lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAP-5=fW68j1tCH7_r=y7Mp1OAnWgJfZQ9hF0FvVkW9pThE_+NA@mail.gmail.com>
Date: Wed, 10 Dec 2025 11:03:52 -0800
From: Ian Rogers <irogers@...gle.com>
To: kernel test robot <oliver.sang@...el.com>
Cc: Namhyung Kim <namhyung@...nel.org>, oe-lkp@...ts.linux.dev, lkp@...el.com, 
	linux-kernel@...r.kernel.org, linux-perf-users@...r.kernel.org
Subject: Re: [linus:master] [perf test] 34e271ae55: kmsg.sanitizer.indirect_leak/calloc/zalloc/dso__new_id/__dsos__addnew_id/__dsos__findnew_id/dsos__findnew_id

On Wed, Dec 10, 2025 at 12:09 AM kernel test robot
<oliver.sang@...el.com> wrote:
>
>
>
> Hello,
>
>
> besides the indirect_leak mentioned in title, we also observe below difference
> if comparing to parent commit.
>
>
> 4fba95fc383f9231 34e271ae55382fbdb04f3e13e85
> ---------------- ---------------------------
>        fail:runs  %reproduction    fail:runs
>            |             |             |
>            :8           75%           6:6     kmsg.sanitizer.direct_leak/malloc/map__get/maps__find_symbol_by_name_cb/maps__for_each_map/maps__find_symbol_by_name/machine__find_kernel_symbol_by_name
>            :8           75%           6:6     kmsg.sanitizer.indirect_leak/calloc/map__new2/__machine__create_kernel_maps/machine__create_kernel_maps/test__kallsyms_split/run_test_child
>            :8           75%           6:6     kmsg.sanitizer.indirect_leak/calloc/symbol__new/map__process_kallsym_symbol/kallsyms__parse/dso__load_all_kallsyms/__dso__load_kallsyms
>            :8           75%           6:6     kmsg.sanitizer.indirect_leak/calloc/zalloc/dso__new_id/__dsos__addnew_id/__dsos__findnew_id/dsos__findnew_id
>            :8           75%           6:6     kmsg.sanitizer.indirect_leak/malloc/dso__get/map__init/map__new2/__machine__create_kernel_maps/machine__create_kernel_maps
>            :8           75%           6:6     kmsg.sanitizer.indirect_leak/malloc/symbols__sort_by_name/dso__sort_by_name/map__find_symbol_by_name_idx/map__find_symbol_by_name/maps__find_symbol_by_name_cb
>
>
> but we don't have enough knowledge to understand if they are expected by the
> change is 34e271ae55, so just make out below report FYI.
>
>
> kernel test robot noticed "kmsg.sanitizer.indirect_leak/calloc/zalloc/dso__new_id/__dsos__addnew_id/__dsos__findnew_id/dsos__findnew_id" on:
>
> commit: 34e271ae55382fbdb04f3e13e856457d8e0dee45 ("perf test: Add kallsyms split test")
> https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git master
>
> [test failed on linux-next/master 6987d58a9cbc5bd57c983baa514474a86c945d56]
>
> in testcase: perf-sanity-tests
> version:
> with following parameters:
>
>         perf_compiler: clang
>         group: group-02
>
>
>
> config: x86_64-rhel-9.4-bpf
> compiler: gcc-14
> test machine: 16 threads 1 sockets Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (Coffee Lake-E) with 32G memory
>
> (please refer to attached dmesg/kmsg for entire log/backtrace)
>
>
>
> If you fix the issue in a separate patch/commit (i.e. not just a new version of
> the same patch/commit), kindly add following tags
> | Reported-by: kernel test robot <oliver.sang@...el.com>
> | Closes: https://lore.kernel.org/oe-lkp/202512101502.f3819cd3-lkp@intel.com

Thanks! Reproduced and posted a fix:
https://lore.kernel.org/linux-perf-users/20251210190141.12725-1-irogers@google.com/

Ian

>
> Indirect leak of 386 byte(s) in 1 object(s) allocated from:
>     #0 0x7f0248972610 in calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:77
>     #1 0x561eb21740b6 in zalloc ../../lib/zalloc.c:8
>     #2 0x561eb2529d8f in dso__new_id util/dso.c:1527
>     #3 0x561eb25327bb in __dsos__addnew_id util/dsos.c:329
>     #4 0x561eb253287d in __dsos__findnew_id util/dsos.c:351
>     #5 0x561eb2532907 in dsos__findnew_id util/dsos.c:358
>     #6 0x561eb25d267f in machine__findnew_dso_id util/machine.c:3191
>     #7 0x561eb25d26ce in machine__findnew_dso util/machine.c:3196
>     #8 0x561eb252778e in machine__findnew_kernel util/dso.c:1338
>     #9 0x561eb25bbfe0 in machine__get_kernel util/machine.c:969
>     #10 0x561eb25c0d10 in machine__create_kernel_maps util/machine.c:1545
>     #11 0x561eb231f3be in test__kallsyms_split tests/kallsyms-split.c:117
>     #12 0x561eb223b4d8 in run_test_child tests/builtin-test.c:340
>     #13 0x561eb218d899 in start_command /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-34e271ae55382fbdb04f3e13e856457d8e0dee45/tools/lib/subcmd/run-command.c:128
>     #14 0x561eb223d9b4 in start_test tests/builtin-test.c:545
>     #15 0x561eb223e920 in __cmd_test tests/builtin-test.c:648
>     #16 0x561eb22412d3 in cmd_test tests/builtin-test.c:850
>     #17 0x561eb214751d in run_builtin /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-34e271ae55382fbdb04f3e13e856457d8e0dee45/tools/perf/perf.c:349
>     #18 0x561eb2147e0e in handle_internal_command /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-34e271ae55382fbdb04f3e13e856457d8e0dee45/tools/perf/perf.c:401
>     #19 0x561eb2148364 in run_argv /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-34e271ae55382fbdb04f3e13e856457d8e0dee45/tools/perf/perf.c:445
>     #20 0x561eb2148b0b in main /usr/src/perf_selftests-x86_64-rhel-9.4-bpf-34e271ae55382fbdb04f3e13e856457d8e0dee45/tools/perf/perf.c:553
>     #21 0x7f023e69aca7  (/lib/x86_64-linux-gnu/libc.so.6+0x29ca7) (BuildId: def5460e3cee00bfee25b429c97bcc4853e5b3a8)
>
>
> more details are in below link.
>
>
> The kernel config and materials to reproduce are available at:
> https://download.01.org/0day-ci/archive/20251210/202512101502.f3819cd3-lkp@intel.com
>
>
>
> --
> 0-DAY CI Kernel Test Service
> https://github.com/intel/lkp-tests/wiki
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ