summaryrefslogtreecommitdiffstats
path: root/security/safesetid
diff options
context:
space:
mode:
authorYanwei Gao <gaoyanwei.tx@gmail.com>2021-03-10 07:52:12 +0100
committerMicah Morton <mortonm@chromium.org>2021-04-27 01:36:50 +0200
commit1ca86ac1ec8d201478e9616565d4df5d51595cfc (patch)
treefb13252ad6c832e5a0fd5ce6a7d9cf57cac63a96 /security/safesetid
parentLinux 5.12 (diff)
downloadlinux-1ca86ac1ec8d201478e9616565d4df5d51595cfc.tar.xz
linux-1ca86ac1ec8d201478e9616565d4df5d51595cfc.zip
LSM: SafeSetID: Fix code specification by scripts/checkpatch.pl
First, the code is found to be irregular through checkpatch.pl. Then I found break is really useless here. Signed-off-by: Yanwei Gao <gaoyanwei.tx@gmail.com> Signed-off-by: Micah Morton <mortonm@chromium.org>
Diffstat (limited to 'security/safesetid')
-rw-r--r--security/safesetid/lsm.c3
1 files changed, 0 insertions, 3 deletions
diff --git a/security/safesetid/lsm.c b/security/safesetid/lsm.c
index 8a176b6adbe5..1079c6d54784 100644
--- a/security/safesetid/lsm.c
+++ b/security/safesetid/lsm.c
@@ -125,7 +125,6 @@ static int safesetid_security_capable(const struct cred *cred,
pr_warn("Operation requires CAP_SETUID, which is not available to UID %u for operations besides approved set*uid transitions\n",
__kuid_val(cred->uid));
return -EPERM;
- break;
case CAP_SETGID:
/*
* If no policy applies to this task, allow the use of CAP_SETGID for
@@ -140,11 +139,9 @@ static int safesetid_security_capable(const struct cred *cred,
pr_warn("Operation requires CAP_SETGID, which is not available to GID %u for operations besides approved set*gid transitions\n",
__kuid_val(cred->uid));
return -EPERM;
- break;
default:
/* Error, the only capabilities were checking for is CAP_SETUID/GID */
return 0;
- break;
}
return 0;
}