Received: by 2002:a05:7412:8d1c:b0:fa:4c10:6cad with SMTP id bj28csp50208rdb; Tue, 16 Jan 2024 14:43:39 -0800 (PST) X-Google-Smtp-Source: AGHT+IGA78fGP+jkgyLCyuzkLHwV4huE9Cq8/muiIId79622BrBo90PPSiM+Y8fX0WcK7SzQ8Rhh X-Received: by 2002:a17:902:b284:b0:1d4:e05a:4d40 with SMTP id u4-20020a170902b28400b001d4e05a4d40mr9910354plr.26.1705445018827; Tue, 16 Jan 2024 14:43:38 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705445018; cv=pass; d=google.com; s=arc-20160816; b=nTm0tvOGbIG+Grnbawe9AjY/UFXMfeSKNYYPLZdvtJTExFAC9iMq9EV+5QmhbShQTj VMDl+LObs2lV7CpbnSwK3ACrSgmeqQlAUQ7Bucc+UVHsYNMXs6URU5YPyg2f2c1hR+W5 0hadM2tGm7ne8chIe9PZSF069bIPZGrKZYxnQ3TVT7bwmYU+2RYZrCOTO8DQNcwpqCFl hREvjbuA9wM7iZEqxAs2I/F26nseY3h1lZHNcl21gMRnGERENVRHCCnCTPoAcpVnUIcd 3CyFuuZpT5JCL449Tct0hhl88WwhjsRvxqOP3EXmumgXcAr4kbXx+DRSbnvXsbhVd+47 i4Mw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=sB04povnSiRYEcbLIHd0rsay9GyXMq3loobY1evbqYU=; fh=7VBrVXk0ztosEmEcKycOXrpmthqiTjEmE7f87wM0T74=; b=MVT9wFUybs9kxetseunpcmQapnuo59TRRv6WBwESaos3qI8K4bpjS+apgJNPpBL+TB 4xFlMgF4n3qnKPAI1EYgbzcoARr3ce80XdOVO2RmgmD5MvBv1moSL7W4T3KiA+npz7c/ aP4l7KA67/y2l6W/UnZVtwj/Kunbe476IHW7zdhADfXqxMepwmbQkaR0mKOLrOd4srfm YuNlk2Mi6SCFHYy/vF8RTNv+ZVEwgCtWmvnqNroCl59okiglY9lBU0DGQTmJV3yRDcFV YQy4thSxwLllLyPyYFqKIADPe2XKS4J8AI+8vwEW0GLp0qjl/nHQyXcPG22Ts1e6kT2W m0ZQ== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-28271-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-28271-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=denx.de Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id ji17-20020a170903325100b001d6ecdaded5si351609plb.338.2024.01.16.14.43.38 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Jan 2024 14:43:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-28271-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-28271-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-28271-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=denx.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 6035BB24213 for ; Tue, 16 Jan 2024 22:18:31 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 2B6E225575; Tue, 16 Jan 2024 20:48:42 +0000 (UTC) Received: from jabberwock.ucw.cz (jabberwock.ucw.cz [46.255.230.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 09B5D25565; Tue, 16 Jan 2024 20:48:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=46.255.230.98 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705438121; cv=none; b=p7TND41/JM6z8hFKBKxlmMPk7lvwB4+9r/6JymHvc6AnwS2VFYvMwh9CaY07LsaYQ4XI8jJeeshrWqLM1Lldk7Jjkt2BT1UWirQZeDT+QYuB540s7N8FuVuAGVNB+Cz2LlVmPFQJZibKT2Fj05VWH8RW9Be1LWQtK4JxpZnlxB8= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705438121; c=relaxed/simple; bh=Y3w3f3kce+eXjMPg/fWB2OkjLHS6gd02jYqc7dXVnQU=; h=Received:Date:From:To:Cc:Subject:Message-ID:References: MIME-Version:Content-Type:Content-Disposition:In-Reply-To; b=uYueRi56aQ6S+4xJONO6y4hKNoaMp+nWIHxutf17aCKk/XVd+RbbNiniy9Lbg2ck7Hpl3efxLIyem2nS8u6V7j+MgOv3CE/9d4W6H5AY6Mj0QfDljz2cObER4t9qjdZh+vxenTjpvjekA15MUqOsCGpganAC7V0m3SwXxphFZDA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=denx.de; spf=fail smtp.mailfrom=denx.de; arc=none smtp.client-ip=46.255.230.98 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=denx.de Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=denx.de Received: by jabberwock.ucw.cz (Postfix, from userid 1017) id 55D1F1C0071; Tue, 16 Jan 2024 21:48:38 +0100 (CET) Date: Tue, 16 Jan 2024 21:48:37 +0100 From: Pavel Machek To: Sasha Levin Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Pierre Mariani , Steve French , sfrench@samba.org, linux-cifs@vger.kernel.org, samba-technical@lists.samba.org Subject: Re: [PATCH AUTOSEL 6.1 09/14] smb: client: Fix minor whitespace errors and warnings Message-ID: References: <20240116010642.218876-1-sashal@kernel.org> <20240116010642.218876-9-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="/Fi84FJxVfiuW0PY" Content-Disposition: inline In-Reply-To: <20240116010642.218876-9-sashal@kernel.org> --/Fi84FJxVfiuW0PY Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! > [ Upstream commit 0108ce08aed195d200ffbad74c1948bbaefe6625 ] >=20 > Fixes no-op checkpatch errors and warnings. Why did AUTOSEL pick this? It should not be picking whitespace changes. BR, Pavel > index f725a119ce31..a957efaa5e74 100644 > --- a/fs/smb/client/connect.c > +++ b/fs/smb/client/connect.c > @@ -505,6 +505,7 @@ static int reconnect_dfs_server(struct TCP_Server_Inf= o *server) > { > int rc =3D 0; > const char *refpath =3D server->current_fullpath + 1; > + > struct dfs_cache_tgt_list tl =3D DFS_CACHE_TGT_LIST_INIT(tl); > struct dfs_cache_tgt_iterator *target_hint =3D NULL; > int num_targets =3D 0; > @@ -773,6 +774,7 @@ cifs_read_from_socket(struct TCP_Server_Info *server,= char *buf, > { > struct msghdr smb_msg =3D {}; > struct kvec iov =3D {.iov_base =3D buf, .iov_len =3D to_read}; > + > iov_iter_kvec(&smb_msg.msg_iter, ITER_DEST, &iov, 1, to_read); > =20 > return cifs_readv_from_socket(server, &smb_msg); > @@ -1412,11 +1414,13 @@ cifs_match_ipaddr(struct sockaddr *srcaddr, struc= t sockaddr *rhs) > case AF_INET: { > struct sockaddr_in *saddr4 =3D (struct sockaddr_in *)srcaddr; > struct sockaddr_in *vaddr4 =3D (struct sockaddr_in *)rhs; > + > return (saddr4->sin_addr.s_addr =3D=3D vaddr4->sin_addr.s_addr); > } > case AF_INET6: { > struct sockaddr_in6 *saddr6 =3D (struct sockaddr_in6 *)srcaddr; > struct sockaddr_in6 *vaddr6 =3D (struct sockaddr_in6 *)rhs; > + > return ipv6_addr_equal(&saddr6->sin6_addr, &vaddr6->sin6_addr); > } > default: > @@ -2588,8 +2592,8 @@ cifs_get_tcon(struct cifs_ses *ses, struct smb3_fs_= context *ctx) > rc =3D -EOPNOTSUPP; > goto out_fail; > } else { > - cifs_dbg(VFS, "Check vers=3D mount option. SMB3.11 " > - "disabled but required for POSIX extensions\n"); > + cifs_dbg(VFS, > + "Check vers=3D mount option. SMB3.11 disabled but required for POSIX= extensions\n"); > rc =3D -EOPNOTSUPP; > goto out_fail; > } > @@ -2733,7 +2737,6 @@ cifs_put_tlink(struct tcon_link *tlink) > if (!IS_ERR(tlink_tcon(tlink))) > cifs_put_tcon(tlink_tcon(tlink)); > kfree(tlink); > - return; > } > =20 > static int > @@ -2867,6 +2870,7 @@ static inline void > cifs_reclassify_socket4(struct socket *sock) > { > struct sock *sk =3D sock->sk; > + > BUG_ON(!sock_allow_reclassification(sk)); > sock_lock_init_class_and_name(sk, "slock-AF_INET-CIFS", > &cifs_slock_key[0], "sk_lock-AF_INET-CIFS", &cifs_key[0]); > @@ -2876,6 +2880,7 @@ static inline void > cifs_reclassify_socket6(struct socket *sock) > { > struct sock *sk =3D sock->sk; > + > BUG_ON(!sock_allow_reclassification(sk)); > sock_lock_init_class_and_name(sk, "slock-AF_INET6-CIFS", > &cifs_slock_key[1], "sk_lock-AF_INET6-CIFS", &cifs_key[1]); > @@ -2910,15 +2915,18 @@ static int > bind_socket(struct TCP_Server_Info *server) > { > int rc =3D 0; > + > if (server->srcaddr.ss_family !=3D AF_UNSPEC) { > /* Bind to the specified local IP address */ > struct socket *socket =3D server->ssocket; > + > rc =3D kernel_bind(socket, > (struct sockaddr *) &server->srcaddr, > sizeof(server->srcaddr)); > if (rc < 0) { > struct sockaddr_in *saddr4; > struct sockaddr_in6 *saddr6; > + > saddr4 =3D (struct sockaddr_in *)&server->srcaddr; > saddr6 =3D (struct sockaddr_in6 *)&server->srcaddr; > if (saddr6->sin6_family =3D=3D AF_INET6) > @@ -3146,6 +3154,7 @@ void reset_cifs_unix_caps(unsigned int xid, struct = cifs_tcon *tcon, > =20 > if (!CIFSSMBQFSUnixInfo(xid, tcon)) { > __u64 cap =3D le64_to_cpu(tcon->fsUnixInfo.Capability); > + > cifs_dbg(FYI, "unix caps which server supports %lld\n", cap); > /* > * check for reconnect case in which we do not > @@ -3997,7 +4006,7 @@ CIFSTCon(const unsigned int xid, struct cifs_ses *s= es, > smb_buffer_response =3D smb_buffer; > =20 > header_assemble(smb_buffer, SMB_COM_TREE_CONNECT_ANDX, > - NULL /*no tid */ , 4 /*wct */ ); > + NULL /*no tid */, 4 /*wct */); > =20 > smb_buffer->Mid =3D get_next_mid(ses->server); > smb_buffer->Uid =3D ses->Suid; > @@ -4016,12 +4025,12 @@ CIFSTCon(const unsigned int xid, struct cifs_ses = *ses, > if (ses->server->sign) > smb_buffer->Flags2 |=3D SMBFLG2_SECURITY_SIGNATURE; > =20 > - if (ses->capabilities & CAP_STATUS32) { > + if (ses->capabilities & CAP_STATUS32) > smb_buffer->Flags2 |=3D SMBFLG2_ERR_STATUS; > - } > - if (ses->capabilities & CAP_DFS) { > + > + if (ses->capabilities & CAP_DFS) > smb_buffer->Flags2 |=3D SMBFLG2_DFS; > - } > + > if (ses->capabilities & CAP_UNICODE) { > smb_buffer->Flags2 |=3D SMBFLG2_UNICODE; > length =3D --=20 DENX Software Engineering GmbH, Managing Director: Erika Unter HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany --/Fi84FJxVfiuW0PY Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQRPfPO7r0eAhk010v0w5/Bqldv68gUCZabrpQAKCRAw5/Bqldv6 8vCiAKCSTvWI5Trv0C+z0NvMhyUpJCX8OQCfcsXC/pHkdCrseZx3gXdW55c3d1Y= =WufH -----END PGP SIGNATURE----- --/Fi84FJxVfiuW0PY--