Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

vt6655: fix printk usage in wpactl.c

This patch fixes the usage of printk in wpactl.c concering one missing log level
occurence and some whitespaces before a newline.

Signed-off-by: Martin Hofmann <martin.hofmann@studium.uni-erlangen.de>
Signed-off-by: Michael Gunselmann <michael.gunselmann@studium.uni-erlangen.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>

authored by

Martin Hofmann and committed by
Greg Kroah-Hartman
edd236af 91d9b19a

+12 -12
+12 -12
drivers/staging/vt6655/wpactl.c
··· 206 206 param->u.wpa_key.seq_len > MAX_KEY_LEN) 207 207 return -EINVAL; 208 208 209 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "param->u.wpa_key.alg_name = %d \n", param->u.wpa_key.alg_name); 209 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "param->u.wpa_key.alg_name = %d\n", param->u.wpa_key.alg_name); 210 210 if (param->u.wpa_key.alg_name == WPA_ALG_NONE) { 211 211 pDevice->eEncryptionStatus = Ndis802_11EncryptionDisabled; 212 212 pDevice->bEncryptionEnable = false; ··· 415 415 //spin_unlock_irq(&pDevice->lock); 416 416 417 417 /* 418 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO " key=%x-%x-%x-%x-%x-xxxxx \n", 418 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO " key=%x-%x-%x-%x-%x-xxxxx\n", 419 419 pMgmt->sNodeDBTable[iNodeIndex].abyWepKey[byKeyIndex][0], 420 420 pMgmt->sNodeDBTable[iNodeIndex].abyWepKey[byKeyIndex][1], 421 421 pMgmt->sNodeDBTable[iNodeIndex].abyWepKey[byKeyIndex][2], ··· 596 596 ptempBSS = kmalloc(sizeof(KnownBSS), (int)GFP_ATOMIC); 597 597 598 598 if (ptempBSS == NULL) { 599 - printk("bubble sort kmalloc memory fail@@@\n"); 599 + printk(KERN_ERR "bubble sort kmalloc memory fail@@@\n"); 600 600 601 601 ret = -ENOMEM; 602 602 ··· 869 869 switch (param->cmd) { 870 870 case VIAWGET_SET_WPA: 871 871 ret = wpa_set_wpa(pDevice, param); 872 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_WPA \n"); 872 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_WPA\n"); 873 873 break; 874 874 875 875 case VIAWGET_SET_KEY: 876 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_KEY \n"); 876 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_KEY\n"); 877 877 spin_lock_irq(&pDevice->lock); 878 878 ret = wpa_set_keys(pDevice, param, false); 879 879 spin_unlock_irq(&pDevice->lock); 880 880 break; 881 881 882 882 case VIAWGET_SET_SCAN: 883 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_SCAN \n"); 883 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_SCAN\n"); 884 884 ret = wpa_set_scan(pDevice, param); 885 885 break; 886 886 ··· 891 891 break; 892 892 893 893 case VIAWGET_GET_SSID: 894 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_GET_SSID \n"); 894 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_GET_SSID\n"); 895 895 ret = wpa_get_ssid(pDevice, param); 896 896 wpa_ioctl = 1; 897 897 break; 898 898 899 899 case VIAWGET_GET_BSSID: 900 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_GET_BSSID \n"); 900 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_GET_BSSID\n"); 901 901 ret = wpa_get_bssid(pDevice, param); 902 902 wpa_ioctl = 1; 903 903 break; 904 904 905 905 case VIAWGET_SET_ASSOCIATE: 906 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_ASSOCIATE \n"); 906 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_ASSOCIATE\n"); 907 907 ret = wpa_set_associate(pDevice, param); 908 908 break; 909 909 910 910 case VIAWGET_SET_DISASSOCIATE: 911 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_DISASSOCIATE \n"); 911 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_DISASSOCIATE\n"); 912 912 ret = wpa_set_disassociate(pDevice, param); 913 913 break; 914 914 915 915 case VIAWGET_SET_DROP_UNENCRYPT: 916 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_DROP_UNENCRYPT \n"); 916 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_DROP_UNENCRYPT\n"); 917 917 break; 918 918 919 919 case VIAWGET_SET_DEAUTHENTICATE: 920 - DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_DEAUTHENTICATE \n"); 920 + DBG_PRT(MSG_LEVEL_DEBUG, KERN_INFO "VIAWGET_SET_DEAUTHENTICATE\n"); 921 921 break; 922 922 923 923 default: