Received: by 2002:a05:7412:a9a3:b0:f9:327e:43ab with SMTP id o35csp103781rdh; Mon, 18 Dec 2023 05:45:45 -0800 (PST) X-Google-Smtp-Source: AGHT+IGLgx7Zxwvx35GHmP4FQcQpD3xsurhv6wHmsXz2ifYmDhMWjgqAAqex20Bl0MJEYW+B2wWs X-Received: by 2002:a50:9b07:0:b0:552:8151:c192 with SMTP id o7-20020a509b07000000b005528151c192mr4269975edi.6.1702907145666; Mon, 18 Dec 2023 05:45:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702907145; cv=none; d=google.com; s=arc-20160816; b=MXJt7/T7UlmFDr42D9FpBHXrG1Kt0Ps4D/CEjthXRjTPYzT7oNfDl3GZU/Ix/I6B/u hDXXN7GKtiWEv3u5PXRTy6/c6/A067n7D7oGHm1eWjfJh+s4BzdAf3gGD8Axn5kA/uj9 1V3i5d/rQOQx6qokIdkh4DrgiS//vl8aPuF13dWs2uqyBpDt854IvbtMKxLOr7LXnClh BcRFcswC3BmLO6BWGN5br3rZAOT5zdM3SU7mZE53bBGckOHdlsimmOBi7ESqwnRVkoPe 1ILJbh/PstbvHqyyPkdh8WZJdUJcIgBuY6KxbP/SOwpIUzbmPLobsjVf+nJVuqyeZxSl SVow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=1ixXR3XKTH39hKKYBoKlldaXP+hnNl1nKybCK1Edi+M=; fh=CXMbWrEbrLa49KXm5MmBQF2gPSAj7ur4j6UkrmXWnZw=; b=e9Xh4RDB7Dwpo77Airu0u1LDFpNsF9dE07obV3i64csawZA+H8UQvhGOYWPwZC3x6X hORBETy1x9+iB6LcSkUCBK9PcP4SSpTi2Xb3jKxPY7PH5vuqqeNSV9I+BhKlRfoqHKPR /Ou93wvmGzPP0WXlJNaPc5xaTDvF6JXSHM13bTSDP6BmHOBMxEn5osGATcagMSoj1Tzv SHuL12xhZP9FModdhFIFHFjmjIvBCp7HEPS4bqwHM9Yvux29erz3uPX4tcUqsyvMjg9G 9lE3ikacpa3v6zscfmh+5zk2b5FtCVWn7JSSLvFLexODlyz6wpSjJ8hFO44vMlM0KM2W ofyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=SAiaqNnm; spf=pass (google.com: domain of linux-kernel+bounces-3769-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-3769-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id n6-20020a50cc46000000b0055317f73474si1662390edi.324.2023.12.18.05.45.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 Dec 2023 05:45:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-3769-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=SAiaqNnm; spf=pass (google.com: domain of linux-kernel+bounces-3769-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-3769-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 6A08B1F2306A for ; Mon, 18 Dec 2023 13:45:45 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7B0F91D123; Mon, 18 Dec 2023 13:45:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="SAiaqNnm" X-Original-To: linux-kernel@vger.kernel.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 68D7911185 for ; Mon, 18 Dec 2023 13:45:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1702907133; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=1ixXR3XKTH39hKKYBoKlldaXP+hnNl1nKybCK1Edi+M=; b=SAiaqNnmKlUCIdzeHzpnaEJlcETnsapzVS0/1eJrbelLEvmXr0pK5WbMklOS3zg3TN+rhc LfDRCI0LJSj/F5QbURo4ow2nzQcpTGXjNtxEVjZn9NkbCEblvYPunWg0Ht+6G2hk7DGLYP Qnpg/rvr+GM376vwX8KuahIW77n3w0s= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-689-D2zy3ttpM2yrOdXBVjGhbg-1; Mon, 18 Dec 2023 08:45:30 -0500 X-MC-Unique: D2zy3ttpM2yrOdXBVjGhbg-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com [10.11.54.8]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id CAFDA1C3B641; Mon, 18 Dec 2023 13:45:28 +0000 (UTC) Received: from localhost (unknown [10.72.116.38]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 73714C159B0; Mon, 18 Dec 2023 13:45:27 +0000 (UTC) Date: Mon, 18 Dec 2023 21:45:24 +0800 From: Baoquan He To: Yuntao Wang Cc: linux-kernel@vger.kernel.org, kexec@lists.infradead.org, x86@kernel.org, Andrew Morton , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Vivek Goyal , Dave Young , Hari Bathini , Sean Christopherson , Takashi Iwai Subject: Re: [PATCH 0/2] crash: fix potential cmem->ranges array overflow Message-ID: References: <20231218081915.24120-1-ytcoode@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231218081915.24120-1-ytcoode@gmail.com> X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.8 Hi Yuntao, On 12/18/23 at 04:19pm, Yuntao Wang wrote: > This series tries to fix the potential cmem->ranges array overflow. This series looks good to me. While you'd better talk to fuqiang to ask if he wants to post these or wants to give up. He posted patch to raise the potention issue and I suggested him to do these during the discussion. Without consulting him for opinion to take over a discussing work, it's not suggested, I would say. https://lore.kernel.org/all/ZXrY7QbXAlxydsSC@MiWiFi-R3L-srv/T/#u > > Yuntao Wang (2): > x86/crash: fix potential cmem->ranges array overflow > crash_core: fix out-of-bounds access check in > crash_exclude_mem_range() > > arch/x86/kernel/crash.c | 9 +++++---- > kernel/crash_core.c | 2 +- > 2 files changed, 6 insertions(+), 5 deletions(-) > > -- > 2.43.0 >