perf arm-spe: Avoid potential buffer overrun
authorIan Rogers <irogers@google.com>
Wed, 7 Apr 2021 15:39:55 +0000 (08:39 -0700)
committerArnaldo Carvalho de Melo <acme@redhat.com>
Wed, 7 Apr 2021 19:23:20 +0000 (16:23 -0300)
commit92f1e8adf7db2ef9b90e5662182810c0cf8ac22e
treec8506787800b6327587706e2540959a16102c59b
parentf2013278ae40b89cc27916366c407ce5261815ef
perf arm-spe: Avoid potential buffer overrun

SPE extended headers are > 1 byte so ensure the buffer contains at least
this before reading. This issue was detected by fuzzing.

Signed-off-by: Ian Rogers <irogers@google.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Andre Przywara <andre.przywara@arm.com>
Cc: Dave Martin <dave.martin@arm.com>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Leo Yan <leo.yan@linaro.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Stephane Eranian <eranian@google.com>
Cc: Will Deacon <will@kernel.org>
Link: http://lore.kernel.org/lkml/20210407153955.317215-1-irogers@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
tools/perf/util/arm-spe-decoder/arm-spe-pkt-decoder.c