[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a9336d8418ad95cdf3724bc027aa938371ea6312.camel@intel.com>
Date: Mon, 8 Sep 2025 12:27:46 +0000
From: "Hogander, Jouni" <jouni.hogander@...el.com>
To: "dri-devel@...ts.freedesktop.org" <dri-devel@...ts.freedesktop.org>,
"Nikula, Jani" <jani.nikula@...el.com>, "intel-gfx@...ts.freedesktop.org"
<intel-gfx@...ts.freedesktop.org>
CC: "kees@...nel.org" <kees@...nel.org>, "linux-kernel@...r.kernel.org"
<linux-kernel@...r.kernel.org>, "linux-hardening@...r.kernel.org"
<linux-hardening@...r.kernel.org>, "gustavoars@...nel.org"
<gustavoars@...nel.org>
Subject: Re: [PATCH 2/3] drm/i915: document range_overflows() and
range_end_overflows() macros
On Fri, 2025-08-29 at 20:46 +0300, Jani Nikula wrote:
> Document the macros in preparation for making them more generally
> available.
>
> Cc: Kees Cook <kees@...nel.org>
> Cc: Gustavo A. R. Silva <gustavoars@...nel.org>
> Cc: linux-hardening@...r.kernel.org
> Signed-off-by: Jani Nikula <jani.nikula@...el.com>
Reviewed-by: Jouni Högander <jouni.hogander@...el.com>
> ---
> drivers/gpu/drm/i915/i915_utils.h | 46
> +++++++++++++++++++++++++++++++
> 1 file changed, 46 insertions(+)
>
> diff --git a/drivers/gpu/drm/i915/i915_utils.h
> b/drivers/gpu/drm/i915/i915_utils.h
> index fdac9a158b53..968dae941532 100644
> --- a/drivers/gpu/drm/i915/i915_utils.h
> +++ b/drivers/gpu/drm/i915/i915_utils.h
> @@ -67,6 +67,18 @@ bool i915_error_injected(void);
> drm_err(&(i915)->drm, fmt, ##__VA_ARGS__); \
> })
>
> +/**
> + * range_overflows() - Check if a range is out of bounds
> + * @start: Start of the range.
> + * @size: Size of the range.
> + * @max: Exclusive upper boundary.
> + *
> + * A strict check to determine if the range [@start, @start + @size)
> is
> + * invalid with respect to the allowable range [0, @max). Any range
> + * starting at or beyond @max is considered an overflow, even if
> @size is 0.
> + *
> + * Returns: true if the range is out of bounds.
> + */
> #define range_overflows(start, size, max) ({ \
> typeof(start) start__ = (start); \
> typeof(size) size__ = (size); \
> @@ -76,9 +88,32 @@ bool i915_error_injected(void);
> start__ >= max__ || size__ > max__ - start__; \
> })
>
> +/**
> + * range_overflows_t() - Check if a range is out of bounds
> + * @type: Data type to use.
> + * @start: Start of the range.
> + * @size: Size of the range.
> + * @max: Exclusive upper boundary.
> + *
> + * Same as range_overflows() but forcing the parameters to @type.
> + *
> + * Returns: true if the range is out of bounds.
> + */
> #define range_overflows_t(type, start, size, max) \
> range_overflows((type)(start), (type)(size), (type)(max))
>
> +/**
> + * range_end_overflows() - Check if a range's endpoint is out of
> bounds
> + * @start: Start of the range.
> + * @size: Size of the range.
> + * @max: Exclusive upper boundary.
> + *
> + * Checks only if the endpoint of a range (@start + @size) exceeds
> @max.
> + * Unlike range_overflows(), a zero-sized range at the boundary
> (@start == @max)
> + * is not considered an overflow. Useful for iterator-style checks.
> + *
> + * Returns: true if the endpoint exceeds the boundary.
> + */
> #define range_end_overflows(start, size, max) ({ \
> typeof(start) start__ = (start); \
> typeof(size) size__ = (size); \
> @@ -88,6 +123,17 @@ bool i915_error_injected(void);
> start__ > max__ || size__ > max__ - start__; \
> })
>
> +/**
> + * range_end_overflows_t() - Check if a range's endpoint is out of
> bounds
> + * @type: Data type to use.
> + * @start: Start of the range.
> + * @size: Size of the range.
> + * @max: Exclusive upper boundary.
> + *
> + * Same as range_end_overflows() but forcing the parameters to
> @type.
> + *
> + * Returns: true if the endpoint exceeds the boundary.
> + */
> #define range_end_overflows_t(type, start, size, max) \
> range_end_overflows((type)(start), (type)(size),
> (type)(max))
>
Powered by blists - more mailing lists