Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1338264pxa; Sun, 2 Aug 2020 04:16:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyBkbHc3HhdooLoLN0KglO8NglYyKX/pLVL5u+sqqsT40GyLBV8zEZP8QipEXRX9NCxCh72 X-Received: by 2002:a50:9e6f:: with SMTP id z102mr11678635ede.300.1596366979893; Sun, 02 Aug 2020 04:16:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596366979; cv=none; d=google.com; s=arc-20160816; b=V52Cnq37zUuppdq0C0MG+pUqDLb1XxUfToCjcGIttLJbS3Fm6rXA5azIQ+d1iLqzLU 07P7LJWnpbH9tWozp8Bc8sMm2Cv/fFgTxI9A6caYee39zGvh7pysfGf0V29Og2uqoSXh 0UhrgGOL4LOqpdDB2D4hmalfcCPfQFx9Dc46FkL0oKrnlSR6sfk+xyJK1KG7UbBxUrxu jD6pn4KSn1oZJgSQWuQFA/1Gy9eAZ+gYqUm1pKum+VF7pBESls45F0+JZDx+7LYSeAqj qUOGZJomYEAL+Q64zHkmSvWF9folyIEM12hOa24yFz9YZiOr0qu0wUhMFiGiVxWfZsCb 0S5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=gOdTF6oc+yTGNUK+3AnvQ2M7fV/cw+CEw9cRd2hZ8vU=; b=rzTyHbkUtY8ITTCb+hY83SRU4WcPaxTKmFsExJzal7n70/fbzFtcLu6nZmxsEnujNO hEmakif2LXsoDNHrUJK720wx0l+jNt9n/U476siWp82EQ4QKUyta+C/D+dKFM3LZAtID M3MvAK53eB/2pPLcg0TZoU2ktXoE77qsH2LZ3+8rAGp/8XnKq6AsC8yDk1S0o8nfWcc6 gF8ThXsVSN67B7h3Hvqx7oa4Ex8mKp/JEFmKov6CKmSsnh9xxLym4aiOTu0VF54tRkZG N3727bf4rLp/zO/M1UFcAf9A9W4Qjv9SfJb8Q2WbHaBC0rfQT1gdtFohSoI/xN77XaHD Uc6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dn2si8559626edb.378.2020.08.02.04.15.57; Sun, 02 Aug 2020 04:16:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728254AbgHBLPn (ORCPT + 99 others); Sun, 2 Aug 2020 07:15:43 -0400 Received: from out4436.biz.mail.alibaba.com ([47.88.44.36]:38704 "EHLO out4436.biz.mail.alibaba.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728192AbgHBLPj (ORCPT ); Sun, 2 Aug 2020 07:15:39 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R121e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04357;MF=tianjia.zhang@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0U4T30CY_1596366926; Received: from localhost(mailfrom:tianjia.zhang@linux.alibaba.com fp:SMTPD_---0U4T30CY_1596366926) by smtp.aliyun-inc.com(127.0.0.1); Sun, 02 Aug 2020 19:15:26 +0800 From: Tianjia Zhang To: freude@linux.ibm.com, hca@linux.ibm.com, gor@linux.ibm.com, borntraeger@de.ibm.com, ifranzki@linux.ibm.com Cc: linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, tianjia.zhang@alibaba.com Subject: [PATCH] s390/pkey: Remove redundant variable initialization Date: Sun, 2 Aug 2020 19:15:26 +0800 Message-Id: <20200802111526.4883-1-tianjia.zhang@linux.alibaba.com> X-Mailer: git-send-email 2.17.1 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the first place, the initialization value of `rc` is wrong. It is unnecessary to initialize `rc` variables, so remove their initialization operation. Fixes: f2bbc96e7cfad ("s390/pkey: add CCA AES cipher key support") Cc: Harald Freudenberger Signed-off-by: Tianjia Zhang --- drivers/s390/crypto/pkey_api.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/s390/crypto/pkey_api.c b/drivers/s390/crypto/pkey_api.c index 74e63ec49068..58140506a8e7 100644 --- a/drivers/s390/crypto/pkey_api.c +++ b/drivers/s390/crypto/pkey_api.c @@ -818,7 +818,7 @@ static int pkey_keyblob2pkey2(const struct pkey_apqn *apqns, size_t nr_apqns, static int pkey_apqns4key(const u8 *key, size_t keylen, u32 flags, struct pkey_apqn *apqns, size_t *nr_apqns) { - int rc = EINVAL; + int rc; u32 _nr_apqns, *_apqns = NULL; struct keytoken_header *hdr = (struct keytoken_header *)key; @@ -886,7 +886,7 @@ static int pkey_apqns4keytype(enum pkey_key_type ktype, u8 cur_mkvp[32], u8 alt_mkvp[32], u32 flags, struct pkey_apqn *apqns, size_t *nr_apqns) { - int rc = -EINVAL; + int rc; u32 _nr_apqns, *_apqns = NULL; if (ktype == PKEY_TYPE_CCA_DATA || ktype == PKEY_TYPE_CCA_CIPHER) { -- 2.26.2