Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp3083740rwe; Mon, 29 Aug 2022 05:40:32 -0700 (PDT) X-Google-Smtp-Source: AA6agR7AqKTS8VXmKSpt5v3LqHjTEyR53gI+zJKQMKPQLaToHw+XVxWDFjpZgroCT+k92Bexiems X-Received: by 2002:a63:8241:0:b0:42b:c6e8:d3e4 with SMTP id w62-20020a638241000000b0042bc6e8d3e4mr7568118pgd.113.1661776832016; Mon, 29 Aug 2022 05:40:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661776832; cv=none; d=google.com; s=arc-20160816; b=uhdHVbZ+motKLz3nVJ1ZlTuVt/XaO6nuY0Z6Esg6z/QchTNLASbtyYlqwmzJ0VRHSG FYf5s2R08F0t3BadoiRzBiuBh0OPI5qJ7UtBFkqKO1VPqDAbyguSI0ww6No6T6XAnaOh HNenWfZ/v9I03vu80EPLg2HtioryQCSei+73iMR2FwTsyfCBH3a3CJxE1i6RH1r3RkPk rWm0cyNA7gKOUfzKlrQkcGU8gRuOWop3iQm82bjoqSu3c3lYNL1krBkhkQSptWVvXG5j /sNHcP9Mkg6zKVlCij2kJbzCtNCtzpfAZaex3kMkY72hQZYK0l/1l4TVq84qM9Rrrxgq N63Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Z9uyqY3e1A3ZRbiGOKOkUOhjkVR8baepEebAvuGggis=; b=NHCXqWtBKZAZZMPuTNFRDZ7f7iMDxtOCxa9IPRbgdmUXeBIh1iby+ptFrkaxBjE+rS RCUtHtGAi4zA4QVO80GDJX4mKTm0D5vt5JutLPatPKSl8pST/5CgfiFMdlQf10jCwTAk pQamp207KnN9l9EpG6d2tTmHgpvKhmhkOU9i9TzWneaw8RZK6V87pNmzNAQvdBaz6UUT oUxH0wiRO6QlGg2Hg9JoDwrch5o2DvWR4R/mynqkoVYMUzcFbY5b0sUUPrft8MYdR44O byg1Obwu7aWv93657J8HGWf8UA741qTXuh1dyDWeaDxNRuNPOiSgbQ1nXMSUsjXXIgMv iZLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1Mwfbu2u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nv18-20020a17090b1b5200b001fddccc9214si1953590pjb.171.2022.08.29.05.40.18; Mon, 29 Aug 2022 05:40:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1Mwfbu2u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232691AbiH2Ley (ORCPT + 99 others); Mon, 29 Aug 2022 07:34:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41780 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232754AbiH2Ldw (ORCPT ); Mon, 29 Aug 2022 07:33:52 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 05E796DF8F; Mon, 29 Aug 2022 04:19:35 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 75566B80FAB; Mon, 29 Aug 2022 11:19:31 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9B104C433D6; Mon, 29 Aug 2022 11:19:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661771970; bh=evU2Kna9ifw/gXx4du2NmnnysFwzHAvOA6q/RwqBm5c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1Mwfbu2u3b+zcM/NjWhRCYcDCRtmvl2YqPVHpdZAZXYLEETRDXRMVTwSzyD0tHdJ6 taJA98b5LyvujMPBWPSmZcoOoxLVmFD+VHq3lAFxG8Em/tSHkqHQUZmWex9D71+XXY 8MiWoCUnST7D9EJVpOAHnV1PkU2dYQ+kscpfjAbE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Badari Pulavarty , SeongJae Park , Andrew Morton Subject: [PATCH 5.19 114/158] mm/damon/dbgfs: avoid duplicate context directory creation Date: Mon, 29 Aug 2022 12:59:24 +0200 Message-Id: <20220829105813.885649323@linuxfoundation.org> X-Mailer: git-send-email 2.37.2 In-Reply-To: <20220829105808.828227973@linuxfoundation.org> References: <20220829105808.828227973@linuxfoundation.org> User-Agent: quilt/0.67 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Badari Pulavarty commit d26f60703606ab425eee9882b32a1781a8bed74d upstream. When user tries to create a DAMON context via the DAMON debugfs interface with a name of an already existing context, the context directory creation fails but a new context is created and added in the internal data structure, due to absence of the directory creation success check. As a result, memory could leak and DAMON cannot be turned on. An example test case is as below: # cd /sys/kernel/debug/damon/ # echo "off" > monitor_on # echo paddr > target_ids # echo "abc" > mk_context # echo "abc" > mk_context # echo $$ > abc/target_ids # echo "on" > monitor_on <<< fails Return value of 'debugfs_create_dir()' is expected to be ignored in general, but this is an exceptional case as DAMON feature is depending on the debugfs functionality and it has the potential duplicate name issue. This commit therefore fixes the issue by checking the directory creation failure and immediately return the error in the case. Link: https://lkml.kernel.org/r/20220821180853.2400-1-sj@kernel.org Fixes: 75c1c2b53c78 ("mm/damon/dbgfs: support multiple contexts") Signed-off-by: Badari Pulavarty Signed-off-by: SeongJae Park Cc: [ 5.15.x] Signed-off-by: Andrew Morton Signed-off-by: Greg Kroah-Hartman --- mm/damon/dbgfs.c | 3 +++ 1 file changed, 3 insertions(+) --- a/mm/damon/dbgfs.c +++ b/mm/damon/dbgfs.c @@ -787,6 +787,9 @@ static int dbgfs_mk_context(char *name) return -ENOENT; new_dir = debugfs_create_dir(name, root); + /* Below check is required for a potential duplicated name case */ + if (IS_ERR(new_dir)) + return PTR_ERR(new_dir); dbgfs_dirs[dbgfs_nr_ctxs] = new_dir; new_ctx = dbgfs_new_ctx();