lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <202509171303.b892ad4b-lkp@intel.com>
Date: Wed, 17 Sep 2025 14:20:10 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Swapnil Sapkal <swapnil.sapkal@....com>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>,
	<linux-perf-users@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
	<peterz@...radead.org>, <mingo@...hat.com>, <acme@...nel.org>,
	<namhyung@...nel.org>, <irogers@...gle.com>, <james.clark@....com>,
	<ravi.bangoria@....com>, <swapnil.sapkal@....com>, <yu.c.chen@...el.com>,
	<mark.rutland@....com>, <alexander.shishkin@...ux.intel.com>,
	<jolsa@...nel.org>, <rostedt@...dmis.org>, <vincent.guittot@...aro.org>,
	<adrian.hunter@...el.com>, <kan.liang@...ux.intel.com>,
	<gautham.shenoy@....com>, <kprateek.nayak@....com>, <juri.lelli@...hat.com>,
	<yangjihong@...edance.com>, <void@...ifault.com>, <tj@...nel.org>,
	<sshegde@...ux.ibm.com>, <ctshao@...gle.com>, <quic_zhonhan@...cinc.com>,
	<thomas.falcon@...el.com>, <blakejones@...gle.com>, <ashelat@...hat.com>,
	<leo.yan@....com>, <dvyukov@...gle.com>, <ak@...ux.intel.com>,
	<yujie.liu@...el.com>, <graham.woodward@....com>, <ben.gainey@....com>,
	<vineethr@...ux.ibm.com>, <tim.c.chen@...ux.intel.com>, <linux@...blig.org>,
	<santosh.shukla@....com>, <sandipan.das@....com>, <oliver.sang@...el.com>
Subject: Re: [PATCH RESEND v4 03/11] perf header: Support CPU DOMAIN relation
 info



Hello,

kernel test robot noticed "perf-sanity-tests.perf_pipe_recording_and_injection_test.fail" on:

commit: 01c79e2544b044e2c01ab435a28a03c3f0d63be3 ("[PATCH RESEND v4 03/11] perf header: Support CPU DOMAIN relation info")
url: https://github.com/intel-lab-lkp/linux/commits/Swapnil-Sapkal/perf-Add-print_separator-to-util/20250909-195256
base: https://git.kernel.org/cgit/linux/kernel/git/perf/perf-tools-next.git perf-tools-next
patch link: https://lore.kernel.org/all/20250909114227.58802-4-swapnil.sapkal@amd.com/
patch subject: [PATCH RESEND v4 03/11] perf header: Support CPU DOMAIN relation info

in testcase: perf-sanity-tests
version: 
with following parameters:

	perf_compiler: gcc
	group: group-02



config: x86_64-rhel-9.4-bpf
compiler: gcc-14
test machine: 256 threads 2 sockets GENUINE INTEL(R) XEON(R) (Sierra Forest) with 128G memory

(please refer to attached dmesg/kmsg for entire log/backtrace)



If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202509171303.b892ad4b-lkp@intel.com


we also observed failure of perf-sanity-tests.Zstd_perf.data_compression/decompression
which can pass on parent.

138d89b6ba9cd79a 01c79e2544b044e2c01ab435a28
---------------- ---------------------------
       fail:runs  %reproduction    fail:runs
           |             |             |
           :6          100%           6:6     perf-sanity-tests.Zstd_perf.data_compression/decompression.fail
           :6          100%           6:6     perf-sanity-tests.perf_pipe_recording_and_injection_test.fail



2025-09-15 14:22:07 sudo /usr/src/linux-perf-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf test 88 -v
 88: perf pipe recording and injection test                          : Running (1 active)
--- start ---
test child forked, pid 16787
 140175e-1401871 l noploop
perf does have symbol 'noploop'

Record+report pipe test
util/util.c:295:6: runtime error: index 64 out of bounds for type 'char [17]'
util/util.c:295:12: runtime error: store to address 0x7f4b418a1060 with insufficient space for an object of type 'char'
0x7f4b418a1060: note: pointer points here
 00 00 00 00  01 00 00 00 00 00 00 00  18 00 04 2e 00 00 00 00  9d 77 00 00 00 00 00 00  02 00 00 00
              ^ 
=================================================================
==16803==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f4b418a1050 at pc 0x561dc13e9257 bp 0x7ffe75d35540 sp 0x7ffe75d35538
WRITE of size 1 at 0x7f4b418a1050 thread T0
    #0 0x561dc13e9256 in cpumask_to_cpulist util/util.c:295
    #1 0x561dc11fb37b in build_cpu_domain_map util/header.c:1727
    #2 0x561dc11fb91f in write_cpu_domain_info util/header.c:1753
    #3 0x561dc145a9ef in perf_event__synthesize_features util/synthetic-events.c:2419
    #4 0x561dc145b224 in perf_event__synthesize_for_pipe util/synthetic-events.c:2471
    #5 0x561dc0bc2085 in record__synthesize /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2063
    #6 0x561dc0bc9ded in __cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2581
    #7 0x561dc0bda8cb in cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:4376
    #8 0x561dc0de7aac in run_builtin /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:349
    #9 0x561dc0de839d in handle_internal_command /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:401
    #10 0x561dc0de88f3 in run_argv /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:445
    #11 0x561dc0de909a in main /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:553
    #12 0x7f4b4efc7ca7  (/lib/x86_64-linux-gnu/libc.so.6+0x29ca7) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #13 0x7f4b4efc7d64 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29d64) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #14 0x561dc0b58470 in _start (/usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf+0xf9b470) (BuildId: 7c6fd1162dbb1e721de92bbfd9fc751e2178f1fa)

Address 0x7f4b418a1050 is located in stack of thread T0 at offset 80 in frame
    #0 0x561dc13e8c26 in cpumask_to_cpulist util/util.c:267

  This frame has 2 object(s):
    [32, 49) 'blk' (line 291)
    [96, 1120) 'cpus' (line 271) <== Memory access at offset 80 underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow util/util.c:295 in cpumask_to_cpulist
Shadow bytes around the buggy address:
  0x7f4b418a0d80: 00 00 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3
  0x7f4b418a0e00: f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00
  0x7f4b418a0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f4b418a0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f4b418a0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x7f4b418a1000: f1 f1 f1 f1 00 00 01 f2 f2 f2[f2]f2 00 00 00 00
  0x7f4b418a1080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f4b418a1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f4b418a1180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f4b418a1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f4b418a1280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
==16803==ABORTING
Record+report pipe test [Failed - cannot find the test file in the perf report #1]

Inject -B build-ids test
util/util.c:295:6: runtime error: index 64 out of bounds for type 'char [17]'
util/util.c:295:12: runtime error: store to address 0x7faa03ca1060 with insufficient space for an object of type 'char'
0x7faa03ca1060: note: pointer points here
 00 00 00 00  01 00 00 00 00 00 00 00  18 00 04 2e 00 00 00 00  9d 77 00 00 00 00 00 00  02 00 00 00
              ^ 
=================================================================
==16818==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7faa03ca1050 at pc 0x5613ca51a257 bp 0x7ffde4af7240 sp 0x7ffde4af7238
WRITE of size 1 at 0x7faa03ca1050 thread T0
    #0 0x5613ca51a256 in cpumask_to_cpulist util/util.c:295
    #1 0x5613ca32c37b in build_cpu_domain_map util/header.c:1727
    #2 0x5613ca32c91f in write_cpu_domain_info util/header.c:1753
    #3 0x5613ca58b9ef in perf_event__synthesize_features util/synthetic-events.c:2419
    #4 0x5613ca58c224 in perf_event__synthesize_for_pipe util/synthetic-events.c:2471
    #5 0x5613c9cf3085 in record__synthesize /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2063
    #6 0x5613c9cfaded in __cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2581
    #7 0x5613c9d0b8cb in cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:4376
    #8 0x5613c9f18aac in run_builtin /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:349
    #9 0x5613c9f1939d in handle_internal_command /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:401
    #10 0x5613c9f198f3 in run_argv /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:445
    #11 0x5613c9f1a09a in main /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:553
    #12 0x7faa11387ca7  (/lib/x86_64-linux-gnu/libc.so.6+0x29ca7) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #13 0x7faa11387d64 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29d64) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #14 0x5613c9c89470 in _start (/usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf+0xf9b470) (BuildId: 7c6fd1162dbb1e721de92bbfd9fc751e2178f1fa)

Address 0x7faa03ca1050 is located in stack of thread T0 at offset 80 in frame
    #0 0x5613ca519c26 in cpumask_to_cpulist util/util.c:267

  This frame has 2 object(s):
    [32, 49) 'blk' (line 291)
    [96, 1120) 'cpus' (line 271) <== Memory access at offset 80 underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow util/util.c:295 in cpumask_to_cpulist
Shadow bytes around the buggy address:
  0x7faa03ca0d80: 00 00 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3
  0x7faa03ca0e00: f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00
  0x7faa03ca0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7faa03ca0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7faa03ca0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x7faa03ca1000: f1 f1 f1 f1 00 00 01 f2 f2 f2[f2]f2 00 00 00 00
  0x7faa03ca1080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7faa03ca1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7faa03ca1180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7faa03ca1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7faa03ca1280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
==16818==ABORTING
Error:
The - data has no samples!
Inject build-ids test [Failed - cannot find noploop function in pipe #1]

Inject -b build-ids test
util/util.c:295:6: runtime error: index 64 out of bounds for type 'char [17]'
util/util.c:295:12: runtime error: store to address 0x7fad986a1060 with insufficient space for an object of type 'char'
0x7fad986a1060: note: pointer points here
 00 00 00 00  01 00 00 00 00 00 00 00  18 00 04 2e 00 00 00 00  9d 77 00 00 00 00 00 00  02 00 00 00
              ^ 
=================================================================
==16835==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fad986a1050 at pc 0x563c459e2257 bp 0x7ffe9db4ac80 sp 0x7ffe9db4ac78
WRITE of size 1 at 0x7fad986a1050 thread T0
    #0 0x563c459e2256 in cpumask_to_cpulist util/util.c:295
    #1 0x563c457f437b in build_cpu_domain_map util/header.c:1727
    #2 0x563c457f491f in write_cpu_domain_info util/header.c:1753
    #3 0x563c45a539ef in perf_event__synthesize_features util/synthetic-events.c:2419
    #4 0x563c45a54224 in perf_event__synthesize_for_pipe util/synthetic-events.c:2471
    #5 0x563c451bb085 in record__synthesize /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2063
    #6 0x563c451c2ded in __cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2581
    #7 0x563c451d38cb in cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:4376
    #8 0x563c453e0aac in run_builtin /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:349
    #9 0x563c453e139d in handle_internal_command /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:401
    #10 0x563c453e18f3 in run_argv /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:445
    #11 0x563c453e209a in main /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:553
    #12 0x7fada5de9ca7  (/lib/x86_64-linux-gnu/libc.so.6+0x29ca7) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #13 0x7fada5de9d64 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29d64) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #14 0x563c45151470 in _start (/usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf+0xf9b470) (BuildId: 7c6fd1162dbb1e721de92bbfd9fc751e2178f1fa)

Address 0x7fad986a1050 is located in stack of thread T0 at offset 80 in frame
    #0 0x563c459e1c26 in cpumask_to_cpulist util/util.c:267

  This frame has 2 object(s):
    [32, 49) 'blk' (line 291)
    [96, 1120) 'cpus' (line 271) <== Memory access at offset 80 underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow util/util.c:295 in cpumask_to_cpulist
Shadow bytes around the buggy address:
  0x7fad986a0d80: 00 00 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3
  0x7fad986a0e00: f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00
  0x7fad986a0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fad986a0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fad986a0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x7fad986a1000: f1 f1 f1 f1 00 00 01 f2 f2 f2[f2]f2 00 00 00 00
  0x7fad986a1080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fad986a1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fad986a1180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fad986a1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fad986a1280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
==16835==ABORTING
Error:
The - data has no samples!
Inject build-ids test [Failed - cannot find noploop function in pipe #1]

Inject --buildid-all build-ids test
util/util.c:295:6: runtime error: index 64 out of bounds for type 'char [17]'
util/util.c:295:12: runtime error: store to address 0x7fb708ca1060 with insufficient space for an object of type 'char'
0x7fb708ca1060: note: pointer points here
 00 00 00 00  01 00 00 00 00 00 00 00  18 00 04 2e 00 00 00 00  9d 77 00 00 00 00 00 00  02 00 00 00
              ^ 
=================================================================
==16849==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fb708ca1050 at pc 0x55677eb40257 bp 0x7ffe5b049bd0 sp 0x7ffe5b049bc8
WRITE of size 1 at 0x7fb708ca1050 thread T0
    #0 0x55677eb40256 in cpumask_to_cpulist util/util.c:295
    #1 0x55677e95237b in build_cpu_domain_map util/header.c:1727
    #2 0x55677e95291f in write_cpu_domain_info util/header.c:1753
    #3 0x55677ebb19ef in perf_event__synthesize_features util/synthetic-events.c:2419
    #4 0x55677ebb2224 in perf_event__synthesize_for_pipe util/synthetic-events.c:2471
    #5 0x55677e319085 in record__synthesize /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2063
    #6 0x55677e320ded in __cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2581
    #7 0x55677e3318cb in cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:4376
    #8 0x55677e53eaac in run_builtin /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:349
    #9 0x55677e53f39d in handle_internal_command /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:401
    #10 0x55677e53f8f3 in run_argv /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:445
    #11 0x55677e54009a in main /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:553
    #12 0x7fb716412ca7  (/lib/x86_64-linux-gnu/libc.so.6+0x29ca7) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #13 0x7fb716412d64 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29d64) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #14 0x55677e2af470 in _start (/usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf+0xf9b470) (BuildId: 7c6fd1162dbb1e721de92bbfd9fc751e2178f1fa)

Address 0x7fb708ca1050 is located in stack of thread T0 at offset 80 in frame
    #0 0x55677eb3fc26 in cpumask_to_cpulist util/util.c:267

  This frame has 2 object(s):
    [32, 49) 'blk' (line 291)
    [96, 1120) 'cpus' (line 271) <== Memory access at offset 80 underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow util/util.c:295 in cpumask_to_cpulist
Shadow bytes around the buggy address:
  0x7fb708ca0d80: 00 00 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3
  0x7fb708ca0e00: f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00
  0x7fb708ca0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fb708ca0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fb708ca0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x7fb708ca1000: f1 f1 f1 f1 00 00 01 f2 f2 f2[f2]f2 00 00 00 00
  0x7fb708ca1080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fb708ca1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fb708ca1180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fb708ca1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7fb708ca1280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
==16849==ABORTING
Error:
The - data has no samples!
Inject build-ids test [Failed - cannot find noploop function in pipe #1]

Inject --mmap2-buildid-all build-ids test
util/util.c:295:6: runtime error: index 64 out of bounds for type 'char [17]'
util/util.c:295:12: runtime error: store to address 0x7f790f8a1060 with insufficient space for an object of type 'char'
0x7f790f8a1060: note: pointer points here
 00 00 00 00  01 00 00 00 00 00 00 00  18 00 04 2e 00 00 00 00  9d 77 00 00 00 00 00 00  02 00 00 00
              ^ 
=================================================================
==16869==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f790f8a1050 at pc 0x5602d1c61257 bp 0x7ffc6a01f190 sp 0x7ffc6a01f188
WRITE of size 1 at 0x7f790f8a1050 thread T0
    #0 0x5602d1c61256 in cpumask_to_cpulist util/util.c:295
    #1 0x5602d1a7337b in build_cpu_domain_map util/header.c:1727
    #2 0x5602d1a7391f in write_cpu_domain_info util/header.c:1753
    #3 0x5602d1cd29ef in perf_event__synthesize_features util/synthetic-events.c:2419
    #4 0x5602d1cd3224 in perf_event__synthesize_for_pipe util/synthetic-events.c:2471
    #5 0x5602d143a085 in record__synthesize /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2063
    #6 0x5602d1441ded in __cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2581
    #7 0x5602d14528cb in cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:4376
    #8 0x5602d165faac in run_builtin /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:349
    #9 0x5602d166039d in handle_internal_command /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:401
    #10 0x5602d16608f3 in run_argv /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:445
    #11 0x5602d166109a in main /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:553
    #12 0x7f791cfd5ca7  (/lib/x86_64-linux-gnu/libc.so.6+0x29ca7) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #13 0x7f791cfd5d64 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29d64) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #14 0x5602d13d0470 in _start (/usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf+0xf9b470) (BuildId: 7c6fd1162dbb1e721de92bbfd9fc751e2178f1fa)

Address 0x7f790f8a1050 is located in stack of thread T0 at offset 80 in frame
    #0 0x5602d1c60c26 in cpumask_to_cpulist util/util.c:267

  This frame has 2 object(s):
    [32, 49) 'blk' (line 291)
    [96, 1120) 'cpus' (line 271) <== Memory access at offset 80 underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow util/util.c:295 in cpumask_to_cpulist
Shadow bytes around the buggy address:
  0x7f790f8a0d80: 00 00 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3
  0x7f790f8a0e00: f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00
  0x7f790f8a0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f790f8a0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f790f8a0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x7f790f8a1000: f1 f1 f1 f1 00 00 01 f2 f2 f2[f2]f2 00 00 00 00
  0x7f790f8a1080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f790f8a1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f790f8a1180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f790f8a1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f790f8a1280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
==16869==ABORTING
Error:
The - data has no samples!
Inject build-ids test [Failed - cannot find noploop function in pipe #1]
---- end(-1) ----
 88: perf pipe recording and injection test                          : FAILED!
2025-09-15 14:22:22 sudo /usr/src/linux-perf-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf test 89 -v
 89: Zstd perf.data compression/decompression                        : Running (1 active)
--- start ---
test child forked, pid 16896
Collecting compressed record file:
500+0 records in
500+0 records out
256000 bytes (256 kB, 250 KiB) copied, 0.00308355 s, 83.0 MB/s
[ perf record: Woken up 2 times to write data ]
util/util.c:295:6: runtime error: index 64 out of bounds for type 'char [17]'
util/util.c:295:12: runtime error: store to address 0x7f9ffdca2060 with insufficient space for an object of type 'char'
0x7f9ffdca2060: note: pointer points here
 00 00 00 00  01 00 00 00 00 00 00 00  18 00 04 2e 00 00 00 00  9d 77 00 00 00 00 00 00  02 00 00 00
              ^ 
=================================================================
==16904==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7f9ffdca2050 at pc 0x564af4570257 bp 0x7ffd6f117510 sp 0x7ffd6f117508
WRITE of size 1 at 0x7f9ffdca2050 thread T0
    #0 0x564af4570256 in cpumask_to_cpulist util/util.c:295
    #1 0x564af438237b in build_cpu_domain_map util/header.c:1727
    #2 0x564af438291f in write_cpu_domain_info util/header.c:1753
    #3 0x564af439cc44 in do_write_feat util/header.c:3892
    #4 0x564af439d65f in perf_header__adds_write util/header.c:3936
    #5 0x564af439f14a in perf_session__do_write_header util/header.c:4060
    #6 0x564af439f72c in perf_session__write_header util/header.c:4100
    #7 0x564af3d46044 in record__finish_output /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:1826
    #8 0x564af3d53e54 in __cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:2894
    #9 0x564af3d618cb in cmd_record /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/builtin-record.c:4376
    #10 0x564af3f6eaac in run_builtin /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:349
    #11 0x564af3f6f39d in handle_internal_command /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:401
    #12 0x564af3f6f8f3 in run_argv /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:445
    #13 0x564af3f7009a in main /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf.c:553
    #14 0x7fa00b28eca7  (/lib/x86_64-linux-gnu/libc.so.6+0x29ca7) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #15 0x7fa00b28ed64 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x29d64) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
    #16 0x564af3cdf470 in _start (/usr/src/perf_selftests-x86_64-rhel-9.4-bpf-01c79e2544b044e2c01ab435a28a03c3f0d63be3/tools/perf/perf+0xf9b470) (BuildId: 7c6fd1162dbb1e721de92bbfd9fc751e2178f1fa)

Address 0x7f9ffdca2050 is located in stack of thread T0 at offset 80 in frame
    #0 0x564af456fc26 in cpumask_to_cpulist util/util.c:267

  This frame has 2 object(s):
    [32, 49) 'blk' (line 291)
    [96, 1120) 'cpus' (line 271) <== Memory access at offset 80 underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow util/util.c:295 in cpumask_to_cpulist
Shadow bytes around the buggy address:
  0x7f9ffdca1d80: 00 00 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3
  0x7f9ffdca1e00: f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00
  0x7f9ffdca1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f9ffdca1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f9ffdca1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x7f9ffdca2000: f1 f1 f1 f1 00 00 01 f2 f2 f2[f2]f2 00 00 00 00
  0x7f9ffdca2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f9ffdca2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f9ffdca2180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f9ffdca2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x7f9ffdca2280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07 
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
==16904==ABORTING
---- end(-1) ----
 89: Zstd perf.data compression/decompression                        : FAILED!



The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250917/202509171303.b892ad4b-lkp@intel.com



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ