On Thu, 27 Jan 2022 at 16:57, Paul Moore <paul@xxxxxxxxxxxxxx> wrote: > > In the process of removing an explicit type cast to preserve a cred > const qualifier in cred_init_security() we ran into a problem where > the task_struct::real_cred field is defined with the "__rcu" > attribute but the selinux_cred() function parameter is not, leading > to a sparse warning: > > security/selinux/hooks.c:216:36: sparse: sparse: > incorrect type in argument 1 (different address spaces) > @@ expected struct cred const *cred > @@ got struct cred const [noderef] __rcu *real_cred > > As we don't want to add the "__rcu" attribute to the selinux_cred() > parameter, we're going to add an explicit cast back to > cred_init_security(). > > Fixes: b084e189b01a ("selinux: simplify cred_init_security") > Reported-by: kernel test robot <lkp@xxxxxxxxx> > Signed-off-by: Paul Moore <paul@xxxxxxxxxxxxxx> > --- > security/selinux/hooks.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c > index eae7dbd62df1..c057896e7dcd 100644 > --- a/security/selinux/hooks.c > +++ b/security/selinux/hooks.c > @@ -213,7 +213,7 @@ static void cred_init_security(void) > { > struct task_security_struct *tsec; > > - tsec = selinux_cred(current->real_cred); > + tsec = selinux_cred((__force const struct cred *)current->real_cred); > tsec->osid = tsec->sid = SECINITSID_KERNEL; > } > Thanks for cleaning up. Just out of curiosity: the kernel doc[1] suggests using prepare_creds() + commit_creds() to update creds. Is is not required here because this is initialization code and the members osid and sid are only used by initialized SELinux? [1]: https://www.kernel.org/doc/html/v5.16/security/credentials.html#altering-credentials