Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp3518801pxb; Mon, 4 Apr 2022 19:39:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzRheItX/dYI8/7F/yLeGJ9Jw3BEwyBsOn02FkZ8Njn93Vz7Aw/rLLW0sYB15vZR/BUv9B6 X-Received: by 2002:a17:90b:164f:b0:1c7:8d27:91fc with SMTP id il15-20020a17090b164f00b001c78d2791fcmr1531329pjb.228.1649126354880; Mon, 04 Apr 2022 19:39:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649126354; cv=none; d=google.com; s=arc-20160816; b=AsRokdl5cQa0AvtNlbf6LHySSIHIQ5Kn73bPzBqhKHDXQ+203mYRuijETakEC+MSrx 2Xbpr18Lgu46fpf5rq/r0JdlRotfWpaHMXdPBxgRhfJ1aubsBvBGpg+iry4nL8Pglsg8 iJr4//4c2KwvUmfeTilQQAntd1T2C+no/TJ4sqN1h14mrqgPBWB97nHWLG8YSzo8yJ0D qZGjlucBN7wrEkFqaBjZUBNGu/qud9pQkMCghFSYSjGdClhcRoGBQ742Bu2fYCaOsTYf 4Icea8tcg6XLy8sMGJH0Zr1TBDLdGPXIBjWz4y5XgBvBSyNRIVomFSBA+TELTNuF2KLj ex4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=uUb6D9ezOxOc8ACteuRYK/6L8///6QYGlhLhJnc1FvM=; b=DoFcrJvpK43XTvPQRaSF0HaexSWhXx/BNX8V/wy4wHlVcu7/m4by8xxk0JvJO9ubpL udbdjQnWK+9xYFfT/0PPW9mhkGgSrqLFMT8XL8l+XS4V5BThNJElOkjps9yj3/oYsbik LCPfBTXpRIG263egEUmgxhdVz5O7KUUDxt98e7t8sPmZ8x+ipo2lXAHkWiibbOcjVyNG PVzFa4Eq0D4BF0LGoehOEfMbUsxXjx6bpfOREeSMYfHH2C34JQvKlqpJfQCF5Q8aekF2 HMoemAtOFnsYrnB+HitmaH+dIVqy5x7il1IAzeWuiEY6bpMZLJHJ1EIKajoGRrNEyOqK m/KQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oL7p2G9L; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id w21-20020a17090a529500b001bd14e0306csi882492pjh.68.2022.04.04.19.39.14 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 04 Apr 2022 19:39:14 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=oL7p2G9L; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 47F272DF641; Mon, 4 Apr 2022 18:03:01 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235430AbiDCLJO (ORCPT + 99 others); Sun, 3 Apr 2022 07:09:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53148 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1356239AbiDCLJN (ORCPT ); Sun, 3 Apr 2022 07:09:13 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9F8BC33A17 for ; Sun, 3 Apr 2022 04:07:19 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 2C53EB80CCC for ; Sun, 3 Apr 2022 11:07:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 94FB3C340F0; Sun, 3 Apr 2022 11:07:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1648984037; bh=Qb1UQDHoSp8efOCvoV2WqfgewIbsjlmYXr/z24eAz/8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=oL7p2G9LNgr81jHAy0USEicUDZD+gQaCtJFx2IdZ+hZjlW0y0xMNrTSp7H08fAzpO WWppB20X23TaxNHbjxE20DDZDke3ORWMakscGYJ6DwzFxl7hV0uQP4jsSPLTcfJbh2 TWGCu+0DXsGQ0TQjKUMZTOEeR18iV6ugRDixYBeI= Date: Sun, 3 Apr 2022 13:07:14 +0200 From: Greg Kroah-Hartman To: Sevinj Aghayeva Cc: linux-staging@lists.linux.dev, linux-kernel@vger.kernel.org, outreachy@lists.linux.dev Subject: Re: [PATCH v3 1/3] staging: rtl8723bs: remove redundant braces in if statements Message-ID: References: <1a9f181f7f30f71c03e6e88df9fb8c17a298a192.1648840991.git.sevinj.aghayeva@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1a9f181f7f30f71c03e6e88df9fb8c17a298a192.1648840991.git.sevinj.aghayeva@gmail.com> X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 01, 2022 at 03:28:36PM -0400, Sevinj Aghayeva wrote: > Adhere to Linux kernel coding style. > > Reported by checkpatch: > > WARNING: braces {} are not necessary for single statement blocks > > Signed-off-by: Sevinj Aghayeva > --- > drivers/staging/rtl8723bs/core/rtw_mlme_ext.c | 76 +++++++------------ > 1 file changed, 26 insertions(+), 50 deletions(-) > > diff --git a/drivers/staging/rtl8723bs/core/rtw_mlme_ext.c b/drivers/staging/rtl8723bs/core/rtw_mlme_ext.c > index 49a3f45cb771..9f328e9a81ff 100644 > --- a/drivers/staging/rtl8723bs/core/rtw_mlme_ext.c > +++ b/drivers/staging/rtl8723bs/core/rtw_mlme_ext.c > @@ -271,12 +271,9 @@ static int has_channel(struct rt_channel_info *channel_set, > { > int i; > > - for (i = 0; i < chanset_size; i++) { > - if (channel_set[i].ChannelNum == chan) { > + for (i = 0; i < chanset_size; i++) > + if (channel_set[i].ChannelNum == chan) > return 1; > - } > - } > - > return 0; > } > > @@ -649,9 +646,8 @@ unsigned int OnBeacon(struct adapter *padapter, union recv_frame *precv_frame) > if (psta) { > /* update WMM, ERP in the beacon */ > /* todo: the timer is used instead of the number of the beacon received */ > - if ((sta_rx_pkts(psta) & 0xf) == 0) { > + if ((sta_rx_pkts(psta) & 0xf) == 0) > update_beacon_info(padapter, pframe, len, psta); > - } > } else { > /* allocate a new CAM entry for IBSS station */ > cam_idx = allocate_fw_sta_entry(padapter); > @@ -916,11 +912,10 @@ unsigned int OnAuthClient(struct adapter *padapter, union recv_frame *precv_fram > go2asoc = 1; > } > } else if (seq == 4) { > - if (pmlmeinfo->auth_algo == dot11AuthAlgrthm_Shared) { > + if (pmlmeinfo->auth_algo == dot11AuthAlgrthm_Shared) > go2asoc = 1; > - } else { > + else > goto authclnt_fail; > - } > } else { > /* this is also illegal */ > goto authclnt_fail; > @@ -1455,11 +1450,10 @@ unsigned int OnAssocRsp(struct adapter *padapter, union recv_frame *precv_frame) > UpdateBrateTbl(padapter, pmlmeinfo->network.supported_rates); > > report_assoc_result: > - if (res > 0) { > + if (res > 0) > rtw_buf_update(&pmlmepriv->assoc_rsp, &pmlmepriv->assoc_rsp_len, pframe, pkt_len); > - } else { > + else > rtw_buf_free(&pmlmepriv->assoc_rsp, &pmlmepriv->assoc_rsp_len); > - } > > report_join_res(padapter, res); > > @@ -1531,9 +1525,8 @@ unsigned int OnDeAuth(struct adapter *padapter, union recv_frame *precv_frame) > reason, GetAddr3Ptr(pframe), > ignore_received_deauth); > > - if (0 == ignore_received_deauth) { > + if (0 == ignore_received_deauth) > receive_disconnect(padapter, GetAddr3Ptr(pframe), reason); > - } > } > pmlmepriv->LinkDetectInfo.bBusyTraffic = false; > return _SUCCESS; > @@ -1674,11 +1667,10 @@ unsigned int OnAction_back(struct adapter *padapter, union recv_frame *precv_fra > /* process_addba_req(padapter, (u8 *)&(pmlmeinfo->ADDBA_req), GetAddr3Ptr(pframe)); */ > process_addba_req(padapter, (u8 *)&(pmlmeinfo->ADDBA_req), addr); > > - if (pmlmeinfo->accept_addba_req) { > + if (pmlmeinfo->accept_addba_req) > issue_action_BA(padapter, addr, WLAN_ACTION_ADDBA_RESP, 0); > - } else { > + else > issue_action_BA(padapter, addr, WLAN_ACTION_ADDBA_RESP, 37);/* reject ADDBA Req */ > - } > > break; > > @@ -1774,9 +1766,8 @@ static unsigned int on_action_public_vendor(union recv_frame *precv_frame) > u8 *pframe = precv_frame->u.hdr.rx_data; > u8 *frame_body = pframe + sizeof(struct ieee80211_hdr_3addr); > > - if (!memcmp(frame_body + 2, P2P_OUI, 4)) { > + if (!memcmp(frame_body + 2, P2P_OUI, 4)) > ret = on_action_public_p2p(precv_frame); > - } > > return ret; > } > @@ -2187,9 +2178,8 @@ void issue_beacon(struct adapter *padapter, int timeout_ms) > > wps_ie = rtw_get_wps_ie(pmgntframe->buf_addr+TXDESC_OFFSET+sizeof(struct ieee80211_hdr_3addr)+_BEACON_IE_OFFSET_, > pattrib->pktlen-sizeof(struct ieee80211_hdr_3addr)-_BEACON_IE_OFFSET_, NULL, &wps_ielen); > - if (wps_ie && wps_ielen > 0) { > + if (wps_ie && wps_ielen > 0) > rtw_get_wps_attr_content(wps_ie, wps_ielen, WPS_ATTR_SELECTED_REGISTRAR, (u8 *)(&sr), NULL); > - } > if (sr != 0) > set_fwstate(pmlmepriv, WIFI_UNDER_WPS); > else > @@ -2245,9 +2235,8 @@ void issue_beacon(struct adapter *padapter, int timeout_ms) > > > /* EXTERNDED SUPPORTED RATE */ > - if (rate_len > 8) { > + if (rate_len > 8) > pframe = rtw_set_ie(pframe, WLAN_EID_EXT_SUPP_RATES, (rate_len - 8), (cur_network->supported_rates + 8), &pattrib->pktlen); > - } > > > /* todo:HT for adhoc */ > @@ -2447,9 +2436,8 @@ void issue_probersp(struct adapter *padapter, unsigned char *da, u8 is_valid_p2p > > > /* EXTERNDED SUPPORTED RATE */ > - if (rate_len > 8) { > + if (rate_len > 8) > pframe = rtw_set_ie(pframe, WLAN_EID_EXT_SUPP_RATES, (rate_len - 8), (cur_network->supported_rates + 8), &pattrib->pktlen); > - } > > > /* todo:HT for adhoc */ > @@ -2674,9 +2662,8 @@ void issue_auth(struct adapter *padapter, struct sta_info *psta, unsigned short > > /* setting auth algo number */ > val16 = (pmlmeinfo->auth_algo == dot11AuthAlgrthm_Shared) ? 1 : 0;/* 0:OPEN System, 1:Shared key */ > - if (val16) { > + if (val16) > use_shared_key = 1; > - } > le_tmp = cpu_to_le16(val16); > > /* setting IV for auth seq #3 */ > @@ -2831,16 +2818,14 @@ void issue_asocrsp(struct adapter *padapter, unsigned short status, struct sta_i > break; > } > > - if (!pbuf || ie_len == 0) { > + if (!pbuf || ie_len == 0) > break; > - } > } > > } > > - if (pmlmeinfo->assoc_AP_vendor == HT_IOT_PEER_REALTEK) { > + if (pmlmeinfo->assoc_AP_vendor == HT_IOT_PEER_REALTEK) > pframe = rtw_set_ie(pframe, WLAN_EID_VENDOR_SPECIFIC, 6, REALTEK_96B_IE, &(pattrib->pktlen)); > - } > > /* add WPS IE ie for wps 2.0 */ > if (pmlmepriv->wps_assoc_resp_ie && pmlmepriv->wps_assoc_resp_ie_len > 0) { > @@ -3301,9 +3286,8 @@ static int _issue_deauth(struct adapter *padapter, unsigned char *da, > __le16 le_tmp; > > pmgntframe = alloc_mgtxmitframe(pxmitpriv); > - if (!pmgntframe) { > + if (!pmgntframe) > goto exit; > - } > > /* update attribute */ > pattrib = &pmgntframe->attrib; > @@ -3627,9 +3611,8 @@ static void issue_action_BSSCoexistPacket(struct adapter *padapter) > action = ACT_PUBLIC_BSSCOEXIST; > > pmgntframe = alloc_mgtxmitframe(pxmitpriv); > - if (!pmgntframe) { > + if (!pmgntframe) > return; > - } > > /* update attribute */ > pattrib = &pmgntframe->attrib; > @@ -3802,9 +3785,8 @@ unsigned int send_beacon(struct adapter *padapter) > > } while (false == bxmitok && issue < 100 && !padapter->bSurpriseRemoved && !padapter->bDriverStopped); > > - if (padapter->bSurpriseRemoved || padapter->bDriverStopped) { > + if (padapter->bSurpriseRemoved || padapter->bDriverStopped) > return _FAIL; > - } > > > if (!bxmitok) > @@ -4388,9 +4370,8 @@ static void process_80211d(struct adapter *padapter, struct wlan_bssid_ex *bssid > } > > /* skip AP 2.4G channel plan */ > - while ((j < chplan_ap.Len) && (chplan_ap.Channel[j] <= 14)) { > + while ((j < chplan_ap.Len) && (chplan_ap.Channel[j] <= 14)) > j++; > - } > } > > pmlmeext->update_channel_plan_by_ap_done = 1; > @@ -4402,9 +4383,8 @@ static void process_80211d(struct adapter *padapter, struct wlan_bssid_ex *bssid > i = 0; > while ((i < MAX_CHANNEL_NUM) && (chplan_new[i].ChannelNum != 0)) { > if (chplan_new[i].ChannelNum == channel) { > - if (chplan_new[i].ScanType == SCAN_PASSIVE) { > + if (chplan_new[i].ScanType == SCAN_PASSIVE) > chplan_new[i].ScanType = SCAN_ACTIVE; > - } > break; > } > i++; > @@ -4629,9 +4609,8 @@ void report_del_sta_event(struct adapter *padapter, unsigned char *MacAddr, unsi > struct cmd_priv *pcmdpriv = &padapter->cmdpriv; > > pcmd_obj = rtw_zmalloc(sizeof(struct cmd_obj)); > - if (!pcmd_obj) { > + if (!pcmd_obj) > return; > - } > > cmdsz = (sizeof(struct stadel_event) + sizeof(struct C2HEvent_Header)); > pevtcmd = rtw_zmalloc(cmdsz); > @@ -5124,9 +5103,8 @@ void survey_timer_hdl(struct timer_list *t) > > /* issue rtw_sitesurvey_cmd */ > if (pmlmeext->sitesurvey_res.state > SCAN_START) { > - if (pmlmeext->sitesurvey_res.state == SCAN_PROCESS) { > + if (pmlmeext->sitesurvey_res.state == SCAN_PROCESS) > pmlmeext->sitesurvey_res.channel_idx++; > - } > > if (pmlmeext->scan_abort) { > pmlmeext->sitesurvey_res.channel_idx = pmlmeext->sitesurvey_res.ch_num; > @@ -5135,9 +5113,8 @@ void survey_timer_hdl(struct timer_list *t) > } > > ph2c = rtw_zmalloc(sizeof(struct cmd_obj)); > - if (!ph2c) { > + if (!ph2c) > goto exit_survey_timer_hdl; > - } > > psurveyPara = rtw_zmalloc(sizeof(struct sitesurvey_parm)); > if (!psurveyPara) { > @@ -5348,9 +5325,8 @@ u8 join_cmd_hdl(struct adapter *padapter, u8 *pbuf) > > /* check already connecting to AP or not */ > if (pmlmeinfo->state & WIFI_FW_ASSOC_SUCCESS) { > - if (pmlmeinfo->state & WIFI_FW_STATION_STATE) { > + if (pmlmeinfo->state & WIFI_FW_STATION_STATE) > issue_deauth_ex(padapter, pnetwork->mac_address, WLAN_REASON_DEAUTH_LEAVING, 1, 100); > - } > pmlmeinfo->state = WIFI_FW_NULL_STATE; > > /* clear CAM */ > -- > 2.25.1 > > Still does not apply to my tree :(