Skip to content

Commit ec3661b

Browse files
committed
Merge branch 'ipv6-overflow-arith'
Hannes Frederic Sowa says: ==================== overflow-arith: begin to add support for overflow builtins functions I add a new header, linux/overflow-arith.h, as the central place to add overflow and wrap-around checking functions. The reason I am doing so is that it can make use of compiler supported builtin functions which can leverage hardware. As I need this for a fix in the ipv6 stack, which is also included in this series, I propose to add it sooner than later over Davem's net tree. This is also the reason why I start slowly with only the one function I need at this time. ==================== Signed-off-by: David S. Miller <[email protected]>
2 parents c80dbe0 + b72a2b0 commit ec3661b

File tree

3 files changed

+27
-1
lines changed

3 files changed

+27
-1
lines changed

include/linux/compiler-gcc.h

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -237,6 +237,10 @@
237237
#define KASAN_ABI_VERSION 3
238238
#endif
239239

240+
#if GCC_VERSION >= 50000
241+
#define CC_HAVE_BUILTIN_OVERFLOW
242+
#endif
243+
240244
#endif /* gcc version >= 40000 specific checks */
241245

242246
#if !defined(__noclone)

include/linux/overflow-arith.h

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
#pragma once
2+
3+
#include <linux/kernel.h>
4+
5+
#ifdef CC_HAVE_BUILTIN_OVERFLOW
6+
7+
#define overflow_usub __builtin_usub_overflow
8+
9+
#else
10+
11+
static inline bool overflow_usub(unsigned int a, unsigned int b,
12+
unsigned int *res)
13+
{
14+
*res = a - b;
15+
return *res > a ? true : false;
16+
}
17+
18+
#endif

net/ipv6/ip6_output.c

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@
2828

2929
#include <linux/errno.h>
3030
#include <linux/kernel.h>
31+
#include <linux/overflow-arith.h>
3132
#include <linux/string.h>
3233
#include <linux/socket.h>
3334
#include <linux/net.h>
@@ -584,7 +585,10 @@ int ip6_fragment(struct sock *sk, struct sk_buff *skb,
584585
if (np->frag_size)
585586
mtu = np->frag_size;
586587
}
587-
mtu -= hlen + sizeof(struct frag_hdr);
588+
589+
if (overflow_usub(mtu, hlen + sizeof(struct frag_hdr), &mtu) ||
590+
mtu <= 7)
591+
goto fail_toobig;
588592

589593
frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
590594
&ipv6_hdr(skb)->saddr);

0 commit comments

Comments
 (0)