Florian Westphal d99bfed58d mptcp: fix bogus socket flag values
Dan Carpenter reports static checker warnings due to bogus BIT() usage:

net/mptcp/subflow.c:571 subflow_write_space() warn: test_bit() takes a bit number
net/mptcp/subflow.c:694 subflow_state_change() warn: test_bit() takes a bit number
net/mptcp/protocol.c:261 ssk_check_wmem() warn: test_bit() takes a bit number
[..]

This is harmless (we use bits 1 & 2 instead of 0 and 1), but would
break eventually when adding BIT(5) (or 6, depends on size of 'long').

Just use 0 and 1, the values are only passed to test/set/clear_bit
functions.

Fixes: 648ef4b88673 ("mptcp: Implement MPTCP receive path")
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2020-02-18 12:05:53 -08:00
..
2019-09-27 15:10:34 -07:00
2019-12-09 10:36:44 -08:00
2019-12-09 10:36:44 -08:00
2020-01-27 11:09:31 +01:00
2019-09-26 08:56:17 +02:00
2019-12-09 10:36:44 -08:00
2020-02-18 12:05:53 -08:00
2019-11-26 14:40:13 -08:00
2020-01-14 18:36:42 -08:00
2020-02-07 17:50:21 -08:00
2020-01-09 18:39:33 -08:00
2020-01-24 13:44:07 +01:00
2020-01-24 13:44:07 +01:00
2020-01-08 15:02:21 -08:00