Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp659047ybg; Tue, 28 Jul 2020 15:42:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwWzJgGNS1vG9kh9Ay/uOj1er0CW//KLPGg49UFjrMFuTHTQ64KHz4w6Um/ZdKukoUunq/w X-Received: by 2002:a17:907:4091:: with SMTP id nm1mr25356578ejb.208.1595976152027; Tue, 28 Jul 2020 15:42:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595976152; cv=none; d=google.com; s=arc-20160816; b=avVO2vkP813e8euJ3Bhvl7ZXeWzXKyoZmu0Jk+TvZCG6KbwcCOyJ3up3VcWgSWkGLh jlmAu2oJOWsKEen+7l4C/wW7mQvaGASau8RSIqbOgytVs7hpWDlrzmbeatZh3YwKIyP3 wo9lYI7alX7aZgvw9xsw8F+9mEnfSR1qfsHvop7OzDxxHB1qKH9B4fu9XLhHBVXB7BwN cqfkQI1v0RJNpfvN9zqYN5Resx/gHe9eB260g7T7D6yqKihrbkl6GVZ9eCWHSL0n0uGZ hp1Lx0pCsEWwu7tMBrHg0x2L5gVNR4VIWLpj3/9yxsmMsm7WAwaJ8K2rXqpTXkJs1g5/ hYzw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=iFIBR8kO/v2IMa977oj9AfCFXjFWrGiNtDjoEkLBU94=; b=j/N4/8tnWdbR2lXqCBhqHnpGE9OKn9pxJ2YxpW/czc7J75pz4DipKCBpRnDwOzfbpE l9yG/5aeIyCzxpr3N9eTCYrMUSzUXWMD47y9es9Nk1RKvK1BdB15iU1uX/cr0VtXnYWP vyJRX/Kp46Mq77c615Fz5GzD8S5dD0HptzLJqN/cM2Oaf33HUwJmFo/s5/BHZmZeF7Hz 24o+n0s01UNJJ4BNO49MWwBsmB1G7L2FWNk0hKSM6bzJ8mLjVIGJlRMlvpZ8TQkLB6sE Bs0ijCbJferEFnNFT8YrCvur2WdB2ZvyWsQQYCoUbYnUXuUu/WncxTHJrqkV1ial1Du4 frOw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q18si7156000eji.43.2020.07.28.15.42.09; Tue, 28 Jul 2020 15:42:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729863AbgG1Wkj (ORCPT + 99 others); Tue, 28 Jul 2020 18:40:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55410 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729628AbgG1Wkj (ORCPT ); Tue, 28 Jul 2020 18:40:39 -0400 Received: from ZenIV.linux.org.uk (zeniv.linux.org.uk [IPv6:2002:c35c:fd02::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 66393C061794; Tue, 28 Jul 2020 15:40:39 -0700 (PDT) Received: from viro by ZenIV.linux.org.uk with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1k0YGR-004arw-Eo; Tue, 28 Jul 2020 22:40:03 +0000 Date: Tue, 28 Jul 2020 23:40:03 +0100 From: Al Viro To: Casey Schaufler Cc: Deven Bowers , agk@redhat.com, axboe@kernel.dk, snitzer@redhat.com, jmorris@namei.org, serge@hallyn.com, zohar@linux.ibm.com, paul@paul-moore.com, eparis@redhat.com, jannh@google.com, dm-devel@redhat.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-block@vger.kernel.org, linux-audit@redhat.com, tyhicks@linux.microsoft.com, linux-kernel@vger.kernel.org, corbet@lwn.net, sashal@kernel.org, jaskarankhurana@linux.microsoft.com, mdsakib@microsoft.com, nramas@linux.microsoft.com, pasha.tatashin@soleen.com Subject: Re: [RFC PATCH v5 05/11] fs: add security blob and hooks for block_device Message-ID: <20200728224003.GC951209@ZenIV.linux.org.uk> References: <20200728213614.586312-1-deven.desai@linux.microsoft.com> <20200728213614.586312-6-deven.desai@linux.microsoft.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 28, 2020 at 03:22:59PM -0700, Casey Schaufler wrote: > > + hlist_for_each_entry(p, &security_hook_heads.bdev_setsecurity, list) { > > + rc = p->hook.bdev_setsecurity(bdev, name, value, size); > > + > > + if (rc == -ENOSYS) > > + rc = 0; > > + > > + if (rc != 0) > > Perhaps: > else if (rc != 0) > > > + break; > > + } > > + > > + return rc; hlist_for_each_entry(p, &security_hook_heads.bdev_setsecurity, list) { rc = p->hook.bdev_setsecurity(bdev, name, value, size); if (rc && rc != -ENOSYS) return rc; } return 0; Easier to reason about that way...