Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp43601rdh; Wed, 25 Oct 2023 15:38:21 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHMtmuDyQekqDzbToahWKh3leLoSYLr8Xr0/XBvcYteNRAjxmae03UmSwCvhcMNqmWBGuzp X-Received: by 2002:a81:5d57:0:b0:5a7:b481:4dd2 with SMTP id r84-20020a815d57000000b005a7b4814dd2mr16375179ywb.47.1698273501055; Wed, 25 Oct 2023 15:38:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698273501; cv=none; d=google.com; s=arc-20160816; b=mNm3arwdgHV3dcZQSslxKXDWhr2Lj2syO5PBtEl9+zS8XqCt6djG9ExqRdVsrb9y70 CePF+k4jgj3DQScnS2fEo2OzdlqdG61nCJOEZRk/BxndXV41dwC8dbRGYYQgiX9vqvLy PvvyeHsGjZflVWB0NOP87cB2Iu8TYU2CMAaaH5LqQWy3EwDHVfuiLePeZ2rMcaPH2nBM iI/eBXjVMWY/dw/667LGs8fRufWdUSO7Lv9dZd65a/OQ3Cc5MMxJ6jajOHIErOdRlnjj R6Mac/Sl5IXvmq7XCCRzJFP6Xyc27HdY0VEuvKBKO5RvcFD/eyZtHhZFRkQ05sddGTor Syqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=3e20YnKe/JhRuK5x86Nv0xNvtTt2v6y5FG534MBgHx0=; fh=3o4UfZdmTwLWOFZmQh0r3WSnauBEEN/P8hydeK8Pk6A=; b=rzboJs2vKUGdEXTv/uxi3xARQGNDVQoI4Hh34Plt2vifGF49ZOyiRXN5dT/wfBGeDA mogy7JHZNTiYEe/x37vg5v89QobooVw8X+bagUbPkkHYHRQDXgiqL1q9b6avPvVv2bzu buJ6IDmjdN63JoNe9VdISY1jmfvSCv6am6gr9JWhp8JAJSDTp4cVv7uBgiZmlKh6r+8l PstdGXiNaRrkFUEPvc7VZ6eRHBBErLpxOhc0W+e/AI/KIW6tZGv4HNkBBVtHkMwzvJp1 lzS4X1w13UYeQT242Baz+At9qlTfHqujwK3VPCagGbnF5gzEDFr/nl23tG4KxX6i3NP5 xn9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=ApOY5nA4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id l15-20020a0de20f000000b005a204618adcsi13076360ywe.109.2023.10.25.15.38.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 25 Oct 2023 15:38:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=ApOY5nA4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 6C01A8183EFD; Wed, 25 Oct 2023 15:38:18 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230156AbjJYWiM (ORCPT + 99 others); Wed, 25 Oct 2023 18:38:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53432 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229649AbjJYWiL (ORCPT ); Wed, 25 Oct 2023 18:38:11 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 046618F for ; Wed, 25 Oct 2023 15:38:10 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1650DC433C8; Wed, 25 Oct 2023 22:38:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1698273489; bh=8ZaHognKBbv1lYU2FsHlrUv1uDTrt8DMUrzopQve/O4=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=ApOY5nA4miFuLqeB+YF2sa6yf/8IKMkCxFPnNxhh6+lkUMoy4dXMMeLTjuWHgzRsv nFNlJhztM+XPFSHjUj+M6bBeWCs9uaD9GfqtjfF6EW1GYCxRYsMm1QsCWHDEkCuFr9 WGRadwkV+tpV0oQURFB8OA4XT6I3A0rdrGItdT0g= Date: Wed, 25 Oct 2023 15:38:07 -0700 From: Andrew Morton To: Abhinav Singh Cc: brauner@kernel.org, surenb@google.com, mst@redhat.com, michael.christie@oracle.com, mathieu.desnoyers@efficios.com, mjguzik@gmail.com, npiggin@gmail.com, shakeelb@google.com, peterz@infradead.org, linux-kernel@vger.kernel.org, linux-kernel-mentees@lists.linuxfoundation.org Subject: Re: [PATCH] Fixing warning of directly dereferencing __rcu tagged Message-Id: <20231025153807.8db950f1db82b2c9ecd03758@linux-foundation.org> In-Reply-To: <20231025222811.855336-1-singhabhinav9051571833@gmail.com> References: <20231025222811.855336-1-singhabhinav9051571833@gmail.com> X-Mailer: Sylpheed 3.8.0beta1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Wed, 25 Oct 2023 15:38:18 -0700 (PDT) On Thu, 26 Oct 2023 03:58:11 +0530 Abhinav Singh wrote: > This patch fixes the warning about directly dereferencing a pointer > tagged with __rcu annotation. > > Dereferencing the pointers tagged with __rcu directly should > always be avoided according to the docs. There is a rcu helper > functions rcu_dereference(...) to use when dereferencing a __rcu > pointer. This functions returns the non __rcu tagged pointer. Seems sensible. > Like normal pointer there should be a check for null case when > further dereferencing the returned dereferenced __rcu pointer. Why is this? > --- a/kernel/fork.c > +++ b/kernel/fork.c > @@ -2369,7 +2369,9 @@ __latent_entropy struct task_struct *copy_process( > > retval = -EAGAIN; > if (is_rlimit_overlimit(task_ucounts(p), UCOUNT_RLIMIT_NPROC, rlimit(RLIMIT_NPROC))) { > - if (p->real_cred->user != INIT_USER && > + const struct cred *real_cred = rcu_dereference(p->real_cred); > + > + if (real_cred && real_cred->user != INIT_USER && > !capable(CAP_SYS_RESOURCE) && !capable(CAP_SYS_ADMIN)) > goto bad_fork_cleanup_count; The old code assumes that p->read_cred cannot be NULL and the new code does nothing to make it possible that `real_cred' can be NULL? In other words, I see no reason to add this new check for NULL?