diff options
author | Yanwei Gao <gaoyanwei.tx@gmail.com> | 2021-03-10 06:52:12 +0000 |
---|---|---|
committer | Micah Morton <mortonm@chromium.org> | 2021-04-26 16:36:50 -0700 |
commit | 1ca86ac1ec8d201478e9616565d4df5d51595cfc (patch) | |
tree | fb13252ad6c832e5a0fd5ce6a7d9cf57cac63a96 /security | |
parent | 9f4ad9e425a1d3b6a34617b8ea226d56a119a717 (diff) | |
download | linux-1ca86ac1ec8d201478e9616565d4df5d51595cfc.tar.bz2 |
LSM: SafeSetID: Fix code specification by scripts/checkpatch.pl
First, the code is found to be irregular through checkpatch.pl.
Then I found break is really useless here.
Signed-off-by: Yanwei Gao <gaoyanwei.tx@gmail.com>
Signed-off-by: Micah Morton <mortonm@chromium.org>
Diffstat (limited to 'security')
-rw-r--r-- | security/safesetid/lsm.c | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/security/safesetid/lsm.c b/security/safesetid/lsm.c index 8a176b6adbe5..1079c6d54784 100644 --- a/security/safesetid/lsm.c +++ b/security/safesetid/lsm.c @@ -125,7 +125,6 @@ static int safesetid_security_capable(const struct cred *cred, pr_warn("Operation requires CAP_SETUID, which is not available to UID %u for operations besides approved set*uid transitions\n", __kuid_val(cred->uid)); return -EPERM; - break; case CAP_SETGID: /* * If no policy applies to this task, allow the use of CAP_SETGID for @@ -140,11 +139,9 @@ static int safesetid_security_capable(const struct cred *cred, pr_warn("Operation requires CAP_SETGID, which is not available to GID %u for operations besides approved set*gid transitions\n", __kuid_val(cred->uid)); return -EPERM; - break; default: /* Error, the only capabilities were checking for is CAP_SETUID/GID */ return 0; - break; } return 0; } |