From nobody Sun Feb 8 05:27:52 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 89FE623A9A8; Fri, 3 Oct 2025 20:15:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1759522512; cv=none; b=I7p4PylZHko9cPM8ZjpR/tJo7ZQM1wKfLd50d5VPFl+LhbmRx0Oxw8AbMGfwHdlIvvcOHQXyA1tvOZLMbtcpuFUY6zNlXCdloFTec11p4CAOO3BZ9WKQbU0ERdUSmYmhtA14SGeMTpFmjMn7L4AStIqFkZma3fELPEyuX7TR4ws= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1759522512; c=relaxed/simple; bh=bjwiI9Qos1leLOU/dQfUObg++Tq8M6DnTqo6oPGEiwM=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=mh9KZm4rwYCo3pIi/0+nMU2BX70AUCjRkMb8IfgnmVp3TFQ1FBTyyW8hBz/kj4hvqJk79aWknbyuQQCUzFerAykqeJ3x2SMASdnvkEsnYH4Y4mF4i5+NqyhCUZDqArGoMtJi2KOQP3ZGUrV/4wLj246kRU1wqvKgvvDzIIt0Adg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=FAiGGoC3; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="FAiGGoC3" Received: by smtp.kernel.org (Postfix) with ESMTPSA id DD5B9C4CEF5; Fri, 3 Oct 2025 20:15:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1759522512; bh=bjwiI9Qos1leLOU/dQfUObg++Tq8M6DnTqo6oPGEiwM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FAiGGoC3YCsVr4iogOumZyxh+ejcDryCAR6xlmtdwpzmPRapmWe/8/vC6ii/Iekmn qrVTrHY1nQ+tZcwdyLnWwuE1SWd46ShRfMqfE0PLmv1judTAgpdNBXm3VUYVG5ZSs+ 7GDWZuGnwrVzsgMB0ROjGo3Q8rFf75L02xxAUxp1KZlksOF0m35m5rgP7EWrnLpkxa 7KXmGufNdLh+PEH84FHy/v6zeobPwA7Ohpf9gnOd7qj9PMbh9yZYAtBllDy0/fShv3 V/HlnTMboDq19GvntLbUNYnUh7kie3pDjZIqQR+XxPLaIV74zWx6lljpBcnnrFWB5c 1ogpe7EaBVj7w== From: SeongJae Park To: Andrew Morton Cc: SeongJae Park , "# 6 . 15 . x" , damon@lists.linux.dev, kernel-team@meta.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: [PATCH 1/2] mm/damon/sysfs: catch commit test ctx alloc failure Date: Fri, 3 Oct 2025 13:14:54 -0700 Message-Id: <20251003201455.41448-2-sj@kernel.org> X-Mailer: git-send-email 2.39.5 In-Reply-To: <20251003201455.41448-1-sj@kernel.org> References: <20251003201455.41448-1-sj@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The damon_ctx for testing online DAMON parameters commit inputs is used without its allocation failure check. This could result in an invalid memory access. Fix it by directly returning an error when the allocation failed. Fixes: 4c9ea539ad59 ("mm/damon/sysfs: validate user inputs from damon_sysfs= _commit_input()") Cc: # 6.15.x Signed-off-by: SeongJae Park --- mm/damon/sysfs.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/mm/damon/sysfs.c b/mm/damon/sysfs.c index a212877ed240..27ebfe016871 100644 --- a/mm/damon/sysfs.c +++ b/mm/damon/sysfs.c @@ -1473,6 +1473,8 @@ static int damon_sysfs_commit_input(void *data) if (IS_ERR(param_ctx)) return PTR_ERR(param_ctx); test_ctx =3D damon_new_ctx(); + if (!test_ctx) + return -ENOMEM; err =3D damon_commit_ctx(test_ctx, param_ctx); if (err) { damon_destroy_ctx(test_ctx); --=20 2.39.5