Commit 77be4f47 authored by Silvio Fricke's avatar Silvio Fricke Committed by Greg Kroah-Hartman

staging: vt6655: removed incorrect casting in wpactl.c

This patch fixes the following type of sparse warnings:

drivers/staging/vt6655/wpactl.c:596:47: warning: cast from restricted gfp_t
drivers/staging/vt6655/wpactl.c:638:68: warning: cast from restricted gfp_t
drivers/staging/vt6655/wpactl.c:860:42: warning: cast from restricted gfp_t
Signed-off-by: default avatarSilvio Fricke <silvio.fricke@gmail.com>
Signed-off-by: default avatarGreg Kroah-Hartman <gregkh@linuxfoundation.org>
parent 6b2a0169
...@@ -594,7 +594,7 @@ static int wpa_get_scan(PSDevice pDevice, ...@@ -594,7 +594,7 @@ static int wpa_get_scan(PSDevice pDevice,
unsigned char *ptempBSS; unsigned char *ptempBSS;
ptempBSS = kmalloc(sizeof(KnownBSS), (int)GFP_ATOMIC); ptempBSS = kmalloc(sizeof(KnownBSS), GFP_ATOMIC);
if (ptempBSS == NULL) { if (ptempBSS == NULL) {
printk(KERN_ERR "bubble sort kmalloc memory fail@@@\n"); printk(KERN_ERR "bubble sort kmalloc memory fail@@@\n");
...@@ -636,7 +636,7 @@ static int wpa_get_scan(PSDevice pDevice, ...@@ -636,7 +636,7 @@ static int wpa_get_scan(PSDevice pDevice,
count++; count++;
} }
pBuf = kcalloc(count, sizeof(struct viawget_scan_result), (int)GFP_ATOMIC); pBuf = kcalloc(count, sizeof(struct viawget_scan_result), GFP_ATOMIC);
if (pBuf == NULL) { if (pBuf == NULL) {
ret = -ENOMEM; ret = -ENOMEM;
...@@ -858,7 +858,7 @@ int wpa_ioctl(PSDevice pDevice, struct iw_point *p) ...@@ -858,7 +858,7 @@ int wpa_ioctl(PSDevice pDevice, struct iw_point *p)
p->length > VIAWGET_WPA_MAX_BUF_SIZE || !p->pointer) p->length > VIAWGET_WPA_MAX_BUF_SIZE || !p->pointer)
return -EINVAL; return -EINVAL;
param = kmalloc((int)p->length, (int)GFP_KERNEL); param = kmalloc((int)p->length, GFP_KERNEL);
if (param == NULL) if (param == NULL)
return -ENOMEM; return -ENOMEM;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment