diff options
| author | Shirish Pargaonkar <shirishp@gmail.com> | 2008-07-24 11:56:05 -0400 |
|---|---|---|
| committer | Steve French <sfrench@us.ibm.com> | 2008-07-24 11:56:05 -0400 |
| commit | ef571cadd516e7ffcdeac6bb8054e5908fcccfcf (patch) | |
| tree | 92238a391411fa5e054982d08af39e2207714c33 | |
| parent | b1910ad6222a705650dc991c003af43b94cdb3e1 (diff) | |
[CIFS] Fix warnings from checkpatch
Signed-off-by: Steve French <sfrench@us.ibm.com>
| -rw-r--r-- | fs/cifs/cifs_debug.c | 4 | ||||
| -rw-r--r-- | fs/cifs/cifsacl.c | 38 | ||||
| -rw-r--r-- | fs/cifs/cifsencrypt.c | 3 | ||||
| -rw-r--r-- | fs/cifs/cifsglob.h | 6 | ||||
| -rw-r--r-- | fs/cifs/cifspdu.h | 8 | ||||
| -rw-r--r-- | fs/cifs/cifssmb.c | 5 |
6 files changed, 31 insertions, 33 deletions
diff --git a/fs/cifs/cifs_debug.c b/fs/cifs/cifs_debug.c index c213aa40064e..688a2d42153f 100644 --- a/fs/cifs/cifs_debug.c +++ b/fs/cifs/cifs_debug.c | |||
| @@ -208,9 +208,9 @@ static int cifs_debug_data_proc_show(struct seq_file *m, void *v) | |||
| 208 | seq_puts(m, " type: CDROM "); | 208 | seq_puts(m, " type: CDROM "); |
| 209 | else | 209 | else |
| 210 | seq_printf(m, " type: %d ", dev_type); | 210 | seq_printf(m, " type: %d ", dev_type); |
| 211 | if (tcon->tidStatus == CifsNeedReconnect) { | 211 | |
| 212 | if (tcon->tidStatus == CifsNeedReconnect) | ||
| 212 | seq_puts(m, "\tDISCONNECTED "); | 213 | seq_puts(m, "\tDISCONNECTED "); |
| 213 | } | ||
| 214 | } | 214 | } |
| 215 | read_unlock(&GlobalSMBSeslock); | 215 | read_unlock(&GlobalSMBSeslock); |
| 216 | 216 | ||
diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c index 18faf65b9114..57ecdc83c26f 100644 --- a/fs/cifs/cifsacl.c +++ b/fs/cifs/cifsacl.c | |||
| @@ -56,7 +56,7 @@ int match_sid(struct cifs_sid *ctsid) | |||
| 56 | struct cifs_sid *cwsid; | 56 | struct cifs_sid *cwsid; |
| 57 | 57 | ||
| 58 | if (!ctsid) | 58 | if (!ctsid) |
| 59 | return (-1); | 59 | return -1; |
| 60 | 60 | ||
| 61 | for (i = 0; i < NUM_WK_SIDS; ++i) { | 61 | for (i = 0; i < NUM_WK_SIDS; ++i) { |
| 62 | cwsid = &(wksidarr[i].cifssid); | 62 | cwsid = &(wksidarr[i].cifssid); |
| @@ -87,11 +87,11 @@ int match_sid(struct cifs_sid *ctsid) | |||
| 87 | } | 87 | } |
| 88 | 88 | ||
| 89 | cFYI(1, ("matching sid: %s\n", wksidarr[i].sidname)); | 89 | cFYI(1, ("matching sid: %s\n", wksidarr[i].sidname)); |
| 90 | return (0); /* sids compare/match */ | 90 | return 0; /* sids compare/match */ |
| 91 | } | 91 | } |
| 92 | 92 | ||
| 93 | cFYI(1, ("No matching sid")); | 93 | cFYI(1, ("No matching sid")); |
| 94 | return (-1); | 94 | return -1; |
| 95 | } | 95 | } |
| 96 | 96 | ||
| 97 | /* if the two SIDs (roughly equivalent to a UUID for a user or group) are | 97 | /* if the two SIDs (roughly equivalent to a UUID for a user or group) are |
| @@ -102,16 +102,16 @@ int compare_sids(const struct cifs_sid *ctsid, const struct cifs_sid *cwsid) | |||
| 102 | int num_subauth, num_sat, num_saw; | 102 | int num_subauth, num_sat, num_saw; |
| 103 | 103 | ||
| 104 | if ((!ctsid) || (!cwsid)) | 104 | if ((!ctsid) || (!cwsid)) |
| 105 | return (0); | 105 | return 0; |
| 106 | 106 | ||
| 107 | /* compare the revision */ | 107 | /* compare the revision */ |
| 108 | if (ctsid->revision != cwsid->revision) | 108 | if (ctsid->revision != cwsid->revision) |
| 109 | return (0); | 109 | return 0; |
| 110 | 110 | ||
| 111 | /* compare all of the six auth values */ | 111 | /* compare all of the six auth values */ |
| 112 | for (i = 0; i < 6; ++i) { | 112 | for (i = 0; i < 6; ++i) { |
| 113 | if (ctsid->authority[i] != cwsid->authority[i]) | 113 | if (ctsid->authority[i] != cwsid->authority[i]) |
| 114 | return (0); | 114 | return 0; |
| 115 | } | 115 | } |
| 116 | 116 | ||
| 117 | /* compare all of the subauth values if any */ | 117 | /* compare all of the subauth values if any */ |
| @@ -121,11 +121,11 @@ int compare_sids(const struct cifs_sid *ctsid, const struct cifs_sid *cwsid) | |||
| 121 | if (num_subauth) { | 121 | if (num_subauth) { |
| 122 | for (i = 0; i < num_subauth; ++i) { | 122 | for (i = 0; i < num_subauth; ++i) { |
| 123 | if (ctsid->sub_auth[i] != cwsid->sub_auth[i]) | 123 | if (ctsid->sub_auth[i] != cwsid->sub_auth[i]) |
| 124 | return (0); | 124 | return 0; |
| 125 | } | 125 | } |
| 126 | } | 126 | } |
| 127 | 127 | ||
| 128 | return (1); /* sids compare/match */ | 128 | return 1; /* sids compare/match */ |
| 129 | } | 129 | } |
| 130 | 130 | ||
| 131 | 131 | ||
| @@ -284,7 +284,7 @@ static __u16 fill_ace_for_sid(struct cifs_ace *pntace, | |||
| 284 | size = 1 + 1 + 2 + 4 + 1 + 1 + 6 + (psid->num_subauth * 4); | 284 | size = 1 + 1 + 2 + 4 + 1 + 1 + 6 + (psid->num_subauth * 4); |
| 285 | pntace->size = cpu_to_le16(size); | 285 | pntace->size = cpu_to_le16(size); |
| 286 | 286 | ||
| 287 | return (size); | 287 | return size; |
| 288 | } | 288 | } |
| 289 | 289 | ||
| 290 | 290 | ||
| @@ -425,7 +425,7 @@ static int set_chmod_dacl(struct cifs_acl *pndacl, struct cifs_sid *pownersid, | |||
| 425 | pndacl->size = cpu_to_le16(size + sizeof(struct cifs_acl)); | 425 | pndacl->size = cpu_to_le16(size + sizeof(struct cifs_acl)); |
| 426 | pndacl->num_aces = cpu_to_le32(3); | 426 | pndacl->num_aces = cpu_to_le32(3); |
| 427 | 427 | ||
| 428 | return (0); | 428 | return 0; |
| 429 | } | 429 | } |
| 430 | 430 | ||
| 431 | 431 | ||
| @@ -509,7 +509,7 @@ static int parse_sec_desc(struct cifs_ntsd *pntsd, int acl_len, | |||
| 509 | sizeof(struct cifs_sid)); */ | 509 | sizeof(struct cifs_sid)); */ |
| 510 | 510 | ||
| 511 | 511 | ||
| 512 | return (0); | 512 | return 0; |
| 513 | } | 513 | } |
| 514 | 514 | ||
| 515 | 515 | ||
| @@ -526,7 +526,7 @@ static int build_sec_desc(struct cifs_ntsd *pntsd, struct cifs_ntsd *pnntsd, | |||
| 526 | struct cifs_acl *ndacl_ptr = NULL; /* no need for SACL ptr */ | 526 | struct cifs_acl *ndacl_ptr = NULL; /* no need for SACL ptr */ |
| 527 | 527 | ||
| 528 | if ((inode == NULL) || (pntsd == NULL) || (pnntsd == NULL)) | 528 | if ((inode == NULL) || (pntsd == NULL) || (pnntsd == NULL)) |
| 529 | return (-EIO); | 529 | return -EIO; |
| 530 | 530 | ||
| 531 | owner_sid_ptr = (struct cifs_sid *)((char *)pntsd + | 531 | owner_sid_ptr = (struct cifs_sid *)((char *)pntsd + |
| 532 | le32_to_cpu(pntsd->osidoffset)); | 532 | le32_to_cpu(pntsd->osidoffset)); |
| @@ -549,7 +549,7 @@ static int build_sec_desc(struct cifs_ntsd *pntsd, struct cifs_ntsd *pnntsd, | |||
| 549 | /* copy security descriptor control portion and owner and group sid */ | 549 | /* copy security descriptor control portion and owner and group sid */ |
| 550 | copy_sec_desc(pntsd, pnntsd, sidsoffset); | 550 | copy_sec_desc(pntsd, pnntsd, sidsoffset); |
| 551 | 551 | ||
| 552 | return (rc); | 552 | return rc; |
| 553 | } | 553 | } |
| 554 | 554 | ||
| 555 | 555 | ||
| @@ -628,11 +628,11 @@ static int set_cifs_acl(struct cifs_ntsd *pnntsd, __u32 acllen, | |||
| 628 | cFYI(DBG2, ("set ACL for %s from mode 0x%x", path, inode->i_mode)); | 628 | cFYI(DBG2, ("set ACL for %s from mode 0x%x", path, inode->i_mode)); |
| 629 | 629 | ||
| 630 | if (!inode) | 630 | if (!inode) |
| 631 | return (rc); | 631 | return rc; |
| 632 | 632 | ||
| 633 | sb = inode->i_sb; | 633 | sb = inode->i_sb; |
| 634 | if (sb == NULL) | 634 | if (sb == NULL) |
| 635 | return (rc); | 635 | return rc; |
| 636 | 636 | ||
| 637 | cifs_sb = CIFS_SB(sb); | 637 | cifs_sb = CIFS_SB(sb); |
| 638 | xid = GetXid(); | 638 | xid = GetXid(); |
| @@ -651,7 +651,7 @@ static int set_cifs_acl(struct cifs_ntsd *pnntsd, __u32 acllen, | |||
| 651 | if (rc != 0) { | 651 | if (rc != 0) { |
| 652 | cERROR(1, ("Unable to open file to set ACL")); | 652 | cERROR(1, ("Unable to open file to set ACL")); |
| 653 | FreeXid(xid); | 653 | FreeXid(xid); |
| 654 | return (rc); | 654 | return rc; |
| 655 | } | 655 | } |
| 656 | } | 656 | } |
| 657 | 657 | ||
| @@ -664,7 +664,7 @@ static int set_cifs_acl(struct cifs_ntsd *pnntsd, __u32 acllen, | |||
| 664 | 664 | ||
| 665 | FreeXid(xid); | 665 | FreeXid(xid); |
| 666 | 666 | ||
| 667 | return (rc); | 667 | return rc; |
| 668 | } | 668 | } |
| 669 | 669 | ||
| 670 | /* Translate the CIFS ACL (simlar to NTFS ACL) for a file into mode bits */ | 670 | /* Translate the CIFS ACL (simlar to NTFS ACL) for a file into mode bits */ |
| @@ -714,7 +714,7 @@ int mode_to_acl(struct inode *inode, const char *path, __u64 nmode) | |||
| 714 | if (!pnntsd) { | 714 | if (!pnntsd) { |
| 715 | cERROR(1, ("Unable to allocate security descriptor")); | 715 | cERROR(1, ("Unable to allocate security descriptor")); |
| 716 | kfree(pntsd); | 716 | kfree(pntsd); |
| 717 | return (-ENOMEM); | 717 | return -ENOMEM; |
| 718 | } | 718 | } |
| 719 | 719 | ||
| 720 | rc = build_sec_desc(pntsd, pnntsd, inode, nmode); | 720 | rc = build_sec_desc(pntsd, pnntsd, inode, nmode); |
| @@ -731,6 +731,6 @@ int mode_to_acl(struct inode *inode, const char *path, __u64 nmode) | |||
| 731 | kfree(pntsd); | 731 | kfree(pntsd); |
| 732 | } | 732 | } |
| 733 | 733 | ||
| 734 | return (rc); | 734 | return rc; |
| 735 | } | 735 | } |
| 736 | #endif /* CONFIG_CIFS_EXPERIMENTAL */ | 736 | #endif /* CONFIG_CIFS_EXPERIMENTAL */ |
diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c index 4ff8939c6cc7..83fd40dc1ef0 100644 --- a/fs/cifs/cifsencrypt.c +++ b/fs/cifs/cifsencrypt.c | |||
| @@ -310,9 +310,8 @@ void calc_lanman_hash(struct cifsSesInfo *ses, char *lnm_session_key) | |||
| 310 | utf8 and other multibyte codepages each need their own strupper | 310 | utf8 and other multibyte codepages each need their own strupper |
| 311 | function since a byte at a time will ont work. */ | 311 | function since a byte at a time will ont work. */ |
| 312 | 312 | ||
| 313 | for (i = 0; i < CIFS_ENCPWD_SIZE; i++) { | 313 | for (i = 0; i < CIFS_ENCPWD_SIZE; i++) |
| 314 | password_with_pad[i] = toupper(password_with_pad[i]); | 314 | password_with_pad[i] = toupper(password_with_pad[i]); |
| 315 | } | ||
| 316 | 315 | ||
| 317 | SMBencrypt(password_with_pad, ses->server->cryptKey, lnm_session_key); | 316 | SMBencrypt(password_with_pad, ses->server->cryptKey, lnm_session_key); |
| 318 | /* clear password before we return/free memory */ | 317 | /* clear password before we return/free memory */ |
diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h index 9cfcf326ead3..7e1cf262effe 100644 --- a/fs/cifs/cifsglob.h +++ b/fs/cifs/cifsglob.h | |||
| @@ -27,7 +27,7 @@ | |||
| 27 | #define MAX_SES_INFO 2 | 27 | #define MAX_SES_INFO 2 |
| 28 | #define MAX_TCON_INFO 4 | 28 | #define MAX_TCON_INFO 4 |
| 29 | 29 | ||
| 30 | #define MAX_TREE_SIZE 2 + MAX_SERVER_SIZE + 1 + MAX_SHARE_SIZE + 1 | 30 | #define MAX_TREE_SIZE (2 + MAX_SERVER_SIZE + 1 + MAX_SHARE_SIZE + 1) |
| 31 | #define MAX_SERVER_SIZE 15 | 31 | #define MAX_SERVER_SIZE 15 |
| 32 | #define MAX_SHARE_SIZE 64 /* used to be 20, this should still be enough */ | 32 | #define MAX_SHARE_SIZE 64 /* used to be 20, this should still be enough */ |
| 33 | #define MAX_USERNAME_SIZE 32 /* 32 is to allow for 15 char names + null | 33 | #define MAX_USERNAME_SIZE 32 /* 32 is to allow for 15 char names + null |
| @@ -537,8 +537,8 @@ require use of the stronger protocol */ | |||
| 537 | #endif /* WEAK_PW_HASH */ | 537 | #endif /* WEAK_PW_HASH */ |
| 538 | #define CIFSSEC_MUST_SEAL 0x40040 /* not supported yet */ | 538 | #define CIFSSEC_MUST_SEAL 0x40040 /* not supported yet */ |
| 539 | 539 | ||
| 540 | #define CIFSSEC_DEF CIFSSEC_MAY_SIGN | CIFSSEC_MAY_NTLM | CIFSSEC_MAY_NTLMV2 | 540 | #define CIFSSEC_DEF (CIFSSEC_MAY_SIGN | CIFSSEC_MAY_NTLM | CIFSSEC_MAY_NTLMV2) |
| 541 | #define CIFSSEC_MAX CIFSSEC_MUST_SIGN | CIFSSEC_MUST_NTLMV2 | 541 | #define CIFSSEC_MAX (CIFSSEC_MUST_SIGN | CIFSSEC_MUST_NTLMV2) |
| 542 | #define CIFSSEC_AUTH_MASK (CIFSSEC_MAY_NTLM | CIFSSEC_MAY_NTLMV2 | CIFSSEC_MAY_LANMAN | CIFSSEC_MAY_PLNTXT | CIFSSEC_MAY_KRB5) | 542 | #define CIFSSEC_AUTH_MASK (CIFSSEC_MAY_NTLM | CIFSSEC_MAY_NTLMV2 | CIFSSEC_MAY_LANMAN | CIFSSEC_MAY_PLNTXT | CIFSSEC_MAY_KRB5) |
| 543 | /* | 543 | /* |
| 544 | ***************************************************************** | 544 | ***************************************************************** |
diff --git a/fs/cifs/cifspdu.h b/fs/cifs/cifspdu.h index 0f327c224da3..409abce12732 100644 --- a/fs/cifs/cifspdu.h +++ b/fs/cifs/cifspdu.h | |||
| @@ -31,7 +31,7 @@ | |||
| 31 | #else | 31 | #else |
| 32 | #define CIFS_PROT 0 | 32 | #define CIFS_PROT 0 |
| 33 | #endif | 33 | #endif |
| 34 | #define POSIX_PROT CIFS_PROT+1 | 34 | #define POSIX_PROT (CIFS_PROT+1) |
| 35 | #define BAD_PROT 0xFFFF | 35 | #define BAD_PROT 0xFFFF |
| 36 | 36 | ||
| 37 | /* SMB command codes */ | 37 | /* SMB command codes */ |
| @@ -341,7 +341,7 @@ | |||
| 341 | #define CREATE_COMPLETE_IF_OPLK 0x00000100 /* should be zero */ | 341 | #define CREATE_COMPLETE_IF_OPLK 0x00000100 /* should be zero */ |
| 342 | #define CREATE_NO_EA_KNOWLEDGE 0x00000200 | 342 | #define CREATE_NO_EA_KNOWLEDGE 0x00000200 |
| 343 | #define CREATE_EIGHT_DOT_THREE 0x00000400 /* doc says this is obsolete | 343 | #define CREATE_EIGHT_DOT_THREE 0x00000400 /* doc says this is obsolete |
| 344 | "open for recovery" flag - should | 344 | "open for recovery" flag should |
| 345 | be zero in any case */ | 345 | be zero in any case */ |
| 346 | #define CREATE_OPEN_FOR_RECOVERY 0x00000400 | 346 | #define CREATE_OPEN_FOR_RECOVERY 0x00000400 |
| 347 | #define CREATE_RANDOM_ACCESS 0x00000800 | 347 | #define CREATE_RANDOM_ACCESS 0x00000800 |
| @@ -414,8 +414,8 @@ struct smb_hdr { | |||
| 414 | __u8 WordCount; | 414 | __u8 WordCount; |
| 415 | } __attribute__((packed)); | 415 | } __attribute__((packed)); |
| 416 | /* given a pointer to an smb_hdr retrieve the value of byte count */ | 416 | /* given a pointer to an smb_hdr retrieve the value of byte count */ |
| 417 | #define BCC(smb_var) ( *(__u16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount))) | 417 | #define BCC(smb_var) (*(__u16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount))) |
| 418 | #define BCC_LE(smb_var) ( *(__le16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount))) | 418 | #define BCC_LE(smb_var) (*(__le16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount))) |
| 419 | /* given a pointer to an smb_hdr retrieve the pointer to the byte area */ | 419 | /* given a pointer to an smb_hdr retrieve the pointer to the byte area */ |
| 420 | #define pByteArea(smb_var) ((unsigned char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount) + 2) | 420 | #define pByteArea(smb_var) ((unsigned char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount) + 2) |
| 421 | 421 | ||
diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c index 7e175e1399d1..c621ffa2ca90 100644 --- a/fs/cifs/cifssmb.c +++ b/fs/cifs/cifssmb.c | |||
| @@ -686,11 +686,10 @@ CIFSSMBNegotiate(unsigned int xid, struct cifsSesInfo *ses) | |||
| 686 | SecurityBlob, | 686 | SecurityBlob, |
| 687 | count - 16, | 687 | count - 16, |
| 688 | &server->secType); | 688 | &server->secType); |
| 689 | if (rc == 1) { | 689 | if (rc == 1) |
| 690 | rc = 0; | 690 | rc = 0; |
| 691 | } else { | 691 | else |
| 692 | rc = -EINVAL; | 692 | rc = -EINVAL; |
| 693 | } | ||
| 694 | } | 693 | } |
| 695 | } else | 694 | } else |
| 696 | server->capabilities &= ~CAP_EXTENDED_SECURITY; | 695 | server->capabilities &= ~CAP_EXTENDED_SECURITY; |
