Message ID | cover.1664882725.git.research_trasio@irq.a4lg.com |
---|---|
Headers |
Return-Path: <gdb-patches-bounces+patchwork=sourceware.org@sourceware.org> X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id E3915385383F for <patchwork@sourceware.org>; Tue, 4 Oct 2022 11:26:36 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org E3915385383F DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1664882796; bh=HMRey27JVokUP/ARfdDwsinverfFUgiCNhj/iusfwas=; h=To:Subject:Date:In-Reply-To:References:List-Id:List-Unsubscribe: List-Archive:List-Post:List-Help:List-Subscribe:From:Reply-To:Cc: From; b=RZhklMPWoWn9ED71W9sX0gGIXKv2so+oPL4UlSkLJ0nQk42oOPqZasij8kglUT7kH 6tC5yM8X6waBHJb2zR54g4KLk+Ro9Gd2nfm0TKU+rgrEpth7GUwg6sA2/vARV2rxo1 7iZ1fIHtouXTONfmw2BFH0PEkwLvzl8v1tgD5orI= X-Original-To: gdb-patches@sourceware.org Delivered-To: gdb-patches@sourceware.org Received: from mail-sender-0.a4lg.com (mail-sender-0.a4lg.com [IPv6:2401:2500:203:30b:4000:6bfe:4757:0]) by sourceware.org (Postfix) with ESMTPS id ED4303858C74; Tue, 4 Oct 2022 11:26:02 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org ED4303858C74 Received: from [127.0.0.1] (localhost [127.0.0.1]) by mail-sender-0.a4lg.com (Postfix) with ESMTPSA id 8C44F300089; Tue, 4 Oct 2022 11:26:00 +0000 (UTC) To: Tsukasa OI <research_trasio@irq.a4lg.com>, Nelson Chu <nelson@rivosinc.com>, Kito Cheng <kito.cheng@sifive.com>, Palmer Dabbelt <palmer@dabbelt.com>, Andrew Burgess <aburgess@redhat.com>, Jan Beulich <jbeulich@suse.com>, Andreas Schwab <schwab@suse.de> Subject: [PATCH v3 0/2] RISC-V: Fix buffer overflow after 176-bit instruction support Date: Tue, 4 Oct 2022 11:25:55 +0000 Message-Id: <cover.1664882725.git.research_trasio@irq.a4lg.com> In-Reply-To: <cover.1664876744.git.research_trasio@irq.a4lg.com> References: <cover.1664876744.git.research_trasio@irq.a4lg.com> Mime-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-6.0 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, KAM_MANYTO, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gdb-patches@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gdb-patches mailing list <gdb-patches.sourceware.org> List-Unsubscribe: <https://sourceware.org/mailman/options/gdb-patches>, <mailto:gdb-patches-request@sourceware.org?subject=unsubscribe> List-Archive: <https://sourceware.org/pipermail/gdb-patches/> List-Post: <mailto:gdb-patches@sourceware.org> List-Help: <mailto:gdb-patches-request@sourceware.org?subject=help> List-Subscribe: <https://sourceware.org/mailman/listinfo/gdb-patches>, <mailto:gdb-patches-request@sourceware.org?subject=subscribe> From: Tsukasa OI via Gdb-patches <gdb-patches@sourceware.org> Reply-To: Tsukasa OI <research_trasio@irq.a4lg.com> Cc: binutils@sourceware.org, gdb-patches@sourceware.org Errors-To: gdb-patches-bounces+patchwork=sourceware.org@sourceware.org Sender: "Gdb-patches" <gdb-patches-bounces+patchwork=sourceware.org@sourceware.org> |
Series |
RISC-V: Fix buffer overflow after 176-bit instruction support
|
|
Message
Tsukasa OI
Oct. 4, 2022, 11:25 a.m. UTC
Hello, This is the PATCH v3 for quick stack buffer overflow fix. [Changes: v2 -> v3] - PATCH 1/2: Define RISCV_MAX_INSN_LEN in riscv_insn_length function (idea by Jan Beulich) - PATCH 2/2: Fix comment and commit message [Changes: v1 -> v2] - Fix assertion failure on riscv_insn::decode - Use new constant RISCV_MAX_INSN_LEN for buffer size PATCH 1: Binutils PATCH 2: GDB (v2/3: depends on PATCH 1) Thanks, Tsukasa Tsukasa OI (2): RISC-V: Fix buffer overflow on print_insn_riscv gdb/riscv: Partial support for instructions up to 176-bit gdb/riscv-tdep.c | 9 +++++---- include/opcode/riscv.h | 2 ++ opcodes/riscv-dis.c | 2 +- 3 files changed, 8 insertions(+), 5 deletions(-) base-commit: d71eca64e70c31e0d32396a0b6c60e3ea9eb420b
Comments
On 04.10.2022 13:25, Tsukasa OI wrote: > This is the PATCH v3 for quick stack buffer overflow fix. > > [Changes: v2 -> v3] > - PATCH 1/2: Define RISCV_MAX_INSN_LEN in riscv_insn_length function > (idea by Jan Beulich) > - PATCH 2/2: Fix comment and commit message Lgtm now, fwiw. Like elsewhere I'd prefer the arch maintainers to actually approve the change to go in. Jan
OK, thanks. If the problem is resolved and test cases are passed, please commit. Thanks Nelson On Tue, Oct 4, 2022 at 8:23 PM Jan Beulich <jbeulich@suse.com> wrote: > > On 04.10.2022 13:25, Tsukasa OI wrote: > > This is the PATCH v3 for quick stack buffer overflow fix. > > > > [Changes: v2 -> v3] > > - PATCH 1/2: Define RISCV_MAX_INSN_LEN in riscv_insn_length function > > (idea by Jan Beulich) > > - PATCH 2/2: Fix comment and commit message > > Lgtm now, fwiw. Like elsewhere I'd prefer the arch maintainers to actually > approve the change to go in. > > Jan