@@ -105,6 +105,7 @@ cifs_chan_clear_in_reconnect(struct cifs_ses *ses,
105
105
struct TCP_Server_Info * server )
106
106
{
107
107
unsigned int chan_index = cifs_ses_get_chan_index (ses , server );
108
+
108
109
if (chan_index == CIFS_INVAL_CHAN_INDEX )
109
110
return ;
110
111
@@ -116,6 +117,7 @@ cifs_chan_in_reconnect(struct cifs_ses *ses,
116
117
struct TCP_Server_Info * server )
117
118
{
118
119
unsigned int chan_index = cifs_ses_get_chan_index (ses , server );
120
+
119
121
if (chan_index == CIFS_INVAL_CHAN_INDEX )
120
122
return true; /* err on the safer side */
121
123
@@ -127,6 +129,7 @@ cifs_chan_set_need_reconnect(struct cifs_ses *ses,
127
129
struct TCP_Server_Info * server )
128
130
{
129
131
unsigned int chan_index = cifs_ses_get_chan_index (ses , server );
132
+
130
133
if (chan_index == CIFS_INVAL_CHAN_INDEX )
131
134
return ;
132
135
@@ -140,6 +143,7 @@ cifs_chan_clear_need_reconnect(struct cifs_ses *ses,
140
143
struct TCP_Server_Info * server )
141
144
{
142
145
unsigned int chan_index = cifs_ses_get_chan_index (ses , server );
146
+
143
147
if (chan_index == CIFS_INVAL_CHAN_INDEX )
144
148
return ;
145
149
@@ -153,6 +157,7 @@ cifs_chan_needs_reconnect(struct cifs_ses *ses,
153
157
struct TCP_Server_Info * server )
154
158
{
155
159
unsigned int chan_index = cifs_ses_get_chan_index (ses , server );
160
+
156
161
if (chan_index == CIFS_INVAL_CHAN_INDEX )
157
162
return true; /* err on the safer side */
158
163
@@ -164,6 +169,7 @@ cifs_chan_is_iface_active(struct cifs_ses *ses,
164
169
struct TCP_Server_Info * server )
165
170
{
166
171
unsigned int chan_index = cifs_ses_get_chan_index (ses , server );
172
+
167
173
if (chan_index == CIFS_INVAL_CHAN_INDEX )
168
174
return true; /* err on the safer side */
169
175
@@ -639,8 +645,7 @@ static __u32 cifs_ssetup_hdr(struct cifs_ses *ses,
639
645
640
646
/* Now no need to set SMBFLG_CASELESS or obsolete CANONICAL PATH */
641
647
642
- /* BB verify whether signing required on neg or just on auth frame
643
- (and NTLM case) */
648
+ /* BB verify whether signing required on neg or just auth frame (and NTLM case) */
644
649
645
650
capabilities = CAP_LARGE_FILES | CAP_NT_SMBS | CAP_LEVEL_II_OPLOCKS |
646
651
CAP_LARGE_WRITE_X | CAP_LARGE_READ_X ;
@@ -697,8 +702,10 @@ static void unicode_domain_string(char **pbcc_area, struct cifs_ses *ses,
697
702
698
703
/* copy domain */
699
704
if (ses -> domainName == NULL ) {
700
- /* Sending null domain better than using a bogus domain name (as
701
- we did briefly in 2.6.18) since server will use its default */
705
+ /*
706
+ * Sending null domain better than using a bogus domain name (as
707
+ * we did briefly in 2.6.18) since server will use its default
708
+ */
702
709
* bcc_ptr = 0 ;
703
710
* (bcc_ptr + 1 ) = 0 ;
704
711
bytes_ret = 0 ;
@@ -717,8 +724,7 @@ static void unicode_ssetup_strings(char **pbcc_area, struct cifs_ses *ses,
717
724
char * bcc_ptr = * pbcc_area ;
718
725
int bytes_ret = 0 ;
719
726
720
- /* BB FIXME add check that strings total less
721
- than 335 or will need to send them as arrays */
727
+ /* BB FIXME add check that strings less than 335 or will need to send as arrays */
722
728
723
729
/* copy user */
724
730
if (ses -> user_name == NULL ) {
0 commit comments