The patch titled
     expose-range-checking-functions-from-arch-specific update
has been removed from the -mm tree.  Its filename was
     expose-range-checking-functions-from-arch-specific-update.patch

This patch was dropped because it was folded into 
expose-range-checking-functions-from-arch-specific.patch

------------------------------------------------------
Subject: expose-range-checking-functions-from-arch-specific update
From: Rusty Russell <[EMAIL PROTECTED]>

range_within() was too ambitious: it started inspiring people.  Remove it.

val_outside() was a terrible name, too.  Try range_over_limit().

Signed-off-by: Rusty Russell <[EMAIL PROTECTED]>
Cc: <[email protected]>
Cc: Randy Dunlap <[EMAIL PROTECTED]>
Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
---

 include/asm-generic/range.h |   12 ++++++------
 include/asm-i386/range.h    |    8 ++++----
 include/asm-i386/uaccess.h  |    8 ++++----
 include/linux/kernel.h      |   21 ---------------------
 4 files changed, 14 insertions(+), 35 deletions(-)

diff -puN 
include/asm-generic/range.h~expose-range-checking-functions-from-arch-specific-update
 include/asm-generic/range.h
--- 
a/include/asm-generic/range.h~expose-range-checking-functions-from-arch-specific-update
+++ a/include/asm-generic/range.h
@@ -2,18 +2,18 @@
 #define _ASM_GENERIC_RANGE_H
 
 /**
- * val_outside - is a value and length past a limit?
- * @val: the start value
+ * range_over_limit() - is a start and length past a limit?
+ * @start: the start value
  * @len: the length from the start
  * @limit: the first invalid value
  *
- * Like val + len > limit, except with overflow checking.
+ * Like start + len > limit, except with overflow checking.
  */
-static inline bool val_outside(unsigned long val, unsigned long len,
-                              unsigned long limit)
+static inline bool range_over_limit(unsigned long start, unsigned long len,
+                                   unsigned long limit)
 
 {
-       return val + len > limit || val + len < val;
+       return start + len > limit || start + len < start;
 }
 
 #endif /* _ASM_GENERIC_RANGE_H */
diff -puN 
include/asm-i386/range.h~expose-range-checking-functions-from-arch-specific-update
 include/asm-i386/range.h
--- 
a/include/asm-i386/range.h~expose-range-checking-functions-from-arch-specific-update
+++ a/include/asm-i386/range.h
@@ -1,14 +1,14 @@
 #ifndef __ASM_RANGE_H
 #define __ASM_RANGE_H
 
-/* Is val + size > limit? This needs 33-bit arithmetic. We have a carry... */
-static inline bool val_outside(unsigned long val, unsigned long len,
-                              unsigned long limit)
+/* Is start + size > limit? This needs 33-bit arithmetic. We have a carry... */
+static inline bool range_over_limit(unsigned long start, unsigned long len,
+                                   unsigned long limit)
 {
        unsigned long flag, roksum;
        asm("addl %3,%1 ; sbbl %0,%0; cmpl %1,%4; sbbl $0,%0"
                :"=&r" (flag), "=r" (roksum)
-               :"1" (val), "g" (len), "rm" (limit));
+               :"1" (start), "g" (len), "rm" (limit));
        return flag;
 }
 #endif /* __ASM_RANGE_H */
diff -puN 
include/asm-i386/uaccess.h~expose-range-checking-functions-from-arch-specific-update
 include/asm-i386/uaccess.h
--- 
a/include/asm-i386/uaccess.h~expose-range-checking-functions-from-arch-specific-update
+++ a/include/asm-i386/uaccess.h
@@ -51,10 +51,10 @@ extern struct movsl_mask {
  * This is equivalent to the following test:
  * (u33)addr + (u33)size > (u33)current->addr_limit.seg
  */
-#define __range_ok(addr, size) ({                              \
-       __chk_user_ptr(addr);                                   \
-       val_outside((int)(addr), (size),                        \
-                   current_thread_info()->addr_limit.seg);     \
+#define __range_ok(addr, size) ({                                      \
+       __chk_user_ptr(addr);                                           \
+       range_over_limit((int)(addr), (size),                           \
+                        current_thread_info()->addr_limit.seg);        \
 })
 
 /**
diff -puN 
include/linux/kernel.h~expose-range-checking-functions-from-arch-specific-update
 include/linux/kernel.h
--- 
a/include/linux/kernel.h~expose-range-checking-functions-from-arch-specific-update
+++ a/include/linux/kernel.h
@@ -16,7 +16,6 @@
 #include <linux/log2.h>
 #include <asm/byteorder.h>
 #include <asm/bug.h>
-#include <asm/range.h>
 
 extern const char linux_banner[];
 extern const char linux_proc_banner[];
@@ -312,26 +311,6 @@ static inline int __attribute__ ((format
        (void)__tmp; \
 })
 
-/**
- * range_within - is one range within another?
- * @start: the start value
- * @len: the length from the start
- * @base: the first valid value
- * @limit: the first invalid value
- *
- * This is usually used for memory range testing.  The common cases of
- * constant 0 start and constant 0 len cases are optimized out.
- */
-static inline bool range_within(unsigned long start, unsigned long len,
-                               unsigned long base, unsigned long limit)
-{
-       if (start < base)
-               return false;
-       if (__builtin_constant_p(len) && len == 0)
-               return start - base <= limit - base;
-       return !val_outside(limit, start, len);
-}
-
 struct sysinfo;
 extern int do_sysinfo(struct sysinfo *info);
 
_

Patches currently in -mm which might be from [EMAIL PROTECTED] are

origin.patch
extend-print_symbol-capability.patch
git-kbuild.patch
xfs-clean-up-shrinker-games.patch
mm-clean-up-and-kernelify-shrinker-registration.patch
array_size-check-for-type.patch
module-use-krealloc.patch
futex-restartable-futex_wait.patch
add-ability-to-keep-track-of-callers-of-symbol_getput.patch
update-mtd-use-of-symbol_getput.patch
update-dvb-use-of-symbol_getput.patch
simplify-module_get_kallsym-by-dropping-length-arg.patch
fix-race-between-rmmod-and-cat-proc-kallsyms.patch
simplify-kallsyms_lookup.patch
fix-race-between-cat-proc-wchan-and-rmmod-et-al.patch
fix-race-between-cat-proc-slab_allocators-and-rmmod.patch
expose-range-checking-functions-from-arch-specific.patch
expose-range-checking-functions-from-arch-specific-update.patch
expose-range-checking-functions-from-arch-specific-update-fix.patch
____call_usermodehelper-dont-flush_signals.patch
wait_for_helper-remove-unneeded-do_sigaction.patch
lguest-the-guest-code.patch
lguest-vs-x86_64-mm-use-per-cpu-variables-for-gdt-pda.patch
lguest-the-guest-code-update-lguests-patch-code-for-new-paravirt-patch.patch
lguest-the-host-code.patch
lguest-the-host-code-vs-x86_64-mm-i386-separate-hardware-defined-tss-from-linux-additions.patch
lguest-the-host-code-fix-lguest-oops-when-guest-dies-while-receiving-i-o.patch
lguest-the-host-code-simplification-dont-pin-guest-trap-handlers.patch
lguest-the-asm-offsets.patch
lguest-the-makefile-and-kconfig.patch
lguest-the-console-driver.patch
lguest-the-net-driver.patch
lguest-the-block-driver.patch
lguest-the-documentation-example-launcher.patch
lguest-the-documentation-example-launcher-fix-lguest-documentation-error.patch
mm-clean-up-and-kernelify-shrinker-registration-reiser4.patch

-
To unsubscribe from this list: send the line "unsubscribe linux-arch" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to