Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp253665pxb; Mon, 13 Sep 2021 18:28:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyZwSLSG2P3AraXINqafO/GZrM55dzRd7yJyxmokO0ImfIFtsbE0sZC/xsTuetmgJ+N5sfn X-Received: by 2002:a92:b702:: with SMTP id k2mr9887096ili.150.1631582884634; Mon, 13 Sep 2021 18:28:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631582884; cv=none; d=google.com; s=arc-20160816; b=ajWsiPAG5xBu+4AzxaJxfOKeuOsilXD1ienLxIVlZIht3VB3CPWYyeiI8Avyu/E9e2 UNuXsvDvzTapyMjsaAvWPh+lAiPYyGcofQuyzv23hR+X6RnhasyaT7XCtG3eVeCuIx8t bVtKqMBRROxbZteKnJz2FScGs7QecUyFZzXUakDLh2bjPPoxUGa+lZBHO95hki8Ar6b1 0/Dt2V8jJ22graBXGeg+O6jCEVcJlCLAhmiqWT4LE6zJF9wre/cb90P0/4WnUQeNsGQv qFEOrhN+hndhyedgjMcq+GSWymD2Wdbi4AM7O9gLd/pLXLRgiB3iSNjY8CXnWdWw13RV /edg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:from:subject:message-id:date:mime-version; bh=zoiyz9yumUb2OwDpSUzdanvEqwi+zK0yBV9E9brBk3c=; b=bCdkKiEmlfXY+k/KFdfZ7yXYWaR/EUdsrBwFqg04nO/zaw34FK6JeCt9OD4viFy1uE f3excDkClaNMkIo3P3qrJ1t3H5aeat1P2A5GZK7nllAivq6ELAvYvSg9igoRaW2V4M+S U4nxV6CJyITtuDrZVnO7ltCaDh3j6JeozWAP3DAoGtm4n4D1jr2SK8FnfvPsrnArTkKD VYELp0Q9NBhTfQFOLDeFx2co9Q379hCLzb4a2q9A+kDfLnI3Tu9j4VjRWdzuXj+vo4Up asMpm74CjT59XvSsUHr6KE3hAzifaQEdbz14jbNt+bmrj0ig/S77P1faFTv1zwSWMzG9 x8Qw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q188si9332451jaa.111.2021.09.13.18.27.53; Mon, 13 Sep 2021 18:28:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=appspotmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242160AbhIMX3m (ORCPT + 99 others); Mon, 13 Sep 2021 19:29:42 -0400 Received: from mail-io1-f69.google.com ([209.85.166.69]:40522 "EHLO mail-io1-f69.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240144AbhIMX3l (ORCPT ); Mon, 13 Sep 2021 19:29:41 -0400 Received: by mail-io1-f69.google.com with SMTP id i26-20020a5e851a000000b005bb55343e9bso15014098ioj.7 for ; Mon, 13 Sep 2021 16:28:25 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:date:message-id:subject:from:to; bh=zoiyz9yumUb2OwDpSUzdanvEqwi+zK0yBV9E9brBk3c=; b=TODSWLxAT23eySrHUKCEZ+xJI12+8dLiUR6WEuJyqFEb6M49haFexZABz+o6Jqkb3p lnJ3+myWsIukA22RnV+tH1EJVTvc14LbDZJsxPmJSX57SgTukVi0wEFx8A02tgw5ZhKU 2ERz7HfEH973W48lH/16PbmwC39MFUDs3rFGLitwObrKLiI0kWXgSUJNFxvxlYHRZhwm UNdCYoQdjr9uzJQVJLOZiXBl1tyghkraEEivmz+q0d3vu2GogPxfvgfD5WTDJUhKMxKt vSUUaQvqVPsM56Jj8pTv6k+Gyw1ax+09+vKwhnffPpLHuj4E9VSN9dcf4bSJ8ZzRtnjV tOSA== X-Gm-Message-State: AOAM5332I2ozEtoaXjDodmXA6CGkmwfM12DjTab/ez/qUnAXz6SmcBPO /jzUyZ6owODeBTkuQJUuCVdyt1IBxFYCP1nyri7hKWzSQoPb MIME-Version: 1.0 X-Received: by 2002:a02:b0d1:: with SMTP id w17mr11996507jah.46.1631575704786; Mon, 13 Sep 2021 16:28:24 -0700 (PDT) Date: Mon, 13 Sep 2021 16:28:24 -0700 X-Google-Appengine-App-Id: s~syzkaller X-Google-Appengine-App-Id-Alias: syzkaller Message-ID: <0000000000004ee28405cbe8d287@google.com> Subject: [syzbot] memory leak in blk_iolatency_init From: syzbot To: axboe@kernel.dk, cgroups@vger.kernel.org, linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com, tj@kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, syzbot found the following issue on: HEAD commit: a3fa7a101dcf Merge branches 'akpm' and 'akpm-hotfixes' (pa.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=12b4a5b3300000 kernel config: https://syzkaller.appspot.com/x/.config?x=9ee3a4c022ccbbca dashboard link: https://syzkaller.appspot.com/bug?extid=01321b15cc98e6bf96d6 compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.1 syz repro: https://syzkaller.appspot.com/x/repro.syz?x=148c170b300000 IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+01321b15cc98e6bf96d6@syzkaller.appspotmail.com 2021/09/09 22:14:31 executed programs: 444 BUG: memory leak unreferenced object 0xffff888129acdb80 (size 96): comm "syz-executor.1", pid 12661, jiffies 4294962682 (age 15.220s) hex dump (first 32 bytes): 20 47 c9 85 ff ff ff ff 20 d4 8e 29 81 88 ff ff G...... ..).... 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmalloc include/linux/slab.h:591 [inline] [] kzalloc include/linux/slab.h:721 [inline] [] blk_iolatency_init+0x28/0x190 block/blk-iolatency.c:724 [] blkcg_init_queue+0xb4/0x1c0 block/blk-cgroup.c:1185 [] blk_alloc_queue+0x22a/0x2e0 block/blk-core.c:566 [] blk_mq_init_queue_data block/blk-mq.c:3100 [inline] [] __blk_mq_alloc_disk+0x25/0xd0 block/blk-mq.c:3124 [] loop_add+0x1c3/0x360 drivers/block/loop.c:2344 [] loop_control_get_free drivers/block/loop.c:2501 [inline] [] loop_control_ioctl+0x17e/0x2e0 drivers/block/loop.c:2516 [] vfs_ioctl fs/ioctl.c:51 [inline] [] __do_sys_ioctl fs/ioctl.c:874 [inline] [] __se_sys_ioctl fs/ioctl.c:860 [inline] [] __x64_sys_ioctl+0xfc/0x140 fs/ioctl.c:860 [] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 [] entry_SYSCALL_64_after_hwframe+0x44/0xae --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@googlegroups.com. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. syzbot can test patches for this issue, for details see: https://goo.gl/tpsmEJ#testing-patches