[PATCH v7 2/2] KEYS: Avoid false positive ENOMEM error on key read
Waiman Long
longman at redhat.com
Sun Mar 22 00:46:33 UTC 2020
On 3/21/20 8:31 PM, Tetsuo Handa wrote:
> On 2020/03/22 3:49, Waiman Long wrote:
>> + do {
>> + if (ret > key_data_len) {
>> + if (unlikely(key_data))
>> + __kvzfree(key_data, key_data_len);
>> + key_data_len = ret;
>> + continue; /* Allocate buffer */
> Excuse me, but "continue;" inside "do { ... } while (0);" means "break;"
> because "while (0)" is evaluated before continuing the loop.
You are right. My mistake. Will send out a new one for patch 2.
-Longman
More information about the Linux-security-module-archive
mailing list