Quoting SF Markus Elfring (elfring@xxxxxxxxxxxxxxxxxxxxx): > From: Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx> > Date: Sun, 13 Aug 2017 14:17:48 +0200 > > One local variable was reset to zero at the end of these functions. > This value will also be set by a previous call of a function if it was > executed successfully. Thus omit an extra assignment there. > > Signed-off-by: Markus Elfring <elfring@xxxxxxxxxxxxxxxxxxxxx> Acked-by: Serge Hallyn <serge@xxxxxxxxxx> > --- > security/selinux/selinuxfs.c | 1 - > security/selinux/ss/avtab.c | 2 -- > security/selinux/ss/ebitmap.c | 4 +--- > security/selinux/ss/policydb.c | 10 ++-------- > 4 files changed, 3 insertions(+), 14 deletions(-) > > diff --git a/security/selinux/selinuxfs.c b/security/selinux/selinuxfs.c > index 00eed842c491..7565c312a198 100644 > --- a/security/selinux/selinuxfs.c > +++ b/security/selinux/selinuxfs.c > @@ -1724,7 +1724,6 @@ static int sel_make_classes(void) > if (rc) > goto out; > } > - rc = 0; > out: > for (i = 0; i < nclasses; i++) > kfree(classes[i]); > diff --git a/security/selinux/ss/avtab.c b/security/selinux/ss/avtab.c > index 3628d3a868b6..a8218905e286 100644 > --- a/security/selinux/ss/avtab.c > +++ b/security/selinux/ss/avtab.c > @@ -587,8 +587,6 @@ int avtab_read(struct avtab *a, void *fp, struct policydb *pol) > goto bad; > } > } > - > - rc = 0; > out: > return rc; > > diff --git a/security/selinux/ss/ebitmap.c b/security/selinux/ss/ebitmap.c > index ad38299164c3..ccf372db689c 100644 > --- a/security/selinux/ss/ebitmap.c > +++ b/security/selinux/ss/ebitmap.c > @@ -373,7 +373,7 @@ int ebitmap_read(struct ebitmap *e, void *fp) > > if (!e->highbit) { > e->node = NULL; > - goto ok; > + goto out; > } > > if (e->highbit && !count) > @@ -436,8 +436,6 @@ int ebitmap_read(struct ebitmap *e, void *fp) > map = EBITMAP_SHIFT_UNIT_SIZE(map); > } > } > -ok: > - rc = 0; > out: > return rc; > bad: > diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c > index aa6500abb178..a2356fc263c6 100644 > --- a/security/selinux/ss/policydb.c > +++ b/security/selinux/ss/policydb.c > @@ -599,7 +599,6 @@ static int policydb_index(struct policydb *p) > if (rc) > goto out; > } > - rc = 0; > out: > return rc; > } > @@ -903,10 +902,10 @@ int policydb_load_isids(struct policydb *p, struct sidtab *s) > > head = p->ocontexts[OCON_ISID]; > for (c = head; c; c = c->next) { > - rc = -EINVAL; > if (!c->context[0].user) { > printk(KERN_ERR "SELinux: SID %s was never defined.\n", > c->u.name); > + rc = -EINVAL; > goto out; > } > > @@ -917,7 +916,6 @@ int policydb_load_isids(struct policydb *p, struct sidtab *s) > goto out; > } > } > - rc = 0; > out: > return rc; > } > @@ -1074,13 +1072,12 @@ static int context_read_and_validate(struct context *c, > } > } > > - rc = -EINVAL; > if (!policydb_context_isvalid(p, c)) { > printk(KERN_ERR "SELinux: invalid security context\n"); > context_destroy(c); > + rc = -EINVAL; > goto out; > } > - rc = 0; > out: > return rc; > } > @@ -1900,7 +1897,6 @@ static int range_read(struct policydb *p, void *fp) > r = NULL; > } > hash_eval(p->range_tr, "rangetr"); > - rc = 0; > out: > kfree(rt); > kfree(r); > @@ -2550,8 +2546,6 @@ int policydb_read(struct policydb *p, void *fp) > rc = policydb_bounds_sanity_check(p); > if (rc) > goto bad; > - > - rc = 0; > out: > return rc; > bad: > -- > 2.14.0