On Wed, Dec 11, 2013 at 08:45:47AM -0600, Tom Lendacky wrote:
> 
> On Wednesday, December 11, 2013 01:51:50 PM Dan Carpenter wrote:
> > Hello Tom Lendacky,
> > 
> > The patch 0ab0a1d505ab: "crypto: ccp - CCP SHA crypto API support"
> > from Nov 12, 2013, leads to the following static checker warning:
> >     drivers/crypto/ccp/ccp-crypto-sha.c:182 ccp_do_sha_update()
> >     warn: should 'rctx->hash_cnt << 3' be a 64 bit type?
> > 
> > drivers/crypto/ccp/ccp-crypto-sha.c
> >    180                  sg_mark_end(sg);
> >    181
> >    182          rctx->msg_bits += (rctx->hash_cnt << 3);        /* Total in
> > bits */ ^^^^^^^^^^^^^^^^^^^
> > This operation wraps if the msg is over 500MB.  I'm not sure if that's
> > possible, but ->msg_bits is declared as a u64 here and in
> > rctx->cmd.u.sha.msg_bits as well.
> 
> I should probably cast hash_cnt to a u64 before doing the shift to be
> sure I don't lose any bits.  So that I can validate my fix, which static
> checker did you run?
> 

I haven't released the Smatch check for this...  I need to tweak it so
it has fewer false positives.

regards,
dan carpenter

--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to