Received: by 2002:a05:6358:700f:b0:131:369:b2a3 with SMTP id 15csp1667929rwo; Wed, 2 Aug 2023 19:24:04 -0700 (PDT) X-Google-Smtp-Source: APBJJlHwv/5KGC1KmsVEnPBrD7fPA2bR5H6CmIS1PQGL4eUZ5HoFgW/lI96agq0LSDFyXNeQE6b3 X-Received: by 2002:a05:6402:2747:b0:522:b723:11bd with SMTP id z7-20020a056402274700b00522b72311bdmr9361756edd.4.1691029444126; Wed, 02 Aug 2023 19:24:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691029444; cv=none; d=google.com; s=arc-20160816; b=pD53CiqkKhT5zhcBHAkFkCkn5sTPp5AZU1dSwgJyW9/3JELU0JGVe+GvNjink1s4fx ROZ8UGycsDQdFUn59c3cJdNGzzwX+yqp2fP1EBK4ANrMBtglNoq3dOZWYlFOnngxi47z AavB3DGpd7/MgrLXKB+Um1JHObLpkNcwYJHUv6xkQWJXY5j3iuJ/6cjGxOBnRUYb/bGp r5recENJXBVcYnBL+yZXogwMd2T8wo2+WYdOdu9xpsD6dAeacSS/pRYxPWiJaiMum8I2 Y8J2QulaPeXBmGqkOeVyBYSxUDi+t+xhgWZYFGLc+jN+Gu3o+EYEjv6uA6zSLkCFQilY EB7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=cUwMJEadu41FAxX4aKAp+VvIYZpbhT2jkzP6ZGxKBy8=; fh=Wa0H2M3yk6Gz1MsQhqMDKtl0kfkJtCM7R04a9vkfNz0=; b=n8nui4k+xF/8QWM/q5C5X3KsGAgC8bZoF3WjcgKtWHp8LfcJ43QWRqt86BLD/lCNB7 APu8QJPjmU+xPpyUmXZcHa1gsi+7skvo32AazcO1vKiunVoQ0CTxADJUowt8Qc/4DaB4 iYzRhkM2hBHhtmqpGcVRn0MKta/qDi8Xx64GJFl9tO+JhRVod+TgF2W0GSC/JpVnkjt3 yKX2I1hVGExzFxHBvBdMTNzYy1zdIyvc7WWNgJi7DhzdyiiFYtPAIzWYxaP0+EFPMOc2 NcIuklcIfL/tcgtOPs2KeVBRm5qYq6fEKXhIT/rThEmBBWoCTu2aRpa9/mtlUcQXU4ij Z1dA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g13-20020a50ee0d000000b00522bf38e12csi6843103eds.452.2023.08.02.19.23.39; Wed, 02 Aug 2023 19:24:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231186AbjHCB2U (ORCPT + 99 others); Wed, 2 Aug 2023 21:28:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54058 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230043AbjHCB2S (ORCPT ); Wed, 2 Aug 2023 21:28:18 -0400 Received: from mail.nfschina.com (unknown [42.101.60.195]) by lindbergh.monkeyblade.net (Postfix) with SMTP id 3647C26BA; Wed, 2 Aug 2023 18:28:17 -0700 (PDT) Received: from localhost.localdomain (unknown [219.141.250.2]) by mail.nfschina.com (Maildata Gateway V2.8.8) with ESMTPA id 3EEF1602E666B; Thu, 3 Aug 2023 09:28:14 +0800 (CST) X-MD-Sfrom: kunyu@nfschina.com X-MD-SrcIP: 219.141.250.2 From: Li kunyu To: martin.lau@linux.dev, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, song@kernel.org, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org Cc: bpf@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Li kunyu Subject: [PATCH bpf-next v2] bpf: bpf_struct_ops: Remove unnecessary initial values of variables Date: Sat, 5 Aug 2023 01:59:29 +0800 Message-Id: <20230804175929.2867-1-kunyu@nfschina.com> X-Mailer: git-send-email 2.18.2 X-Spam-Status: No, score=0.9 required=5.0 tests=BAYES_00,DATE_IN_FUTURE_24_48, RDNS_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org err and tlinks is assigned first, so it does not need to initialize the assignment. Signed-off-by: Li kunyu --- v2: Remove tlinks initialization assignment. kernel/bpf/bpf_struct_ops.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/kernel/bpf/bpf_struct_ops.c b/kernel/bpf/bpf_struct_ops.c index d3f0a4825fa6..c05585ed1f37 100644 --- a/kernel/bpf/bpf_struct_ops.c +++ b/kernel/bpf/bpf_struct_ops.c @@ -374,9 +374,9 @@ static long bpf_struct_ops_map_update_elem(struct bpf_map *map, void *key, struct bpf_struct_ops_value *uvalue, *kvalue; const struct btf_member *member; const struct btf_type *t = st_ops->type; - struct bpf_tramp_links *tlinks = NULL; + struct bpf_tramp_links *tlinks; void *udata, *kdata; - int prog_fd, err = 0; + int prog_fd, err; void *image, *image_end; u32 i; @@ -818,7 +818,7 @@ static int bpf_struct_ops_map_link_update(struct bpf_link *link, struct bpf_map struct bpf_struct_ops_map *st_map, *old_st_map; struct bpf_map *old_map; struct bpf_struct_ops_link *st_link; - int err = 0; + int err; st_link = container_of(link, struct bpf_struct_ops_link, link); st_map = container_of(new_map, struct bpf_struct_ops_map, map); -- 2.18.2