mirror of
https://github.com/Fishwaldo/Star64_linux.git
synced 2025-07-23 07:12:09 +00:00
ipv4: coding style: comparison for inequality with NULL
The ipv4 code uses a mixture of coding styles. In some instances check for non-NULL pointer is done as x != NULL and sometimes as x. x is preferred according to checkpatch and this patch makes the code consistent by adopting the latter form. No changes detected by objdiff. Signed-off-by: Ian Morris <ipm@chirality.org.uk> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
51456b2914
commit
00db41243e
30 changed files with 64 additions and 63 deletions
|
@ -1256,7 +1256,7 @@ static u8 tcp_sacktag_one(struct sock *sk,
|
|||
fack_count += pcount;
|
||||
|
||||
/* Lost marker hint past SACKed? Tweak RFC3517 cnt */
|
||||
if (!tcp_is_fack(tp) && (tp->lost_skb_hint != NULL) &&
|
||||
if (!tcp_is_fack(tp) && tp->lost_skb_hint &&
|
||||
before(start_seq, TCP_SKB_CB(tp->lost_skb_hint)->seq))
|
||||
tp->lost_cnt_hint += pcount;
|
||||
|
||||
|
@ -1535,7 +1535,7 @@ static struct sk_buff *tcp_sacktag_walk(struct sk_buff *skb, struct sock *sk,
|
|||
if (!before(TCP_SKB_CB(skb)->seq, end_seq))
|
||||
break;
|
||||
|
||||
if ((next_dup != NULL) &&
|
||||
if (next_dup &&
|
||||
before(TCP_SKB_CB(skb)->seq, next_dup->end_seq)) {
|
||||
in_sack = tcp_match_skb_to_sack(sk, skb,
|
||||
next_dup->start_seq,
|
||||
|
@ -1551,7 +1551,7 @@ static struct sk_buff *tcp_sacktag_walk(struct sk_buff *skb, struct sock *sk,
|
|||
if (in_sack <= 0) {
|
||||
tmp = tcp_shift_skb_data(sk, skb, state,
|
||||
start_seq, end_seq, dup_sack);
|
||||
if (tmp != NULL) {
|
||||
if (tmp) {
|
||||
if (tmp != skb) {
|
||||
skb = tmp;
|
||||
continue;
|
||||
|
@ -5321,7 +5321,7 @@ void tcp_finish_connect(struct sock *sk, struct sk_buff *skb)
|
|||
|
||||
tcp_set_state(sk, TCP_ESTABLISHED);
|
||||
|
||||
if (skb != NULL) {
|
||||
if (skb) {
|
||||
icsk->icsk_af_ops->sk_rx_dst_set(sk, skb);
|
||||
security_inet_conn_established(sk, skb);
|
||||
}
|
||||
|
@ -5690,7 +5690,7 @@ int tcp_rcv_state_process(struct sock *sk, struct sk_buff *skb,
|
|||
}
|
||||
|
||||
req = tp->fastopen_rsk;
|
||||
if (req != NULL) {
|
||||
if (req) {
|
||||
WARN_ON_ONCE(sk->sk_state != TCP_SYN_RECV &&
|
||||
sk->sk_state != TCP_FIN_WAIT1);
|
||||
|
||||
|
@ -5780,7 +5780,7 @@ int tcp_rcv_state_process(struct sock *sk, struct sk_buff *skb,
|
|||
* ACK we have received, this would have acknowledged
|
||||
* our SYNACK so stop the SYNACK timer.
|
||||
*/
|
||||
if (req != NULL) {
|
||||
if (req) {
|
||||
/* Return RST if ack_seq is invalid.
|
||||
* Note that RFC793 only says to generate a
|
||||
* DUPACK for it but for TCP Fast Open it seems
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue