Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp1745322imj; Sun, 17 Feb 2019 13:28:27 -0800 (PST) X-Google-Smtp-Source: AHgI3IY4ntJw0aveT2cOWgPUB3cyOL5Em+MXhLfLEsD8oAv3OTBeejmzvVXNbfTCs7Cf1awn28v1 X-Received: by 2002:a63:6c01:: with SMTP id h1mr15837387pgc.330.1550438907179; Sun, 17 Feb 2019 13:28:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550438907; cv=none; d=google.com; s=arc-20160816; b=LtrOkrJoTnzQdHIvlZ55FY9zeWSGJbGaCweAEL8oQXf4Dr7FKl5kIdJFSPSIenqmnn jHXSmt/IBpfG8AkzhzItBH0juSbxcHOZQeh1f/aL1jc3urHgaWOW5LCZpagd3f+oDvjm uHkgajfTkfksmpYFAgi8eed2RBhx+t6ckx6/7zm+JQCixTQ/Mj0xk4XL1F17jmipTLSk /NreZgCYjf4lKnsafTlMbHEUsCzuDqT+6d98m9Gy9eh/9Bvc0VygOFNgZY6SqAIQiaI2 y5wlyio/YOtqGUhRsZPs+DclSfrnv3s+on0M7/nN0Mt407355FMApsO0RRCMUmc5maVn hFzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:content-transfer-encoding:mime-version :message-id:date:subject:cc:from:dkim-signature; bh=kDNQwzUrWUBbefyEc2Id23W24JWPHbwanzy1PDDivVI=; b=06jn5QAWoMYKhWtuLX4ze/MkDMAEsX57wJyzJ4QMXIX/zWF4mmmRsqNn14ikzqVlFr C5f39kVxOO1gsakTlzz4JR1OpWmestQCfjAT4LU5LQCS750Eb0bDYwokttDcC87DEubt k0X4E+Kree9tmAoa5ZBuqOxvhNdP7sml0+V3lfhf4H7DA9qjcqdeCdqhe7yn6vVEd4dy 1QX1RnyZkCzXPTks053dfoiZqw8cPy1Z3wIyohYwBvhgKklNUIIrxWWT5TGOArXFmPD8 jidjepcuiecLtEhobY/Suet3EXjqWDRF5j0W/2N1XqYX5Zhv70p8eX/fQ1siRwPKEqrc iOkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b="EJ9/DT3D"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t16si11143081pgl.63.2019.02.17.13.28.10; Sun, 17 Feb 2019 13:28:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b="EJ9/DT3D"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726892AbfBQV0N (ORCPT + 99 others); Sun, 17 Feb 2019 16:26:13 -0500 Received: from mail-qt1-f193.google.com ([209.85.160.193]:41486 "EHLO mail-qt1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726773AbfBQV0L (ORCPT ); Sun, 17 Feb 2019 16:26:11 -0500 Received: by mail-qt1-f193.google.com with SMTP id v10so17170842qtp.8; Sun, 17 Feb 2019 13:26:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=kDNQwzUrWUBbefyEc2Id23W24JWPHbwanzy1PDDivVI=; b=EJ9/DT3D+oY3dsx6Gbla5n/8EjWPIa2JfIDSrz1NotPmeWovkgK1KIsT63Kms6kGr/ XNPG5K1f0MyAku1beLTNnAmkxcUkFafl39tnYk/VoLZ08/o0VJKPPYVS9NUFOXPkOD1P X3BwCduvrQefreXqdMoOq+FFw0TOVSheo8ccMs01bdohgZhf34VjWb2HVQqPbMrZiznq V+kxOeGWq1rCtqapH1u/8mK6roPFxinlbmtlsBt9u0Bb9qpx7xtP3H+Q9VZttjW7vftF GdxOVz2qtpXQKD3i40c9hVArskwXptV8BMSy/PKooJYguqN0oxOhtPbJoT+I93KRhRNf UpMQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=kDNQwzUrWUBbefyEc2Id23W24JWPHbwanzy1PDDivVI=; b=RA+gJ2ATBTW8vDddDns6RbrPXQqi45ZV722IVFyA4O2RNIKcmRNsZ5MDtlXz/MlKGT JBLBiyt7ZMxT3a6Hy9gKDLmThHOQcviWwg8LeBoJj+7DdJ3irTo2KuHRZh/G8P+jxvxl 8n3hvHcRQonbVLNMEOmqBb0GhmpTbk7i4Eo9Brim6sW+CcRGkJUXBWWe66BzCZR74Uux PIOBg58/WsptgOk4jg2vzwVJ4dZjed+chFAbNceaxq1WltNJlY5ZvmcWuMayH/4VV92i AMkv2s6e+r3EKQ39v6Rc5UiwFcyIKFu4mTgCoNp75QA2ZA2+f1doV9wBt3GFEzVJmoaZ YASA== X-Gm-Message-State: AHQUAuaR8o5qgrzwoEbAYSYKLc/QPjIEHqsqaLVZNLi275/X8E5Vyva5 8B0qBWTSynnXzyNDjPSWxVUsQ5bdmPcK X-Received: by 2002:a0c:eaca:: with SMTP id y10mr14894486qvp.176.1550438769961; Sun, 17 Feb 2019 13:26:09 -0800 (PST) Received: from localhost.localdomain (modemcable148.230-83-70.mc.videotron.ca. [70.83.230.148]) by smtp.gmail.com with ESMTPSA id a6sm5156150qkk.5.2019.02.17.13.26.08 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 17 Feb 2019 13:26:09 -0800 (PST) From: Keyur Patel X-Google-Original-From: Keyur Patel Cc: iamkeyur96@gmail.com, Kalle Valo , "David S. Miller" , Eric Biggers , Herbert Xu , linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] orinoco : Replace function name in string with __func__ Date: Sun, 17 Feb 2019 11:25:45 -0500 Message-Id: <20190217162548.18257-1-iamkeyur96@gmail.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit To: unlisted-recipients:; (no To-header on input) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Keyur Patel Replace hard coded function name with __func__, to improve robustness and to conform to the Linux kernel coding style. Issue found using checkpatch. Signed-off-by: Keyur Patel --- drivers/net/wireless/intersil/orinoco/mic.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/drivers/net/wireless/intersil/orinoco/mic.c b/drivers/net/wireless/intersil/orinoco/mic.c index 709d9ab3e7bc..67b0c05afbdb 100644 --- a/drivers/net/wireless/intersil/orinoco/mic.c +++ b/drivers/net/wireless/intersil/orinoco/mic.c @@ -18,16 +18,16 @@ int orinoco_mic_init(struct orinoco_private *priv) { priv->tx_tfm_mic = crypto_alloc_shash("michael_mic", 0, 0); if (IS_ERR(priv->tx_tfm_mic)) { - printk(KERN_DEBUG "orinoco_mic_init: could not allocate " - "crypto API michael_mic\n"); + printk(KERN_DEBUG "%s: could not allocate " + "crypto API michael_mic\n", __func__); priv->tx_tfm_mic = NULL; return -ENOMEM; } priv->rx_tfm_mic = crypto_alloc_shash("michael_mic", 0, 0); if (IS_ERR(priv->rx_tfm_mic)) { - printk(KERN_DEBUG "orinoco_mic_init: could not allocate " - "crypto API michael_mic\n"); + printk(KERN_DEBUG "%s: could not allocate " + "crypto API michael_mic\n", __func__); priv->rx_tfm_mic = NULL; return -ENOMEM; } @@ -52,7 +52,7 @@ int orinoco_mic(struct crypto_shash *tfm_michael, u8 *key, int err; if (tfm_michael == NULL) { - printk(KERN_WARNING "orinoco_mic: tfm_michael == NULL\n"); + printk(KERN_WARNING "%s: tfm_michael == NULL\n", __func__); return -1; } -- 2.20.1