Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp504999ybz; Fri, 24 Apr 2020 04:23:35 -0700 (PDT) X-Google-Smtp-Source: APiQypK6qL/Xtl/xv2r2XzCNIsYsUUnm0LQ5BiRusbGUw6wJuUGDPuEvqbtGjVQ+cYBvafZH3PyN X-Received: by 2002:a17:906:e5a:: with SMTP id q26mr6290114eji.261.1587727415185; Fri, 24 Apr 2020 04:23:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587727415; cv=none; d=google.com; s=arc-20160816; b=o8JXZRkfCp7D8xeM3Iqy245WlnIgRYHKK4DqeZ6hjZenzcnZ7dVw2ZdFcGkyUTmYPq 2xJAgJLFEn34xKrtqakvEHyo+GNOnPiKrrfK4YFo8h6OqLiWYK/sX8kIE0cvhU10R3Ze vAjZtfK2dZpP2mefV4ty6dQ9Y2H2xaWCZ5P4wD67t+C8hUqSwxaIG+Q4b6zt5qe9bHjl wN1cWbhoTAFnAecKM7lMGjjX10Pt3gEx7b9HIVrJZeFaCY8F1ppNzc+0HaeYT3Z/6huP 01Ic1gaqWP4SahpsO3h6FfsJmQmwf9da4RpNts7MNcfivJtOt2cFUOzYfV+Pr+HaQClI s9ZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=WIvN4oT2hvKkfVVdIJ8zVucKswF6UuR96Iuo7uoqK/U=; b=bG+gBMmKexQ4knYS0mPMfs4CwVXXZJKFobvv8WDHoJXKQ/cpmqUfUQELfpFeLvWvFp c+mXkjCF3mKCa7BPu8jKee6Nd0ESNAGYgfVndgC32kH/a2pAV75LQVhkoBnFyBnWnfn9 MYm4iGE3mtLy5NQZra6h3M/LeD6Cg3rQadEqedo7l18Pk0IveYbLzhhWfYkL5tsqhhte H78NOztw87Zc0AQkbB5Ovzm87pMo4fEH3CWlN4jq0KA5jJ/SyJz3oTBiWqQQT2pFWOLn XQYLvv6M9B2aIor6UJu4318M83vX+gRaLHCHRKN+j5SrBCGhdueJAidU5R3E1cFd3Lj7 xzlw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q17si2761168edr.550.2020.04.24.04.23.11; Fri, 24 Apr 2020 04:23:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726813AbgDXLVp (ORCPT + 99 others); Fri, 24 Apr 2020 07:21:45 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:47682 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726289AbgDXLVp (ORCPT ); Fri, 24 Apr 2020 07:21:45 -0400 Received: from 1.general.cking.uk.vpn ([10.172.193.212] helo=localhost) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1jRwOs-0005mF-TW; Fri, 24 Apr 2020 11:21:43 +0000 From: Colin King To: James Morris , "Serge E . Hallyn" , linux-security-module@vger.kernel.org Cc: kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] integrity: remove redundant assignment to variable ret Date: Fri, 24 Apr 2020 12:21:42 +0100 Message-Id: <20200424112142.12261-1-colin.king@canonical.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Colin Ian King The variable ret is being initialized with a value that is never read and it is being updated later with a new value. The initialization is redundant and can be removed. Addresses-Coverity: ("Unused value") Signed-off-by: Colin Ian King --- security/integrity/digsig_asymmetric.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/security/integrity/digsig_asymmetric.c b/security/integrity/digsig_asymmetric.c index 4e0d6778277e..cfa4127d0518 100644 --- a/security/integrity/digsig_asymmetric.c +++ b/security/integrity/digsig_asymmetric.c @@ -79,7 +79,7 @@ int asymmetric_verify(struct key *keyring, const char *sig, struct public_key_signature pks; struct signature_v2_hdr *hdr = (struct signature_v2_hdr *)sig; struct key *key; - int ret = -ENOMEM; + int ret; if (siglen <= sizeof(*hdr)) return -EBADMSG; -- 2.25.1