lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAP-5=fVyGswdFrEw7=P8RGPJP+2wW3qQhzCfz1BoJ9Uvg4iKDg@mail.gmail.com>
Date: Wed, 21 Jan 2026 07:52:15 -0800
From: Ian Rogers <irogers@...gle.com>
To: kernel test robot <oliver.sang@...el.com>, Thomas Richter <tmricht@...ux.ibm.com>
Cc: oe-lkp@...ts.linux.dev, lkp@...el.com, 
	Arnaldo Carvalho de Melo <acme@...hat.com>, Sri Jayaramappa <sjayaram@...mai.com>, 
	Adrian Hunter <adrian.hunter@...el.com>, 
	Alexander Shishkin <alexander.shishkin@...ux.intel.com>, Guilherme Amadio <amadio@...too.org>, 
	Ingo Molnar <mingo@...hat.com>, Jiri Olsa <jolsa@...nel.org>, Namhyung Kim <namhyung@...nel.org>, 
	Peter Zijlstra <peterz@...radead.org>, linux-perf-users@...r.kernel.org, 
	linux-kernel@...r.kernel.org
Subject: Re: [linux-next:master] [perf test subcmd help] ef92c4351e: kmsg.sanitizer.indirect_leak/malloc/___interceptor_backtrace/child_test_sig_handler/raise/abort

On Mon, Jan 19, 2026 at 11:58 PM kernel test robot
<oliver.sang@...el.com> wrote:
>
>
>
> Hello,
>
> kernel test robot noticed "kmsg.sanitizer.indirect_leak/malloc/___interceptor_backtrace/child_test_sig_handler/raise/abort" on:
>
> commit: ef92c4351ec75bcfb8a1cc3a88109b5339f296ef ("perf test subcmd help: Add exclude disjoint subcmd names")
> https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git master
>
> [test failed on linux-next/master d08c85ac8894995d4b0d8fb48d2f6a3e53cd79ab]
>
> in testcase: perf-sanity-tests
> version:
> with following parameters:
>
>         perf_compiler: clang
>         group: group-02
>
>
>
> config: x86_64-rhel-9.4-bpf
> compiler: gcc-14
> test machine: 64 threads 2 sockets Intel(R) Xeon(R) Gold 6346 CPU @ 3.10GHz (Ice Lake) with 256G memory
>
> (please refer to attached dmesg/kmsg for entire log/backtrace)
>
>
>
> If you fix the issue in a separate patch/commit (i.e. not just a new version of
> the same patch/commit), kindly add following tags
> | Reported-by: kernel test robot <oliver.sang@...el.com>
> | Closes: https://lore.kernel.org/oe-lkp/202601201519.ce4c3ab3-lkp@intel.com
>
>
> --- start ---
> test child forked, pid 11710
> perf: help.c:107: exclude_cmds: Assertion `cmds->names[ci] == NULL' failed.
>
> ---- unexpected signal (6) ----
>     #0 0x7f7688c77403 in ___interceptor_backtrace.part.0 sanitizer_common_interceptors.inc:4358
>     #1 0x55f34adb6c34 in child_test_sig_handler builtin-test.c:312
>     #2 0x7f767ea2bdf0 libc.so.6[3fdf0]
>     #3 0x7f767ea8095c libc.so.6[9495c]
>     #4 0x7f767ea2bcc2 in raise libc.so.6[3fcc2]
>     #5 0x7f767ea144ac in abort libc.so.6[284ac]
>     #6 0x7f767ea14420 in __assert_perror_fail libc.so.6[28420]
>     #7 0x55f34acf4e70 in exclude_cmds help.c:106
>     #8 0x55f34ae9a646 in test__exclude_cmdnames_no_overlap subcmd-help.c:112
>     #9 0x55f34adb74c5 in run_test_child builtin-test.c:340
>     #10 0x55f34ad08db3 in start_command run-command.c:128
>     #11 0x55f34adb99a1 in start_test builtin-test.c:546
>     #12 0x55f34adba90d in __cmd_test builtin-test.c:648
>     #13 0x55f34adbd2c0 in cmd_test builtin-test.c:850
>     #14 0x55f34acc2a45 in run_builtin perf.c:349
>     #15 0x55f34acc3336 in handle_internal_command perf.c:401
>     #16 0x55f34acc388c in run_argv perf.c:448
>     #17 0x55f34acc4033 in main perf.c:555
>     #18 0x7f767ea15ca8 libc.so.6[29ca8]
>     #19 0x7f767ea15d65 in __libc_start_main libc.so.6[29d65]
>     #20 0x55f34aa28241 in _start perf[102f241]

I believe this is resolved by:
https://lore.kernel.org/lkml/20260121082402.2311962-1-tmricht@linux.ibm.com/

> =================================================================
> ==11710==ERROR: LeakSanitizer: detected memory leaks
>
> Direct leak of 30952 byte(s) in 3 object(s) allocated from:
>     #0 0x7f7688ced610 in calloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:77
>     #1 0x7f7688ace808  (/lib/x86_64-linux-gnu/libelf.so.1+0x3808) (BuildId: d6a40be9eadcbcb0562b7bb13bbe81166e82cc40)
>
> Indirect leak of 9280 byte(s) in 3 object(s) allocated from:
>     #0 0x7f7688cedc57 in malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:69
>     #1 0x7f7688ad6550  (/lib/x86_64-linux-gnu/libelf.so.1+0xb550) (BuildId: d6a40be9eadcbcb0562b7bb13bbe81166e82cc40)
>
> Indirect leak of 1873 byte(s) in 3 object(s) allocated from:
>     #0 0x7f7688cedc57 in malloc ../../../../src/libsanitizer/asan/asan_malloc_linux.cpp:69
>     #1 0x7f7688ad73fa  (/lib/x86_64-linux-gnu/libelf.so.1+0xc3fa) (BuildId: d6a40be9eadcbcb0562b7bb13bbe81166e82cc40)
>
> SUMMARY: AddressSanitizer: 42105 byte(s) leaked in 9 allocation(s).
>  68.4: Exclude disjoint subcmd names                                 : FAILED!

To better diagnose these leaks could you disable the fast asan stack unwinder:
ASAN_OPTIONS=fast_unwind_on_malloc=0

Thanks,
Ian

> The kernel config and materials to reproduce are available at:
> https://download.01.org/0day-ci/archive/20260120/202601201519.ce4c3ab3-lkp@intel.com
>
>
>
> --
> 0-DAY CI Kernel Test Service
> https://github.com/intel/lkp-tests/wiki
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ