]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
shared,sysext,analyze: remove unneeded if() for vars already guarded
authorMichael Vogt <michael@amutable.com>
Sat, 28 Mar 2026 21:39:03 +0000 (22:39 +0100)
committerMichael Vogt <michael@amutable.com>
Tue, 31 Mar 2026 16:30:40 +0000 (18:30 +0200)
There are some unnecessary() if() checks for variables
that are already guarded by assert()s. Drop those.

Thanks to keszybz for clarifying the direction of this commit.

src/analyze/analyze-security.c
src/shared/condition.c
src/shared/openssl-util.c
src/sysext/sysext.c

index 5e9db877b7106930242918882227644b6e4f1686..c1b2948e6ca3a8d94727a86e665380f2aecf449d 100644 (file)
@@ -577,8 +577,7 @@ static bool syscall_names_in_filter(Set *s, bool allow_list, const SyscallFilter
 
                 if (set_contains(s, syscall) == allow_list) {
                         log_debug("Offending syscall filter item: %s", syscall);
-                        if (ret_offending_syscall)
-                                *ret_offending_syscall = syscall;
+                        *ret_offending_syscall = syscall;
                         return true; /* bad! */
                 }
         }
index dd720c55bd9e536a9ad03e1176feb276c2cc6f19..af5093a6a3132121b54f95d3619c7032d68d7e57 100644 (file)
@@ -82,11 +82,9 @@ Condition* condition_new(ConditionType type, const char *parameter, bool trigger
                 .negate = negate,
         };
 
-        if (parameter) {
-                c->parameter = strdup(parameter);
-                if (!c->parameter)
-                        return mfree(c);
-        }
+        c->parameter = strdup(parameter);
+        if (!c->parameter)
+                return mfree(c);
 
         return c;
 }
index 9e0b9987463d9b8cc367955cb3501f34709a3dac..b512fcef949f5c39e094b4adc8fd22b54d14489d 100644 (file)
@@ -1339,8 +1339,7 @@ static int openssl_load_private_key_from_file(const char *path, EVP_PKEY **ret)
                 return log_debug_errno(SYNTHETIC_ERRNO(EIO), "Failed to parse PEM private key: %s",
                                        ERR_error_string(ERR_get_error(), NULL));
 
-        if (ret)
-                *ret = TAKE_PTR(pk);
+        *ret = TAKE_PTR(pk);
 
         return 0;
 }
@@ -1404,8 +1403,7 @@ static int load_x509_certificate_from_file(const char *path, X509 **ret) {
                 return log_debug_errno(SYNTHETIC_ERRNO(EBADMSG), "Failed to parse X.509 certificate: %s",
                                        ERR_error_string(ERR_get_error(), NULL));
 
-        if (ret)
-                *ret = TAKE_PTR(cert);
+        *ret = TAKE_PTR(cert);
 
         return 0;
 }
index 20f0ceb3f031e157bc31320bd6943421fa4619c3..52e6c3be666b0362b6118c9422d7d8666059dfc0 100644 (file)
@@ -2437,8 +2437,7 @@ static int image_discover_and_read_metadata(ImageClass image_class, Hashmap **re
                         return log_error_errno(r, "Failed to read metadata for image %s: %m", img->name);
         }
 
-        if (ret_images)
-                *ret_images = TAKE_PTR(images);
+        *ret_images = TAKE_PTR(images);
 
         return 0;
 }