Quoting SF Markus Elfring (elfr...@users.sourceforge.net):
> From: Markus Elfring <elfr...@users.sourceforge.net>
> Date: Sun, 13 Aug 2017 14:17:48 +0200
> 
> One local variable was reset to zero at the end of these functions.
> This value will also be set by a previous call of a function if it was
> executed successfully. Thus omit an extra assignment there.
> 
> Signed-off-by: Markus Elfring <elfr...@users.sourceforge.net>

Acked-by: Serge Hallyn <se...@hallyn.com>

> ---
>  security/selinux/selinuxfs.c   |  1 -
>  security/selinux/ss/avtab.c    |  2 --
>  security/selinux/ss/ebitmap.c  |  4 +---
>  security/selinux/ss/policydb.c | 10 ++--------
>  4 files changed, 3 insertions(+), 14 deletions(-)
> 
> diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c
> index 00eed842c491..7565c312a198 100644
> --- a/security/selinux/selinuxfs.c
> +++ b/security/selinux/selinuxfs.c
> @@ -1724,7 +1724,6 @@ static int sel_make_classes(void)
>               if (rc)
>                       goto out;
>       }
> -     rc = 0;
>  out:
>       for (i = 0; i < nclasses; i++)
>               kfree(classes[i]);
> diff --git a/security/selinux/ss/avtab.c b/security/selinux/ss/avtab.c
> index 3628d3a868b6..a8218905e286 100644
> --- a/security/selinux/ss/avtab.c
> +++ b/security/selinux/ss/avtab.c
> @@ -587,8 +587,6 @@ int avtab_read(struct avtab *a, void *fp, struct policydb 
> *pol)
>                       goto bad;
>               }
>       }
> -
> -     rc = 0;
>  out:
>       return rc;
>  
> diff --git a/security/selinux/ss/ebitmap.c b/security/selinux/ss/ebitmap.c
> index ad38299164c3..ccf372db689c 100644
> --- a/security/selinux/ss/ebitmap.c
> +++ b/security/selinux/ss/ebitmap.c
> @@ -373,7 +373,7 @@ int ebitmap_read(struct ebitmap *e, void *fp)
>  
>       if (!e->highbit) {
>               e->node = NULL;
> -             goto ok;
> +             goto out;
>       }
>  
>       if (e->highbit && !count)
> @@ -436,8 +436,6 @@ int ebitmap_read(struct ebitmap *e, void *fp)
>                       map = EBITMAP_SHIFT_UNIT_SIZE(map);
>               }
>       }
> -ok:
> -     rc = 0;
>  out:
>       return rc;
>  bad:
> diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c
> index aa6500abb178..a2356fc263c6 100644
> --- a/security/selinux/ss/policydb.c
> +++ b/security/selinux/ss/policydb.c
> @@ -599,7 +599,6 @@ static int policydb_index(struct policydb *p)
>               if (rc)
>                       goto out;
>       }
> -     rc = 0;
>  out:
>       return rc;
>  }
> @@ -903,10 +902,10 @@ int policydb_load_isids(struct policydb *p, struct 
> sidtab *s)
>  
>       head = p->ocontexts[OCON_ISID];
>       for (c = head; c; c = c->next) {
> -             rc = -EINVAL;
>               if (!c->context[0].user) {
>                       printk(KERN_ERR "SELinux:  SID %s was never defined.\n",
>                               c->u.name);
> +                     rc = -EINVAL;
>                       goto out;
>               }
>  
> @@ -917,7 +916,6 @@ int policydb_load_isids(struct policydb *p, struct sidtab 
> *s)
>                       goto out;
>               }
>       }
> -     rc = 0;
>  out:
>       return rc;
>  }
> @@ -1074,13 +1072,12 @@ static int context_read_and_validate(struct context 
> *c,
>               }
>       }
>  
> -     rc = -EINVAL;
>       if (!policydb_context_isvalid(p, c)) {
>               printk(KERN_ERR "SELinux:  invalid security context\n");
>               context_destroy(c);
> +             rc = -EINVAL;
>               goto out;
>       }
> -     rc = 0;
>  out:
>       return rc;
>  }
> @@ -1900,7 +1897,6 @@ static int range_read(struct policydb *p, void *fp)
>               r = NULL;
>       }
>       hash_eval(p->range_tr, "rangetr");
> -     rc = 0;
>  out:
>       kfree(rt);
>       kfree(r);
> @@ -2550,8 +2546,6 @@ int policydb_read(struct policydb *p, void *fp)
>       rc = policydb_bounds_sanity_check(p);
>       if (rc)
>               goto bad;
> -
> -     rc = 0;
>  out:
>       return rc;
>  bad:
> -- 
> 2.14.0

Reply via email to