[CIFS] formatting cleanup found by checkpatch
Signed-off-by: Steve French <sfrench@us.ibm.com>
This commit is contained in:
		
							parent
							
								
									f01d5e14e7
								
							
						
					
					
						commit
						26f57364d7
					
				| @ -385,10 +385,9 @@ asn1_oid_decode(struct asn1_ctx *ctx, | ||||
| 	unsigned long *optr; | ||||
| 
 | ||||
| 	size = eoc - ctx->pointer + 1; | ||||
| 	*oid = kmalloc(size * sizeof (unsigned long), GFP_ATOMIC); | ||||
| 	if (*oid == NULL) { | ||||
| 	*oid = kmalloc(size * sizeof(unsigned long), GFP_ATOMIC); | ||||
| 	if (*oid == NULL) | ||||
| 		return 0; | ||||
| 	} | ||||
| 
 | ||||
| 	optr = *oid; | ||||
| 
 | ||||
| @ -581,9 +580,8 @@ decode_negTokenInit(unsigned char *security_blob, int length, | ||||
| 			return 0; | ||||
| 		} else if ((cls != ASN1_UNI) || (con != ASN1_CON) | ||||
| 			   || (tag != ASN1_SEQ)) { | ||||
| 			cFYI(1, | ||||
| 			     ("Exit 6 cls = %d con = %d tag = %d end = %p (%d)", | ||||
| 			      cls, con, tag, end, *end)); | ||||
| 			cFYI(1, ("cls = %d con = %d tag = %d end = %p (%d)", | ||||
| 				cls, con, tag, end, *end)); | ||||
| 		} | ||||
| 
 | ||||
| 		if (asn1_header_decode(&ctx, &end, &cls, &con, &tag) == 0) { | ||||
|  | ||||
| @ -240,9 +240,9 @@ static int cifs_permission(struct inode *inode, int mask, struct nameidata *nd) | ||||
| 
 | ||||
| 	cifs_sb = CIFS_SB(inode->i_sb); | ||||
| 
 | ||||
| 	if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM) { | ||||
| 	if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_NO_PERM) | ||||
| 		return 0; | ||||
| 	} else /* file mode might have been restricted at mount time
 | ||||
| 	else /* file mode might have been restricted at mount time
 | ||||
| 		on the client (above and beyond ACL on servers) for | ||||
| 		servers which do not support setting and viewing mode bits, | ||||
| 		so allowing client to check permissions is useful */ | ||||
| @ -716,7 +716,7 @@ static int | ||||
| cifs_init_inodecache(void) | ||||
| { | ||||
| 	cifs_inode_cachep = kmem_cache_create("cifs_inode_cache", | ||||
| 					      sizeof (struct cifsInodeInfo), | ||||
| 					      sizeof(struct cifsInodeInfo), | ||||
| 					      0, (SLAB_RECLAIM_ACCOUNT| | ||||
| 						SLAB_MEM_SPREAD), | ||||
| 					      cifs_init_once); | ||||
| @ -816,8 +816,8 @@ static int | ||||
| cifs_init_mids(void) | ||||
| { | ||||
| 	cifs_mid_cachep = kmem_cache_create("cifs_mpx_ids", | ||||
| 				sizeof (struct mid_q_entry), 0, | ||||
| 				SLAB_HWCACHE_ALIGN, NULL); | ||||
| 					    sizeof(struct mid_q_entry), 0, | ||||
| 					    SLAB_HWCACHE_ALIGN, NULL); | ||||
| 	if (cifs_mid_cachep == NULL) | ||||
| 		return -ENOMEM; | ||||
| 
 | ||||
| @ -829,8 +829,8 @@ cifs_init_mids(void) | ||||
| 	} | ||||
| 
 | ||||
| 	cifs_oplock_cachep = kmem_cache_create("cifs_oplock_structs", | ||||
| 				sizeof (struct oplock_q_entry), 0, | ||||
| 				SLAB_HWCACHE_ALIGN, NULL); | ||||
| 					sizeof(struct oplock_q_entry), 0, | ||||
| 					SLAB_HWCACHE_ALIGN, NULL); | ||||
| 	if (cifs_oplock_cachep == NULL) { | ||||
| 		mempool_destroy(cifs_mid_poolp); | ||||
| 		kmem_cache_destroy(cifs_mid_cachep); | ||||
| @ -882,7 +882,8 @@ static int cifs_oplock_thread(void *dummyarg) | ||||
| 				the call */ | ||||
| 				/* mutex_lock(&inode->i_mutex);*/ | ||||
| 				if (S_ISREG(inode->i_mode)) { | ||||
| 					rc = filemap_fdatawrite(inode->i_mapping); | ||||
| 					rc = | ||||
| 					   filemap_fdatawrite(inode->i_mapping); | ||||
| 					if (CIFS_I(inode)->clientCanCacheRead | ||||
| 									 == 0) { | ||||
| 						filemap_fdatawait(inode->i_mapping); | ||||
| @ -907,8 +908,7 @@ static int cifs_oplock_thread(void *dummyarg) | ||||
| 					    0 /* len */ , 0 /* offset */, 0, | ||||
| 					    0, LOCKING_ANDX_OPLOCK_RELEASE, | ||||
| 					    0 /* wait flag */); | ||||
| 					cFYI(1,  | ||||
| 					      ("Oplock release rc = %d ", rc)); | ||||
| 					cFYI(1, ("Oplock release rc = %d", rc)); | ||||
| 				} | ||||
| 			} else | ||||
| 				spin_unlock(&GlobalMid_Lock); | ||||
|  | ||||
| @ -99,7 +99,7 @@ extern int 	cifs_setxattr(struct dentry *, const char *, const void *, | ||||
| 			size_t, int); | ||||
| extern ssize_t	cifs_getxattr(struct dentry *, const char *, void *, size_t); | ||||
| extern ssize_t	cifs_listxattr(struct dentry *, char *, size_t); | ||||
| extern int cifs_ioctl (struct inode *inode, struct file *filep, | ||||
| extern int cifs_ioctl(struct inode *inode, struct file *filep, | ||||
| 		       unsigned int command, unsigned long arg); | ||||
| #define CIFS_VERSION   "1.50" | ||||
| #endif				/* _CIFSFS_H */ | ||||
|  | ||||
| @ -360,10 +360,10 @@ struct smb_hdr { | ||||
| 	__u8 WordCount; | ||||
| } __attribute__((packed)); | ||||
| /* given a pointer to an smb_hdr retrieve the value of byte count */ | ||||
| #define BCC(smb_var) ( *(__u16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2* smb_var->WordCount) ) ) | ||||
| #define BCC_LE(smb_var) ( *(__le16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2* smb_var->WordCount) ) ) | ||||
| #define BCC(smb_var) ( *(__u16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount))) | ||||
| #define BCC_LE(smb_var) ( *(__le16 *)((char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount))) | ||||
| /* given a pointer to an smb_hdr retrieve the pointer to the byte area */ | ||||
| #define pByteArea(smb_var) ((unsigned char *)smb_var + sizeof(struct smb_hdr) + (2* smb_var->WordCount) + 2 ) | ||||
| #define pByteArea(smb_var) ((unsigned char *)smb_var + sizeof(struct smb_hdr) + (2 * smb_var->WordCount) + 2) | ||||
| 
 | ||||
| /*
 | ||||
|  * Computer Name Length (since Netbios name was length 16 with last byte 0x20) | ||||
|  | ||||
| @ -304,7 +304,7 @@ extern int cifs_calculate_mac_key(struct mac_key *key, const char *rn, | ||||
| 				 const char *pass); | ||||
| extern int CalcNTLMv2_partial_mac_key(struct cifsSesInfo *, | ||||
| 			const struct nls_table *); | ||||
| extern void CalcNTLMv2_response(const struct cifsSesInfo *, char * ); | ||||
| extern void CalcNTLMv2_response(const struct cifsSesInfo *, char *); | ||||
| extern void setup_ntlmv2_rsp(struct cifsSesInfo *, char *, | ||||
| 			     const struct nls_table *); | ||||
| #ifdef CONFIG_CIFS_WEAK_PW_HASH | ||||
|  | ||||
| @ -94,9 +94,8 @@ static void mark_open_files_invalid(struct cifsTconInfo *pTcon) | ||||
| 	write_lock(&GlobalSMBSeslock); | ||||
| 	list_for_each_safe(tmp, tmp1, &pTcon->openFileList) { | ||||
| 		open_file = list_entry(tmp, struct cifsFileInfo, tlist); | ||||
| 		if (open_file) { | ||||
| 		if (open_file) | ||||
| 			open_file->invalidHandle = TRUE; | ||||
| 		} | ||||
| 	} | ||||
| 	write_unlock(&GlobalSMBSeslock); | ||||
| 	/* BB Add call to invalidate_inodes(sb) for all superblocks mounted
 | ||||
| @ -1112,7 +1111,7 @@ PsxCreat: | ||||
| 		} | ||||
| 		memcpy((char *) pRetData, | ||||
| 			(char *)psx_rsp + sizeof(OPEN_PSX_RSP), | ||||
| 			sizeof (FILE_UNIX_BASIC_INFO)); | ||||
| 			sizeof(FILE_UNIX_BASIC_INFO)); | ||||
| 	} | ||||
| 
 | ||||
| psx_create_err: | ||||
| @ -1193,9 +1192,9 @@ OldOpenRetry: | ||||
| 	} | ||||
| 	if (*pOplock & REQ_OPLOCK) | ||||
| 		pSMB->OpenFlags = cpu_to_le16(REQ_OPLOCK); | ||||
| 	else if (*pOplock & REQ_BATCHOPLOCK) { | ||||
| 	else if (*pOplock & REQ_BATCHOPLOCK) | ||||
| 		pSMB->OpenFlags = cpu_to_le16(REQ_BATCHOPLOCK); | ||||
| 	} | ||||
| 
 | ||||
| 	pSMB->OpenFlags |= cpu_to_le16(REQ_MORE_INFO); | ||||
| 	/* BB fixme add conversion for access_flags to bits 0 - 2 of mode */ | ||||
| 	/* 0 = read
 | ||||
| @ -1310,9 +1309,8 @@ openRetry: | ||||
| 	} | ||||
| 	if (*pOplock & REQ_OPLOCK) | ||||
| 		pSMB->OpenFlags = cpu_to_le32(REQ_OPLOCK); | ||||
| 	else if (*pOplock & REQ_BATCHOPLOCK) { | ||||
| 	else if (*pOplock & REQ_BATCHOPLOCK) | ||||
| 		pSMB->OpenFlags = cpu_to_le32(REQ_BATCHOPLOCK); | ||||
| 	} | ||||
| 	pSMB->DesiredAccess = cpu_to_le32(access_flags); | ||||
| 	pSMB->AllocationSize = 0; | ||||
| 	/* set file as system file if special file such
 | ||||
| @ -1446,11 +1444,11 @@ CIFSSMBRead(const int xid, struct cifsTconInfo *tcon, const int netfid, | ||||
| 			*nbytes = 0; | ||||
| 		} else { | ||||
| 			pReadData = (char *) (&pSMBr->hdr.Protocol) + | ||||
| 			    le16_to_cpu(pSMBr->DataOffset); | ||||
| /*                      if (rc = copy_to_user(buf, pReadData, data_length)) {
 | ||||
| 					le16_to_cpu(pSMBr->DataOffset); | ||||
| /*			if (rc = copy_to_user(buf, pReadData, data_length)) {
 | ||||
| 				cERROR(1,("Faulting on read rc = %d",rc)); | ||||
| 				rc = -EFAULT; | ||||
|                         }*/ /* can not use copy_to_user when using page cache*/ | ||||
| 			}*/ /* can not use copy_to_user when using page cache*/ | ||||
| 			if (*buf) | ||||
| 				memcpy(*buf, pReadData, data_length); | ||||
| 		} | ||||
| @ -2538,7 +2536,7 @@ validate_ntransact(char *buf, char **ppparm, char **ppdata, | ||||
| 		cFYI(1, ("data starts after end of smb")); | ||||
| 		return -EINVAL; | ||||
| 	} else if (data_count + *ppdata > end_of_smb) { | ||||
| 		cFYI(1,("data %p + count %d (%p) ends after end of smb %p start %p", | ||||
| 		cFYI(1, ("data %p + count %d (%p) ends after end of smb %p start %p", | ||||
| 			*ppdata, data_count, (data_count + *ppdata), | ||||
| 			end_of_smb, pSMBr)); | ||||
| 		return -EINVAL; | ||||
| @ -2615,7 +2613,7 @@ CIFSSMBQueryReparseLinkInfo(const int xid, struct cifsTconInfo *tcon, | ||||
| 					reparse_buf->TargetNameOffset + | ||||
| 					reparse_buf->TargetNameLen) > | ||||
| 						end_of_smb) { | ||||
| 					cFYI(1,("reparse buf goes beyond SMB")); | ||||
| 					cFYI(1, ("reparse buf beyond SMB")); | ||||
| 					rc = -EIO; | ||||
| 					goto qreparse_out; | ||||
| 				} | ||||
| @ -3883,12 +3881,10 @@ getDFSRetry: | ||||
| 	pSMB->hdr.Mid = GetNextMid(ses->server); | ||||
| 	pSMB->hdr.Tid = ses->ipc_tid; | ||||
| 	pSMB->hdr.Uid = ses->Suid; | ||||
| 	if (ses->capabilities & CAP_STATUS32) { | ||||
| 	if (ses->capabilities & CAP_STATUS32) | ||||
| 		pSMB->hdr.Flags2 |= SMBFLG2_ERR_STATUS; | ||||
| 	} | ||||
| 	if (ses->capabilities & CAP_DFS) { | ||||
| 	if (ses->capabilities & CAP_DFS) | ||||
| 		pSMB->hdr.Flags2 |= SMBFLG2_DFS; | ||||
| 	} | ||||
| 
 | ||||
| 	if (ses->capabilities & CAP_UNICODE) { | ||||
| 		pSMB->hdr.Flags2 |= SMBFLG2_UNICODE; | ||||
| @ -4265,7 +4261,7 @@ QFSAttributeRetry: | ||||
| 			     *) (((char *) &pSMBr->hdr.Protocol) + | ||||
| 				 data_offset); | ||||
| 			memcpy(&tcon->fsAttrInfo, response_data, | ||||
| 			       sizeof (FILE_SYSTEM_ATTRIBUTE_INFO)); | ||||
| 			       sizeof(FILE_SYSTEM_ATTRIBUTE_INFO)); | ||||
| 		} | ||||
| 	} | ||||
| 	cifs_buf_release(pSMB); | ||||
| @ -4334,7 +4330,7 @@ QFSDeviceRetry: | ||||
| 				(((char *) &pSMBr->hdr.Protocol) + | ||||
| 				 data_offset); | ||||
| 			memcpy(&tcon->fsDevInfo, response_data, | ||||
| 			       sizeof (FILE_SYSTEM_DEVICE_INFO)); | ||||
| 			       sizeof(FILE_SYSTEM_DEVICE_INFO)); | ||||
| 		} | ||||
| 	} | ||||
| 	cifs_buf_release(pSMB); | ||||
| @ -4402,7 +4398,7 @@ QFSUnixRetry: | ||||
| 			     *) (((char *) &pSMBr->hdr.Protocol) + | ||||
| 				 data_offset); | ||||
| 			memcpy(&tcon->fsUnixInfo, response_data, | ||||
| 			       sizeof (FILE_SYSTEM_UNIX_INFO)); | ||||
| 			       sizeof(FILE_SYSTEM_UNIX_INFO)); | ||||
| 		} | ||||
| 	} | ||||
| 	cifs_buf_release(pSMB); | ||||
| @ -4612,7 +4608,7 @@ SetEOFRetry: | ||||
| 		strncpy(pSMB->FileName, fileName, name_len); | ||||
| 	} | ||||
| 	params = 6 + name_len; | ||||
| 	data_count = sizeof (struct file_end_of_file_info); | ||||
| 	data_count = sizeof(struct file_end_of_file_info); | ||||
| 	pSMB->MaxParameterCount = cpu_to_le16(2); | ||||
| 	pSMB->MaxDataCount = cpu_to_le16(4100); | ||||
| 	pSMB->MaxSetupCount = 0; | ||||
| @ -4800,7 +4796,7 @@ CIFSSMBSetFileTimes(const int xid, struct cifsTconInfo *tcon, | ||||
| 
 | ||||
| 	data_offset = (char *) (&pSMB->hdr.Protocol) + offset; | ||||
| 
 | ||||
| 	count = sizeof (FILE_BASIC_INFO); | ||||
| 	count = sizeof(FILE_BASIC_INFO); | ||||
| 	pSMB->MaxParameterCount = cpu_to_le16(2); | ||||
| 	pSMB->MaxDataCount = cpu_to_le16(1000);	/* BB find max SMB PDU from sess */ | ||||
| 	pSMB->SetupCount = 1; | ||||
| @ -4871,7 +4867,7 @@ SetTimesRetry: | ||||
| 	} | ||||
| 
 | ||||
| 	params = 6 + name_len; | ||||
| 	count = sizeof (FILE_BASIC_INFO); | ||||
| 	count = sizeof(FILE_BASIC_INFO); | ||||
| 	pSMB->MaxParameterCount = cpu_to_le16(2); | ||||
| 	pSMB->MaxDataCount = cpu_to_le16(1000);	/* BB find exact max SMB PDU from sess structure BB */ | ||||
| 	pSMB->MaxSetupCount = 0; | ||||
| @ -4900,7 +4896,7 @@ SetTimesRetry: | ||||
| 		pSMB->InformationLevel = cpu_to_le16(SMB_SET_FILE_BASIC_INFO); | ||||
| 	pSMB->Reserved4 = 0; | ||||
| 	pSMB->hdr.smb_buf_length += byte_count; | ||||
| 	memcpy(data_offset, data, sizeof (FILE_BASIC_INFO)); | ||||
| 	memcpy(data_offset, data, sizeof(FILE_BASIC_INFO)); | ||||
| 	pSMB->ByteCount = cpu_to_le16(byte_count); | ||||
| 	rc = SendReceive(xid, tcon->ses, (struct smb_hdr *) pSMB, | ||||
| 			 (struct smb_hdr *) pSMBr, &bytes_returned, 0); | ||||
| @ -5003,7 +4999,7 @@ setPermsRetry: | ||||
| 	} | ||||
| 
 | ||||
| 	params = 6 + name_len; | ||||
| 	count = sizeof (FILE_UNIX_BASIC_INFO); | ||||
| 	count = sizeof(FILE_UNIX_BASIC_INFO); | ||||
| 	pSMB->MaxParameterCount = cpu_to_le16(2); | ||||
| 	pSMB->MaxDataCount = cpu_to_le16(1000);	/* BB find exact max SMB PDU from sess structure BB */ | ||||
| 	pSMB->MaxSetupCount = 0; | ||||
|  | ||||
| @ -124,7 +124,7 @@ cifs_reconnect(struct TCP_Server_Info *server) | ||||
| 	struct mid_q_entry *mid_entry; | ||||
| 
 | ||||
| 	spin_lock(&GlobalMid_Lock); | ||||
| 	if ( kthread_should_stop() ) { | ||||
| 	if (kthread_should_stop()) { | ||||
| 		/* the demux thread will exit normally
 | ||||
| 		next time through the loop */ | ||||
| 		spin_unlock(&GlobalMid_Lock); | ||||
| @ -151,9 +151,8 @@ cifs_reconnect(struct TCP_Server_Info *server) | ||||
| 	} | ||||
| 	list_for_each(tmp, &GlobalTreeConnectionList) { | ||||
| 		tcon = list_entry(tmp, struct cifsTconInfo, cifsConnectionList); | ||||
| 		if ((tcon) && (tcon->ses) && (tcon->ses->server == server)) { | ||||
| 		if ((tcon) && (tcon->ses) && (tcon->ses->server == server)) | ||||
| 			tcon->tidStatus = CifsNeedReconnect; | ||||
| 		} | ||||
| 	} | ||||
| 	read_unlock(&GlobalSMBSeslock); | ||||
| 	/* do not want to be sending data on a socket we are freeing */ | ||||
| @ -187,7 +186,7 @@ cifs_reconnect(struct TCP_Server_Info *server) | ||||
| 	spin_unlock(&GlobalMid_Lock); | ||||
| 	up(&server->tcpSem); | ||||
| 
 | ||||
| 	while ( (!kthread_should_stop()) && (server->tcpStatus != CifsGood)) { | ||||
| 	while ((!kthread_should_stop()) && (server->tcpStatus != CifsGood)) { | ||||
| 		try_to_freeze(); | ||||
| 		if (server->protocolType == IPV6) { | ||||
| 			rc = ipv6_connect(&server->addr.sockAddr6, | ||||
| @ -204,7 +203,7 @@ cifs_reconnect(struct TCP_Server_Info *server) | ||||
| 		} else { | ||||
| 			atomic_inc(&tcpSesReconnectCount); | ||||
| 			spin_lock(&GlobalMid_Lock); | ||||
| 			if ( !kthread_should_stop() ) | ||||
| 			if (!kthread_should_stop()) | ||||
| 				server->tcpStatus = CifsGood; | ||||
| 			server->sequence_number = 0; | ||||
| 			spin_unlock(&GlobalMid_Lock); | ||||
| @ -358,11 +357,9 @@ cifs_demultiplex_thread(struct TCP_Server_Info *server) | ||||
| 	length = tcpSesAllocCount.counter; | ||||
| 	write_unlock(&GlobalSMBSeslock); | ||||
| 	complete(&cifsd_complete); | ||||
| 	if (length  > 1) { | ||||
| 		mempool_resize(cifs_req_poolp, | ||||
| 			length + cifs_min_rcv, | ||||
| 			GFP_KERNEL); | ||||
| 	} | ||||
| 	if (length  > 1) | ||||
| 		mempool_resize(cifs_req_poolp, length + cifs_min_rcv, | ||||
| 				GFP_KERNEL); | ||||
| 
 | ||||
| 	set_freezable(); | ||||
| 	while (!kthread_should_stop()) { | ||||
| @ -378,7 +375,7 @@ cifs_demultiplex_thread(struct TCP_Server_Info *server) | ||||
| 			} | ||||
| 		} else if (isLargeBuf) { | ||||
| 			/* we are reusing a dirty large buf, clear its start */ | ||||
| 			memset(bigbuf, 0, sizeof (struct smb_hdr)); | ||||
| 			memset(bigbuf, 0, sizeof(struct smb_hdr)); | ||||
| 		} | ||||
| 
 | ||||
| 		if (smallbuf == NULL) { | ||||
| @ -391,7 +388,7 @@ cifs_demultiplex_thread(struct TCP_Server_Info *server) | ||||
| 			} | ||||
| 			/* beginning of smb buffer is cleared in our buf_get */ | ||||
| 		} else /* if existing small buf clear beginning */ | ||||
| 			memset(smallbuf, 0, sizeof (struct smb_hdr)); | ||||
| 			memset(smallbuf, 0, sizeof(struct smb_hdr)); | ||||
| 
 | ||||
| 		isLargeBuf = FALSE; | ||||
| 		isMultiRsp = FALSE; | ||||
| @ -406,7 +403,7 @@ incomplete_rcv: | ||||
| 		    kernel_recvmsg(csocket, &smb_msg, | ||||
| 				&iov, 1, pdu_length, 0 /* BB other flags? */); | ||||
| 
 | ||||
| 		if ( kthread_should_stop() ) { | ||||
| 		if (kthread_should_stop()) { | ||||
| 			break; | ||||
| 		} else if (server->tcpStatus == CifsNeedReconnect) { | ||||
| 			cFYI(1, ("Reconnect after server stopped responding")); | ||||
| @ -505,7 +502,7 @@ incomplete_rcv: | ||||
| 
 | ||||
| 		/* else we have an SMB response */ | ||||
| 		if ((pdu_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) || | ||||
| 			    (pdu_length < sizeof (struct smb_hdr) - 1 - 4)) { | ||||
| 			    (pdu_length < sizeof(struct smb_hdr) - 1 - 4)) { | ||||
| 			cERROR(1, ("Invalid size SMB length %d pdu_length %d", | ||||
| 					length, pdu_length+4)); | ||||
| 			cifs_reconnect(server); | ||||
| @ -529,7 +526,7 @@ incomplete_rcv: | ||||
| 		     total_read += length) { | ||||
| 			length = kernel_recvmsg(csocket, &smb_msg, &iov, 1, | ||||
| 						pdu_length - total_read, 0); | ||||
| 			if ( kthread_should_stop() || | ||||
| 			if (kthread_should_stop() || | ||||
| 			    (length == -EINTR)) { | ||||
| 				/* then will exit */ | ||||
| 				reconnect = 2; | ||||
| @ -632,9 +629,9 @@ multi_t2_fnd: | ||||
| 			/* Was previous buf put in mpx struct for multi-rsp? */ | ||||
| 			if (!isMultiRsp) { | ||||
| 				/* smb buffer will be freed by user thread */ | ||||
| 				if (isLargeBuf) { | ||||
| 				if (isLargeBuf) | ||||
| 					bigbuf = NULL; | ||||
| 				} else | ||||
| 				else | ||||
| 					smallbuf = NULL; | ||||
| 			} | ||||
| 			wake_up_process(task_to_wake); | ||||
| @ -703,9 +700,8 @@ multi_t2_fnd: | ||||
| 		list_for_each(tmp, &GlobalSMBSessionList) { | ||||
| 			ses = list_entry(tmp, struct cifsSesInfo, | ||||
| 					 cifsSessionList); | ||||
| 			if (ses->server == server) { | ||||
| 			if (ses->server == server) | ||||
| 				ses->status = CifsExiting; | ||||
| 			} | ||||
| 		} | ||||
| 
 | ||||
| 		spin_lock(&GlobalMid_Lock); | ||||
| @ -715,9 +711,8 @@ multi_t2_fnd: | ||||
| 				cFYI(1, ("Clearing Mid 0x%x - waking up ", | ||||
| 					 mid_entry->mid)); | ||||
| 				task_to_wake = mid_entry->tsk; | ||||
| 				if (task_to_wake) { | ||||
| 				if (task_to_wake) | ||||
| 					wake_up_process(task_to_wake); | ||||
| 				} | ||||
| 			} | ||||
| 		} | ||||
| 		spin_unlock(&GlobalMid_Lock); | ||||
| @ -750,18 +745,15 @@ multi_t2_fnd: | ||||
| 	list_for_each(tmp, &GlobalSMBSessionList) { | ||||
| 		ses = list_entry(tmp, struct cifsSesInfo, | ||||
| 				cifsSessionList); | ||||
| 		if (ses->server == server) { | ||||
| 		if (ses->server == server) | ||||
| 			ses->server = NULL; | ||||
| 		} | ||||
| 	} | ||||
| 	write_unlock(&GlobalSMBSeslock); | ||||
| 
 | ||||
| 	kfree(server); | ||||
| 	if (length  > 0) { | ||||
| 		mempool_resize(cifs_req_poolp, | ||||
| 			length + cifs_min_rcv, | ||||
| 			GFP_KERNEL); | ||||
| 	} | ||||
| 	if (length  > 0) | ||||
| 		mempool_resize(cifs_req_poolp, length + cifs_min_rcv, | ||||
| 				GFP_KERNEL); | ||||
| 
 | ||||
| 	return 0; | ||||
| } | ||||
|  | ||||
| @ -1067,7 +1067,7 @@ int cifs_readdir(struct file *file, void *direntry, filldir_t filldir) | ||||
| 		for (i = 0; (i < num_to_fill) && (rc == 0); i++) { | ||||
| 			if (current_entry == NULL) { | ||||
| 				/* evaluate whether this case is an error */ | ||||
| 				cERROR(1,("past end of SMB num to fill %d i %d", | ||||
| 				cERROR(1, ("past SMB end,  num to fill %d i %d", | ||||
| 					  num_to_fill, i)); | ||||
| 				break; | ||||
| 			} | ||||
|  | ||||
| @ -67,9 +67,8 @@ static __u32 cifs_ssetup_hdr(struct cifsSesInfo *ses, SESSION_SETUP_ANDX *pSMB) | ||||
| 		pSMB->req.hdr.Flags2 |= SMBFLG2_DFS; | ||||
| 		capabilities |= CAP_DFS; | ||||
| 	} | ||||
| 	if (ses->capabilities & CAP_UNIX) { | ||||
| 	if (ses->capabilities & CAP_UNIX) | ||||
| 		capabilities |= CAP_UNIX; | ||||
| 	} | ||||
| 
 | ||||
| 	/* BB check whether to init vcnum BB */ | ||||
| 	return capabilities; | ||||
| @ -203,14 +202,11 @@ static int decode_unicode_ssetup(char **pbcc_area, int bleft, | ||||
| 	if (len >= words_left) | ||||
| 		return rc; | ||||
| 
 | ||||
| 	if (ses->serverOS) | ||||
| 		kfree(ses->serverOS); | ||||
| 	kfree(ses->serverOS); | ||||
| 	/* UTF-8 string will not grow more than four times as big as UCS-16 */ | ||||
| 	ses->serverOS = kzalloc(4 * len, GFP_KERNEL); | ||||
| 	if (ses->serverOS != NULL) { | ||||
| 		cifs_strfromUCS_le(ses->serverOS, (__le16 *)data, len, | ||||
| 				   nls_cp); | ||||
| 	} | ||||
| 	if (ses->serverOS != NULL) | ||||
| 		cifs_strfromUCS_le(ses->serverOS, (__le16 *)data, len, nls_cp); | ||||
| 	data += 2 * (len + 1); | ||||
| 	words_left -= len + 1; | ||||
| 
 | ||||
| @ -220,8 +216,7 @@ static int decode_unicode_ssetup(char **pbcc_area, int bleft, | ||||
| 	if (len >= words_left) | ||||
| 		return rc; | ||||
| 
 | ||||
| 	if (ses->serverNOS) | ||||
| 		kfree(ses->serverNOS); | ||||
| 	kfree(ses->serverNOS); | ||||
| 	ses->serverNOS = kzalloc(4 * len, GFP_KERNEL); /* BB this is wrong length FIXME BB */ | ||||
| 	if (ses->serverNOS != NULL) { | ||||
| 		cifs_strfromUCS_le(ses->serverNOS, (__le16 *)data, len, | ||||
| @ -240,8 +235,7 @@ static int decode_unicode_ssetup(char **pbcc_area, int bleft, | ||||
| 	if (len > words_left) | ||||
| 		return rc; | ||||
| 
 | ||||
| 	if (ses->serverDomain) | ||||
| 		kfree(ses->serverDomain); | ||||
| 	kfree(ses->serverDomain); | ||||
| 	ses->serverDomain = kzalloc(2 * (len + 1), GFP_KERNEL); /* BB FIXME wrong length */ | ||||
| 	if (ses->serverDomain != NULL) { | ||||
| 		cifs_strfromUCS_le(ses->serverDomain, (__le16 *)data, len, | ||||
| @ -271,8 +265,7 @@ static int decode_ascii_ssetup(char **pbcc_area, int bleft, | ||||
| 	if (len >= bleft) | ||||
| 		return rc; | ||||
| 
 | ||||
| 	if (ses->serverOS) | ||||
| 		kfree(ses->serverOS); | ||||
| 	kfree(ses->serverOS); | ||||
| 
 | ||||
| 	ses->serverOS = kzalloc(len + 1, GFP_KERNEL); | ||||
| 	if (ses->serverOS) | ||||
| @ -289,8 +282,7 @@ static int decode_ascii_ssetup(char **pbcc_area, int bleft, | ||||
| 	if (len >= bleft) | ||||
| 		return rc; | ||||
| 
 | ||||
| 	if (ses->serverNOS) | ||||
| 		kfree(ses->serverNOS); | ||||
| 	kfree(ses->serverNOS); | ||||
| 
 | ||||
| 	ses->serverNOS = kzalloc(len + 1, GFP_KERNEL); | ||||
| 	if (ses->serverNOS) | ||||
| @ -479,7 +471,8 @@ CIFS_SessSetup(unsigned int xid, struct cifsSesInfo *ses, int first_time, | ||||
| 		if (ses->capabilities & CAP_UNICODE) { | ||||
| 			if (iov[0].iov_len % 2) { | ||||
| 				*bcc_ptr = 0; | ||||
| 			}	bcc_ptr++; | ||||
| 				bcc_ptr++; | ||||
| 			} | ||||
| 			unicode_ssetup_strings(&bcc_ptr, ses, nls_cp); | ||||
| 		} else | ||||
| 			ascii_ssetup_strings(&bcc_ptr, ses, nls_cp); | ||||
|  | ||||
| @ -55,7 +55,7 @@ AllocMidQEntry(const struct smb_hdr *smb_buffer, struct cifsSesInfo *ses) | ||||
| 	if (temp == NULL) | ||||
| 		return temp; | ||||
| 	else { | ||||
| 		memset(temp, 0, sizeof (struct mid_q_entry)); | ||||
| 		memset(temp, 0, sizeof(struct mid_q_entry)); | ||||
| 		temp->mid = smb_buffer->Mid;	/* always LE */ | ||||
| 		temp->pid = current->pid; | ||||
| 		temp->command = smb_buffer->Command; | ||||
| @ -158,7 +158,7 @@ smb_send(struct socket *ssocket, struct smb_hdr *smb_buffer, | ||||
| 	iov.iov_len = len; | ||||
| 
 | ||||
| 	smb_msg.msg_name = sin; | ||||
| 	smb_msg.msg_namelen = sizeof (struct sockaddr); | ||||
| 	smb_msg.msg_namelen = sizeof(struct sockaddr); | ||||
| 	smb_msg.msg_control = NULL; | ||||
| 	smb_msg.msg_controllen = 0; | ||||
| 	smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL; /* BB add more flags?*/ | ||||
| @ -228,7 +228,7 @@ smb_send2(struct socket *ssocket, struct kvec *iov, int n_vec, | ||||
| 		return -ENOTSOCK; /* BB eventually add reconnect code here */ | ||||
| 
 | ||||
| 	smb_msg.msg_name = sin; | ||||
| 	smb_msg.msg_namelen = sizeof (struct sockaddr); | ||||
| 	smb_msg.msg_namelen = sizeof(struct sockaddr); | ||||
| 	smb_msg.msg_control = NULL; | ||||
| 	smb_msg.msg_controllen = 0; | ||||
| 	smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL; /* BB add more flags?*/ | ||||
| @ -363,9 +363,8 @@ static int allocate_mid(struct cifsSesInfo *ses, struct smb_hdr *in_buf, | ||||
| 		} /* else ok - we are setting up session */ | ||||
| 	} | ||||
| 	*ppmidQ = AllocMidQEntry(in_buf, ses); | ||||
| 	if (*ppmidQ == NULL) { | ||||
| 	if (*ppmidQ == NULL) | ||||
| 		return -ENOMEM; | ||||
| 	} | ||||
| 	return 0; | ||||
| } | ||||
| 
 | ||||
| @ -572,9 +571,8 @@ SendReceive2(const unsigned int xid, struct cifsSesInfo *ses, | ||||
| 			rc = map_smb_to_linux_error(midQ->resp_buf); | ||||
| 
 | ||||
| 			/* convert ByteCount if necessary */ | ||||
| 			if (receive_len >= | ||||
| 			    sizeof (struct smb_hdr) - | ||||
| 			    4 /* do not count RFC1001 header */  + | ||||
| 			if (receive_len >= sizeof(struct smb_hdr) - 4 | ||||
| 			    /* do not count RFC1001 header */  + | ||||
| 			    (2 * midQ->resp_buf->WordCount) + 2 /* bcc */ ) | ||||
| 				BCC(midQ->resp_buf) = | ||||
| 					le16_to_cpu(BCC_LE(midQ->resp_buf)); | ||||
| @ -752,9 +750,8 @@ SendReceive(const unsigned int xid, struct cifsSesInfo *ses, | ||||
| 			rc = map_smb_to_linux_error(out_buf); | ||||
| 
 | ||||
| 			/* convert ByteCount if necessary */ | ||||
| 			if (receive_len >= | ||||
| 			    sizeof (struct smb_hdr) - | ||||
| 			    4 /* do not count RFC1001 header */  + | ||||
| 			if (receive_len >= sizeof(struct smb_hdr) - 4 | ||||
| 			    /* do not count RFC1001 header */  + | ||||
| 			    (2 * out_buf->WordCount) + 2 /* bcc */ ) | ||||
| 				BCC(out_buf) = le16_to_cpu(BCC_LE(out_buf)); | ||||
| 		} else { | ||||
| @ -996,9 +993,8 @@ SendReceiveBlockingLock(const unsigned int xid, struct cifsTconInfo *tcon, | ||||
| 			rc = map_smb_to_linux_error(out_buf); | ||||
| 
 | ||||
| 			/* convert ByteCount if necessary */ | ||||
| 			if (receive_len >= | ||||
| 			    sizeof (struct smb_hdr) - | ||||
| 			    4 /* do not count RFC1001 header */  + | ||||
| 			if (receive_len >= sizeof(struct smb_hdr) - 4 | ||||
| 			    /* do not count RFC1001 header */  + | ||||
| 			    (2 * out_buf->WordCount) + 2 /* bcc */ ) | ||||
| 				BCC(out_buf) = le16_to_cpu(BCC_LE(out_buf)); | ||||
| 		} else { | ||||
|  | ||||
		Loading…
	
		Reference in New Issue
	
	Block a user