Em Mon, Apr 16, 2018 at 01:54:30PM -0300, Arnaldo Carvalho de Melo escreveu:
> Em Sun, Apr 15, 2018 at 11:23:50AM +0200, Jiri Olsa escreveu:
> > Return immediately when we find issue in the user
> > stack checks. The error value could get overwritten
> > by following check for PERF_SAMPLE_REGS_INTR.
> > 
> > Signed-off-by: Jiri Olsa <jo...@kernel.org>
> 
> Also, since you're sending this to syskaller-bugs, was this something
> reported by that tool? If so I think we should communicate with him,
> like described in its docs, no? /me goes to find the doc snippet...

Ok, you did it in 2/3, nevermind then :-)
 
- Arnaldo
> 
> 
> >  kernel/events/core.c | 4 ++--
> >  1 file changed, 2 insertions(+), 2 deletions(-)
> > 
> > diff --git a/kernel/events/core.c b/kernel/events/core.c
> > index fc1c330c6bd6..4d997bc064d2 100644
> > --- a/kernel/events/core.c
> > +++ b/kernel/events/core.c
> > @@ -10191,9 +10191,9 @@ static int perf_copy_attr(struct perf_event_attr 
> > __user *uattr,
> >              * __u16 sample size limit.
> >              */
> >             if (attr->sample_stack_user >= USHRT_MAX)
> > -                   ret = -EINVAL;
> > +                   return -EINVAL;
> >             else if (!IS_ALIGNED(attr->sample_stack_user, sizeof(u64)))
> > -                   ret = -EINVAL;
> > +                   return -EINVAL;
> >     }
> >  
> >     if (!attr->sample_max_stack)
> > -- 
> > 2.13.6

Reply via email to