Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp483087imm; Tue, 31 Jul 2018 23:30:20 -0700 (PDT) X-Google-Smtp-Source: AAOMgpeMyMiTMqx/Kvb5sRJMpfJOezL0i+q7/SsfafBAkkmyZ7rFrX/mFPQfi1KdfptUZ8MJZv94 X-Received: by 2002:a63:6004:: with SMTP id u4-v6mr23272020pgb.441.1533105020397; Tue, 31 Jul 2018 23:30:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533105020; cv=none; d=google.com; s=arc-20160816; b=fx/2Y0VYQH3aJF19/kBPQlBmf8wwN1Kd8/HWUZwyhqT9cPuZR4mZ/3fhf6LIlXKsMO HXrYHrNnCPvVo9oElJYmlncjOB7JSLZJdbuYprggFz5lrxPuf8nXYoiLAau27cNH1Q53 r5AT/Q4yiBhyo7HCcIxOqWLuVH5y5zv0oSwy/Zgao4r104JqdatcjFdXpaNZDjcE571Y 6CKQZ6z5CvYwmC7QeX+sdt5k7VcIv6rJnGFxCaeD4AYJ/6x0Dlo1TR5vfRSdWk1cXWJW IPZZSMTr8+l21T+P1gcxz171OgBZwKbVluF13ehbDbp9201/IioQYw4avZrZV4I417qf lYMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:arc-authentication-results; bh=LJsv4GW/fMl0d8Iu85eWECy+0wa1HA4gGkZYQvuhWBI=; b=D40b1pyZnuk7F1hOtEGS/MNmGdL4JwxrqOSNqVhRq9GCgr1Gq5ZfYhPJX6beAqpDXE AxK0nluURpFvh+ek1BHgvD6R9DAkeq6nTqX88SXPa0qnlEeM/qIA19E6q9nlwuf8txh8 H85FYNfDNaZkQllFhNmevrjSjGOvdhnff6TqD9q1iGVyRKOhOBfqluAwIp/dk95ld3yr ZHq5zYuUZEN83A2VwsHHE71PdeGWaUcfckVjVA6jZCM18xzRNXx8+IjIjMSFcGnF4ahY p+T1xjUYCoERt8htuchrldVdT7FmSSpxSqVUnK3djT62PqLExNm63i1XCi5Sn6mUrs8R GwZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t16-v6si9788277pgj.234.2018.07.31.23.29.54; Tue, 31 Jul 2018 23:30:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387457AbeHAIMf (ORCPT + 99 others); Wed, 1 Aug 2018 04:12:35 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:60915 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2387419AbeHAIMe (ORCPT ); Wed, 1 Aug 2018 04:12:34 -0400 Received: from DGGEMS407-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 36282B15B6AB6; Wed, 1 Aug 2018 14:28:26 +0800 (CST) Received: from localhost (10.177.31.96) by DGGEMS407-HUB.china.huawei.com (10.3.19.207) with Microsoft SMTP Server id 14.3.399.0; Wed, 1 Aug 2018 14:28:18 +0800 From: YueHaibing To: , , , , , , CC: , , , YueHaibing Subject: [PATCH] sunrpc: remove redundant variables 'checksumlen','blocksize' and 'data' Date: Wed, 1 Aug 2018 14:28:10 +0800 Message-ID: <20180801062810.19752-1-yuehaibing@huawei.com> X-Mailer: git-send-email 2.10.2.windows.1 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [10.177.31.96] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Variables 'checksumlen','blocksize' and 'data' are being assigned, but are never used,hence they are redundant and can be removed. fix fllowing warning: net/sunrpc/auth_gss/gss_krb5_wrap.c:443:7: warning: variable ‘blocksize’ set but not used [-Wunused-but-set-variable] net/sunrpc/auth_gss/gss_krb5_crypto.c:376:15: warning: variable ‘checksumlen’ set but not used [-Wunused-but-set-variable] net/sunrpc/xprtrdma/svc_rdma.c:97:9: warning: variable ‘data’ set but not used [-Wunused-but-set-variable] Signed-off-by: YueHaibing --- net/sunrpc/auth_gss/gss_krb5_crypto.c | 2 -- net/sunrpc/auth_gss/gss_krb5_wrap.c | 2 -- net/sunrpc/xprtrdma/svc_rdma.c | 2 -- 3 files changed, 6 deletions(-) diff --git a/net/sunrpc/auth_gss/gss_krb5_crypto.c b/net/sunrpc/auth_gss/gss_krb5_crypto.c index 8654494..84a16fd 100644 --- a/net/sunrpc/auth_gss/gss_krb5_crypto.c +++ b/net/sunrpc/auth_gss/gss_krb5_crypto.c @@ -373,7 +373,6 @@ make_checksum_v2(struct krb5_ctx *kctx, char *header, int hdrlen, struct scatterlist sg[1]; int err = -1; u8 *checksumdata; - unsigned int checksumlen; if (kctx->gk5e->keyed_cksum == 0) { dprintk("%s: expected keyed hash for %s\n", @@ -393,7 +392,6 @@ make_checksum_v2(struct krb5_ctx *kctx, char *header, int hdrlen, tfm = crypto_alloc_ahash(kctx->gk5e->cksum_name, 0, CRYPTO_ALG_ASYNC); if (IS_ERR(tfm)) goto out_free_cksum; - checksumlen = crypto_ahash_digestsize(tfm); req = ahash_request_alloc(tfm, GFP_NOFS); if (!req) diff --git a/net/sunrpc/auth_gss/gss_krb5_wrap.c b/net/sunrpc/auth_gss/gss_krb5_wrap.c index a737c2d..9a1347f 100644 --- a/net/sunrpc/auth_gss/gss_krb5_wrap.c +++ b/net/sunrpc/auth_gss/gss_krb5_wrap.c @@ -440,7 +440,6 @@ static u32 gss_wrap_kerberos_v2(struct krb5_ctx *kctx, u32 offset, struct xdr_buf *buf, struct page **pages) { - int blocksize; u8 *ptr, *plainhdr; s32 now; u8 flags = 0x00; @@ -473,7 +472,6 @@ gss_wrap_kerberos_v2(struct krb5_ctx *kctx, u32 offset, *ptr++ = 0xff; be16ptr = (__be16 *)ptr; - blocksize = crypto_skcipher_blocksize(kctx->acceptor_enc); *be16ptr++ = 0; /* "inner" token header always uses 0 for RRC */ *be16ptr++ = 0; diff --git a/net/sunrpc/xprtrdma/svc_rdma.c b/net/sunrpc/xprtrdma/svc_rdma.c index 357ba90..134bef6a 100644 --- a/net/sunrpc/xprtrdma/svc_rdma.c +++ b/net/sunrpc/xprtrdma/svc_rdma.c @@ -94,7 +94,6 @@ static int read_reset_stat(struct ctl_table *table, int write, atomic_set(stat, 0); else { char str_buf[32]; - char *data; int len = snprintf(str_buf, 32, "%d\n", atomic_read(stat)); if (len >= 32) return -EFAULT; @@ -103,7 +102,6 @@ static int read_reset_stat(struct ctl_table *table, int write, *lenp = 0; return 0; } - data = &str_buf[*ppos]; len -= *ppos; if (len > *lenp) len = *lenp; -- 2.7.0