Commit 5635b82a authored by Mahati Chamarthy's avatar Mahati Chamarthy Committed by Greg Kroah-Hartman

Staging: rtl8192e: Fix style warnings relating to printk(KERN_DEBUG

This fixes the following checkpatch.pl warnings:
WARNING: Prefer [subsystem eg: netdev]_dbg([subsystem]dev, ... then dev_dbg(dev, ... then pr_debug(...  to printk(KERN_DEBUG ...
Signed-off-by: default avatarMahati Chamarthy <mahati.chamarthy@gmail.com>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
parent fe40a0b3
...@@ -69,7 +69,7 @@ static void *rtllib_ccmp_init(int key_idx) ...@@ -69,7 +69,7 @@ static void *rtllib_ccmp_init(int key_idx)
priv->tfm = (void *)crypto_alloc_cipher("aes", 0, CRYPTO_ALG_ASYNC); priv->tfm = (void *)crypto_alloc_cipher("aes", 0, CRYPTO_ALG_ASYNC);
if (IS_ERR(priv->tfm)) { if (IS_ERR(priv->tfm)) {
printk(KERN_DEBUG "rtllib_crypt_ccmp: could not allocate " pr_debug("rtllib_crypt_ccmp: could not allocate "
"crypto API aes\n"); "crypto API aes\n");
priv->tfm = NULL; priv->tfm = NULL;
goto fail; goto fail;
...@@ -278,7 +278,7 @@ static int rtllib_ccmp_decrypt(struct sk_buff *skb, int hdr_len, void *priv) ...@@ -278,7 +278,7 @@ static int rtllib_ccmp_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
keyidx = pos[3]; keyidx = pos[3];
if (!(keyidx & (1 << 5))) { if (!(keyidx & (1 << 5))) {
if (net_ratelimit()) { if (net_ratelimit()) {
printk(KERN_DEBUG "CCMP: received packet without ExtIV" pr_debug("CCMP: received packet without ExtIV"
" flag from %pM\n", hdr->addr2); " flag from %pM\n", hdr->addr2);
} }
key->dot11RSNAStatsCCMPFormatErrors++; key->dot11RSNAStatsCCMPFormatErrors++;
...@@ -286,13 +286,13 @@ static int rtllib_ccmp_decrypt(struct sk_buff *skb, int hdr_len, void *priv) ...@@ -286,13 +286,13 @@ static int rtllib_ccmp_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
} }
keyidx >>= 6; keyidx >>= 6;
if (key->key_idx != keyidx) { if (key->key_idx != keyidx) {
printk(KERN_DEBUG "CCMP: RX tkey->key_idx=%d frame " pr_debug("CCMP: RX tkey->key_idx=%d frame "
"keyidx=%d priv=%p\n", key->key_idx, keyidx, priv); "keyidx=%d priv=%p\n", key->key_idx, keyidx, priv);
return -6; return -6;
} }
if (!key->key_set) { if (!key->key_set) {
if (net_ratelimit()) { if (net_ratelimit()) {
printk(KERN_DEBUG "CCMP: received packet from %pM" pr_debug("CCMP: received packet from %pM"
" with keyid=%d that does not have a configured" " with keyid=%d that does not have a configured"
" key\n", hdr->addr2, keyidx); " key\n", hdr->addr2, keyidx);
} }
...@@ -341,7 +341,7 @@ static int rtllib_ccmp_decrypt(struct sk_buff *skb, int hdr_len, void *priv) ...@@ -341,7 +341,7 @@ static int rtllib_ccmp_decrypt(struct sk_buff *skb, int hdr_len, void *priv)
if (memcmp(mic, a, CCMP_MIC_LEN) != 0) { if (memcmp(mic, a, CCMP_MIC_LEN) != 0) {
if (net_ratelimit()) { if (net_ratelimit()) {
printk(KERN_DEBUG "CCMP: decrypt failed: STA=" pr_debug("CCMP: decrypt failed: STA="
" %pM\n", hdr->addr2); " %pM\n", hdr->addr2);
} }
key->dot11RSNAStatsCCMPDecryptErrors++; key->dot11RSNAStatsCCMPDecryptErrors++;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment