From nobody Thu Apr 2 01:54:03 2026 Received: from mail-pj1-f54.google.com (mail-pj1-f54.google.com [209.85.216.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5DC83396B7B for ; Wed, 1 Apr 2026 21:53:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.54 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775080417; cv=none; b=NQk8ko+s1PNIa8U6M5uSOBasI0vsYcA84JJaD4JTNnDy9FGhgjpv7gz3F6wmDnCrn160YBZ2gQkHjBsf+Y0oIZcHxIRKNsXIrR6TEF5xWgZq1869qwMCyoJikB22betyq/jaLqp3UJb/328/QtMIDL1zUHePkuKHZt5XOkGkHqo= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1775080417; c=relaxed/simple; bh=P1A/B5SEhFNrspl1jpQ5Vp/mmn/KnDLxr4+YZIHBwb0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=u2z9VJQMqcdLQds6S0x7LVqUPj2Wuum3vK3JEnyE0GIcZeA5x89u0pExvqu/LBbJrBIpo+ROIsdpbNa2PuIgb13ghwkMwhyZ0zuwPbffgAfAxz+6vMt0cBH+C7lT37mSCs5P6ReoNU6iO+meFoBqyNJKXN2+uib7YEqm/HE1qzM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=RbWa1+Bi; arc=none smtp.client-ip=209.85.216.54 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="RbWa1+Bi" Received: by mail-pj1-f54.google.com with SMTP id 98e67ed59e1d1-35691a231a7so100863a91.3 for ; Wed, 01 Apr 2026 14:53:36 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1775080416; x=1775685216; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=JYk7+CLAHHn5x54H7ZOq36QjL/LAFfK40g57iglkRIM=; b=RbWa1+BicwEj21KKRfxLFuhmsEKcEIDIKGWsKQID1s+qDNaVGzpeJfE6ANUirZwxCY TbGncspF1aGq3WdSgszT/h0hOjfLqiucBxgJY/eksx7DSiz4amzwC9LFlp1Sz6efCBIF ZWxTI8imB9d3IIRAD+mmfc2UFDo5gyU5gm8tHybggcDJ8qRrY/7X7j2UP8/z2UTu0YHp Ehc1q3HhmSg+qiKnNJg+ptBZnnw5l7cxXGqM0S3P/9BbKzLKDNgLbu8+s3t2aZ7gM9aO WHUYzm1w/gPFTXdEOOZh+pfw71TW8k4eRftqZgRwKl7oEgE7Si6VKAL1YUkmR0I9TUGg mLrw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1775080416; x=1775685216; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=JYk7+CLAHHn5x54H7ZOq36QjL/LAFfK40g57iglkRIM=; b=S1UiHr/XMnmaMwTKmk2Fiu80fkS2pxx0kOLvcoTA3MzGQCPbcTYBlesc6WtqXX2lQj fAjAgdznWUvKyUjuSE7RwTPa3Q4ddTRsuS3uP8mMuetB1H2LG3okApNsUVJtzGT4rM9r 2zRj7qcfgwOAD+xVEl6uMMGvx6eE7QTZW9hfS/BsyU79IolmfyE0Os21PwalhFybObiZ ND8zQ6HB9Ipr1jYXI3QnMv+kNHtrsr37CvgZPgNgSJcHPyWz6IKgLEm5xjOmZ8z3mBoa KPUjSJc6ADqZ3wznjsYBayQMwHD1w0neX+DQKLeR0s4bcLM+NWM22xS/dUubXsduXPb5 mMuQ== X-Forwarded-Encrypted: i=1; AJvYcCWcar9m8BJ31HE/AG5uB5WwKSCvsoRFtzKtUmxVo8dNdm0AxKAyUe+UjJtDBi7TbYFiGkPHCjWMx1Ibj8c=@vger.kernel.org X-Gm-Message-State: AOJu0Yz5FrkvzoP6g2yewSsw/rRPked6LjNsr0kcLZNrHlukRLSAdTL+ 2RKUfTG8At1vIxKti2or9y3McJD4OiHyT93nCqexx0kjvchpJUnVOWwi X-Gm-Gg: ATEYQzwHPer8+cUuTQXpG7TpCPBLWpUHMpNPH8Jbn8UtcfnO2+ElYtmoRUUcJNMHfcP sX8pyxhfh5yHyGxh7Eque0V1V8jFrXajPBjVT77xEQ4jU7e8PKEtXccu8wjjZK4D2xC0d7wqLFu cEcfqV8uTIjyQBzYkM128cYPzfZF7dOsjZBuNsPhwTPzg+MWTsY0OsU/DmqnXOCxdC4ik4/w3fB /bppYYG+LVIxmBGImXgJGdWXR8kG/5rQsa2456RnLnKCpDglmfmFRbqG8lYdndZt8F1OMqfpvSS ZhYRC1U217ENFxl20p72z0c/fpfg1N/OhAqsn7njJV6a+Bw5T2SNfjjlAjNw1xNH3uqG2fNaAK2 qP5POAPXf4zj3jquL1L7aUKH6niTKStKCkzhVbIpvJ5GeoL4UUL8zLjiyx1tDlDIFSi6kqEWvBN Qn4HqlHDUzGDZdrdWfhLkZnyJJb2k+HS1nWeqSEPQGcoC6EZg= X-Received: by 2002:a17:90a:e7d0:b0:35b:97ba:acee with SMTP id 98e67ed59e1d1-35dc6edc2edmr4890117a91.17.1775080415644; Wed, 01 Apr 2026 14:53:35 -0700 (PDT) Received: from fedora ([61.74.238.173]) by smtp.gmail.com with ESMTPSA id 98e67ed59e1d1-35dd35e34f9sm733641a91.1.2026.04.01.14.53.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Apr 2026 14:53:35 -0700 (PDT) From: SeungJu Cheon To: peterz@infradead.org, mingo@redhat.com, acme@kernel.org, namhyung@kernel.org Cc: mark.rutland@arm.com, alexander.shishkin@linux.intel.com, jolsa@kernel.org, irogers@google.com, adrian.hunter@intel.com, brcampbell@google.com, shuah@kernel.org, linux-perf-users@vger.kernel.org, linux-kernel@vger.kernel.org, SeungJu Cheon Subject: [PATCH v2] perf header: Validate build_id filename length to prevent buffer overflow Date: Thu, 2 Apr 2026 06:53:10 +0900 Message-ID: <20260401215310.348463-1-suunj1331@gmail.com> X-Mailer: git-send-email 2.52.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The build_id parsing functions calculate a filename length from the event header size and read directly into a stack buffer of PATH_MAX bytes without bounds checking. A malformed perf.data file with a crafted header.size can cause the length to be negative or exceed PATH_MAX, resulting in a stack buffer overflow. Add bounds checking for the filename length in both perf_header__read_build_ids() and the ABI quirk variant. Print a warning message when invalid length is detected. Signed-off-by: SeungJu Cheon Reviewed-by: Ian Rogers --- v2: - Add warning message when invalid filename length detected --- tools/perf/util/header.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/tools/perf/util/header.c b/tools/perf/util/header.c index 9142a8ba4019..132d360d716a 100644 --- a/tools/perf/util/header.c +++ b/tools/perf/util/header.c @@ -2545,6 +2545,11 @@ static int perf_header__read_build_ids_abi_quirk(str= uct perf_header *header, perf_event_header__bswap(&old_bev.header); =20 len =3D old_bev.header.size - sizeof(old_bev); + if (len < 0 || len >=3D PATH_MAX) { + pr_warning("invalid build_id filename length %d\n", len); + return -1; + } + if (readn(input, filename, len) !=3D len) return -1; =20 @@ -2587,6 +2592,11 @@ static int perf_header__read_build_ids(struct perf_h= eader *header, perf_event_header__bswap(&bev.header); =20 len =3D bev.header.size - sizeof(bev); + if (len < 0 || len >=3D PATH_MAX) { + pr_warning("invalid build_id filename length %d\n", len); + goto out; + } + if (readn(input, filename, len) !=3D len) goto out; /* --=20 2.52.0