Re: [PATCH] selinux: avtab_init() and cond_policydb_init() return void

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Mar 5, 2020 at 9:04 PM Paul Moore <paul@xxxxxxxxxxxxxx> wrote:
> The avtab_init() and cond_policydb_init() functions always return
> zero so mark them as returning void and update the callers not to
> check for a return value.
>
> Suggested-by: Ondrej Mosnacek <omosnace@xxxxxxxxxx>

This was originally suggested by Stephen - you should credit him, not
me :) I only expressed my preference to still keep the functions,
since Stephen was considering removing them completely.

Other than that,

Reviewed-by: Ondrej Mosnacek <omosnace@xxxxxxxxxx>

> Signed-off-by: Paul Moore <paul@xxxxxxxxxxxxxx>
> ---
>  security/selinux/ss/avtab.c       |    3 +--
>  security/selinux/ss/avtab.h       |    2 +-
>  security/selinux/ss/conditional.c |   10 ++--------
>  security/selinux/ss/conditional.h |    2 +-
>  security/selinux/ss/policydb.c    |   11 ++---------
>  5 files changed, 7 insertions(+), 21 deletions(-)
>
> diff --git a/security/selinux/ss/avtab.c b/security/selinux/ss/avtab.c
> index 8c5800750fa8..01b300a4a882 100644
> --- a/security/selinux/ss/avtab.c
> +++ b/security/selinux/ss/avtab.c
> @@ -299,12 +299,11 @@ void avtab_destroy(struct avtab *h)
>         h->mask = 0;
>  }
>
> -int avtab_init(struct avtab *h)
> +void avtab_init(struct avtab *h)
>  {
>         kvfree(h->htable);
>         h->htable = NULL;
>         h->nel = 0;
> -       return 0;
>  }
>
>  int avtab_alloc(struct avtab *h, u32 nrules)
> diff --git a/security/selinux/ss/avtab.h b/security/selinux/ss/avtab.h
> index 837e938798ef..5fdcb6696bcc 100644
> --- a/security/selinux/ss/avtab.h
> +++ b/security/selinux/ss/avtab.h
> @@ -87,7 +87,7 @@ struct avtab {
>         u32 mask;       /* mask to compute hash func */
>  };
>
> -int avtab_init(struct avtab *);
> +void avtab_init(struct avtab *h);
>  int avtab_alloc(struct avtab *, u32);
>  struct avtab_datum *avtab_search(struct avtab *h, struct avtab_key *k);
>  void avtab_destroy(struct avtab *h);
> diff --git a/security/selinux/ss/conditional.c b/security/selinux/ss/conditional.c
> index cce4a75fb3e7..939a74fd8fb4 100644
> --- a/security/selinux/ss/conditional.c
> +++ b/security/selinux/ss/conditional.c
> @@ -125,19 +125,13 @@ void evaluate_cond_nodes(struct policydb *p)
>                 evaluate_cond_node(p, &p->cond_list[i]);
>  }
>
> -int cond_policydb_init(struct policydb *p)
> +void cond_policydb_init(struct policydb *p)
>  {
> -       int rc;
> -
>         p->bool_val_to_struct = NULL;
>         p->cond_list = NULL;
>         p->cond_list_len = 0;
>
> -       rc = avtab_init(&p->te_cond_avtab);
> -       if (rc)
> -               return rc;
> -
> -       return 0;
> +       avtab_init(&p->te_cond_avtab);
>  }
>
>  static void cond_node_destroy(struct cond_node *node)
> diff --git a/security/selinux/ss/conditional.h b/security/selinux/ss/conditional.h
> index b9eb888ffa76..90c9c964f5f5 100644
> --- a/security/selinux/ss/conditional.h
> +++ b/security/selinux/ss/conditional.h
> @@ -61,7 +61,7 @@ struct cond_node {
>         struct cond_av_list false_list;
>  };
>
> -int cond_policydb_init(struct policydb *p);
> +void cond_policydb_init(struct policydb *p);
>  void cond_policydb_destroy(struct policydb *p);
>
>  int cond_init_bool_indexes(struct policydb *p);
> diff --git a/security/selinux/ss/policydb.c b/security/selinux/ss/policydb.c
> index 00edcd216aaa..932b2b9bcdb2 100644
> --- a/security/selinux/ss/policydb.c
> +++ b/security/selinux/ss/policydb.c
> @@ -463,17 +463,10 @@ static int rangetr_cmp(struct hashtab *h, const void *k1, const void *k2)
>   */
>  static int policydb_init(struct policydb *p)
>  {
> -       int rc;
> -
>         memset(p, 0, sizeof(*p));
>
> -       rc = avtab_init(&p->te_avtab);
> -       if (rc)
> -               return rc;
> -
> -       rc = cond_policydb_init(p);
> -       if (rc)
> -               return rc;
> +       avtab_init(&p->te_avtab);
> +       cond_policydb_init(p);
>
>         p->filename_trans = hashtab_create(filenametr_hash, filenametr_cmp,
>                                            (1 << 11));
>

-- 
Ondrej Mosnacek <omosnace at redhat dot com>
Software Engineer, Security Technologies
Red Hat, Inc.




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux