]> git.kernelconcepts.de Git - karo-tx-linux.git/commitdiff
Revert "Merge branch 'ipv6-overflow-arith'"
authorHannes Frederic Sowa <hannes@stressinduktion.org>
Wed, 28 Oct 2015 12:21:03 +0000 (13:21 +0100)
committerDavid S. Miller <davem@davemloft.net>
Thu, 29 Oct 2015 14:01:48 +0000 (07:01 -0700)
Linus dislikes these changes. To not hold up the net-merge let's revert
it for now and fix the bug like Linus suggested.

This reverts commit ec3661b42257d9a06cf0d318175623ac7a660113, reversing
changes made to c80dbe04612986fd6104b4a1be21681b113b5ac9.

Cc: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
include/linux/compiler-gcc.h
include/linux/overflow-arith.h [deleted file]
net/ipv6/ip6_output.c

index 82c159e0532aeac8901caea417eddfd6b16e2f12..dfaa7b3e9ae900676b61dc7c3f693c78de97e8cd 100644 (file)
 #define KASAN_ABI_VERSION 3
 #endif
 
-#if GCC_VERSION >= 50000
-#define CC_HAVE_BUILTIN_OVERFLOW
-#endif
-
 #endif /* gcc version >= 40000 specific checks */
 
 #if !defined(__noclone)
diff --git a/include/linux/overflow-arith.h b/include/linux/overflow-arith.h
deleted file mode 100644 (file)
index e12ccf8..0000000
+++ /dev/null
@@ -1,18 +0,0 @@
-#pragma once
-
-#include <linux/kernel.h>
-
-#ifdef CC_HAVE_BUILTIN_OVERFLOW
-
-#define overflow_usub __builtin_usub_overflow
-
-#else
-
-static inline bool overflow_usub(unsigned int a, unsigned int b,
-                                unsigned int *res)
-{
-       *res = a - b;
-       return *res > a ? true : false;
-}
-
-#endif
index 8dddb45c433e53ad35d30cd4263a5a5080cd0da9..d03d6da772f3bc394aaee0aa7e6694bed6cf56ac 100644 (file)
@@ -28,7 +28,6 @@
 
 #include <linux/errno.h>
 #include <linux/kernel.h>
-#include <linux/overflow-arith.h>
 #include <linux/string.h>
 #include <linux/socket.h>
 #include <linux/net.h>
@@ -585,10 +584,7 @@ int ip6_fragment(struct sock *sk, struct sk_buff *skb,
                if (np->frag_size)
                        mtu = np->frag_size;
        }
-
-       if (overflow_usub(mtu, hlen + sizeof(struct frag_hdr), &mtu) ||
-           mtu <= 7)
-               goto fail_toobig;
+       mtu -= hlen + sizeof(struct frag_hdr);
 
        frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
                                    &ipv6_hdr(skb)->saddr);