Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3302939imu; Mon, 17 Dec 2018 17:35:00 -0800 (PST) X-Google-Smtp-Source: AFSGD/V14tNyGiJySgmOO6Cc8YneCCFdqpALLKI0q6HuvmVbD7bqGoRxCaIpeTTAHMVRPzrr8UL9 X-Received: by 2002:a65:4049:: with SMTP id h9mr13888978pgp.304.1545096900079; Mon, 17 Dec 2018 17:35:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545096900; cv=none; d=google.com; s=arc-20160816; b=XvWDQnJO4KML9ot18w1mmLDSFXzDnjigGqfTTi7YWzl3k5ZKJgAHs5NoE+DtTUiTOQ swdBw96KUYNnctKR4CgIc7CxWkNCySS4gdcabbakNKJCSxeHeCWZbDMTKtsF7PTfFiim XDVTOUaxWlKmDvUvoNABccdSSnz9daL6zlinOclvQPmliTb2Bg0Bt7JJJY5fjsCrAnxC 3R8Zt08EYmVWqSldny2GszP8FyR8TAXmdxP6fZaKCypqlXQuLPbs2xOVmxUGsn79G7zl rTi0CcXxwUvjYpjWoz4O8SIXVdQb/e5L5bEmR+IivaU6ozr959A2QgGUd/Cg/2DDw6j2 W31A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=svmNLhE3Tr4zTSvfE4BZbjutXRtXujbd6cEeiu2JXak=; b=d2kkuc6cLVJq91pXifPnxId/zkqDvn2dsN+NkvPdP74bdOwMIjJTTG4D0g7Oq/ADep VlQv9cfTXZwC44wZKz4iRmWb0tPl+khlCyDsb0MfVRs83WPrzsmcP3Xkaq+ZHNWRfZFJ 2QiAHGrIXabawY8Uvpxla8SHZzj8RcxdpP7BB8B2gUqoC3/AK9VgJFC0O2Zs3lUEmip+ 2Zvfy5dLnGab4JXNiB24JNu6zPtRwBL98nIG+beG245WJ8ZxBuZepHk9unbTl9Wx/iru 99M6Lj6UD3STagO8dQz8GEbQEJ1QLpT1nVHf9+aEEoyum9+P837I9B6jTWHGu3utqQ1b NsEg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 38si11888325pln.313.2018.12.17.17.34.44; Mon, 17 Dec 2018 17:35:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726391AbeLRBdy (ORCPT + 99 others); Mon, 17 Dec 2018 20:33:54 -0500 Received: from zeniv.linux.org.uk ([195.92.253.2]:36418 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726260AbeLRBdy (ORCPT ); Mon, 17 Dec 2018 20:33:54 -0500 Received: from viro by ZenIV.linux.org.uk with local (Exim 4.91 #2 (Red Hat Linux)) id 1gZ4Gb-0003qW-0k; Tue, 18 Dec 2018 01:33:49 +0000 Date: Tue, 18 Dec 2018 01:33:48 +0000 From: Al Viro To: Linus Torvalds Cc: zohar@linux.ibm.com, linux-integrity@vger.kernel.org, James Morris James Morris , Linux List Kernel Mailing Subject: Re: [PATCH] ima: cleanup the match_token policy code Message-ID: <20181218013348.GR2217@ZenIV.linux.org.uk> References: <1545092089.4206.5.camel@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Dec 17, 2018 at 04:36:54PM -0800, Linus Torvalds wrote: > On Mon, Dec 17, 2018 at 4:14 PM Mimi Zohar wrote: > > > > Start the policy_tokens and the associated enumeration from zero, > > simplifying the pt macro. > > I applied this directly, since I decided to just commit my own "don't > use negative Opt_err" patch for the test_and_set_bit() cases, and they > kind of go together. > > There's still a -1 in security/keys/encrypted-keys/encrypted.c, and > there are also three cases of "Opt_error = -1" in the security layer. > > All of which look pointless and wrong, but not actively buggy, so I'll > leave them alone. FWIW, that part of LSM shite is getting taken out and shot - LSM-related preps in the beginning of mount API series are, at the moment, at fs/btrfs/ctree.h | 4 - fs/btrfs/super.c | 82 ++------- fs/namespace.c | 9 +- fs/nfs/internal.h | 2 +- fs/nfs/super.c | 34 ++-- fs/super.c | 23 +-- include/linux/lsm_hooks.h | 17 +- include/linux/security.h | 82 ++------- security/security.c | 39 +++-- security/selinux/hooks.c | 798 ++++++++++++++++++++++++++++++++------------------------------------------------------ security/smack/smack_lsm.c | 359 +++++++++++++++------------------------ 11 files changed, 523 insertions(+), 926 deletions(-) and unlike the original variant there's not much touched in security/* further in the series... No match_token() uses left in there after this part.