# git rev-parse -q --verify c9cc0517bba9f0213f1e55172feceb99e5512daf^{commit} c9cc0517bba9f0213f1e55172feceb99e5512daf already have revision, skipping fetch # git checkout -q -f -B kisskb c9cc0517bba9f0213f1e55172feceb99e5512daf # git clean -qxdf # < git log -1 # commit c9cc0517bba9f0213f1e55172feceb99e5512daf # Author: Jason A. Donenfeld # Date: Thu Feb 6 12:42:01 2020 +0100 # # crypto: chacha20poly1305 - prevent integer overflow on large input # # This code assigns src_len (size_t) to sl (int), which causes problems # when src_len is very large. Probably nobody in the kernel should be # passing this much data to chacha20poly1305 all in one go anyway, so I # don't think we need to change the algorithm or introduce larger types # or anything. But we should at least error out early in this case and # print a warning so that we get reports if this does happen and can look # into why anybody is possibly passing it that much data or if they're # accidently passing -1 or similar. # # Fixes: d95312a3ccc0 ("crypto: lib/chacha20poly1305 - reimplement crypt_from_sg() routine") # Cc: Ard Biesheuvel # Cc: stable@vger.kernel.org # 5.5+ # Signed-off-by: Jason A. Donenfeld # Acked-by: Ard Biesheuvel # Signed-off-by: Herbert Xu # < /opt/cross/kisskb/korg/gcc-8.1.0-nolibc/x86_64-linux/bin/x86_64-linux-gcc --version # < /opt/cross/kisskb/korg/gcc-8.1.0-nolibc/x86_64-linux/bin/x86_64-linux-ld --version # < git log --format=%s --max-count=1 c9cc0517bba9f0213f1e55172feceb99e5512daf # < make -s -j 24 ARCH=x86_64 O=/kisskb/build/crypto_x86_64-allnoconfig_x86_64-gcc8 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-8.1.0-nolibc/x86_64-linux/bin/x86_64-linux- allnoconfig # make -s -j 24 ARCH=x86_64 O=/kisskb/build/crypto_x86_64-allnoconfig_x86_64-gcc8 CROSS_COMPILE=/opt/cross/kisskb/korg/gcc-8.1.0-nolibc/x86_64-linux/bin/x86_64-linux- /kisskb/src/tools/objtool Completed OK # rm -rf /kisskb/build/crypto_x86_64-allnoconfig_x86_64-gcc8 # Build took: 0:00:24.103520