Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2649789pxj; Mon, 14 Jun 2021 04:02:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx3moQi4Wakn3YcQEbeg5Qthqx2vnv8jhdECWRbWo2kGG+Cwswr1bA+ynrIs/ysIB+PTFDj X-Received: by 2002:a17:906:3006:: with SMTP id 6mr15054079ejz.73.1623668563124; Mon, 14 Jun 2021 04:02:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623668563; cv=none; d=google.com; s=arc-20160816; b=euhNiPY/1R6ci5Ro1yrj91BdlwhANkCIo24QEpgWcFyIc0jMYt0rnmSLmAgOarM40b xAob4rl1+VQMQJt1c5JsTmU9m93sHAShO6FZiLYpSdIHKuy+YtMRzjU/hmj7Z0CLVT/Z XOSe0EJkiPiZHuYqbEMLSPK0uS53lMecE2CL7qej7pXMfdSBJcwMxPT2mxpQ0ac/po4d k/HlXo4F5HihT1txcd1FndJtfSO+C2sP/uPJHJd5DjnA6Aq31gAu8MQ4S4L4HfACGZBg yfDY8gscF32V/SQeum3s06h9UzjTWbhwolCdvCTpUtvVwYC8kWkMhDkvpg5AH/UDSdpB SIXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=xr2LuXnl8VYYpf2nOOAGacb3cHJCToRiM3mIeE1sIO0=; b=psXv+2app4mU3/fzotPwlYgOM4WQ89pYoj6IPBcqQtKQTDZRAhZAMoAxcX9mtmSmyk APXBwvhCaqBnfkbB55znJFVJJkuKT6V4ld31i93ubjlcGQKWfxBrCeIiNuAY/sD648w3 a3HmSjJMvBAZf83qFmiAIOxVt7TxDrK27Zg4Sg5aMBNh4UOZRUGQ/Nx7w7wwK8pkn3cG TYV5+PDRoLdj0CCCV0NhuMW4gy/BEZRa3a5FIPTEdG1Ls6IrFVuL8eXjB2qtMNx/kJP8 z81nB9R/exTzfRpNKZSFATr1jxWDETIWNKusDZKbMZCpFHX8bWnVGYN0BrCq9i9MDJay gsMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CWHXQxv1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yd10si10717271ejb.249.2021.06.14.04.02.20; Mon, 14 Jun 2021 04:02:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=CWHXQxv1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234815AbhFNLDN (ORCPT + 99 others); Mon, 14 Jun 2021 07:03:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:58192 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234847AbhFNKyc (ORCPT ); Mon, 14 Jun 2021 06:54:32 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1859261490; Mon, 14 Jun 2021 10:40:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623667222; bh=pKJfy3nXKu+knlbuBGoOjIAmt7isEgtgwAYMAdlimKE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CWHXQxv1GoEo1wG5oXqyBduCjuMZytS0Uovg8k4GE6ibyxU9IjMF6PpAG4bS0b4A8 qVdd6Apo7hI1D3qa5kvRrVDORKU9eUbxXN/vL72FnP9TwuNLS1xOHUGqR6FBQLGVIk 6I/zm073SCvSsOLwG9KwulW+KYZr5WVHkfk2jemA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Leo Yan , Adrian Hunter , Jiri Olsa , Alexander Shishkin , Kan Liang , Mark Rutland , Namhyung Kim , Peter Zijlstra , Arnaldo Carvalho de Melo , Sasha Levin Subject: [PATCH 5.4 74/84] perf session: Correct buffer copying when peeking events Date: Mon, 14 Jun 2021 12:27:52 +0200 Message-Id: <20210614102648.872694302@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210614102646.341387537@linuxfoundation.org> References: <20210614102646.341387537@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Leo Yan [ Upstream commit 197eecb6ecae0b04bd694432f640ff75597fed9c ] When peeking an event, it has a short path and a long path. The short path uses the session pointer "one_mmap_addr" to directly fetch the event; and the long path needs to read out the event header and the following event data from file and fill into the buffer pointer passed through the argument "buf". The issue is in the long path that it copies the event header and event data into the same destination address which pointer "buf", this means the event header is overwritten. We are just lucky to run into the short path in most cases, so we don't hit the issue in the long path. This patch adds the offset "hdr_sz" to the pointer "buf" when copying the event data, so that it can reserve the event header which can be used properly by its caller. Fixes: 5a52f33adf02 ("perf session: Add perf_session__peek_event()") Signed-off-by: Leo Yan Acked-by: Adrian Hunter Acked-by: Jiri Olsa Cc: Alexander Shishkin Cc: Kan Liang Cc: Mark Rutland Cc: Namhyung Kim Cc: Peter Zijlstra Link: http://lore.kernel.org/lkml/20210605052957.1070720-1-leo.yan@linaro.org Signed-off-by: Arnaldo Carvalho de Melo Signed-off-by: Sasha Levin --- tools/perf/util/session.c | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/perf/util/session.c b/tools/perf/util/session.c index 56f3039fe2a7..8ff2c98e9032 100644 --- a/tools/perf/util/session.c +++ b/tools/perf/util/session.c @@ -1631,6 +1631,7 @@ int perf_session__peek_event(struct perf_session *session, off_t file_offset, if (event->header.size < hdr_sz || event->header.size > buf_sz) return -1; + buf += hdr_sz; rest = event->header.size - hdr_sz; if (readn(fd, buf, rest) != (ssize_t)rest) -- 2.30.2