summaryrefslogtreecommitdiffstats
path: root/recipes-kernel/linux/linux-ti33x-psp-3.2/3.2.6/0047-eCryptfs-Infinite-loop-due-to-overflow-in-ecryptfs_w.patch
diff options
context:
space:
mode:
authorDenys Dmytriyenko <denys@ti.com>2015-05-06 13:24:53 -0400
committerDenys Dmytriyenko <denys@ti.com>2015-05-06 13:51:41 -0400
commit84a71a2560d56081a04b26fe50cfbb666df22f95 (patch)
treed681a25b2dc1533c5661f31a01fddf934602d0e5 /recipes-kernel/linux/linux-ti33x-psp-3.2/3.2.6/0047-eCryptfs-Infinite-loop-due-to-overflow-in-ecryptfs_w.patch
parent7126dca19c9f109c7394267176547d24fd5eb259 (diff)
downloadmeta-ti-84a71a2560d56081a04b26fe50cfbb666df22f95.tar.gz
linux: remove outdated kernel recipes
Signed-off-by: Denys Dmytriyenko <denys@ti.com>
Diffstat (limited to 'recipes-kernel/linux/linux-ti33x-psp-3.2/3.2.6/0047-eCryptfs-Infinite-loop-due-to-overflow-in-ecryptfs_w.patch')
-rw-r--r--recipes-kernel/linux/linux-ti33x-psp-3.2/3.2.6/0047-eCryptfs-Infinite-loop-due-to-overflow-in-ecryptfs_w.patch51
1 files changed, 0 insertions, 51 deletions
diff --git a/recipes-kernel/linux/linux-ti33x-psp-3.2/3.2.6/0047-eCryptfs-Infinite-loop-due-to-overflow-in-ecryptfs_w.patch b/recipes-kernel/linux/linux-ti33x-psp-3.2/3.2.6/0047-eCryptfs-Infinite-loop-due-to-overflow-in-ecryptfs_w.patch
deleted file mode 100644
index 9f4e173c..00000000
--- a/recipes-kernel/linux/linux-ti33x-psp-3.2/3.2.6/0047-eCryptfs-Infinite-loop-due-to-overflow-in-ecryptfs_w.patch
+++ /dev/null
@@ -1,51 +0,0 @@
1From 66d791bcaed9fa50738794abf5b46abcf2b28656 Mon Sep 17 00:00:00 2001
2From: Li Wang <liwang@nudt.edu.cn>
3Date: Thu, 19 Jan 2012 09:44:36 +0800
4Subject: [PATCH 47/87] eCryptfs: Infinite loop due to overflow in
5 ecryptfs_write()
6
7commit 684a3ff7e69acc7c678d1a1394fe9e757993fd34 upstream.
8
9ecryptfs_write() can enter an infinite loop when truncating a file to a
10size larger than 4G. This only happens on architectures where size_t is
11represented by 32 bits.
12
13This was caused by a size_t overflow due to it incorrectly being used to
14store the result of a calculation which uses potentially large values of
15type loff_t.
16
17[tyhicks@canonical.com: rewrite subject and commit message]
18Signed-off-by: Li Wang <liwang@nudt.edu.cn>
19Signed-off-by: Yunchuan Wen <wenyunchuan@kylinos.com.cn>
20Reviewed-by: Cong Wang <xiyou.wangcong@gmail.com>
21Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
22Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
23---
24 fs/ecryptfs/read_write.c | 4 ++--
25 1 file changed, 2 insertions(+), 2 deletions(-)
26
27diff --git a/fs/ecryptfs/read_write.c b/fs/ecryptfs/read_write.c
28index 54eb14c..608c1c3 100644
29--- a/fs/ecryptfs/read_write.c
30+++ b/fs/ecryptfs/read_write.c
31@@ -130,7 +130,7 @@ int ecryptfs_write(struct inode *ecryptfs_inode, char *data, loff_t offset,
32 pgoff_t ecryptfs_page_idx = (pos >> PAGE_CACHE_SHIFT);
33 size_t start_offset_in_page = (pos & ~PAGE_CACHE_MASK);
34 size_t num_bytes = (PAGE_CACHE_SIZE - start_offset_in_page);
35- size_t total_remaining_bytes = ((offset + size) - pos);
36+ loff_t total_remaining_bytes = ((offset + size) - pos);
37
38 if (fatal_signal_pending(current)) {
39 rc = -EINTR;
40@@ -141,7 +141,7 @@ int ecryptfs_write(struct inode *ecryptfs_inode, char *data, loff_t offset,
41 num_bytes = total_remaining_bytes;
42 if (pos < offset) {
43 /* remaining zeros to write, up to destination offset */
44- size_t total_remaining_zeros = (offset - pos);
45+ loff_t total_remaining_zeros = (offset - pos);
46
47 if (num_bytes > total_remaining_zeros)
48 num_bytes = total_remaining_zeros;
49--
501.7.9.4
51