All of lore.kernel.org
 help / color / mirror / Atom feed
From: sashiko-bot@kernel.org
To: "Arnaldo Carvalho de Melo" <acme@kernel.org>
Cc: linux-perf-users@vger.kernel.org
Subject: Re: [PATCH 12/28] perf cpumap: Reject RANGE_CPUS with start_cpu > end_cpu
Date: Tue, 12 May 2026 21:37:24 +0000	[thread overview]
Message-ID: <20260512213725.1D22CC2BCB0@smtp.kernel.org> (raw)
In-Reply-To: <20260510033424.255812-13-acme@kernel.org>

Thank you for your contribution! Sashiko AI review found 2 potential issue(s) to consider:
- [High] Time-of-Check to Time-of-Use (TOCTOU) Heap Buffer Overflow and Out-of-Bounds Read in cpumap parsing.
- [High] Pre-existing Out-of-Bounds Read in `perf_event__process_event_update` due to missing nested payload bounds checks.
--

commit fe3ac4a4fbae6a151523bf3561bfcf888589a6b9
Author: Arnaldo Carvalho de Melo <acme@redhat.com>

perf cpumap: Reject RANGE_CPUS with start_cpu > end_cpu

cpu_map__from_range() computes nr_cpus as end_cpu - start_cpu + 1.
When a crafted perf.data has start_cpu > end_cpu, this wraps to a huge value,
causing a massive allocation attempt. This commit returns NULL when the range
is inverted, clamps any_cpu to a boolean, and hardens cpu_map__from_mask()
to reject unsupported long_size values.

> diff --git a/tools/perf/util/cpumap.c b/tools/perf/util/cpumap.c
> index 11922e1ded844..c32db7b307d7d 100644
> --- a/tools/perf/util/cpumap.c
> +++ b/tools/perf/util/cpumap.c
> @@ -93,9 +93,18 @@ static struct perf_cpu_map *cpu_map__from_entries(const struct perf_record_cpu_m
>  static struct perf_cpu_map *cpu_map__from_mask(const struct perf_record_cpu_map_data *data)
>  {
>  	DECLARE_BITMAP(local_copy, 64);
> -	int weight = 0, mask_nr = data->mask32_data.nr;
> +	int weight = 0, mask_nr;
> +	/* Cache validated long_size — data is mmap'd and could change */
> +	u16 long_size;
>  	struct perf_cpu_map *map;
>  
> +	/* long_size must be 4 or 8; other values overflow cpus_per_i below */
> +	if (data->mask32_data.long_size != 4 && data->mask32_data.long_size != 8)
> +		return NULL;
> +
> +	long_size = data->mask32_data.long_size;

Can this validation check be bypassed if the file is modified concurrently?

Because perf.data files are mapped using MAP_SHARED by default, concurrent
modifications to the file are immediately visible to the perf process.

If valid data is supplied initially, could data->mask32_data.long_size be
concurrently modified after the if statement but before it is assigned to
long_size, defeating this check entirely?

[ ... ]

> @@ -129,8 +141,12 @@ static struct perf_cpu_map *cpu_map__from_range(const struct perf_record_cpu_map
>  	struct perf_cpu_map *map;
>  	unsigned int i = 0;
>  
> +	if (data->range_cpu_data.end_cpu < data->range_cpu_data.start_cpu)
> +		return NULL;
> +
> +	/* any_cpu is boolean (0 or 1), not a count — clamp to avoid inflated nr */
>  	map = perf_cpu_map__empty_new(data->range_cpu_data.end_cpu -
> -				data->range_cpu_data.start_cpu + 1 + data->range_cpu_data.any_cpu);
> +				data->range_cpu_data.start_cpu + 1 + !!data->range_cpu_data.any_cpu);
>  	if (!map)
>  		return NULL;
>  

Does this section allow an out-of-bounds read or write during parsing?

Since perf_cpu_map__empty_new() relies on perf_cpu_map__alloc() defined in
another translation unit, the allocation acts as a compiler memory barrier.
This forces the compiler to reload the boundary fields from the memory-mapped
data pointer.

Could valid bounds be supplied to pass the initial checks, and then
concurrently expanded in the file before the initialization loop:

	for (int cpu = data->range_cpu_data.start_cpu; cpu <= data->range_cpu_data.end_cpu;
	     i++, cpu++) {

causing the loop to read and write significantly past the bounds of the
allocated heap buffer?

Is there a similar out-of-bounds read vulnerability when processing nested CPU
maps?

While session.c explicitly enforces payload boundary checks for standalone
PERF_RECORD_CPU_MAP events to ensure embedded size fields like nr do not
exceed the event's overall header.size, it seems this validation is missing
for nested CPU maps.

When processing PERF_RECORD_EVENT_UPDATE events of type
PERF_EVENT_UPDATE__CPUS, perf_event__process_event_update() passes the nested
cpus payload directly to cpu_map__new_data().

cpu_map__new_data() trusts the embedded size fields without verifying them
against the parent event's size.  Could a malformed perf.data file with a
minimal event header.size but a massive embedded nr value in the nested
payload force the parsing loops to read extensively past the end of the
memory-mapped file?

-- 
Sashiko AI review · https://sashiko.dev/#/patchset/20260510033424.255812-1-acme@kernel.org?part=12

  reply	other threads:[~2026-05-12 21:37 UTC|newest]

Thread overview: 44+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-05-10  3:33 [PATCH 00/28] perf: Harden perf.data parsing against crafted/corrupted files Arnaldo Carvalho de Melo
2026-05-10  3:33 ` [PATCH 01/28] perf session: Add minimum event size validation table Arnaldo Carvalho de Melo
2026-05-11 19:01   ` Ian Rogers
2026-05-10  3:33 ` [PATCH 02/28] perf tools: Fix event_contains() macro to verify full field extent Arnaldo Carvalho de Melo
2026-05-11 23:46   ` sashiko-bot
2026-05-10  3:33 ` [PATCH 03/28] perf zstd: Fix compression error path in zstd_compress_stream_to_records() Arnaldo Carvalho de Melo
2026-05-12  0:13   ` sashiko-bot
2026-05-10  3:33 ` [PATCH 04/28] perf zstd: Fix multi-iteration decompression and error handling Arnaldo Carvalho de Melo
2026-05-10  3:33 ` [PATCH 05/28] perf session: Fix PERF_RECORD_READ swap and dump for variable-length events Arnaldo Carvalho de Melo
2026-05-10  3:33 ` [PATCH 06/28] perf session: Align auxtrace_info priv size before byte-swapping Arnaldo Carvalho de Melo
2026-05-10  3:33 ` [PATCH 07/28] perf session: Add validated swap infrastructure with null-termination checks Arnaldo Carvalho de Melo
2026-05-12  4:08   ` sashiko-bot
2026-05-10  3:33 ` [PATCH 08/28] perf session: Use bounded copy for PERF_RECORD_TIME_CONV Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 09/28] perf session: Validate HEADER_ATTR alignment and attr.size before swapping Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 10/28] perf session: Validate nr fields against event size on both swap and common paths Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 11/28] perf header: Byte-swap build ID event pid and bounds check section entries Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 12/28] perf cpumap: Reject RANGE_CPUS with start_cpu > end_cpu Arnaldo Carvalho de Melo
2026-05-12 21:37   ` sashiko-bot [this message]
2026-05-10  3:34 ` [PATCH 13/28] perf auxtrace: Harden auxtrace_error event handling Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 14/28] perf session: Add byte-swap and bounds check for PERF_RECORD_BPF_METADATA events Arnaldo Carvalho de Melo
2026-05-12 22:58   ` sashiko-bot
2026-05-10  3:34 ` [PATCH 15/28] perf header: Validate null-termination in PERF_RECORD_EVENT_UPDATE string fields Arnaldo Carvalho de Melo
2026-05-12 23:45   ` sashiko-bot
2026-05-10  3:34 ` [PATCH 16/28] perf tools: Bounds check perf_event_attr fields against attr.size before printing Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 17/28] perf header: Propagate feature section processing errors Arnaldo Carvalho de Melo
2026-05-13  3:21   ` sashiko-bot
2026-05-10  3:34 ` [PATCH 18/28] perf header: Validate f_attr.ids section before use in perf_session__read_header() Arnaldo Carvalho de Melo
2026-05-13  4:36   ` sashiko-bot
2026-05-10  3:34 ` [PATCH 19/28] perf header: Validate feature section size and add read path bounds checking Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 20/28] perf header: Sanity check HEADER_EVENT_DESC attr.size before swap Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 21/28] perf header: Validate bitmap size before allocating in do_read_bitmap() Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 22/28] perf session: Add byte-swap for PERF_RECORD_COMPRESSED2 events Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 23/28] perf tools: Harden compressed event processing Arnaldo Carvalho de Melo
2026-05-13 21:56   ` sashiko-bot
2026-05-10  3:34 ` [PATCH 24/28] perf session: Check for decompression buffer size overflow Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 25/28] perf session: Bound nr_cpus_avail and validate sample CPU Arnaldo Carvalho de Melo
2026-05-10  3:34 ` [PATCH 26/28] perf timechart: Bounds check cpu_id and fix topology_map allocation Arnaldo Carvalho de Melo
2026-05-12 18:32   ` Ian Rogers
2026-05-12 19:48     ` Arnaldo Carvalho de Melo
2026-05-13 23:43   ` sashiko-bot
2026-05-10  3:34 ` [PATCH 27/28] perf kwork: Bounds check work->cpu before indexing cpus_runtime[] Arnaldo Carvalho de Melo
2026-05-14  0:06   ` sashiko-bot
2026-05-10  3:34 ` [PATCH 28/28] perf test: Add truncated perf.data robustness test Arnaldo Carvalho de Melo
2026-05-14  0:18   ` sashiko-bot

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20260512213725.1D22CC2BCB0@smtp.kernel.org \
    --to=sashiko-bot@kernel.org \
    --cc=acme@kernel.org \
    --cc=linux-perf-users@vger.kernel.org \
    --cc=sashiko@lists.linux.dev \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.