Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp4515985pxb; Tue, 25 Jan 2022 12:03:45 -0800 (PST) X-Google-Smtp-Source: ABdhPJwz8PlrsIs/PUb+YbT7PAKxWDzYzRgrTPFDmP2MvIF+NBRExx9vYaC8IpblJni8wxTy3kJm X-Received: by 2002:a05:6402:358e:: with SMTP id y14mr11498858edc.136.1643141025729; Tue, 25 Jan 2022 12:03:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643141025; cv=none; d=google.com; s=arc-20160816; b=ZdRpldw1q6K4IEUR6Bf8Qzf9qO7+T8ehatvAzzRCZDEVotucOFMFGqCeWNvh4zMnNu w4oTXxtrcwDn+vFODdFUC+zlbn+oE2do/q0IMH57QVYBW7o4+DZLU4TGJ4avA3x9mh0q s1LqKiYh3GfApO+ygOq0w0WbBku+wuttVA/gnEl1hvjJT4dNf4dZcnUxV5PcR2+RImHa UYpITsR9FWo8LfSjKuNlkK9tHczcHHg0GsYK6n33kuKqALbWRM9Jw1wIKffS2NVXHBkk AoHKUcsDw+nygm5sRdDbLBf4k/El92xfUJkgxUbulhlLG/dgbXhjQqSFRu/C6lrI4Omi /L2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=aiRyUdK+Th3jYryTsLsyc7X3KP1ePUO9wmCn+4PrUBo=; b=bw2Yfmpstv9umHhnQq7iLxPZHICtGiaGecxXOdbaFhLRMSQAVicLPtAHAyuDo8TfBF eqYU6qUZhq3rzz1RR5g4H2WG3UD+TRuOSbWBS6VjGILgLgElQZi2FOC6WdExeTSYdCnA V5XYuV6irwUQlpbbr/lMgz0VqUD34zN/KTgABcd7HyKaljgy67Quq/Uh/LaPEfWlYoif Vw+6JegipjfwJ7mJDP1dnEkrZx4Xn802vnaHavdCBRH5q9TObGKhP0ZN2Aq8YRosmLiP VBcQ41xhJhZhYSSbmoZtxcNNFEYdO+V4QooK4tgiiw9udFD7KrOn8qKdFvrEWmpA91lw 4srA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@googlemail.com header.s=20210112 header.b=Z+8iOa0u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=googlemail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qw37si5102354ejc.789.2022.01.25.12.03.17; Tue, 25 Jan 2022 12:03:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@googlemail.com header.s=20210112 header.b=Z+8iOa0u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=googlemail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1578455AbiAYOTi (ORCPT + 99 others); Tue, 25 Jan 2022 09:19:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33960 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1578086AbiAYOO6 (ORCPT ); Tue, 25 Jan 2022 09:14:58 -0500 Received: from mail-ed1-x52b.google.com (mail-ed1-x52b.google.com [IPv6:2a00:1450:4864:20::52b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 26AE1C061753; Tue, 25 Jan 2022 06:14:58 -0800 (PST) Received: by mail-ed1-x52b.google.com with SMTP id n10so47531977edv.2; Tue, 25 Jan 2022 06:14:58 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlemail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=aiRyUdK+Th3jYryTsLsyc7X3KP1ePUO9wmCn+4PrUBo=; b=Z+8iOa0upC3i/zyphaOtyFRqvXOAh4xIReWOwanfDLcuBAi9U1bHB31LDIKeD9OPGu gq2oeKrW+7VQK8NmgvhpZuhu3XPitQYBpLWY4ibNBPlcaw6bK15M2x6buZZOEHDi0oUc 4ZV0//Q4kqfuFm5ZNq0f+FTRS4JsnPBjCCdrOpJ6GU3zL2FsD2fR0Yqgq2mAx3hnVPac tq4K8ItBgto3JVoG9jk6nnK8w6e1zRoNMC8k9l71Pe6BzcHwe3x0ftMQry6DVles3tzc YFdCl2ynVfEE/R+ZzlaMRgi3gZVBBXSmEKqYYZbtCXWlyFyxotNLpRhS6/PJIOjlNT8J t3qQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=aiRyUdK+Th3jYryTsLsyc7X3KP1ePUO9wmCn+4PrUBo=; b=cbCJNN4anKhJbdXwQMNZqPkZJ0aM71mXlwsWNf/35g3rreGbgGally4AjWHGaf9+w7 UkwErVuHjo9p7OLow1vsFT3yC0EGpVaa59RozHDDSNUlSSMORwF4x3hAkYhMmDHFIJvy 0SB3EmRrdr79yL5eMr3NYhcIS97bYfUDphYndodMKrELouj0VQg8Nnp1chHA8bSmXaR4 wgbSLpdsaI0McqlNwqhcOMO76aQYK43MqXg8nI0GZ8BhSIH0/7dJzU8vQZYUQ1WVse+w ZQXhXN3dwQxAcZAttG8KMXYWOzMV9PR0puDGe7y48r30nxY4N6CguZkvDUXbd/p5c868 HiNw== X-Gm-Message-State: AOAM530mvMQbt77htpE4PHjSqYzbl+r9Ww3xb1IElxZd2rzooQC3Wh9M cSvlEVmGlpfjn4qExcNr1Gf8pYeIKlnm2A== X-Received: by 2002:a17:906:f85:: with SMTP id q5mr17103251ejj.232.1643120096662; Tue, 25 Jan 2022 06:14:56 -0800 (PST) Received: from debianHome.localdomain (dynamic-077-010-144-044.77.10.pool.telefonica.de. [77.10.144.44]) by smtp.gmail.com with ESMTPSA id lu44sm6292929ejb.145.2022.01.25.06.14.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 25 Jan 2022 06:14:56 -0800 (PST) From: =?UTF-8?q?Christian=20G=C3=B6ttsche?= To: selinux@vger.kernel.org Cc: Paul Moore , Stephen Smalley , Eric Paris , Nathan Chancellor , Nick Desaulniers , Ondrej Mosnacek , =?UTF-8?q?Micka=C3=ABl=20Sala=C3=BCn?= , Serge Hallyn , Yang Li , Casey Schaufler , Lakshmi Ramasubramanian , Jeff Vander Stoep , linux-kernel@vger.kernel.org, llvm@lists.linux.dev Subject: [PATCH 5/9] selinux: drop cast to same type Date: Tue, 25 Jan 2022 15:14:15 +0100 Message-Id: <20220125141422.32655-4-cgzones@googlemail.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220125141422.32655-1-cgzones@googlemail.com> References: <20220125141422.32655-1-cgzones@googlemail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Both the lvalue scontextp and rvalue scontext are of the type char*. Drop the redundant explicit cast not needed since commit 9a59daa03df7 ("SELinux: fix sleeping allocation in security_context_to_sid"), where the type of scontext changed from const char* to char*. Signed-off-by: Christian Göttsche --- security/selinux/ss/services.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/selinux/ss/services.c b/security/selinux/ss/services.c index 5a7df45bdab1..2f8db93e53b2 100644 --- a/security/selinux/ss/services.c +++ b/security/selinux/ss/services.c @@ -1452,7 +1452,7 @@ static int string_to_context_struct(struct policydb *pol, /* Parse the security context. */ rc = -EINVAL; - scontextp = (char *) scontext; + scontextp = scontext; /* Extract the user. */ p = scontextp; -- 2.34.1