From: "Hogander, Jouni" <jouni.hogander@intel.com>
To: "dri-devel@lists.freedesktop.org"
<dri-devel@lists.freedesktop.org>,
"Nikula, Jani" <jani.nikula@intel.com>,
"intel-gfx@lists.freedesktop.org"
<intel-gfx@lists.freedesktop.org>
Cc: "kees@kernel.org" <kees@kernel.org>,
"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
"linux-hardening@vger.kernel.org"
<linux-hardening@vger.kernel.org>,
"gustavoars@kernel.org" <gustavoars@kernel.org>
Subject: Re: [PATCH 3/3] overflow: add range_overflows() and range_end_overflows()
Date: Mon, 8 Sep 2025 12:28:20 +0000 [thread overview]
Message-ID: <7059a21202d09cbb5d024baa7b566a825f51ee1b.camel@intel.com> (raw)
In-Reply-To: <20250829174601.2163064-3-jani.nikula@intel.com>
On Fri, 2025-08-29 at 20:46 +0300, Jani Nikula wrote:
> Move the range_overflows() and range_end_overflows() along with the
> _t
> variants over from drm/i915 and drm/buddy to overflow.h.
>
> Cc: Kees Cook <kees@kernel.org>
> Cc: Gustavo A. R. Silva <gustavoars@kernel.org>
> Cc: linux-hardening@vger.kernel.org
> Signed-off-by: Jani Nikula <jani.nikula@intel.com>
Reviewed-by: Jouni Högander <jouni.hogander@intel.com>
> ---
> drivers/gpu/drm/i915/i915_utils.h | 70 -----------------------------
> --
> include/drm/drm_buddy.h | 9 ----
> include/linux/overflow.h | 70
> +++++++++++++++++++++++++++++++
> 3 files changed, 70 insertions(+), 79 deletions(-)
>
> diff --git a/drivers/gpu/drm/i915/i915_utils.h
> b/drivers/gpu/drm/i915/i915_utils.h
> index 968dae941532..eb4d43c40009 100644
> --- a/drivers/gpu/drm/i915/i915_utils.h
> +++ b/drivers/gpu/drm/i915/i915_utils.h
> @@ -67,76 +67,6 @@ bool i915_error_injected(void);
> drm_err(&(i915)->drm, fmt, ##__VA_ARGS__); \
> })
>
> -/**
> - * range_overflows() - Check if a range is out of bounds
> - * @start: Start of the range.
> - * @size: Size of the range.
> - * @max: Exclusive upper boundary.
> - *
> - * A strict check to determine if the range [@start, @start + @size)
> is
> - * invalid with respect to the allowable range [0, @max). Any range
> - * starting at or beyond @max is considered an overflow, even if
> @size is 0.
> - *
> - * Returns: true if the range is out of bounds.
> - */
> -#define range_overflows(start, size, max) ({ \
> - typeof(start) start__ = (start); \
> - typeof(size) size__ = (size); \
> - typeof(max) max__ = (max); \
> - (void)(&start__ == &size__); \
> - (void)(&start__ == &max__); \
> - start__ >= max__ || size__ > max__ - start__; \
> -})
> -
> -/**
> - * range_overflows_t() - Check if a range is out of bounds
> - * @type: Data type to use.
> - * @start: Start of the range.
> - * @size: Size of the range.
> - * @max: Exclusive upper boundary.
> - *
> - * Same as range_overflows() but forcing the parameters to @type.
> - *
> - * Returns: true if the range is out of bounds.
> - */
> -#define range_overflows_t(type, start, size, max) \
> - range_overflows((type)(start), (type)(size), (type)(max))
> -
> -/**
> - * range_end_overflows() - Check if a range's endpoint is out of
> bounds
> - * @start: Start of the range.
> - * @size: Size of the range.
> - * @max: Exclusive upper boundary.
> - *
> - * Checks only if the endpoint of a range (@start + @size) exceeds
> @max.
> - * Unlike range_overflows(), a zero-sized range at the boundary
> (@start == @max)
> - * is not considered an overflow. Useful for iterator-style checks.
> - *
> - * Returns: true if the endpoint exceeds the boundary.
> - */
> -#define range_end_overflows(start, size, max) ({ \
> - typeof(start) start__ = (start); \
> - typeof(size) size__ = (size); \
> - typeof(max) max__ = (max); \
> - (void)(&start__ == &size__); \
> - (void)(&start__ == &max__); \
> - start__ > max__ || size__ > max__ - start__; \
> -})
> -
> -/**
> - * range_end_overflows_t() - Check if a range's endpoint is out of
> bounds
> - * @type: Data type to use.
> - * @start: Start of the range.
> - * @size: Size of the range.
> - * @max: Exclusive upper boundary.
> - *
> - * Same as range_end_overflows() but forcing the parameters to
> @type.
> - *
> - * Returns: true if the endpoint exceeds the boundary.
> - */
> -#define range_end_overflows_t(type, start, size, max) \
> - range_end_overflows((type)(start), (type)(size),
> (type)(max))
> -
> #define ptr_mask_bits(ptr, n)
> ({ \
> unsigned long __v = (unsigned
> long)(ptr); \
> (typeof(ptr))(__v & -
> BIT(n)); \
> diff --git a/include/drm/drm_buddy.h b/include/drm/drm_buddy.h
> index 513837632b7d..04afd7c21a82 100644
> --- a/include/drm/drm_buddy.h
> +++ b/include/drm/drm_buddy.h
> @@ -13,15 +13,6 @@
>
> #include <drm/drm_print.h>
>
> -#define range_overflows(start, size, max) ({ \
> - typeof(start) start__ = (start); \
> - typeof(size) size__ = (size); \
> - typeof(max) max__ = (max); \
> - (void)(&start__ == &size__); \
> - (void)(&start__ == &max__); \
> - start__ >= max__ || size__ > max__ - start__; \
> -})
> -
> #define DRM_BUDDY_RANGE_ALLOCATION BIT(0)
> #define DRM_BUDDY_TOPDOWN_ALLOCATION BIT(1)
> #define DRM_BUDDY_CONTIGUOUS_ALLOCATION BIT(2)
> diff --git a/include/linux/overflow.h b/include/linux/overflow.h
> index 154ed0dbb43f..725f95f7e416 100644
> --- a/include/linux/overflow.h
> +++ b/include/linux/overflow.h
> @@ -238,6 +238,76 @@ static inline bool __must_check
> __must_check_overflow(bool overflow)
> __overflows_type_constexpr(n,
> T), \
> __overflows_type(n, T))
>
> +/**
> + * range_overflows() - Check if a range is out of bounds
> + * @start: Start of the range.
> + * @size: Size of the range.
> + * @max: Exclusive upper boundary.
> + *
> + * A strict check to determine if the range [@start, @start + @size)
> is
> + * invalid with respect to the allowable range [0, @max). Any range
> + * starting at or beyond @max is considered an overflow, even if
> @size is 0.
> + *
> + * Returns: true if the range is out of bounds.
> + */
> +#define range_overflows(start, size, max) ({ \
> + typeof(start) start__ = (start); \
> + typeof(size) size__ = (size); \
> + typeof(max) max__ = (max); \
> + (void)(&start__ == &size__); \
> + (void)(&start__ == &max__); \
> + start__ >= max__ || size__ > max__ - start__; \
> +})
> +
> +/**
> + * range_overflows_t() - Check if a range is out of bounds
> + * @type: Data type to use.
> + * @start: Start of the range.
> + * @size: Size of the range.
> + * @max: Exclusive upper boundary.
> + *
> + * Same as range_overflows() but forcing the parameters to @type.
> + *
> + * Returns: true if the range is out of bounds.
> + */
> +#define range_overflows_t(type, start, size, max) \
> + range_overflows((type)(start), (type)(size), (type)(max))
> +
> +/**
> + * range_end_overflows() - Check if a range's endpoint is out of
> bounds
> + * @start: Start of the range.
> + * @size: Size of the range.
> + * @max: Exclusive upper boundary.
> + *
> + * Checks only if the endpoint of a range (@start + @size) exceeds
> @max.
> + * Unlike range_overflows(), a zero-sized range at the boundary
> (@start == @max)
> + * is not considered an overflow. Useful for iterator-style checks.
> + *
> + * Returns: true if the endpoint exceeds the boundary.
> + */
> +#define range_end_overflows(start, size, max) ({ \
> + typeof(start) start__ = (start); \
> + typeof(size) size__ = (size); \
> + typeof(max) max__ = (max); \
> + (void)(&start__ == &size__); \
> + (void)(&start__ == &max__); \
> + start__ > max__ || size__ > max__ - start__; \
> +})
> +
> +/**
> + * range_end_overflows_t() - Check if a range's endpoint is out of
> bounds
> + * @type: Data type to use.
> + * @start: Start of the range.
> + * @size: Size of the range.
> + * @max: Exclusive upper boundary.
> + *
> + * Same as range_end_overflows() but forcing the parameters to
> @type.
> + *
> + * Returns: true if the endpoint exceeds the boundary.
> + */
> +#define range_end_overflows_t(type, start, size, max) \
> + range_end_overflows((type)(start), (type)(size),
> (type)(max))
> +
> /**
> * castable_to_type - like __same_type(), but also allows for casted
> literals
> *
next prev parent reply other threads:[~2025-09-08 12:28 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-08-29 17:45 [PATCH 1/3] drm/i915: rename range_overflows_end() to range_end_overflows() Jani Nikula
2025-08-29 17:46 ` [PATCH 2/3] drm/i915: document range_overflows() and range_end_overflows() macros Jani Nikula
2025-09-08 12:27 ` Hogander, Jouni
2025-08-29 17:46 ` [PATCH 3/3] overflow: add range_overflows() and range_end_overflows() Jani Nikula
2025-09-04 2:43 ` Kees Cook
2025-09-04 7:34 ` Jani Nikula
2025-09-04 16:27 ` Kees Cook
2025-09-08 12:43 ` Jani Nikula
2025-09-08 12:28 ` Hogander, Jouni [this message]
2025-09-03 10:03 ` [PATCH 1/3] drm/i915: rename range_overflows_end() to range_end_overflows() Hogander, Jouni
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=7059a21202d09cbb5d024baa7b566a825f51ee1b.camel@intel.com \
--to=jouni.hogander@intel.com \
--cc=dri-devel@lists.freedesktop.org \
--cc=gustavoars@kernel.org \
--cc=intel-gfx@lists.freedesktop.org \
--cc=jani.nikula@intel.com \
--cc=kees@kernel.org \
--cc=linux-hardening@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).