lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 29 Mar 2017 11:48:29 -0400 From: Paul Moore <paul@...l-moore.com> To: SF Markus Elfring <elfring@...rs.sourceforge.net> Cc: linux-security-module@...r.kernel.org, selinux@...ho.nsa.gov, Eric Paris <eparis@...isplace.org>, James Morris <james.l.morris@...cle.com>, "Serge E. Hallyn" <serge@...lyn.com>, Stephen Smalley <sds@...ho.nsa.gov>, William Roberts <william.c.roberts@...el.com>, LKML <linux-kernel@...r.kernel.org>, kernel-janitors@...r.kernel.org Subject: Re: [PATCH 44/46] selinux: Adjust two checks for null pointers On Sun, Jan 15, 2017 at 10:44 AM, SF Markus Elfring <elfring@...rs.sourceforge.net> wrote: > From: Markus Elfring <elfring@...rs.sourceforge.net> > Date: Sun, 15 Jan 2017 13:30:20 +0100 > MIME-Version: 1.0 > Content-Type: text/plain; charset=UTF-8 > Content-Transfer-Encoding: 8bit > > The script "checkpatch.pl" pointed information out like the following. > > Comparison to NULL could be written !… > > Thus fix affected source code places. > > Signed-off-by: Markus Elfring <elfring@...rs.sourceforge.net> > --- > security/selinux/ss/sidtab.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) Merged. Definitely code churn, but arguably there is some minor value in making checkpatch.pl happy. In the future changes like this should be bundled with more significant changes to make them more appealing. > diff --git a/security/selinux/ss/sidtab.c b/security/selinux/ss/sidtab.c > index c9533b21942b..f6915f257486 100644 > --- a/security/selinux/ss/sidtab.c > +++ b/security/selinux/ss/sidtab.c > @@ -54,7 +54,7 @@ int sidtab_insert(struct sidtab *s, u32 sid, struct context *context) > } > > newnode = kmalloc(sizeof(*newnode), GFP_ATOMIC); > - if (newnode == NULL) { > + if (!newnode) { > rc = -ENOMEM; > goto out; > } > @@ -98,7 +98,7 @@ static struct context *sidtab_search_core(struct sidtab *s, u32 sid, int force) > if (force && cur && sid == cur->sid && cur->context.len) > return &cur->context; > > - if (cur == NULL || sid != cur->sid || cur->context.len) { > + if (!cur || sid != cur->sid || cur->context.len) { > /* Remap invalid SIDs to the unlabeled SID. */ > sid = SECINITSID_UNLABELED; > hvalue = SIDTAB_HASH(sid); > -- > 2.11.0 > -- paul moore www.paul-moore.com
Powered by blists - more mailing lists