]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
coresight: tmc: Explicit type conversions to prevent integer overflow
authorRuidong Tian <tianruidong@linux.alibaba.com>
Fri, 4 Aug 2023 08:15:14 +0000 (16:15 +0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 13 Sep 2023 07:48:29 +0000 (09:48 +0200)
[ Upstream commit fd380097cdb305582b7a1f9476391330299d2c59 ]

Perf cs_etm session executed unexpectedly when AUX buffer > 1G.

  perf record -C 0 -m ,2G -e cs_etm// -- <workload>
  [ perf record: Captured and wrote 2.615 MB perf.data ]

Perf only collect about 2M perf data rather than 2G. This is becasuse
the operation, "nr_pages << PAGE_SHIFT", in coresight tmc driver, will
overflow when nr_pages >= 0x80000(correspond to 1G AUX buffer). The
overflow cause buffer allocation to fail, and TMC driver will alloc
minimal buffer size(1M). You can just get about 2M perf data(1M AUX
buffer + perf data header) at least.

Explicit convert nr_pages to 64 bit to avoid overflow.

Fixes: 22f429f19c41 ("coresight: etm-perf: Add support for ETR backend")
Fixes: 99443ea19e8b ("coresight: Add generic TMC sg table framework")
Fixes: 2e499bbc1a92 ("coresight: tmc: implementing TMC-ETF AUX space API")
Signed-off-by: Ruidong Tian <tianruidong@linux.alibaba.com>
Reviewed-by: James Clark <james.clark@arm.com>
Signed-off-by: Suzuki K Poulose <suzuki.poulose@arm.com>
Link: https://lore.kernel.org/r/20230804081514.120171-2-tianruidong@linux.alibaba.com
Signed-off-by: Sasha Levin <sashal@kernel.org>
drivers/hwtracing/coresight/coresight-tmc-etf.c
drivers/hwtracing/coresight/coresight-tmc-etr.c
drivers/hwtracing/coresight/coresight-tmc.h

index 0ab1f73c2d06a56becefd29f56d5ce693c8275e8..e374b02d98be36d0f2e3209a709312940e57490c 100644 (file)
@@ -450,7 +450,7 @@ static int tmc_set_etf_buffer(struct coresight_device *csdev,
                return -EINVAL;
 
        /* wrap head around to the amount of space we have */
-       head = handle->head & ((buf->nr_pages << PAGE_SHIFT) - 1);
+       head = handle->head & (((unsigned long)buf->nr_pages << PAGE_SHIFT) - 1);
 
        /* find the page to write to */
        buf->cur = head / PAGE_SIZE;
index eaa296ced167893770a3695a1e9b8fb24098d861..8ef4a2a13427e1eed31b5cb27ae6e644e8c9bb94 100644 (file)
@@ -45,7 +45,8 @@ struct etr_perf_buffer {
 };
 
 /* Convert the perf index to an offset within the ETR buffer */
-#define PERF_IDX2OFF(idx, buf) ((idx) % ((buf)->nr_pages << PAGE_SHIFT))
+#define PERF_IDX2OFF(idx, buf)         \
+               ((idx) % ((unsigned long)(buf)->nr_pages << PAGE_SHIFT))
 
 /* Lower limit for ETR hardware buffer */
 #define TMC_ETR_PERF_MIN_BUF_SIZE      SZ_1M
@@ -1262,7 +1263,7 @@ alloc_etr_buf(struct tmc_drvdata *drvdata, struct perf_event *event,
         * than the size requested via sysfs.
         */
        if ((nr_pages << PAGE_SHIFT) > drvdata->size) {
-               etr_buf = tmc_alloc_etr_buf(drvdata, (nr_pages << PAGE_SHIFT),
+               etr_buf = tmc_alloc_etr_buf(drvdata, ((ssize_t)nr_pages << PAGE_SHIFT),
                                            0, node, NULL);
                if (!IS_ERR(etr_buf))
                        goto done;
index 01c0382a29c0a9808c317ae4d2f2d83b1ab1b85f..26e6356261c113b1a8a4a96fa6a2f89fadd6441f 100644 (file)
@@ -325,7 +325,7 @@ ssize_t tmc_sg_table_get_data(struct tmc_sg_table *sg_table,
 static inline unsigned long
 tmc_sg_table_buf_size(struct tmc_sg_table *sg_table)
 {
-       return sg_table->data_pages.nr_pages << PAGE_SHIFT;
+       return (unsigned long)sg_table->data_pages.nr_pages << PAGE_SHIFT;
 }
 
 struct coresight_device *tmc_etr_get_catu_device(struct tmc_drvdata *drvdata);