From nobody Mon Dec 1 22:03:46 2025 Received: from mail-dy1-f177.google.com (mail-dy1-f177.google.com [74.125.82.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0200A2D6E7C for ; Fri, 28 Nov 2025 03:39:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.82.177 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764301145; cv=none; b=C+WjxokDXf2wM9gV9C2dXLCxiyRWiUU7wu/wKt9OW8ifzgEEKCuHJstjNjjX4q5jatuEnoecLj1JpXi+muLqNypiVpFkbXMB3FUTaaYsm6wrmt6Eg8BDW/hUp16NVdubQkgFIEprOCYoFv1UJi6J9ZRApX0ZWD2DUofya+peIqE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764301145; c=relaxed/simple; bh=MJtcgcMVRbYqnz7yUeXOqkpQ9bJ6N+uilCKOuFcLl7w=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=J5NwxzPjcm02AcoVyC9b644kEv3fjDe918s1z5okYEdeW6KIU+AA8dtcXVZLctjLZcogNJAtksJR2qPQUTcQKOC9i8qRVecGeg7jGWJ1aocgnKn6jQy7H3ccbdM5g14rLmfzZFx6HR15tumsqZ1vzNMYOn/hNA3a5LSmxhfbS+A= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=YNXca38o; arc=none smtp.client-ip=74.125.82.177 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="YNXca38o" Received: by mail-dy1-f177.google.com with SMTP id 5a478bee46e88-2a45877bd5eso3402450eec.0 for ; Thu, 27 Nov 2025 19:39:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1764301143; x=1764905943; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=iXLSGxyqlw9PW9NDqgFwLCeID+cibWsbL+ACEydXwXc=; b=YNXca38oDHluT8SnWtE8fYPvLA0bnx2/Aq1SAToE+Eg2S5+oWjtbsS3qFMc4Wcb75+ ev42RpVfVNR/4+LsMANrg1tWuP3HWKRTqxxgUSV0pnrJLMpnjJfuc/kwmOVars31nevO Cle9pCOGPCevycQRlUWY/tkG24d3Rou1fDleTRNN37uImpB1UcLUoLFBIhXxAGRheBAx QGjPnQTkgRH6TL4GIK+Zcs5z4RVcjyxuBiSAEj6dOkUlJgpxgLmmVX7t39YDnJDoDT1f VMlJINj81TPckhsZtCLNmChYUybAobdGalR0T4RXU4oYZh+9+MaSU1YhBrm4Ar5fsM8T BV2A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1764301143; x=1764905943; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=iXLSGxyqlw9PW9NDqgFwLCeID+cibWsbL+ACEydXwXc=; b=WAXPjvl+vx9YLNf3GOOWaXf/lvwTk6xSLlq8TbuvTxhoXLHgA6+luCYPa7fNnlmlDc kpQKM7jYGT1TbkzmDEt6a7MTAcn9BW/CRe6hcXa6ziROrCHjTT/b2se4t5GFE5oeBVZV s2t69swhyxtRINE1jPPcVINYa57RTtsGHOEOwvFqsXq29gzO75Xa+TTrAAybgHUvIl+t hj2mWQ4q+02YFbwDiQCoVxzgPClLrKxKJubsPlUWofyHtExr8DFIMjoNgZW3X1SaQgT7 gRlrX74nkGelmlokKpiSOWQiegdwIifkHNJt6mPX6IyJThzMRauERgfN5s+jBqk1Zd9k iIJQ== X-Forwarded-Encrypted: i=1; AJvYcCUOMVzFA+TqVvfYS6WuHtNeEttm7vCiTBAs2I9Lizw8ihWaxSJ36b2MoKWnE3cASvXTolvndKnVeKGwaQA=@vger.kernel.org X-Gm-Message-State: AOJu0YxN20prFiak34qOQ1RlBlXzTmT+9k7nIuQccXIFVPBpYQxscbXL 7+Ouosg6vRY4DZ4eSOTFrDRLo73kCGRzSpax1LPcsIZD+jNuZsT3BV1sWxOnbg== X-Gm-Gg: ASbGnct9lXoo1VN0FuyyrVML5kHLGgPRAGGNuz5N6v8QhG7hrBB8DIoJtDwiJXknTKn 7wcj8kAzbdd3D63gErLYvD1jktH7zc3ZDgbjSpj+nPdDTILuYwaDlR0On7tE2Tv7J4NAXLUFVqv xtQKZfNizOqmOaBD/wUL3240E86Lr0D+4lGOzcvMjDeZzbRGp3nOyZ/idgkyZVS4EaYD2yylfHB EtDVbi1E1oc/4Z8iwaV1Kq+DssX8eGerfy2Be2Opp/dkaR8S5Q5N7Ck2dnHH/WppAqhMyMCrYDL devHEphfsRm98qottqCoMOADhwiSAI3WHY8ssgLTmkfycdXoTW0r39LAgCL39yoI4tYJtMyTcD1 QlWPDW5znMlIFSQsA6lU4GMMsrB6+niWQpa/V4iLX5ugFJ8fP6iLhdi7GWdLYHpyIMGJvwComyE AlAcmZFNzHApb7G4ym3zsrzLKO6zJt1qBcepzOKMFfSl4= X-Google-Smtp-Source: AGHT+IE3ELtSLAn3cS8ZIIaoCXejMxDH6G7MwxZ/EqUfIf2ZaCbtg0fJtBdYds0m+odBYLXmysvpmA== X-Received: by 2002:a05:7300:a2ca:b0:2a6:a306:efdb with SMTP id 5a478bee46e88-2a718576e14mr17180250eec.3.1764301142957; Thu, 27 Nov 2025 19:39:02 -0800 (PST) Received: from ParadiseLost.localdomain (lohr.com.br. [177.69.253.233]) by smtp.gmail.com with ESMTPSA id a92af1059eb24-11dcb03cc7dsm13999469c88.5.2025.11.27.19.39.01 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 Nov 2025 19:39:02 -0800 (PST) From: "Rafael V. Volkmer" To: Kees Cook Cc: "Gustavo A . R . Silva" , linux-hardening@vger.kernel.org, linux-kernel@vger.kernel.org, "Rafael V. Volkmer" Subject: [PATCH 2/2] overflow: add size_shl() helper for saturated left shifts Date: Fri, 28 Nov 2025 00:38:30 -0300 Message-ID: <20251128033830.331426-3-rafael.v.volkmer@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20251128033830.331426-1-rafael.v.volkmer@gmail.com> References: <20251128033830.331426-1-rafael.v.volkmer@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Introduce size_shl() as a sibling to size_mul(), size_add() and size_sub() for the left-shift case. It computes value << shift with both operands promoted to size_t and uses check_shl_overflow() to detect invalid or overflowing shifts, returning SIZE_MAX on failure. No functional change for existing callers; this only adds a new helper. Signed-off-by: Rafael V. Volkmer --- include/linux/overflow.h | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) diff --git a/include/linux/overflow.h b/include/linux/overflow.h index ca8252e625d5..91d0b5b00a56 100644 --- a/include/linux/overflow.h +++ b/include/linux/overflow.h @@ -404,6 +404,25 @@ static inline size_t __must_check size_sub(size_t minu= end, size_t subtrahend) return bytes; } =20 +/** + * size_shl() - Calculate size_t left shift with saturation at SIZE_MAX + * @value: value to be shifted + * @shift: how many bits left to shift + * + * Returns: calculate @value << @shift, both promoted to size_t, with any + * overflow or invalid shift causing the return value to be SIZE_MAX. The + * lvalue must be size_t to avoid implicit type conversion. + */ +static inline size_t __must_check size_shl(size_t value, size_t shift) +{ + size_t out; + + if (check_shl_overflow(value, shift, &out)) + return SIZE_MAX; + + return out; +} + /** * array_size() - Calculate size of 2-dimensional array. * @a: dimension one --=20 2.43.0