Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

ath6kl: merge split format strings into one

Found by checkpatch:

WARNING: quoted string split across lines

Signed-off-by: Kalle Valo <kvalo@qca.qualcomm.com>

+64 -62
+12 -17
drivers/net/wireless/ath/ath6kl/cfg80211.c
··· 693 693 ie, 2 + vif->ssid_len + beacon_ie_len, 694 694 0, GFP_KERNEL); 695 695 if (bss) 696 - ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "added bss %pM to " 697 - "cfg80211\n", bssid); 696 + ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, 697 + "added bss %pM to cfg80211\n", bssid); 698 698 kfree(ie); 699 699 } else 700 700 ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "cfg80211 already has a bss\n"); ··· 927 927 WMI_FRAME_PROBE_REQ, 928 928 request->ie, request->ie_len); 929 929 if (ret) { 930 - ath6kl_err("failed to set Probe Request appie for " 931 - "scan"); 930 + ath6kl_err("failed to set Probe Request appie for scan"); 932 931 return ret; 933 932 } 934 933 ··· 944 945 945 946 channels = kzalloc(n_channels * sizeof(u16), GFP_KERNEL); 946 947 if (channels == NULL) { 947 - ath6kl_warn("failed to set scan channels, " 948 - "scan all channels"); 948 + ath6kl_warn("failed to set scan channels, scan all channels"); 949 949 n_channels = 0; 950 950 } 951 951 ··· 1123 1125 ar->ap_mode_bkey.key_len = key->key_len; 1124 1126 memcpy(ar->ap_mode_bkey.key, key->key, key->key_len); 1125 1127 if (!test_bit(CONNECTED, &vif->flags)) { 1126 - ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delay initial group " 1127 - "key configuration until AP mode has been " 1128 - "started\n"); 1128 + ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, 1129 + "Delay initial group key configuration until AP mode has been started\n"); 1129 1130 /* 1130 1131 * The key will be set in ath6kl_connect_ap_mode() once 1131 1132 * the connected event is received from the target. ··· 1140 1143 * the AP mode has properly started 1141 1144 * (ath6kl_install_statioc_wep_keys). 1142 1145 */ 1143 - ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delay WEP key configuration " 1144 - "until AP mode has been started\n"); 1146 + ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, 1147 + "Delay WEP key configuration until AP mode has been started\n"); 1145 1148 vif->wep_key_list[key_index].key_len = key->key_len; 1146 1149 memcpy(vif->wep_key_list[key_index].key, key->key, 1147 1150 key->key_len); ··· 1973 1976 sizeof(discvr_pattern), discvr_offset, 1974 1977 discvr_pattern, discvr_mask); 1975 1978 if (ret) { 1976 - ath6kl_err("failed to add WOW mDNS/SSDP/LLMNR " 1977 - "pattern\n"); 1979 + ath6kl_err("failed to add WOW mDNS/SSDP/LLMNR pattern\n"); 1978 1980 return ret; 1979 1981 } 1980 1982 } ··· 2157 2161 ret = ath6kl_wmi_set_host_sleep_mode_cmd(ar->wmi, vif->fw_vif_idx, 2158 2162 ATH6KL_HOST_MODE_AWAKE); 2159 2163 if (ret) { 2160 - ath6kl_warn("Failed to configure host sleep mode for " 2161 - "wow resume: %d\n", ret); 2164 + ath6kl_warn("Failed to configure host sleep mode for wow resume: %d\n", 2165 + ret); 2162 2166 ar->state = ATH6KL_STATE_WOW; 2163 2167 return ret; 2164 2168 } ··· 3288 3292 ar->wmi->saved_pwr_mode = ar->wmi->pwr_mode; 3289 3293 3290 3294 if (ath6kl_wmi_powermode_cmd(ar->wmi, 0, REC_POWER) != 0) 3291 - ath6kl_warn("ath6kl_deep_sleep_enable: " 3292 - "wmi_powermode_cmd failed\n"); 3295 + ath6kl_warn("ath6kl_deep_sleep_enable: wmi_powermode_cmd failed\n"); 3293 3296 return; 3294 3297 } 3295 3298
+6 -5
drivers/net/wireless/ath/ath6kl/init.c
··· 463 463 P2P_FLAG_MACADDR_REQ | 464 464 P2P_FLAG_HMODEL_REQ); 465 465 if (ret) { 466 - ath6kl_dbg(ATH6KL_DBG_TRC, "failed to request P2P " 467 - "capabilities (%d) - assuming P2P not " 468 - "supported\n", ret); 466 + ath6kl_dbg(ATH6KL_DBG_TRC, 467 + "failed to request P2P capabilities (%d) - assuming P2P not supported\n", 468 + ret); 469 469 ar->p2p = false; 470 470 } 471 471 } ··· 474 474 /* Enable Probe Request reporting for P2P */ 475 475 ret = ath6kl_wmi_probe_report_req_cmd(ar->wmi, idx, true); 476 476 if (ret) { 477 - ath6kl_dbg(ATH6KL_DBG_TRC, "failed to enable Probe " 478 - "Request reporting (%d)\n", ret); 477 + ath6kl_dbg(ATH6KL_DBG_TRC, 478 + "failed to enable Probe Request reporting (%d)\n", 479 + ret); 479 480 } 480 481 } 481 482
+4 -4
drivers/net/wireless/ath/ath6kl/main.c
··· 421 421 if (!ik->valid) 422 422 break; 423 423 424 - ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delayed addkey for " 425 - "the initial group key for AP mode\n"); 424 + ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, 425 + "Delayed addkey for the initial group key for AP mode\n"); 426 426 memset(key_rsc, 0, sizeof(key_rsc)); 427 427 res = ath6kl_wmi_addkey_cmd( 428 428 ar->wmi, vif->fw_vif_idx, ik->key_index, ik->key_type, ··· 430 430 ik->key, 431 431 KEY_OP_INIT_VAL, NULL, SYNC_BOTH_WMIFLAG); 432 432 if (res) { 433 - ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, "Delayed " 434 - "addkey failed: %d\n", res); 433 + ath6kl_dbg(ATH6KL_DBG_WLAN_CFG, 434 + "Delayed addkey failed: %d\n", res); 435 435 } 436 436 break; 437 437 }
+4 -5
drivers/net/wireless/ath/ath6kl/sdio.c
··· 985 985 } 986 986 987 987 if (status) { 988 - ath6kl_err("%s: failed to write initial bytes of 0x%x " 989 - "to window reg: 0x%X\n", __func__, 990 - addr, reg_addr); 988 + ath6kl_err("%s: failed to write initial bytes of 0x%x to window reg: 0x%X\n", 989 + __func__, addr, reg_addr); 991 990 return status; 992 991 } 993 992 ··· 1075 1076 (u8 *)&ar->bmi.cmd_credits, 4, 1076 1077 HIF_RD_SYNC_BYTE_INC); 1077 1078 if (ret) { 1078 - ath6kl_err("Unable to decrement the command credit " 1079 - "count register: %d\n", ret); 1079 + ath6kl_err("Unable to decrement the command credit count register: %d\n", 1080 + ret); 1080 1081 return ret; 1081 1082 } 1082 1083
+38 -31
drivers/net/wireless/ath/ath6kl/wmi.c
··· 460 460 freq, dur); 461 461 chan = ieee80211_get_channel(ar->wiphy, freq); 462 462 if (!chan) { 463 - ath6kl_dbg(ATH6KL_DBG_WMI, "remain_on_chnl: Unknown channel " 464 - "(freq=%u)\n", freq); 463 + ath6kl_dbg(ATH6KL_DBG_WMI, 464 + "remain_on_chnl: Unknown channel (freq=%u)\n", 465 + freq); 465 466 return -EINVAL; 466 467 } 467 468 id = vif->last_roc_id; ··· 489 488 ev = (struct wmi_cancel_remain_on_chnl_event *) datap; 490 489 freq = le32_to_cpu(ev->freq); 491 490 dur = le32_to_cpu(ev->duration); 492 - ath6kl_dbg(ATH6KL_DBG_WMI, "cancel_remain_on_chnl: freq=%u dur=%u " 493 - "status=%u\n", freq, dur, ev->status); 491 + ath6kl_dbg(ATH6KL_DBG_WMI, 492 + "cancel_remain_on_chnl: freq=%u dur=%u status=%u\n", 493 + freq, dur, ev->status); 494 494 chan = ieee80211_get_channel(ar->wiphy, freq); 495 495 if (!chan) { 496 - ath6kl_dbg(ATH6KL_DBG_WMI, "cancel_remain_on_chnl: Unknown " 497 - "channel (freq=%u)\n", freq); 496 + ath6kl_dbg(ATH6KL_DBG_WMI, 497 + "cancel_remain_on_chnl: Unknown channel (freq=%u)\n", 498 + freq); 498 499 return -EINVAL; 499 500 } 500 501 if (vif->last_cancel_roc_id && ··· 551 548 freq = le32_to_cpu(ev->freq); 552 549 dlen = le16_to_cpu(ev->len); 553 550 if (datap + len < ev->data + dlen) { 554 - ath6kl_err("invalid wmi_p2p_rx_probe_req_event: " 555 - "len=%d dlen=%u\n", len, dlen); 551 + ath6kl_err("invalid wmi_p2p_rx_probe_req_event: len=%d dlen=%u\n", 552 + len, dlen); 556 553 return -EINVAL; 557 554 } 558 - ath6kl_dbg(ATH6KL_DBG_WMI, "rx_probe_req: len=%u freq=%u " 559 - "probe_req_report=%d\n", 555 + ath6kl_dbg(ATH6KL_DBG_WMI, 556 + "rx_probe_req: len=%u freq=%u probe_req_report=%d\n", 560 557 dlen, freq, vif->probe_req_report); 561 558 562 559 if (vif->probe_req_report || vif->nw_type == AP_NETWORK) ··· 595 592 freq = le32_to_cpu(ev->freq); 596 593 dlen = le16_to_cpu(ev->len); 597 594 if (datap + len < ev->data + dlen) { 598 - ath6kl_err("invalid wmi_rx_action_event: " 599 - "len=%d dlen=%u\n", len, dlen); 595 + ath6kl_err("invalid wmi_rx_action_event: len=%d dlen=%u\n", 596 + len, dlen); 600 597 return -EINVAL; 601 598 } 602 599 ath6kl_dbg(ATH6KL_DBG_WMI, "rx_action: len=%u freq=%u\n", dlen, freq); ··· 780 777 /* AP mode start/STA connected event */ 781 778 struct net_device *dev = vif->ndev; 782 779 if (memcmp(dev->dev_addr, ev->u.ap_bss.bssid, ETH_ALEN) == 0) { 783 - ath6kl_dbg(ATH6KL_DBG_WMI, "%s: freq %d bssid %pM " 784 - "(AP started)\n", 780 + ath6kl_dbg(ATH6KL_DBG_WMI, 781 + "%s: freq %d bssid %pM (AP started)\n", 785 782 __func__, le16_to_cpu(ev->u.ap_bss.ch), 786 783 ev->u.ap_bss.bssid); 787 784 ath6kl_connect_ap_mode_bss( 788 785 vif, le16_to_cpu(ev->u.ap_bss.ch)); 789 786 } else { 790 - ath6kl_dbg(ATH6KL_DBG_WMI, "%s: aid %u mac_addr %pM " 791 - "auth=%u keymgmt=%u cipher=%u apsd_info=%u " 792 - "(STA connected)\n", 787 + ath6kl_dbg(ATH6KL_DBG_WMI, 788 + "%s: aid %u mac_addr %pM auth=%u keymgmt=%u cipher=%u apsd_info=%u (STA connected)\n", 793 789 __func__, ev->u.ap_sta.aid, 794 790 ev->u.ap_sta.mac_addr, 795 791 ev->u.ap_sta.auth, ··· 1231 1229 ev = (struct wmi_neighbor_report_event *) datap; 1232 1230 if (sizeof(*ev) + ev->num_neighbors * sizeof(struct wmi_neighbor_info) 1233 1231 > len) { 1234 - ath6kl_dbg(ATH6KL_DBG_WMI, "truncated neighbor event " 1235 - "(num=%d len=%d)\n", ev->num_neighbors, len); 1232 + ath6kl_dbg(ATH6KL_DBG_WMI, 1233 + "truncated neighbor event (num=%d len=%d)\n", 1234 + ev->num_neighbors, len); 1236 1235 return -EINVAL; 1237 1236 } 1238 1237 for (i = 0; i < ev->num_neighbors; i++) { ··· 2132 2129 struct wmi_add_cipher_key_cmd *cmd; 2133 2130 int ret; 2134 2131 2135 - ath6kl_dbg(ATH6KL_DBG_WMI, "addkey cmd: key_index=%u key_type=%d " 2136 - "key_usage=%d key_len=%d key_op_ctrl=%d\n", 2132 + ath6kl_dbg(ATH6KL_DBG_WMI, 2133 + "addkey cmd: key_index=%u key_type=%d key_usage=%d key_len=%d key_op_ctrl=%d\n", 2137 2134 key_index, key_type, key_usage, key_len, key_op_ctrl); 2138 2135 2139 2136 if ((key_index > WMI_MAX_KEY_INDEX) || (key_len > WMI_MAX_KEY_LEN) || ··· 3050 3047 3051 3048 res = ath6kl_wmi_cmd_send(wmip, if_idx, skb, WMI_AP_CONFIG_COMMIT_CMDID, 3052 3049 NO_SYNC_WMIFLAG); 3053 - ath6kl_dbg(ATH6KL_DBG_WMI, "%s: nw_type=%u auth_mode=%u ch=%u " 3054 - "ctrl_flags=0x%x-> res=%d\n", 3050 + ath6kl_dbg(ATH6KL_DBG_WMI, 3051 + "%s: nw_type=%u auth_mode=%u ch=%u ctrl_flags=0x%x-> res=%d\n", 3055 3052 __func__, p->nw_type, p->auth_mode, le16_to_cpu(p->ch), 3056 3053 le32_to_cpu(p->ctrl_flags), res); 3057 3054 return res; ··· 3211 3208 if (!skb) 3212 3209 return -ENOMEM; 3213 3210 3214 - ath6kl_dbg(ATH6KL_DBG_WMI, "set_appie_cmd: mgmt_frm_type=%u " 3215 - "ie_len=%u\n", mgmt_frm_type, ie_len); 3211 + ath6kl_dbg(ATH6KL_DBG_WMI, 3212 + "set_appie_cmd: mgmt_frm_type=%u ie_len=%u\n", 3213 + mgmt_frm_type, ie_len); 3216 3214 p = (struct wmi_set_appie_cmd *) skb->data; 3217 3215 p->mgmt_frm_type = mgmt_frm_type; 3218 3216 p->ie_len = ie_len; ··· 3314 3310 wmi->last_mgmt_tx_frame = buf; 3315 3311 wmi->last_mgmt_tx_frame_len = data_len; 3316 3312 3317 - ath6kl_dbg(ATH6KL_DBG_WMI, "send_action_cmd: id=%u freq=%u wait=%u " 3318 - "len=%u\n", id, freq, wait, data_len); 3313 + ath6kl_dbg(ATH6KL_DBG_WMI, 3314 + "send_action_cmd: id=%u freq=%u wait=%u len=%u\n", 3315 + id, freq, wait, data_len); 3319 3316 p = (struct wmi_send_action_cmd *) skb->data; 3320 3317 p->id = cpu_to_le32(id); 3321 3318 p->freq = cpu_to_le32(freq); ··· 3353 3348 wmi->last_mgmt_tx_frame = buf; 3354 3349 wmi->last_mgmt_tx_frame_len = data_len; 3355 3350 3356 - ath6kl_dbg(ATH6KL_DBG_WMI, "send_action_cmd: id=%u freq=%u wait=%u " 3357 - "len=%u\n", id, freq, wait, data_len); 3351 + ath6kl_dbg(ATH6KL_DBG_WMI, 3352 + "send_action_cmd: id=%u freq=%u wait=%u len=%u\n", 3353 + id, freq, wait, data_len); 3358 3354 p = (struct wmi_send_mgmt_cmd *) skb->data; 3359 3355 p->id = cpu_to_le32(id); 3360 3356 p->freq = cpu_to_le32(freq); ··· 3408 3402 if (!skb) 3409 3403 return -ENOMEM; 3410 3404 3411 - ath6kl_dbg(ATH6KL_DBG_WMI, "send_probe_response_cmd: freq=%u dst=%pM " 3412 - "len=%u\n", freq, dst, data_len); 3405 + ath6kl_dbg(ATH6KL_DBG_WMI, 3406 + "send_probe_response_cmd: freq=%u dst=%pM len=%u\n", 3407 + freq, dst, data_len); 3413 3408 p = (struct wmi_p2p_probe_response_cmd *) skb->data; 3414 3409 p->freq = cpu_to_le32(freq); 3415 3410 memcpy(p->destination_addr, dst, ETH_ALEN);