Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp881675ybv; Fri, 7 Feb 2020 10:10:38 -0800 (PST) X-Google-Smtp-Source: APXvYqwPw/966ZD/eVi/ZySnh1B7D7aCqjjRqxqlCljBjlSaTEVKTerssrvoUPTeG7JcNVMbl+SI X-Received: by 2002:a9d:3cf:: with SMTP id f73mr473669otf.11.1581099038617; Fri, 07 Feb 2020 10:10:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581099038; cv=none; d=google.com; s=arc-20160816; b=V9ijWXjEEDotebGOcXXfg/0JfxQEQksjYxjkog0zQBAmnF3AddRC+PZEX7bJlvbwO0 ryNX9Bu+q2YnCRmBIbzZZILhCXV9knLKH8xcUyObDFbh2gzQR3sDOY5aPVQTlSeFP8cG P4eRjWtX8saoyI+ngF6c1DmQKE2AFcyx41bgQkwMCE2FuWWlKbpZRqnh7s+8YRocRAAq TJzbSQhFOQgrNdLkUJgft3UjES9DyJIjwGTk7xSG0ENMlriy2wXBYQfGotLNHOKU4o4B /abp/9UQQTJ50bOOeSgdH2T80GWfGWEmEQcjJIHO3DRwef5kRgeOmG+MEOm/N4w0jlnY XkWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=5zQQHlAdkKi/5/LHbljBLnmP/SWJe90/jtmz6ntc02A=; b=mT8+TFGOU5pjBrjJEvUzB0a45IxM3Yiio3SxgZGox43acvhWofLeAbTppYjP1QM8c3 4rwBHG4KYS21AleCDrXm6f/W1yK+EqsfTpW7+bxKCmzDlvSaPN5Nm++8vMT1M3ipcYOr kS5u2t3++aPNmdK6djiOJflXOCvCVSCuizeDKRmgH9pA3agAa448tr0UA0q05lvVujZc AIkBq2iYB8ikSyUb4myEHpoiWjrm59krR8HyEmpV9tC0radOjktNvkzBdCm7pcxMhwCm rIqUzih0AhR7VSJ52paEzMLNUB+TPYTwhqzZ3y3R+/1A7S2ig3dInpKXvgQZsZ3pqWNe hCrA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=VlHMmU6I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k184si3994523oib.239.2020.02.07.10.10.26; Fri, 07 Feb 2020 10:10:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=VlHMmU6I; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727540AbgBGSIP (ORCPT + 99 others); Fri, 7 Feb 2020 13:08:15 -0500 Received: from mail-pj1-f65.google.com ([209.85.216.65]:54143 "EHLO mail-pj1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727524AbgBGSIN (ORCPT ); Fri, 7 Feb 2020 13:08:13 -0500 Received: by mail-pj1-f65.google.com with SMTP id n96so1226646pjc.3 for ; Fri, 07 Feb 2020 10:08:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=5zQQHlAdkKi/5/LHbljBLnmP/SWJe90/jtmz6ntc02A=; b=VlHMmU6I/xL2vd2EXJyZn/ypmR6KSTr1B4+IlMCX9nCDq0DE+2inkBhFKo67GNtamL DpvJG29b7TujDuTvONAjb6/SpatGl2GrrRZ6JsyvuO9CTrEKGXsmRt0jVSeqle/RbjSK zd+ZbybUkmsrYnybTPzXNp18CnEXZ38idwf5+RuV04DBCGSZNm7zGwt8GwuOKY5R2I92 QPWAoEPwrHf8N+yGxnXXhhyy+9C3NCdDh1MgO0MSTu+bZAof26suReLMld0nlje0tIFF SH3nf1UfidaWVduztODzs4bYOv4P65oth5ukwHT+DpjVFe75oL9s/5KHOinB/4yz9AI4 +gbg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=5zQQHlAdkKi/5/LHbljBLnmP/SWJe90/jtmz6ntc02A=; b=qnARldIDEp10qqlEST5oTegdy217OF/3YMW6w7Og+I1haQ5NmktRVUb1Y40eNQt8cE RwuLQurwn82AT8ywP3QpgT7g+j1ZY8dpdB6t3krw7wj3rIQqG7TW0/rz0ptPduYVvWLq bbVRJf/VwAMOO/xcSbRKZG1AFTS4/Osxg8iBpVO2wiFHDaT7bfLFr8tm5CiEaFZbEZLv znrS7LGvfnKiqm8o+mCtz9yQy8mtGhW9sCSdsqDisWH0/c7qHOF++ptKGUKUxNyif2QX JBznHEhgfyOcVr8NpR2V7+ZqOhtwnfiD6F7pUBU1g6Y6Vj5B2eGM9RcIm2qo0t/ZnRUN 5jNw== X-Gm-Message-State: APjAAAU1qcmPTxI+qh1KZhpppsqunFQt3ec/H7THs+xpTFpQBaJzN2Xd utPBugNsHBY3E3LegglgH3E= X-Received: by 2002:a17:902:8a81:: with SMTP id p1mr10766574plo.284.1581098893117; Fri, 07 Feb 2020 10:08:13 -0800 (PST) Received: from localhost.localdomain ([103.211.17.120]) by smtp.googlemail.com with ESMTPSA id gx18sm3088795pjb.8.2020.02.07.10.08.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 07 Feb 2020 10:08:12 -0800 (PST) From: Amol Grover To: Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , James Morris , Thomas Gleixner , Peter Zijlstra , Jann Horn , David Howells , Shakeel Butt , "Eric W . Biederman" , Andrew Morton , Paul Moore , Eric Paris Cc: linux-kernel-mentees@lists.linuxfoundation.org, linux-kernel@vger.kernel.org, linux-audit@redhat.com, Joel Fernandes , Madhuparna Bhowmik , "Paul E . McKenney" , Amol Grover Subject: [PATCH 2/3] cred: Do not use RCU primitives to access cred pointer Date: Fri, 7 Feb 2020 23:35:04 +0530 Message-Id: <20200207180504.4200-2-frextrite@gmail.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200207180504.4200-1-frextrite@gmail.com> References: <20200207180504.4200-1-frextrite@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since task_struct::cred can only be used task-synchronously, and is not visible to other threads under RCU context, we do not require RCU primitives to read/write to it and incur heavy barriers. Suggested-by: Jann Horn Co-developed-by: Joel Fernandes (Google) Signed-off-by: Joel Fernandes (Google) Signed-off-by: Amol Grover --- include/linux/cred.h | 5 ++--- kernel/cred.c | 6 +++--- 2 files changed, 5 insertions(+), 6 deletions(-) diff --git a/include/linux/cred.h b/include/linux/cred.h index 18639c069263..5973791e5fe4 100644 --- a/include/linux/cred.h +++ b/include/linux/cred.h @@ -291,11 +291,10 @@ static inline void put_cred(const struct cred *_cred) /** * current_cred - Access the current task's subjective credentials * - * Access the subjective credentials of the current task. RCU-safe, - * since nobody else can modify it. + * Access the subjective credentials of the current task. */ #define current_cred() \ - rcu_dereference_protected(current->cred, 1) + (current->cred) /** * current_real_cred - Access the current task's objective credentials diff --git a/kernel/cred.c b/kernel/cred.c index 809a985b1793..3956c31d068d 100644 --- a/kernel/cred.c +++ b/kernel/cred.c @@ -485,7 +485,7 @@ int commit_creds(struct cred *new) if (new->user != old->user) atomic_inc(&new->user->processes); rcu_assign_pointer(task->real_cred, new); - rcu_assign_pointer(task->cred, new); + task->cred = new; if (new->user != old->user) atomic_dec(&old->user->processes); alter_cred_subscribers(old, -2); @@ -562,7 +562,7 @@ const struct cred *override_creds(const struct cred *new) */ get_new_cred((struct cred *)new); alter_cred_subscribers(new, 1); - rcu_assign_pointer(current->cred, new); + current->cred = new; alter_cred_subscribers(old, -1); kdebug("override_creds() = %p{%d,%d}", old, @@ -590,7 +590,7 @@ void revert_creds(const struct cred *old) validate_creds(old); validate_creds(override); alter_cred_subscribers(old, 1); - rcu_assign_pointer(current->cred, old); + current->cred = old; alter_cred_subscribers(override, -1); put_cred(override); } -- 2.24.1