staging: vt6655: removed incorrect casting in wpactl.c
authorSilvio Fricke <silvio.fricke@gmail.com>
Sat, 12 Apr 2014 00:30:24 +0000 (02:30 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Fri, 18 Apr 2014 23:11:56 +0000 (16:11 -0700)
This patch fixes the following type of sparse warnings:

drivers/staging/vt6655/wpactl.c:596:47: warning: cast from restricted gfp_t
drivers/staging/vt6655/wpactl.c:638:68: warning: cast from restricted gfp_t
drivers/staging/vt6655/wpactl.c:860:42: warning: cast from restricted gfp_t

Signed-off-by: Silvio Fricke <silvio.fricke@gmail.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/staging/vt6655/wpactl.c

index a3a663fd7afaa4bce28da4ad468eb31b129c185d..1f72589cf718637851d650c314baa6efe8b52bd8 100644 (file)
@@ -594,7 +594,7 @@ static int wpa_get_scan(PSDevice pDevice,
 
        unsigned char *ptempBSS;
 
-       ptempBSS = kmalloc(sizeof(KnownBSS), (int)GFP_ATOMIC);
+       ptempBSS = kmalloc(sizeof(KnownBSS), GFP_ATOMIC);
 
        if (ptempBSS == NULL) {
                printk(KERN_ERR "bubble sort kmalloc memory fail@@@\n");
@@ -636,7 +636,7 @@ static int wpa_get_scan(PSDevice pDevice,
                count++;
        }
 
-       pBuf = kcalloc(count, sizeof(struct viawget_scan_result), (int)GFP_ATOMIC);
+       pBuf = kcalloc(count, sizeof(struct viawget_scan_result), GFP_ATOMIC);
 
        if (pBuf == NULL) {
                ret = -ENOMEM;
@@ -858,7 +858,7 @@ int wpa_ioctl(PSDevice pDevice, struct iw_point *p)
            p->length > VIAWGET_WPA_MAX_BUF_SIZE || !p->pointer)
                return -EINVAL;
 
-       param = kmalloc((int)p->length, (int)GFP_KERNEL);
+       param = kmalloc((int)p->length, GFP_KERNEL);
        if (param == NULL)
                return -ENOMEM;