Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1380927ybb; Wed, 1 Apr 2020 22:59:03 -0700 (PDT) X-Google-Smtp-Source: APiQypIcC5lsBizRsj4HwOOxj9bmeu6prmZtZAlmC4U0F1AmpltxL8V0qY9tUwBp5mY8XqNgtQNN X-Received: by 2002:a9d:6e02:: with SMTP id e2mr1138851otr.317.1585807142861; Wed, 01 Apr 2020 22:59:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585807142; cv=none; d=google.com; s=arc-20160816; b=GO0WwwoaE0xH9IWHUeM0U4lehEnfGzdjej6c3e4Bep1nfH+eTkCqILbgHRcYYKm4PU Q/3bLV2KddeD4abS9Wl3pkH7f9AGIpZ/mGDfriR508gJSzPzBa+h3pIGaG5bw41WFL1T XfaEgOUo+HMX8I/9beAUHvH/I8QIGLHDDhDRYSFlneh8C3WGVvzUXZP+Z3vhkrYJ2VHO eh+r5oKipsNiUCdq6JDA8PVe/oj9dGmcjY3KIbA6JPSHcF1rHetZyG5YevOWvz4kGYC/ dPFlWkBiXBeGGAQZqrGurT0AueKcjvR5g3oiDGdLMkj63kSC4Q9qtWm1cvN+M5xDvSTK 7dFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=6dJnmRISnXhx/tid8L3bkFndKLLLawXzGhi1aYEmqBI=; b=bcDwcA3NMhHB/CUhZrxJRMUVwhACY1QBiZjhPpz+AY1Xt4CPCW8OYnUtC4XLRg5LkB VFMhpDurT3JsJt9hTYVyyZrm/nskqS/eozhGwDS53Sk7d0VAgo1K4dj9U8uEEJ9OSyAm rjCUEq6N/kkX3AsqeWdMHRGa4rOtzUD035CIhpt+75X114lTWaAthW61yqaHIV6JXduq wkzvn0AxsYCQAScuyD3A6dC9AxK53B5Vq3caNqzW7Vg52Kf2JWA7v44jMeawaKmvVDR+ jt2/RKydxM4C3QzaBKySFxRss8FcmCoSJ1So2PCtYlaqc/ktr+0zc6XTfxA5ojZ0/srd guXg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=F5ZgPkj4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c10si2024942oif.81.2020.04.01.22.58.50; Wed, 01 Apr 2020 22:59:02 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=F5ZgPkj4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729032AbgDBF5e (ORCPT + 99 others); Thu, 2 Apr 2020 01:57:34 -0400 Received: from mail-pl1-f193.google.com ([209.85.214.193]:40767 "EHLO mail-pl1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725789AbgDBF5e (ORCPT ); Thu, 2 Apr 2020 01:57:34 -0400 Received: by mail-pl1-f193.google.com with SMTP id h11so937171plk.7 for ; Wed, 01 Apr 2020 22:57:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=6dJnmRISnXhx/tid8L3bkFndKLLLawXzGhi1aYEmqBI=; b=F5ZgPkj4Jqb8jVfvdsxgqgz1JEo/1oI1a8uoJIAQA0lpNWQHcaE8671FBeypM6kX3E Dt2Vs0xHlYHGmQ8yuRM5u0mTovkVC35KiwjAZfihtabHL7dVwoUYBEe9WW4k/SUjsCFs dRRQL/gps9M5cE/BlrvUTtv8cJeWUwUo53YE3Z3r/n7QMlw59odA1tKMNrlMWSXK6ZTR ByY4qGARizvkaiTkQKjZYorE1SeoyEYKhPVCEMPxGo5R4YSnUW97n57U6H0RItQxNBga X9n5ayS/XEnySMr0+fxqtf7pACtsK5A1ad9y5KjvXkFlCFVBuCY+Vj867Hd4YWqJ8zT2 qHIg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=6dJnmRISnXhx/tid8L3bkFndKLLLawXzGhi1aYEmqBI=; b=qrBCXPpsktzomxXkvkqX75OHK9hWb0HbzVtaNkZ08Kx/09yP26wVzgAeykvI8QUqx6 XucsU6u7GRo2rVUGeQklcWJZoKX2bD9LC7IsA/VzEl7q2kr8JCuTxuDDqYjD2OwFz3Ci f9s5bVcerGgrAUTgUrkbVvnfm2aqHNvvdiBzXbtrBYgwI+YR2RU8ysAM9BJNc5HFdQbl /LhLvG83QVxqHuzYNrQukwWFc43F76v55GJu7Gn+V19azjlvUvyMeMNXOgFFX3PVBZKR QbHMOkHIrBWvHxm2nwqpoLjzNtrvt2dpPusVam8xjwlyrYoer87izapfRBTjToUqiwH1 B7nA== X-Gm-Message-State: AGi0PuZPHHOVQdvFGVck3tV+9K+hsm4TCalXtf03UaJ1ox3q7zLszua7 bHmwV9dc3yJvxm7EpuGg41HXu1HMN/U= X-Received: by 2002:a17:902:e788:: with SMTP id cp8mr1382631plb.343.1585807053025; Wed, 01 Apr 2020 22:57:33 -0700 (PDT) Received: from localhost.localdomain ([103.87.57.161]) by smtp.googlemail.com with ESMTPSA id 207sm2776058pgg.19.2020.04.01.22.57.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 01 Apr 2020 22:57:32 -0700 (PDT) From: Amol Grover To: Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , James Morris , Thomas Gleixner , Peter Zijlstra , Jann Horn , David Howells , Shakeel Butt , "Eric W . Biederman" , Andrew Morton , Paul Moore , Eric Paris Cc: linux-kernel-mentees@lists.linuxfoundation.org, linux-kernel@vger.kernel.org, linux-audit@redhat.com, Joel Fernandes , Madhuparna Bhowmik , "Paul E . McKenney" , Amol Grover Subject: [PATCH 3/3 RESEND] auditsc: Do not use RCU primitive to read from cred pointer Date: Thu, 2 Apr 2020 11:26:40 +0530 Message-Id: <20200402055640.6677-3-frextrite@gmail.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200402055640.6677-1-frextrite@gmail.com> References: <20200402055640.6677-1-frextrite@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org task_struct::cred is only used task-synchronously and does not require any RCU locks, hence, rcu_dereference_check is not required to read from it. Suggested-by: Jann Horn Co-developed-by: Joel Fernandes (Google) Signed-off-by: Joel Fernandes (Google) Signed-off-by: Amol Grover --- kernel/auditsc.c | 15 +++++---------- 1 file changed, 5 insertions(+), 10 deletions(-) diff --git a/kernel/auditsc.c b/kernel/auditsc.c index 4effe01ebbe2..d3510513cdd1 100644 --- a/kernel/auditsc.c +++ b/kernel/auditsc.c @@ -430,24 +430,19 @@ static int audit_field_compare(struct task_struct *tsk, /* Determine if any context name data matches a rule's watch data */ /* Compare a task_struct with an audit_rule. Return 1 on match, 0 * otherwise. - * - * If task_creation is true, this is an explicit indication that we are - * filtering a task rule at task creation time. This and tsk == current are - * the only situations where tsk->cred may be accessed without an rcu read lock. */ static int audit_filter_rules(struct task_struct *tsk, struct audit_krule *rule, struct audit_context *ctx, struct audit_names *name, - enum audit_state *state, - bool task_creation) + enum audit_state *state) { const struct cred *cred; int i, need_sid = 1; u32 sid; unsigned int sessionid; - cred = rcu_dereference_check(tsk->cred, tsk == current || task_creation); + cred = tsk->cred; for (i = 0; i < rule->field_count; i++) { struct audit_field *f = &rule->fields[i]; @@ -745,7 +740,7 @@ static enum audit_state audit_filter_task(struct task_struct *tsk, char **key) rcu_read_lock(); list_for_each_entry_rcu(e, &audit_filter_list[AUDIT_FILTER_TASK], list) { if (audit_filter_rules(tsk, &e->rule, NULL, NULL, - &state, true)) { + &state)) { if (state == AUDIT_RECORD_CONTEXT) *key = kstrdup(e->rule.filterkey, GFP_ATOMIC); rcu_read_unlock(); @@ -791,7 +786,7 @@ static enum audit_state audit_filter_syscall(struct task_struct *tsk, list_for_each_entry_rcu(e, list, list) { if (audit_in_mask(&e->rule, ctx->major) && audit_filter_rules(tsk, &e->rule, ctx, NULL, - &state, false)) { + &state)) { rcu_read_unlock(); ctx->current_state = state; return state; @@ -815,7 +810,7 @@ static int audit_filter_inode_name(struct task_struct *tsk, list_for_each_entry_rcu(e, list, list) { if (audit_in_mask(&e->rule, ctx->major) && - audit_filter_rules(tsk, &e->rule, ctx, n, &state, false)) { + audit_filter_rules(tsk, &e->rule, ctx, n, &state)) { ctx->current_state = state; return 1; } -- 2.24.1