From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 28637C32792 for ; Mon, 22 Aug 2022 06:24:50 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 3E7AA940007; Mon, 22 Aug 2022 02:24:50 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 396856B0074; Mon, 22 Aug 2022 02:24:50 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 285B9940007; Mon, 22 Aug 2022 02:24:50 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 1A6E56B0073 for ; Mon, 22 Aug 2022 02:24:50 -0400 (EDT) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id B7561AB48E for ; Mon, 22 Aug 2022 06:24:49 +0000 (UTC) X-FDA: 79826240298.07.3EE2A82 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf07.hostedemail.com (Postfix) with ESMTP id 4B38B400A7 for ; Mon, 22 Aug 2022 06:24:49 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 548FC60F8C; Mon, 22 Aug 2022 06:24:48 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1C60FC433D6; Mon, 22 Aug 2022 06:24:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1661149487; bh=FjGBRomwEACT3kJZ1nqAWJj3vryOLMkbXOehoUiRIus=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=V6KrLcKk0kHlmoTuYPxvLdUYBNtcoAhfAj8CpaWwIKHnKbImsUJ0biProtL+pJ972 OPzn7LkZjU2WNJJKBKo0yo3xib0/G5ZKxr+QLsJEBLqePM9Av9eY3w3aXK6JHhv6cU D8xpM9DzFGfF17z8WdQoQFOLUjunWSt3HIvfOHjc= Date: Mon, 22 Aug 2022 08:24:44 +0200 From: Greg KH To: SeongJae Park Cc: akpm@linux-foundation.org, badari.pulavarty@intel.com, damon@lists.linux.dev, linux-mm@kvack.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH v3] mm/damon/dbgfs: avoid duplicate context directory creation Message-ID: References: <20220821180853.2400-1-sj@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220821180853.2400-1-sj@kernel.org> ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1661149489; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=EhCqq+SKe37oXd54K2ODcL2y8nEyilpy76VboqdD7SI=; b=R490oS2QprGt+9mVUgzVmjdUBQtMQmzNI+B/0H4SokXgfZ450wodTPbCZMyG78gVVPiDnn QWuYPUZLd1ZWrPb7ydbQkmDn9W43dVvmwSSYjKdMW0UUpzdqUcA4xnibE4CVE6n+YSY89y +ZXR9MpNBHJ3PEKTQg/MNP+3Q6qfVb4= ARC-Authentication-Results: i=1; imf07.hostedemail.com; dkim=pass header.d=linuxfoundation.org header.s=korg header.b=V6KrLcKk; spf=pass (imf07.hostedemail.com: domain of gregkh@linuxfoundation.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=gregkh@linuxfoundation.org; dmarc=pass (policy=none) header.from=linuxfoundation.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1661149489; a=rsa-sha256; cv=none; b=HSJULD6Uuc/QO//Yy1kuGoROcUyciOINi10fdtTp51sl2p1bJQE8+xW8xZraUEXLHj0dXp QUUQEiUJ/A5xpa4HWR+7uSENb71PPA9zYU2AOQwq1mBQEbOToIpBDZzWoXQIkPGWFeEIky 5Id3V5oMUXPdlfYneQS5B1aj1bmVmaE= Authentication-Results: imf07.hostedemail.com; dkim=pass header.d=linuxfoundation.org header.s=korg header.b=V6KrLcKk; spf=pass (imf07.hostedemail.com: domain of gregkh@linuxfoundation.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=gregkh@linuxfoundation.org; dmarc=pass (policy=none) header.from=linuxfoundation.org X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 4B38B400A7 X-Stat-Signature: 7d13psxcmgme8zqr44k4gych4egwcuow X-Rspam-User: X-HE-Tag: 1661149489-853709 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Sun, Aug 21, 2022 at 06:08:53PM +0000, SeongJae Park wrote: > From: Badari Pulavarty > > From: Badari Pulavarty Twice? > > When user tries to create a DAMON context via the DAMON debugfs > interface with a name of an already existing context, the context > directory creation fails but a new context is created and added in the > internal data structure, due to absence of the directory creation > success check. As a result, memory could leak and DAMON cannot be > turned on. An example test case is as below: > > # cd /sys/kernel/debug/damon/ > # echo "off" > monitor_on > # echo paddr > target_ids > # echo "abc" > mk_context > # echo "abc" > mk_context > # echo $$ > abc/target_ids > # echo "on" > monitor_on <<< fails > > Return value of 'debugfs_create_dir()' is expected to be ignored in > general, but this is an exceptional case as DAMON feature is depending > on the debugfs functionality and it has the potential duplicate name > issue. This commit therefore fixes the issue by checking the directory > creation failure and immediately return the error in the case. > > Fixes: 75c1c2b53c78 ("mm/damon/dbgfs: support multiple contexts") > Cc: # 5.15.x > Signed-off-by: Badari Pulavarty > Signed-off-by: SeongJae Park > --- > Changes from v2 > (https://lore.kernel.org/damon/20220819171930.16166-1-sj@kernel.org/) > - Simply check the debugfs_create_dir() return value (Andrew Morton) > - Put a comment for justifying check of the return value (Greg KH) > > Changes from v1 > (https://lore.kernel.org/damon/DM6PR11MB3978994F75A4104D714437379C679@DM6PR11MB3978.namprd11.prod.outlook.com/) > - Manually check duplicate entry instead of checking > 'debugfs_create_dir()' return value > - Reword commit message and the test case > > Seems Badari have some email client issue, so I (SJ) am making this > third version of the patch based on Badari's final proposal and > reposting on behalf of Badari. > > mm/damon/dbgfs.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/mm/damon/dbgfs.c b/mm/damon/dbgfs.c > index 51d67c8050dd..3b55a1b219b5 100644 > --- a/mm/damon/dbgfs.c > +++ b/mm/damon/dbgfs.c > @@ -818,6 +818,9 @@ static int dbgfs_mk_context(char *name) > return -ENOENT; > > new_dir = debugfs_create_dir(name, root); > + /* Below check is required for a potential duplicated name case */ > + if (IS_ERR(new_dir)) > + return PTR_ERR(new_dir); Did you just leak the memory allocated above this check? It's hard to determine as you are setting global variables. thanks, greg k-h