Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp167813rwb; Wed, 28 Sep 2022 00:36:24 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5oOX2k3FERZiNjW8POywoX5Wm71M/7MXpaqvS8CXN2r7ZAzqE8otJcuXUb30JAaIB8FXwK X-Received: by 2002:a17:907:1b22:b0:741:8809:b4e6 with SMTP id mp34-20020a1709071b2200b007418809b4e6mr26170251ejc.84.1664350583816; Wed, 28 Sep 2022 00:36:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664350583; cv=none; d=google.com; s=arc-20160816; b=eFFNjUZ6D4MtzYABDzG/NV3y6In+lPVi7dII1VjF5ZmnMMfzQYKIMgQ8itoOk4MBxl 9cM41Hla5Q11FkpKnfH239PHy8AMo6xmLUy1gxh2Xv/C2Ajq+1k2plfQmIqIXEhJGlJL wDVkYpe/TGpN5vuuQvm3A8Qr8zXhA2e8ZUy41bQzNbAH7WnYv/kBF6SH93dxOyeb3rV5 c5zaTVxppL6J6gYb+sLjhM8ZL7FzG+2yWxePYlqqnaQgBmbiwSYOqJ1aAy8zrZEYZBIe WSXCL4UEpldsPPFgNsl7RJQtS9vwYP517F9m5IwUCeyG5b4ij52Oc3ppgXMdkvddKrr7 rEDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:robot-unsubscribe :robot-id:message-id:mime-version:references:in-reply-to:cc:subject :to:reply-to:sender:from:dkim-signature:dkim-signature:date; bh=JykWq5c8PgvO0Em9NwSaZy2eh5npciNbuq8edi2FoO4=; b=Wb2pEtT+j/Cifvp8CgJcom5/7HHAoaDAPWxAaaGX4RDOf8AGz4GRGTAlRiamRqc55r AERyKmvomB70JflvtXLFPqUwA0ki841i1D6cBhzA8cLi0Kl6b5sjOhYHAs4fqWJf8YBd keS2mbcED2jslK6IiV1UkWnYseIqaYrCW2lHQbJDzttZaGIfzosr2EFpTh5HpaO7GFCV 2vC+tkRtZgjUGQ68kdIsPVJwjRasM0m0YLrn5gLYEiF7gu3srmxSfYFfwPlC3LOub0G0 GX/kFLVxgWaI4MaEiAjnWlC3IgM1kVTwDOhtXmSLygxP/DAd2Siqpy1Blhuo4vyJR2d/ qDMw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=SKbew54R; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=Idvj6+On; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cy1-20020a0564021c8100b0045286795667si3682724edb.170.2022.09.28.00.35.54; Wed, 28 Sep 2022 00:36:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=SKbew54R; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=Idvj6+On; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232679AbiI1G5v (ORCPT + 99 others); Wed, 28 Sep 2022 02:57:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44368 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233317AbiI1G52 (ORCPT ); Wed, 28 Sep 2022 02:57:28 -0400 Received: from galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8ED7263F10; Tue, 27 Sep 2022 23:57:23 -0700 (PDT) Date: Wed, 28 Sep 2022 06:57:19 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1664348240; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=JykWq5c8PgvO0Em9NwSaZy2eh5npciNbuq8edi2FoO4=; b=SKbew54R+KbF1OIyE2bQ42y4t0gH16WCgKiU6bhOR8Rocg58UtJ6nd77wF4LYGj69aLyOu gvJbQxdtZF8aO08fAqhyDX8PUZ7EUO2Nku+BdYVSN2YE/eddAHF91VT+2DyMnZZ/3hKpMI P7MNf409spiqlkHFUKGEJDeFF0g52dINhZOrlf555LW1ixbBppxaMWn1s2rgts5uxA8lbp UTSUbySS7ngel2iy2L6wl/fX1Gt88eh4IhJ8MKRyLr9/q/uJ654X/ZFLdB3jzsu/yyF+Kw 334lMxxsbkm64oXgQazu+oe0vthJ4T6M5Cl9NfWMQEh59YV2IZ7dA4zaZXkAcA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1664348240; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=JykWq5c8PgvO0Em9NwSaZy2eh5npciNbuq8edi2FoO4=; b=Idvj6+On7OylSMMxWz3i3oaDUQWIEAiKPb2jo1vtjQ21lfefNONL+J7i+AwrcrOOMGq9nL iEDC2kMiPWteLhBQ== From: "tip-bot2 for Jiri Olsa" Sender: tip-bot2@linutronix.de Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: perf/core] bpf: Check flags for branch stack in bpf_read_branch_records helper Cc: Jiri Olsa , "Peter Zijlstra (Intel)" , Kan Liang , x86@kernel.org, linux-kernel@vger.kernel.org In-Reply-To: <20220927203259.590950-1-jolsa@kernel.org> References: <20220927203259.590950-1-jolsa@kernel.org> MIME-Version: 1.0 Message-ID: <166434823927.401.13847148343207516601.tip-bot2@tip-bot2> Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the perf/core branch of tip: Commit-ID: cce6a2d7e0e494c453ad73e1e78bd50684f20cca Gitweb: https://git.kernel.org/tip/cce6a2d7e0e494c453ad73e1e78bd50684f20cca Author: Jiri Olsa AuthorDate: Tue, 27 Sep 2022 22:32:59 +02:00 Committer: Peter Zijlstra CommitterDate: Tue, 27 Sep 2022 22:50:25 +02:00 bpf: Check flags for branch stack in bpf_read_branch_records helper Recent commit [1] changed branch stack data indication from br_stack pointer to sample_flags in perf_sample_data struct. We need to check sample_flags for PERF_SAMPLE_BRANCH_STACK bit for valid branch stack data. [1] a9a931e26668 ("perf: Use sample_flags for branch stack") Fixes: a9a931e26668 ("perf: Use sample_flags for branch stack") Signed-off-by: Jiri Olsa Signed-off-by: Peter Zijlstra (Intel) Reviewed-by: Kan Liang Link: https://lore.kernel.org/r/20220927203259.590950-1-jolsa@kernel.org --- kernel/trace/bpf_trace.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c index 68e5cdd..1fcd123 100644 --- a/kernel/trace/bpf_trace.c +++ b/kernel/trace/bpf_trace.c @@ -1507,6 +1507,9 @@ BPF_CALL_4(bpf_read_branch_records, struct bpf_perf_event_data_kern *, ctx, if (unlikely(flags & ~BPF_F_GET_BRANCH_RECORDS_SIZE)) return -EINVAL; + if (unlikely(!(ctx->data->sample_flags & PERF_SAMPLE_BRANCH_STACK))) + return -ENOENT; + if (unlikely(!br_stack)) return -ENOENT;