qcacld-3.0: Optimize log in connect path
Optimize log in connect path during phase. Remove duplicate logs and combine scattered info. Change-Id: I6f57405669987b35d5c0acb2f0b818e5e61bd7a9 CRs-Fixed: 2617508
This commit is contained in:
parent
fcdfa57793
commit
385977d071
@ -2949,8 +2949,6 @@ hdd_association_completion_handler(struct hdd_adapter *adapter,
|
||||
adapter->wapi_info.is_wapi_sta = false;
|
||||
}
|
||||
#endif /* FEATURE_WLAN_WAPI */
|
||||
hdd_debug("bss_descr[%d] devicemode[%d]", !!roam_info->bss_desc,
|
||||
adapter->device_mode);
|
||||
if ((QDF_STA_MODE == adapter->device_mode) &&
|
||||
roam_info->bss_desc) {
|
||||
ie_len = GET_IE_LEN_IN_BSS(roam_info->bss_desc->length);
|
||||
@ -3029,7 +3027,6 @@ hdd_association_completion_handler(struct hdd_adapter *adapter,
|
||||
|
||||
conn_info_freq = sta_ctx->conn_info.chan_freq;
|
||||
|
||||
hdd_debug("check if STA chan ok for DNBS");
|
||||
if (policy_mgr_is_chan_ok_for_dnbs(hdd_ctx->psoc,
|
||||
conn_info_freq, &ok)) {
|
||||
hdd_err("Unable to check DNBS eligibility for chan(freq):%u",
|
||||
@ -3133,7 +3130,6 @@ hdd_association_completion_handler(struct hdd_adapter *adapter,
|
||||
FT_ASSOC_RSP_IES_OFFSET;
|
||||
|
||||
hdd_debug("assoc_rsp_len %d", assoc_rsp_len);
|
||||
hdd_debug("Assoc Rsp IE dump");
|
||||
QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_HDD,
|
||||
QDF_TRACE_LEVEL_DEBUG,
|
||||
assoc_rsp,
|
||||
@ -3172,7 +3168,6 @@ hdd_association_completion_handler(struct hdd_adapter *adapter,
|
||||
}
|
||||
|
||||
hdd_debug("assoc_req_len %d", assoc_req_len);
|
||||
hdd_debug("Assoc/Reassoc Req IE dump");
|
||||
QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_HDD,
|
||||
QDF_TRACE_LEVEL_DEBUG,
|
||||
assoc_req,
|
||||
|
@ -13507,10 +13507,8 @@ void wlan_hdd_enable_roaming(struct hdd_adapter *cur_adapter,
|
||||
struct csr_roam_profile *roam_profile;
|
||||
struct hdd_station_ctx *sta_ctx;
|
||||
|
||||
if (!policy_mgr_is_sta_active_connection_exists(hdd_ctx->psoc)) {
|
||||
hdd_debug("No active sta session");
|
||||
if (!policy_mgr_is_sta_active_connection_exists(hdd_ctx->psoc))
|
||||
return;
|
||||
}
|
||||
|
||||
hdd_for_each_adapter(hdd_ctx, adapter) {
|
||||
roam_profile = hdd_roam_profile(adapter);
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2011-2019 The Linux Foundation. All rights reserved.
|
||||
* Copyright (c) 2011-2020 The Linux Foundation. All rights reserved.
|
||||
*
|
||||
* Permission to use, copy, modify, and/or distribute this software for
|
||||
* any purpose with or without fee is hereby granted, provided that the
|
||||
@ -70,7 +70,7 @@
|
||||
#define GET_LIM_PROCESS_DEFD_MESGS(mac) (mac->lim.gLimProcessDefdMsgs)
|
||||
#define SET_LIM_PROCESS_DEFD_MESGS(mac, val) \
|
||||
mac->lim.gLimProcessDefdMsgs = val; \
|
||||
pe_debug("%s Defer LIM messages - value %d", __func__, val);
|
||||
pe_debug("Defer LIM msg %d", val);
|
||||
|
||||
/* LIM exported function templates */
|
||||
#define LIM_MIN_BCN_PR_LENGTH 12
|
||||
|
@ -2669,12 +2669,8 @@ lim_add_sta_self(struct mac_context *mac, uint8_t updateSta,
|
||||
uint32_t selfStaDot11Mode = 0;
|
||||
|
||||
selfStaDot11Mode = mac->mlme_cfg->dot11_mode.dot11_mode;
|
||||
pe_debug("cfgDot11Mode: %d", (int)selfStaDot11Mode);
|
||||
pe_debug("Roam Channel Bonding Mode %d",
|
||||
(int)mac->roam.configParam.uCfgDot11Mode);
|
||||
|
||||
sir_copy_mac_addr(staMac, pe_session->self_mac_addr);
|
||||
pe_debug(QDF_MAC_ADDR_STR ": ", QDF_MAC_ADDR_ARRAY(staMac));
|
||||
pAddStaParams = qdf_mem_malloc(sizeof(tAddStaParams));
|
||||
if (!pAddStaParams)
|
||||
return QDF_STATUS_E_NOMEM;
|
||||
@ -2721,30 +2717,16 @@ lim_add_sta_self(struct mac_context *mac, uint8_t updateSta,
|
||||
pe_session);
|
||||
pAddStaParams->fShortGI20Mhz = pe_session->ht_config.ht_sgi20;
|
||||
pAddStaParams->fShortGI40Mhz = pe_session->ht_config.ht_sgi40;
|
||||
pe_debug("maxAmpduDensity: %d maxAmpduSize: %d",
|
||||
pAddStaParams->maxAmpduDensity,
|
||||
pAddStaParams->maxAmpduSize);
|
||||
|
||||
pe_debug("fShortGI20Mhz: %d fShortGI40Mhz: %d",
|
||||
pAddStaParams->fShortGI20Mhz,
|
||||
pAddStaParams->fShortGI40Mhz);
|
||||
|
||||
pe_debug("txChannelWidth: %d mimoPS: %d",
|
||||
pAddStaParams->ch_width, pAddStaParams->mimoPS);
|
||||
}
|
||||
pAddStaParams->vhtCapable = IS_DOT11_MODE_VHT(selfStaDot11Mode);
|
||||
if (pAddStaParams->vhtCapable) {
|
||||
if (pAddStaParams->vhtCapable)
|
||||
pAddStaParams->ch_width =
|
||||
pe_session->ch_width;
|
||||
pe_debug("VHT WIDTH SET %d", pAddStaParams->ch_width);
|
||||
}
|
||||
|
||||
pAddStaParams->vhtTxBFCapable =
|
||||
pe_session->vht_config.su_beam_formee;
|
||||
pAddStaParams->enable_su_tx_bformer =
|
||||
pe_session->vht_config.su_beam_former;
|
||||
pe_debug("vhtCapable: %d vhtTxBFCapable %d, su_bfer %d",
|
||||
pAddStaParams->vhtCapable, pAddStaParams->vhtTxBFCapable,
|
||||
pAddStaParams->enable_su_tx_bformer);
|
||||
|
||||
/* In 11ac mode, the hardware is capable of supporting 128K AMPDU size */
|
||||
if (IS_DOT11_MODE_VHT(selfStaDot11Mode))
|
||||
@ -2773,22 +2755,10 @@ lim_add_sta_self(struct mac_context *mac, uint8_t updateSta,
|
||||
if (QDF_P2P_CLIENT_MODE == pe_session->opmode)
|
||||
pAddStaParams->p2pCapableSta = 1;
|
||||
|
||||
pe_debug("updateSta = %d htcapable = %d ",
|
||||
pAddStaParams->updateSta,
|
||||
pAddStaParams->htCapable);
|
||||
|
||||
pe_debug("htLdpcCapable: %d vhtLdpcCapable: %d "
|
||||
"p2pCapableSta: %d",
|
||||
pAddStaParams->htLdpcCapable, pAddStaParams->vhtLdpcCapable,
|
||||
pAddStaParams->p2pCapableSta);
|
||||
|
||||
if (pe_session->isNonRoamReassoc) {
|
||||
pAddStaParams->nonRoamReassoc = 1;
|
||||
pe_session->isNonRoamReassoc = 0;
|
||||
}
|
||||
pe_debug("sessionid: %d Assoc ID: %d listenInterval = %d",
|
||||
pe_session->smeSessionId, pAddStaParams->assocId,
|
||||
pAddStaParams->listenInterval);
|
||||
|
||||
if (IS_DOT11_MODE_HE(selfStaDot11Mode))
|
||||
lim_add_self_he_cap(pAddStaParams, pe_session);
|
||||
@ -2801,10 +2771,9 @@ lim_add_sta_self(struct mac_context *mac, uint8_t updateSta,
|
||||
msgQ.bodyptr = pAddStaParams;
|
||||
msgQ.bodyval = 0;
|
||||
|
||||
pe_debug(QDF_MAC_ADDR_STR ":Sessionid %d : "
|
||||
"Sending WMA_ADD_STA_REQ. (aid %d)",
|
||||
QDF_MAC_ADDR_ARRAY(pAddStaParams->staMac),
|
||||
pAddStaParams->sessionId, pAddStaParams->assocId);
|
||||
pe_debug(QDF_MAC_ADDR_STR ": vdev %d Sending WMA_ADD_STA_REQ.LI %d",
|
||||
QDF_MAC_ADDR_ARRAY(pAddStaParams->staMac),
|
||||
pe_session->vdev_id, pAddStaParams->listenInterval);
|
||||
MTRACE(mac_trace_msg_tx(mac, pe_session->peSessionId, msgQ.type));
|
||||
|
||||
retCode = wma_post_ctrl_msg(mac, &msgQ);
|
||||
@ -3038,8 +3007,9 @@ lim_check_and_announce_join_success(struct mac_context *mac_ctx,
|
||||
if (!LIM_IS_STA_ROLE(session_entry))
|
||||
return;
|
||||
|
||||
pe_debug("Received Beacon/PR with matching BSSID:%pM PESessionID %d",
|
||||
session_entry->bssId, session_entry->peSessionId);
|
||||
pe_debug("Received Beacon/PR with BSSID:%pM pe session %d vdev %d",
|
||||
session_entry->bssId, session_entry->peSessionId,
|
||||
session_entry->vdev_id);
|
||||
|
||||
/* Deactivate Join Failure timer */
|
||||
lim_deactivate_and_change_timer(mac_ctx, eLIM_JOIN_FAIL_TIMER);
|
||||
|
@ -604,9 +604,8 @@ lim_process_assoc_rsp_frame(struct mac_context *mac_ctx,
|
||||
return;
|
||||
}
|
||||
|
||||
pe_nofl_info("Assoc RX %d vid %d sys role %d"
|
||||
" lim state %d rssi %d from "QDF_MAC_ADDR_STR, subtype,
|
||||
session_entry->peSessionId,
|
||||
pe_nofl_info("Assoc RX subtype %d vdev %d sys role %d lim state %d rssi %d from " QDF_MAC_ADDR_STR,
|
||||
subtype, session_entry->vdev_id,
|
||||
GET_LIM_SYSTEM_ROLE(session_entry),
|
||||
session_entry->limMlmState,
|
||||
WMA_GET_RX_RSSI_NORMALIZED(rx_pkt_info),
|
||||
|
@ -793,8 +793,7 @@ static void lim_process_auth_frame_type2(struct mac_context *mac_ctx,
|
||||
return;
|
||||
}
|
||||
|
||||
pe_debug("Alloc new data: %pK peer", auth_node);
|
||||
lim_print_mac_addr(mac_ctx, mac_hdr->sa, LOGD);
|
||||
pe_debug("add new auth node: for %pM", mac_hdr->sa);
|
||||
qdf_mem_copy((uint8_t *) auth_node->peerMacAddr,
|
||||
mac_ctx->lim.gpLimMlmAuthReq->peerMacAddr,
|
||||
sizeof(tSirMacAddr));
|
||||
@ -1250,12 +1249,6 @@ lim_process_auth_frame(struct mac_context *mac_ctx, uint8_t *rx_pkt_info,
|
||||
curr_seq_num = (mac_hdr->seqControl.seqNumHi << 4) |
|
||||
(mac_hdr->seqControl.seqNumLo);
|
||||
|
||||
pe_nofl_info("vid %d sys role %d lim_state %d Auth RX from "QDF_MAC_ADDR_STR" rssi %d",
|
||||
pe_session->peSessionId, GET_LIM_SYSTEM_ROLE(pe_session),
|
||||
pe_session->limMlmState,
|
||||
QDF_MAC_ADDR_ARRAY(mac_hdr->bssId),
|
||||
WMA_GET_RX_RSSI_NORMALIZED(rx_pkt_info));
|
||||
|
||||
if (pe_session->prev_auth_seq_num == curr_seq_num &&
|
||||
mac_hdr->fc.retry) {
|
||||
pe_debug("auth frame, seq num: %d is already processed, drop it",
|
||||
@ -1273,7 +1266,13 @@ lim_process_auth_frame(struct mac_context *mac_ctx, uint8_t *rx_pkt_info,
|
||||
return;
|
||||
}
|
||||
auth_alg = *(uint16_t *) body_ptr;
|
||||
pe_debug("auth_alg %d ", auth_alg);
|
||||
|
||||
pe_nofl_info("Auth RX: vdev %d sys role %d lim_state %d from " QDF_MAC_ADDR_STR " rssi %d auth_alg %d seq %d",
|
||||
pe_session->vdev_id, GET_LIM_SYSTEM_ROLE(pe_session),
|
||||
pe_session->limMlmState,
|
||||
QDF_MAC_ADDR_ARRAY(mac_hdr->bssId),
|
||||
WMA_GET_RX_RSSI_NORMALIZED(rx_pkt_info),
|
||||
auth_alg, curr_seq_num);
|
||||
|
||||
/* Restore default failure timeout */
|
||||
if (QDF_P2P_CLIENT_MODE == pe_session->opmode &&
|
||||
@ -1529,12 +1528,6 @@ lim_process_auth_frame(struct mac_context *mac_ctx, uint8_t *rx_pkt_info,
|
||||
|
||||
rx_auth_frm_body = rx_auth_frame;
|
||||
|
||||
pe_debug("Received Auth frame with type: %d seqnum: %d status: %d %d",
|
||||
(uint32_t) rx_auth_frm_body->authAlgoNumber,
|
||||
(uint32_t) rx_auth_frm_body->authTransactionSeqNumber,
|
||||
(uint32_t) rx_auth_frm_body->authStatusCode,
|
||||
(uint32_t) mac_ctx->lim.gLimNumPreAuthContexts);
|
||||
|
||||
if (!lim_is_valid_fils_auth_frame(mac_ctx, pe_session,
|
||||
rx_auth_frm_body)) {
|
||||
pe_err("Received invalid FILS auth packet");
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2011-2019 The Linux Foundation. All rights reserved.
|
||||
* Copyright (c) 2011-2020 The Linux Foundation. All rights reserved.
|
||||
*
|
||||
* Permission to use, copy, modify, and/or distribute this software for
|
||||
* any purpose with or without fee is hereby granted, provided that the
|
||||
@ -67,9 +67,12 @@ lim_process_beacon_frame(struct mac_context *mac_ctx, uint8_t *rx_pkt_info,
|
||||
* beacon counter
|
||||
*/
|
||||
mac_hdr = WMA_GET_RX_MAC_HEADER(rx_pkt_info);
|
||||
pe_debug("Received Beacon frame with length: %d from",
|
||||
WMA_GET_RX_MPDU_LEN(rx_pkt_info));
|
||||
lim_print_mac_addr(mac_ctx, mac_hdr->sa, LOG2);
|
||||
|
||||
pe_debug("Beacon (len %d): " QDF_MAC_ADDR_STR " RSSI %d",
|
||||
WMA_GET_RX_MPDU_LEN(rx_pkt_info),
|
||||
QDF_MAC_ADDR_ARRAY(mac_hdr->sa),
|
||||
(uint)abs((int8_t)
|
||||
WMA_GET_RX_RSSI_NORMALIZED(rx_pkt_info)));
|
||||
|
||||
/* Expect Beacon in any state as Scan is independent of LIM state */
|
||||
bcn_ptr = qdf_mem_malloc(sizeof(*bcn_ptr));
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2012-2019 The Linux Foundation. All rights reserved.
|
||||
* Copyright (c) 2012-2020 The Linux Foundation. All rights reserved.
|
||||
*
|
||||
* Permission to use, copy, modify, and/or distribute this software for
|
||||
* any purpose with or without fee is hereby granted, provided that the
|
||||
@ -160,8 +160,6 @@ void lim_apply_configuration(struct mac_context *mac, struct pe_session *pe_sess
|
||||
{
|
||||
uint32_t phyMode;
|
||||
|
||||
pe_debug("Applying config");
|
||||
|
||||
pe_session->limSentCapsChangeNtf = false;
|
||||
|
||||
lim_get_phy_mode(mac, &phyMode, pe_session);
|
||||
|
@ -440,8 +440,6 @@ void lim_process_mlm_join_req(struct mac_context *mac_ctx,
|
||||
SIR_MAC_GET_IBSS(mlm_join_req->bssDescription.
|
||||
capabilityInfo))) {
|
||||
session->pLimMlmJoinReq = mlm_join_req;
|
||||
pe_debug("vdev_id:%d Join req on current freq %d",
|
||||
session->vdev_id, session->curr_op_freq);
|
||||
lim_process_mlm_post_join_suspend_link(mac_ctx, session);
|
||||
return;
|
||||
}
|
||||
@ -663,12 +661,11 @@ static void lim_process_mlm_auth_req(struct mac_context *mac_ctx, uint32_t *msg)
|
||||
return;
|
||||
}
|
||||
|
||||
pe_debug("Process Auth Req sessionID %d Systemrole %d"
|
||||
"mlmstate %d from: " QDF_MAC_ADDR_STR
|
||||
" with authtype %d", session_id,
|
||||
GET_LIM_SYSTEM_ROLE(session), session->limMlmState,
|
||||
QDF_MAC_ADDR_ARRAY(mac_ctx->lim.gpLimMlmAuthReq->peerMacAddr),
|
||||
mac_ctx->lim.gpLimMlmAuthReq->authType);
|
||||
pe_debug("vdev %d Systemrole %d mlmstate %d from: " QDF_MAC_ADDR_STR "with authtype %d",
|
||||
session->vdev_id, GET_LIM_SYSTEM_ROLE(session),
|
||||
session->limMlmState,
|
||||
QDF_MAC_ADDR_ARRAY(mac_ctx->lim.gpLimMlmAuthReq->peerMacAddr),
|
||||
mac_ctx->lim.gpLimMlmAuthReq->authType);
|
||||
|
||||
sir_copy_mac_addr(curr_bssid, session->bssId);
|
||||
|
||||
@ -865,8 +862,7 @@ static void lim_process_mlm_assoc_req(struct mac_context *mac_ctx, uint32_t *msg
|
||||
MTRACE(mac_trace(mac_ctx, TRACE_CODE_MLM_STATE,
|
||||
session_entry->peSessionId,
|
||||
session_entry->limMlmState));
|
||||
pe_debug("SessionId:%d Sending Assoc_Req Frame",
|
||||
session_entry->peSessionId);
|
||||
pe_debug("vdev %d Sending Assoc_Req Frame", session_entry->vdev_id);
|
||||
|
||||
/* Prepare and send Association request frame */
|
||||
lim_send_assoc_req_mgmt_frame(mac_ctx, mlm_assoc_req, session_entry);
|
||||
|
@ -297,8 +297,6 @@ void lim_process_mlm_join_cnf(struct mac_context *mac_ctx,
|
||||
result_code = ((tLimMlmJoinCnf *) msg)->resultCode;
|
||||
/* Process Join confirm from MLM */
|
||||
if (result_code == eSIR_SME_SUCCESS) {
|
||||
pe_debug("***SessionId:%d Joined ESS ***",
|
||||
join_cnf->sessionId);
|
||||
/* Setup hardware upfront */
|
||||
if (lim_sta_send_add_bss_pre_assoc(mac_ctx,
|
||||
session_entry) ==
|
||||
@ -344,10 +342,6 @@ static void lim_send_mlm_assoc_req(struct mac_context *mac_ctx,
|
||||
uint32_t tele_bcn = 0;
|
||||
tpSirMacCapabilityInfo cap_info;
|
||||
|
||||
/* Successful MAC based authentication. Trigger Association with BSS */
|
||||
pe_debug("SessionId: %d Authenticated with BSS",
|
||||
session_entry->peSessionId);
|
||||
|
||||
if (!session_entry->lim_join_req) {
|
||||
pe_err("Join Request is NULL");
|
||||
/* No need to Assert. JOIN timeout will handle this error */
|
||||
@ -397,10 +391,6 @@ static void lim_send_mlm_assoc_req(struct mac_context *mac_ctx,
|
||||
|
||||
assoc_req->capabilityInfo = caps;
|
||||
cap_info = ((tpSirMacCapabilityInfo) &assoc_req->capabilityInfo);
|
||||
pe_debug("Capabilities to be used in AssocReq=0x%X,"
|
||||
"privacy bit=%x shortSlotTime %x", caps,
|
||||
cap_info->privacy,
|
||||
cap_info->shortSlotTime);
|
||||
|
||||
/*
|
||||
* If telescopic beaconing is enabled, set listen interval to
|
||||
@ -2176,9 +2166,6 @@ void lim_process_sta_add_bss_rsp_pre_assoc(struct mac_context *mac_ctx,
|
||||
MTRACE(mac_trace(mac_ctx, TRACE_CODE_SME_STATE,
|
||||
session_entry->peSessionId,
|
||||
session_entry->limSmeState));
|
||||
pe_debug("SessionId:%d lim_post_mlm_message "
|
||||
"LIM_MLM_AUTH_REQ with limSmeState: %d",
|
||||
session_entry->peSessionId, session_entry->limSmeState);
|
||||
lim_post_mlm_message(mac_ctx, LIM_MLM_AUTH_REQ,
|
||||
(uint32_t *) pMlmAuthReq);
|
||||
return;
|
||||
@ -2247,9 +2234,6 @@ static void lim_process_sta_mlm_add_bss_rsp(struct mac_context *mac_ctx,
|
||||
session_entry->limMlmState));
|
||||
/* to know the session started for self or for peer */
|
||||
session_entry->statypeForBss = STA_ENTRY_PEER;
|
||||
/* Now, send WMA_ADD_STA_REQ */
|
||||
pe_debug("SessionId: %d On STA: ADD_BSS was successful",
|
||||
session_entry->peSessionId);
|
||||
sta_ds =
|
||||
dph_get_hash_entry(mac_ctx, DPH_STA_HASH_INDEX_PEER,
|
||||
&session_entry->dph.dphHashTable);
|
||||
@ -2711,12 +2695,6 @@ static void lim_process_switch_channel_join_req(
|
||||
|
||||
session_entry->limPrevMlmState = session_entry->limMlmState;
|
||||
session_entry->limMlmState = eLIM_MLM_WT_JOIN_BEACON_STATE;
|
||||
pe_debug("Sessionid %d prev lim state %d new lim state %d "
|
||||
"systemrole = %d nontx_profile_num %d",
|
||||
session_entry->peSessionId,
|
||||
session_entry->limPrevMlmState,
|
||||
session_entry->limMlmState, GET_LIM_SYSTEM_ROLE(session_entry),
|
||||
nontx_bss_id);
|
||||
|
||||
/* Apply previously set configuration at HW */
|
||||
lim_apply_configuration(mac_ctx, session_entry);
|
||||
@ -2778,11 +2756,10 @@ static void lim_process_switch_channel_join_req(
|
||||
/* assign appropriate sessionId to the timer object */
|
||||
mac_ctx->lim.lim_timers.gLimPeriodicJoinProbeReqTimer.sessionId =
|
||||
session_entry->peSessionId;
|
||||
pe_debug("Sessionid: %d Send Probe req on channel freq %d ssid:%.*s "
|
||||
"BSSID: " QDF_MAC_ADDR_STR, session_entry->peSessionId,
|
||||
session_entry->curr_op_freq, ssId.length, ssId.ssId,
|
||||
QDF_MAC_ADDR_ARRAY(
|
||||
session_entry->pLimMlmJoinReq->bssDescription.bssId));
|
||||
pe_debug("vdev %d Send Probe req on freq %d %.*s " QDF_MAC_ADDR_STR, session_entry->vdev_id,
|
||||
session_entry->curr_op_freq, ssId.length, ssId.ssId,
|
||||
QDF_MAC_ADDR_ARRAY(
|
||||
session_entry->pLimMlmJoinReq->bssDescription.bssId));
|
||||
|
||||
/*
|
||||
* We need to wait for probe response, so start join
|
||||
@ -2901,7 +2878,6 @@ void lim_process_switch_channel_rsp(struct mac_context *mac,
|
||||
pe_session->chainMask = rsp->chain_mask;
|
||||
pe_session->smpsMode = rsp->smps_mode;
|
||||
pe_session->channelChangeReasonCode = 0xBAD;
|
||||
pe_debug("channelChangeReasonCode %d", channelChangeReasonCode);
|
||||
switch (channelChangeReasonCode) {
|
||||
case LIM_SWITCH_CHANNEL_REASSOC:
|
||||
lim_process_switch_channel_re_assoc_req(mac, pe_session, status);
|
||||
@ -2918,13 +2894,12 @@ void lim_process_switch_channel_rsp(struct mac_context *mac,
|
||||
* THat way all this response handler does is call the call back
|
||||
* We can get rid of the reason code here.
|
||||
*/
|
||||
if (mac->lim.gpchangeChannelCallback) {
|
||||
pe_debug("Channel changed hence invoke registered call back");
|
||||
if (mac->lim.gpchangeChannelCallback)
|
||||
mac->lim.gpchangeChannelCallback(mac, status,
|
||||
mac->lim.
|
||||
gpchangeChannelData,
|
||||
pe_session);
|
||||
}
|
||||
|
||||
/* If MCC upgrade/DBS downgrade happended during channel switch,
|
||||
* the policy manager connection table needs to be updated.
|
||||
*/
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2011-2019 The Linux Foundation. All rights reserved.
|
||||
* Copyright (c) 2011-2020 The Linux Foundation. All rights reserved.
|
||||
*
|
||||
* Permission to use, copy, modify, and/or distribute this software for
|
||||
* any purpose with or without fee is hereby granted, provided that the
|
||||
@ -114,8 +114,6 @@ lim_process_probe_rsp_frame(struct mac_context *mac_ctx, uint8_t *rx_Packet_info
|
||||
pe_err("session_entry is NULL");
|
||||
return;
|
||||
}
|
||||
pe_debug("SessionId: %d ProbeRsp Frame is received",
|
||||
session_entry->peSessionId);
|
||||
|
||||
probe_rsp = qdf_mem_malloc(sizeof(tSirProbeRespBeacon));
|
||||
if (!probe_rsp) {
|
||||
@ -128,10 +126,6 @@ lim_process_probe_rsp_frame(struct mac_context *mac_ctx, uint8_t *rx_Packet_info
|
||||
|
||||
header = WMA_GET_RX_MAC_HEADER(rx_Packet_info);
|
||||
|
||||
pe_debug("Rx Probe Response with length = %d from "QDF_MAC_ADDR_STR,
|
||||
WMA_GET_RX_MPDU_LEN(rx_Packet_info),
|
||||
QDF_MAC_ADDR_ARRAY(header->sa));
|
||||
|
||||
/* Validate IE information before processing Probe Response Frame */
|
||||
if (lim_validate_ie_information_in_probe_rsp_frame(mac_ctx,
|
||||
rx_Packet_info) !=
|
||||
@ -142,11 +136,11 @@ lim_process_probe_rsp_frame(struct mac_context *mac_ctx, uint8_t *rx_Packet_info
|
||||
}
|
||||
|
||||
frame_len = WMA_GET_RX_PAYLOAD_LEN(rx_Packet_info);
|
||||
QDF_TRACE(QDF_MODULE_ID_PE, QDF_TRACE_LEVEL_DEBUG,
|
||||
FL("Probe Resp Frame Received: BSSID "
|
||||
QDF_MAC_ADDR_STR " (RSSI %d)"),
|
||||
QDF_MAC_ADDR_ARRAY(header->bssId),
|
||||
(uint) abs((int8_t)WMA_GET_RX_RSSI_NORMALIZED(rx_Packet_info)));
|
||||
pe_debug("Probe Resp(len %d): " QDF_MAC_ADDR_STR " RSSI %d",
|
||||
WMA_GET_RX_MPDU_LEN(rx_Packet_info),
|
||||
QDF_MAC_ADDR_ARRAY(header->bssId),
|
||||
(uint)abs((int8_t)
|
||||
WMA_GET_RX_RSSI_NORMALIZED(rx_Packet_info)));
|
||||
/* Get pointer to Probe Response frame body */
|
||||
body = WMA_GET_RX_MPDU_DATA(rx_Packet_info);
|
||||
/* Enforce Mandatory IEs */
|
||||
|
@ -1321,11 +1321,7 @@ __lim_process_sme_join_req(struct mac_context *mac_ctx, void *msg_buf)
|
||||
pe_err("Session Can not be created");
|
||||
ret_code = eSIR_SME_RESOURCES_UNAVAILABLE;
|
||||
goto end;
|
||||
} else {
|
||||
pe_debug("SessionId:%d New session created",
|
||||
session_id);
|
||||
}
|
||||
|
||||
/* Update the beacon/probe filter in mac_ctx */
|
||||
lim_set_bcn_probe_filter(mac_ctx, session,
|
||||
&sme_join_req->ssId,
|
||||
@ -1369,12 +1365,10 @@ __lim_process_sme_join_req(struct mac_context *mac_ctx, void *msg_buf)
|
||||
SIR_MAC_CISCO_OUI, SIR_MAC_CISCO_OUI_SIZE,
|
||||
((uint8_t *)&bss_desc->ieFields), ie_len);
|
||||
|
||||
if (vendor_ie) {
|
||||
pe_debug("Cisco vendor OUI present");
|
||||
if (vendor_ie)
|
||||
session->isCiscoVendorAP = true;
|
||||
} else {
|
||||
else
|
||||
session->isCiscoVendorAP = false;
|
||||
}
|
||||
|
||||
/* Copy the dot 11 mode in to the session table */
|
||||
|
||||
@ -1395,11 +1389,6 @@ __lim_process_sme_join_req(struct mac_context *mac_ctx, void *msg_buf)
|
||||
* self and peer rates
|
||||
*/
|
||||
session->supported_nss_1x1 = true;
|
||||
pe_debug("enable Smps: %d mode: %d send action: %d supported nss 1x1: %d cbMode %d nwType: %d dot11mode: %d force_24ghz_in_ht20 %d",
|
||||
session->enableHtSmps, session->htSmpsvalue,
|
||||
session->send_smps_action, session->supported_nss_1x1,
|
||||
sme_join_req->cbMode, session->nwType,
|
||||
session->dot11mode, sme_join_req->force_24ghz_in_ht20);
|
||||
|
||||
/* Copy oper freq to the session Table */
|
||||
session->curr_op_freq = bss_desc->chan_freq;
|
||||
@ -1416,15 +1405,8 @@ __lim_process_sme_join_req(struct mac_context *mac_ctx, void *msg_buf)
|
||||
sme_join_req->enableVhtpAid;
|
||||
session->enableVhtGid =
|
||||
sme_join_req->enableVhtGid;
|
||||
pe_debug("vht su bformer [%d]",
|
||||
session->vht_config.su_beam_former);
|
||||
}
|
||||
|
||||
pe_debug("vhtCapability: %d su_beam_formee: %d txbf_csn_value: %d su_tx_bformer %d",
|
||||
session->vhtCapability,
|
||||
session->vht_config.su_beam_formee,
|
||||
session->vht_config.csnof_beamformer_antSup,
|
||||
session->vht_config.su_beam_former);
|
||||
/*Phy mode */
|
||||
session->gLimPhyMode = bss_desc->nwType;
|
||||
handle_ht_capabilityand_ht_info(mac_ctx, session);
|
||||
@ -1551,11 +1533,6 @@ __lim_process_sme_join_req(struct mac_context *mac_ctx, void *msg_buf)
|
||||
session->nss = sme_join_req->nss;
|
||||
session->nss_forced_1x1 = sme_join_req->nss_forced_1x1;
|
||||
|
||||
pe_debug("nss %d, vdev_nss %d, supported_nss_1x1 %d",
|
||||
session->nss,
|
||||
session->vdev_nss,
|
||||
session->supported_nss_1x1);
|
||||
|
||||
mlm_join_req->bssDescription.length =
|
||||
session->lim_join_req->bssDescription.length;
|
||||
|
||||
@ -1590,20 +1567,18 @@ __lim_process_sme_join_req(struct mac_context *mac_ctx, void *msg_buf)
|
||||
&tx_pwr_attr);
|
||||
session->def_max_tx_pwr = session->maxTxPower;
|
||||
|
||||
pe_debug("Reg max %d local power con %d max tx pwr %d",
|
||||
reg_max, local_power_constraint, session->maxTxPower);
|
||||
pe_debug("Reg %d local %d session %d join req %d",
|
||||
reg_max, local_power_constraint, session->maxTxPower,
|
||||
sme_join_req->powerCap.maxTxPower);
|
||||
|
||||
if (sme_join_req->powerCap.maxTxPower > session->maxTxPower) {
|
||||
if (sme_join_req->powerCap.maxTxPower > session->maxTxPower)
|
||||
sme_join_req->powerCap.maxTxPower = session->maxTxPower;
|
||||
pe_debug("Update MaxTxPower in join Req to %d",
|
||||
sme_join_req->powerCap.maxTxPower);
|
||||
}
|
||||
|
||||
if (session->gLimCurrentBssUapsd) {
|
||||
session->gUapsdPerAcBitmask =
|
||||
session->lim_join_req->uapsdPerAcBitmask;
|
||||
pe_debug("UAPSD flag for all AC - 0x%2x",
|
||||
session->gUapsdPerAcBitmask);
|
||||
session->gUapsdPerAcBitmask);
|
||||
|
||||
/* resetting the dynamic uapsd mask */
|
||||
session->gUapsdPerAcDeliveryEnableMask = 0;
|
||||
@ -1645,6 +1620,16 @@ __lim_process_sme_join_req(struct mac_context *mac_ctx, void *msg_buf)
|
||||
session->spectrumMgtEnabled = true;
|
||||
|
||||
session->isOSENConnection = sme_join_req->isOSENConnection;
|
||||
pe_debug("Smps %d: mode %d action %d, nss 1x1 %d vdev_nss %d nss %d cbMode %d width %d dot11mode %d subfer %d subfee %d csn %d is_cisco %d",
|
||||
session->enableHtSmps, session->htSmpsvalue,
|
||||
session->send_smps_action, session->supported_nss_1x1,
|
||||
session->vdev_nss, session->nss,
|
||||
sme_join_req->cbMode, session->ch_width,
|
||||
session->dot11mode,
|
||||
session->vht_config.su_beam_former,
|
||||
session->vht_config.su_beam_formee,
|
||||
session->vht_config.csnof_beamformer_antSup,
|
||||
session->isCiscoVendorAP);
|
||||
|
||||
/* Issue LIM_MLM_JOIN_REQ to MLM */
|
||||
status = lim_send_join_req(session, mlm_join_req);
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2011-2019 The Linux Foundation. All rights reserved.
|
||||
* Copyright (c) 2011-2020 The Linux Foundation. All rights reserved.
|
||||
*
|
||||
* Permission to use, copy, modify, and/or distribute this software for
|
||||
* any purpose with or without fee is hereby granted, provided that the
|
||||
@ -346,11 +346,6 @@ void lim_extract_ap_capability(struct mac_context *mac_ctx, uint8_t *p_ie,
|
||||
else
|
||||
mac_ctx->lim.htCapabilityPresentInBeacon = 0;
|
||||
|
||||
pe_debug("Bcon: VHTCap.present: %d SU Beamformer: %d BSS_VHT_CAPABLE: %d",
|
||||
beacon_struct->VHTCaps.present,
|
||||
beacon_struct->VHTCaps.suBeamFormerCap,
|
||||
IS_BSS_VHT_CAPABLE(beacon_struct->VHTCaps));
|
||||
|
||||
vht_op = &beacon_struct->VHTOperation;
|
||||
vht_caps = &beacon_struct->VHTCaps;
|
||||
if (IS_BSS_VHT_CAPABLE(beacon_struct->VHTCaps) &&
|
||||
@ -484,10 +479,6 @@ void lim_extract_ap_capability(struct mac_context *mac_ctx, uint8_t *p_ie,
|
||||
session->ch_center_freq_seg1 = 0;
|
||||
}
|
||||
session->ch_width = vht_ch_wd + 1;
|
||||
pe_debug("cntr_freq0: %d cntr_freq1: %d width: %d",
|
||||
session->ch_center_freq_seg0,
|
||||
session->ch_center_freq_seg1,
|
||||
session->ch_width);
|
||||
}
|
||||
|
||||
if (session->vhtCapability &&
|
||||
|
@ -363,9 +363,8 @@ void lim_delete_pre_auth_node(struct mac_context *mac, tSirMacAddr macAddr)
|
||||
|
||||
mac->lim.pLimPreAuthList = pTempNode->next;
|
||||
|
||||
pe_debug("first node to delete, Release data entry: %pK id %d peer",
|
||||
pTempNode, pTempNode->authNodeIdx);
|
||||
lim_print_mac_addr(mac, macAddr, LOGD);
|
||||
pe_debug("fRelease data for %d peer %pM",
|
||||
pTempNode->authNodeIdx, macAddr);
|
||||
lim_release_pre_auth_node(mac, pTempNode);
|
||||
|
||||
return;
|
||||
|
@ -2426,7 +2426,7 @@ lim_send_assoc_req_mgmt_frame(struct mac_context *mac_ctx,
|
||||
MTRACE(qdf_trace(QDF_MODULE_ID_PE, TRACE_CODE_TX_MGMT,
|
||||
pe_session->peSessionId, mac_hdr->fc.subType));
|
||||
|
||||
pe_nofl_info("vid %d Assoc TX to %pM seq num %d",
|
||||
pe_nofl_info("Assoc TX vdev %d to %pM seq num %d",
|
||||
pe_session->vdev_id, pe_session->bssId,
|
||||
mac_ctx->mgmtSeqNum);
|
||||
|
||||
@ -2621,22 +2621,12 @@ lim_send_auth_mgmt_frame(struct mac_context *mac_ctx,
|
||||
* status code, 128 bytes for challenge text and
|
||||
* 4 bytes each for IV & ICV.
|
||||
*/
|
||||
pe_debug("Sending encrypted auth frame to " QDF_MAC_ADDR_STR,
|
||||
QDF_MAC_ADDR_ARRAY(peer_addr));
|
||||
|
||||
body_len = wep_challenge_len + LIM_ENCR_AUTH_INFO_LEN;
|
||||
frame_len = sizeof(tSirMacMgmtHdr) + body_len;
|
||||
|
||||
goto alloc_packet;
|
||||
}
|
||||
|
||||
pe_debug("Sending Auth seq# %d status %d (%d) to "
|
||||
QDF_MAC_ADDR_STR,
|
||||
auth_frame->authTransactionSeqNumber,
|
||||
auth_frame->authStatusCode,
|
||||
(auth_frame->authStatusCode == eSIR_MAC_SUCCESS_STATUS),
|
||||
QDF_MAC_ADDR_ARRAY(peer_addr));
|
||||
|
||||
switch (auth_frame->authTransactionSeqNumber) {
|
||||
case SIR_MAC_AUTH_FRAME_1:
|
||||
/*
|
||||
@ -2770,10 +2760,6 @@ alloc_packet:
|
||||
|
||||
if (wep_challenge_len) {
|
||||
qdf_mem_copy(body, (uint8_t *) auth_frame, body_len);
|
||||
|
||||
pe_debug("Sending Auth seq# 3 to " QDF_MAC_ADDR_STR,
|
||||
QDF_MAC_ADDR_ARRAY(mac_hdr->da));
|
||||
|
||||
} else {
|
||||
*((uint16_t *) (body)) =
|
||||
sir_swap_u16if_needed(auth_frame->authAlgoNumber);
|
||||
@ -2855,16 +2841,13 @@ alloc_packet:
|
||||
pe_debug("FILS: appending fils Auth data");
|
||||
lim_add_fils_data_to_auth_frame(session, body);
|
||||
}
|
||||
|
||||
pe_nofl_info("Auth TX seq %d seq num %d status %d to "
|
||||
QDF_MAC_ADDR_STR,
|
||||
auth_frame->authTransactionSeqNumber,
|
||||
mac_ctx->mgmtSeqNum,
|
||||
auth_frame->authStatusCode,
|
||||
QDF_MAC_ADDR_ARRAY(mac_hdr->da));
|
||||
}
|
||||
QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_PE,
|
||||
QDF_TRACE_LEVEL_DEBUG,
|
||||
|
||||
pe_nofl_info("Auth TX seq %d seq num %d status %d WEP %d to " QDF_MAC_ADDR_STR,
|
||||
auth_frame->authTransactionSeqNumber, mac_ctx->mgmtSeqNum,
|
||||
auth_frame->authStatusCode, mac_hdr->fc.wep,
|
||||
QDF_MAC_ADDR_ARRAY(mac_hdr->da));
|
||||
QDF_TRACE_HEX_DUMP(QDF_MODULE_ID_PE, QDF_TRACE_LEVEL_DEBUG,
|
||||
frame, frame_len);
|
||||
|
||||
if ((session->ftPEContext.pFTPreAuthReq) &&
|
||||
|
@ -1,5 +1,5 @@
|
||||
/*
|
||||
* Copyright (c) 2011-2019 The Linux Foundation. All rights reserved.
|
||||
* Copyright (c) 2011-2020 The Linux Foundation. All rights reserved.
|
||||
*
|
||||
* Permission to use, copy, modify, and/or distribute this software for
|
||||
* any purpose with or without fee is hereby granted, provided that the
|
||||
@ -135,7 +135,6 @@ QDF_STATUS lim_send_switch_chnl_params(struct mac_context *mac,
|
||||
|
||||
return QDF_STATUS_SUCCESS;
|
||||
send_resp:
|
||||
pe_err("switch channel rsp, status = 0x%x", status);
|
||||
rsp.status = status;
|
||||
rsp.vdev_id = session->vdev_id;
|
||||
|
||||
|
@ -198,8 +198,6 @@ static void lim_handle_join_rsp_status(struct mac_context *mac_ctx,
|
||||
qdf_mem_free(session_entry->beacon);
|
||||
session_entry->beacon = NULL;
|
||||
session_entry->bcnLen = 0;
|
||||
pe_debug("Beacon: %d",
|
||||
sme_join_rsp->beaconLength);
|
||||
}
|
||||
|
||||
if (session_entry->assoc_req) {
|
||||
@ -212,8 +210,6 @@ static void lim_handle_join_rsp_status(struct mac_context *mac_ctx,
|
||||
qdf_mem_free(session_entry->assoc_req);
|
||||
session_entry->assoc_req = NULL;
|
||||
session_entry->assocReqLen = 0;
|
||||
pe_debug("AssocReq: %d",
|
||||
sme_join_rsp->assocReqLength);
|
||||
}
|
||||
if (session_entry->assocRsp) {
|
||||
sme_join_rsp->assocRspLength =
|
||||
@ -226,10 +222,12 @@ static void lim_handle_join_rsp_status(struct mac_context *mac_ctx,
|
||||
qdf_mem_free(session_entry->assocRsp);
|
||||
session_entry->assocRsp = NULL;
|
||||
session_entry->assocRspLen = 0;
|
||||
pe_debug("AssocRsp: %d",
|
||||
sme_join_rsp->assocRspLength);
|
||||
}
|
||||
|
||||
pe_debug("Beacon len %d Assoc Req len %d Assoc Rsp len %d",
|
||||
sme_join_rsp->beaconLength, sme_join_rsp->assocReqLength,
|
||||
sme_join_rsp->assocRspLength);
|
||||
|
||||
if (result_code == eSIR_SME_SUCCESS) {
|
||||
if (session_entry->ricData) {
|
||||
sme_join_rsp->parsedRicRspLen =
|
||||
|
@ -8615,11 +8615,10 @@ QDF_STATUS lim_pre_vdev_start(struct mac_context *mac,
|
||||
mlme_obj->proto.generic.slot_time = session->shortSlotTimeSupported;
|
||||
mlme_obj->mgmt.rate_info.bcn_tx_rate = session->beacon_tx_rate;
|
||||
|
||||
pe_debug("maxregpower %d cac_duration_ms %d beacon_interval %d hidden_ssid: %d dtimPeriod %d slot_time %d bcn tx rate %d",
|
||||
session->maxTxPower, session->cac_duration_ms,
|
||||
session->beaconParams.beaconInterval, session->ssidHidden,
|
||||
session->dtimPeriod, mlme_obj->proto.generic.slot_time,
|
||||
session->beacon_tx_rate);
|
||||
pe_debug("cac_duration_ms %d beacon_interval %d hidden_ssid: %d dtimPeriod %d slot_time %d bcn tx rate %d",
|
||||
session->cac_duration_ms, session->beaconParams.beaconInterval,
|
||||
session->ssidHidden, session->dtimPeriod,
|
||||
mlme_obj->proto.generic.slot_time, session->beacon_tx_rate);
|
||||
|
||||
mlme_obj->proto.ht_info.allow_ht = !!session->htCapability;
|
||||
mlme_obj->proto.vht_info.allow_vht = !!session->vhtCapability;
|
||||
|
@ -128,15 +128,14 @@ int find_ie_location(struct mac_context *mac, tpSirRSNie pRsnIe, uint8_t EID)
|
||||
bytesLeft = pRsnIe->length;
|
||||
|
||||
while (1) {
|
||||
if (EID == pRsnIe->rsnIEdata[idx]) {
|
||||
if (EID == pRsnIe->rsnIEdata[idx])
|
||||
/* Found it */
|
||||
return idx;
|
||||
} else if (EID != pRsnIe->rsnIEdata[idx] &&
|
||||
/* & if no more IE, */
|
||||
bytesLeft <= (uint16_t) (ieLen)) {
|
||||
pe_debug("No IE (%d)", EID);
|
||||
if (EID != pRsnIe->rsnIEdata[idx] &&
|
||||
/* & if no more IE, */
|
||||
bytesLeft <= (uint16_t)(ieLen))
|
||||
return ret_val;
|
||||
}
|
||||
|
||||
bytesLeft -= ieLen;
|
||||
ieLen = pRsnIe->rsnIEdata[idx + 1] + 2;
|
||||
idx += ieLen;
|
||||
@ -1175,13 +1174,10 @@ populate_dot11f_ext_cap(struct mac_context *mac,
|
||||
pe_debug("11MC support enabled");
|
||||
pDot11f->num_bytes = DOT11F_IE_EXTCAP_MAX_LEN;
|
||||
} else {
|
||||
if (eLIM_AP_ROLE != pe_session->limSystemRole) {
|
||||
pe_debug("11MC support enabled");
|
||||
if (eLIM_AP_ROLE != pe_session->limSystemRole)
|
||||
pDot11f->num_bytes = DOT11F_IE_EXTCAP_MAX_LEN;
|
||||
} else {
|
||||
pe_debug("11MC support disabled");
|
||||
else
|
||||
pDot11f->num_bytes = DOT11F_IE_EXTCAP_MIN_LEN;
|
||||
}
|
||||
}
|
||||
|
||||
p_ext_cap = (struct s_ext_cap *)pDot11f->bytes;
|
||||
@ -3833,8 +3829,7 @@ sir_parse_beacon_ie(struct mac_context *mac,
|
||||
qdf_mem_free(pBies);
|
||||
return QDF_STATUS_E_FAILURE;
|
||||
} else if (DOT11F_WARNED(status)) {
|
||||
pe_debug("There were warnings while unpacking Beacon IEs (0x%08x, %d bytes):",
|
||||
status, nPayload);
|
||||
pe_debug("warnings (0x%08x, %d bytes):", status, nPayload);
|
||||
}
|
||||
/* & "transliterate" from a 'tDot11fBeaconIEs' to a 'tSirProbeRespBeacon'... */
|
||||
if (!pBies->SSID.present) {
|
||||
|
@ -1987,12 +1987,12 @@ void csr_roam_substate_change(struct mac_context *mac,
|
||||
sessionId);
|
||||
return;
|
||||
}
|
||||
sme_debug("CSR RoamSubstate: [ %s <== %s ]",
|
||||
mac_trace_getcsr_roam_sub_state(NewSubstate),
|
||||
mac_trace_getcsr_roam_sub_state(mac->roam.
|
||||
curSubState[sessionId]));
|
||||
if (mac->roam.curSubState[sessionId] == NewSubstate)
|
||||
return;
|
||||
sme_debug("CSR RoamSubstate: [ %s <== %s ]",
|
||||
mac_trace_getcsr_roam_sub_state(NewSubstate),
|
||||
mac_trace_getcsr_roam_sub_state(mac->roam.
|
||||
curSubState[sessionId]));
|
||||
spin_lock(&mac->roam.roam_state_lock);
|
||||
mac->roam.curSubState[sessionId] = NewSubstate;
|
||||
spin_unlock(&mac->roam.roam_state_lock);
|
||||
@ -2004,22 +2004,26 @@ enum csr_roam_state csr_roam_state_change(struct mac_context *mac,
|
||||
{
|
||||
enum csr_roam_state PreviousState;
|
||||
|
||||
sme_debug("CSR RoamState[%hu]: [ %s <== %s ]", sessionId,
|
||||
mac_trace_getcsr_roam_state(NewRoamState),
|
||||
mac_trace_getcsr_roam_state(mac->roam.curState[sessionId]));
|
||||
PreviousState = mac->roam.curState[sessionId];
|
||||
|
||||
if (NewRoamState != mac->roam.curState[sessionId]) {
|
||||
/* Whenever we transition OUT of the Roaming state,
|
||||
* clear the Roaming substate.
|
||||
*/
|
||||
if (CSR_IS_ROAM_JOINING(mac, sessionId)) {
|
||||
csr_roam_substate_change(mac, eCSR_ROAM_SUBSTATE_NONE,
|
||||
sessionId);
|
||||
}
|
||||
if (NewRoamState == mac->roam.curState[sessionId])
|
||||
return PreviousState;
|
||||
|
||||
mac->roam.curState[sessionId] = NewRoamState;
|
||||
sme_debug("CSR RoamState[%d]: [ %s <== %s ]", sessionId,
|
||||
mac_trace_getcsr_roam_state(NewRoamState),
|
||||
mac_trace_getcsr_roam_state(
|
||||
mac->roam.curState[sessionId]));
|
||||
/*
|
||||
* Whenever we transition OUT of the Roaming state,
|
||||
* clear the Roaming substate.
|
||||
*/
|
||||
if (CSR_IS_ROAM_JOINING(mac, sessionId)) {
|
||||
csr_roam_substate_change(mac, eCSR_ROAM_SUBSTATE_NONE,
|
||||
sessionId);
|
||||
}
|
||||
|
||||
mac->roam.curState[sessionId] = NewRoamState;
|
||||
|
||||
return PreviousState;
|
||||
}
|
||||
|
||||
@ -3780,25 +3784,24 @@ csr_connect_info(struct mac_context *mac_ctx,
|
||||
conn_stats.result_code = (u2 == eCSR_ROAM_RESULT_ASSOCIATED) ? 1 : 0;
|
||||
conn_stats.reason_code = 0;
|
||||
conn_stats.op_freq = conn_profile->op_freq;
|
||||
sme_debug("+---------CONNECTION INFO START------------+");
|
||||
sme_debug("VDEV-ID: %d self_mac:%pM", session->vdev_id,
|
||||
session->self_mac_addr.bytes);
|
||||
sme_debug("ssid: %.*s", conn_stats.ssid_len, conn_stats.ssid);
|
||||
sme_debug("bssid: %pM", conn_stats.bssid);
|
||||
sme_debug("RSSI: %d dBm", conn_stats.rssi);
|
||||
sme_debug("Channel Freq: %d channel_bw: %s", conn_stats.op_freq,
|
||||
csr_get_ch_width_str(conn_stats.chnl_bw));
|
||||
sme_debug("dot11Mode: %s",
|
||||
csr_get_dot11_mode_str(conn_stats.dot11mode));
|
||||
sme_debug("AKM: %s", csr_get_akm_str(conn_profile->AuthType));
|
||||
sme_debug("DUT_NSS: %d | Intersected NSS:%d", session->vdev_nss,
|
||||
sme_nofl_debug("+---------CONNECTION INFO START------------+");
|
||||
sme_nofl_debug("VDEV-ID: %d self_mac:%pM", session->vdev_id,
|
||||
session->self_mac_addr.bytes);
|
||||
sme_nofl_debug("ssid: %.*s bssid: %pM RSSI: %d dBm",
|
||||
conn_stats.ssid_len, conn_stats.ssid,
|
||||
conn_stats.bssid, conn_stats.rssi);
|
||||
sme_nofl_debug("Channel Freq: %d channel_bw: %s dot11Mode: %s", conn_stats.op_freq,
|
||||
csr_get_ch_width_str(conn_stats.chnl_bw),
|
||||
csr_get_dot11_mode_str(conn_stats.dot11mode));
|
||||
sme_nofl_debug("AKM: %s Encry-type: %s",
|
||||
csr_get_akm_str(conn_profile->AuthType),
|
||||
csr_get_encr_type_str(conn_stats.encryption_type));
|
||||
sme_nofl_debug("DUT_NSS: %d | Intersected NSS:%d", session->vdev_nss,
|
||||
csr_get_sta_ap_intersected_nss(mac_ctx, session->vdev_id));
|
||||
sme_debug("Encry-type: %s",
|
||||
csr_get_encr_type_str(conn_stats.encryption_type));
|
||||
sme_debug("Qos enable: %d | Associated: %s",
|
||||
conn_stats.qos_capability,
|
||||
(conn_stats.result_code ? "yes" : "no"));
|
||||
sme_debug("+---------CONNECTION INFO END------------+");
|
||||
sme_nofl_debug("Qos enable: %d | Associated: %s",
|
||||
conn_stats.qos_capability,
|
||||
(conn_stats.result_code ? "yes" : "no"));
|
||||
sme_nofl_debug("+---------CONNECTION INFO END------------+");
|
||||
|
||||
WLAN_HOST_DIAG_EVENT_REPORT(&conn_stats, EVENT_WLAN_CONN_STATS_V2);
|
||||
}
|
||||
@ -9261,7 +9264,6 @@ csr_roam_save_connected_information(struct mac_context *mac,
|
||||
return QDF_STATUS_E_FAILURE;
|
||||
}
|
||||
|
||||
sme_debug("session id: %d", sessionId);
|
||||
pConnectProfile = &pSession->connectedProfile;
|
||||
if (pConnectProfile->pAddIEAssoc) {
|
||||
qdf_mem_free(pConnectProfile->pAddIEAssoc);
|
||||
@ -9460,7 +9462,8 @@ static void csr_roam_join_rsp_processor(struct mac_context *mac,
|
||||
if (pEntry)
|
||||
pCommand = GET_BASE_ADDR(pEntry, tSmeCmd, Link);
|
||||
|
||||
sme_debug("is_fils_connection %d", pSmeJoinRsp->is_fils_connection);
|
||||
if (pSmeJoinRsp->is_fils_connection)
|
||||
sme_debug("Fils connection");
|
||||
/* Copy Sequence Number last used for FILS assoc failure case */
|
||||
if (session_ptr->is_fils_connection)
|
||||
session_ptr->fils_seq_num = pSmeJoinRsp->fils_seq_num;
|
||||
@ -9481,8 +9484,6 @@ static void csr_roam_join_rsp_processor(struct mac_context *mac,
|
||||
}
|
||||
|
||||
session_ptr->supported_nss_1x1 = pSmeJoinRsp->supported_nss_1x1;
|
||||
sme_debug("SME session supported nss: %d",
|
||||
session_ptr->supported_nss_1x1);
|
||||
|
||||
/*
|
||||
* The join bssid count can be reset as soon as
|
||||
|
@ -1340,9 +1340,6 @@ bool wma_is_vdev_valid(uint32_t vdev_id)
|
||||
return false;
|
||||
}
|
||||
|
||||
WMA_LOGD("%s: vdev_id: %d, vdev_active: %d", __func__, vdev_id,
|
||||
wma_handle->interfaces[vdev_id].vdev_active);
|
||||
|
||||
return wma_handle->interfaces[vdev_id].vdev_active;
|
||||
}
|
||||
|
||||
@ -2880,7 +2877,6 @@ int wma_peer_assoc_conf_handler(void *handle, uint8_t *cmd_param_info,
|
||||
uint8_t macaddr[QDF_MAC_ADDR_SIZE];
|
||||
int status = 0;
|
||||
|
||||
WMA_LOGD(FL("Enter"));
|
||||
param_buf = (WMI_PEER_ASSOC_CONF_EVENTID_param_tlvs *) cmd_param_info;
|
||||
if (!param_buf) {
|
||||
WMA_LOGE("Invalid peer assoc conf event buffer");
|
||||
@ -2927,8 +2923,6 @@ int wma_peer_assoc_conf_handler(void *handle, uint8_t *cmd_param_info,
|
||||
wma_send_msg_high_priority(wma, WMA_ADD_STA_RSP,
|
||||
(void *)params, 0);
|
||||
} else if (req_msg->msg_type == WMA_ADD_BSS_REQ) {
|
||||
WMA_LOGD(FL("Send ADD BSS RSP: vdev_id %d status %d"),
|
||||
event->vdev_id, QDF_STATUS_SUCCESS);
|
||||
wma_send_add_bss_resp(wma, event->vdev_id, QDF_STATUS_SUCCESS);
|
||||
} else {
|
||||
WMA_LOGE(FL("Unhandled request message type: %d"),
|
||||
@ -4329,8 +4323,6 @@ static void wma_add_sta_req_sta_mode(tp_wma_handle wma, tpAddStaParams params)
|
||||
}
|
||||
}
|
||||
qdf_atomic_set(&iface->bss_status, WMA_BSS_STATUS_STARTED);
|
||||
WMA_LOGD("%s: STA mode (type %d subtype %d) BSS is started",
|
||||
__func__, iface->type, iface->sub_type);
|
||||
/* Sta is now associated, configure various params */
|
||||
|
||||
/* Send SMPS force command to FW to send the required
|
||||
@ -4364,8 +4356,7 @@ static void wma_add_sta_req_sta_mode(tp_wma_handle wma, tpAddStaParams params)
|
||||
WMA_VHT_PPS_DELIM_CRC_FAIL, 1);
|
||||
if (wmi_service_enabled(wma->wmi_handle,
|
||||
wmi_service_listen_interval_offload_support)) {
|
||||
WMA_LOGD("%s: listen interval offload enabled, setting params",
|
||||
__func__);
|
||||
wma_debug("listen interval offload enabled, setting params");
|
||||
status = wma_vdev_set_param(wma->wmi_handle,
|
||||
params->smesessionId,
|
||||
WMI_VDEV_PARAM_MAX_LI_OF_MODDTIM,
|
||||
@ -4404,10 +4395,9 @@ out:
|
||||
return;
|
||||
|
||||
params->status = status;
|
||||
WMA_LOGD(FL("statype %d vdev_id %d aid %d sta mac " QDF_MAC_ADDR_STR
|
||||
" status %d"), params->staType, params->smesessionId,
|
||||
params->assocId, QDF_MAC_ADDR_ARRAY(params->bssId),
|
||||
params->status);
|
||||
wma_debug("vdev_id %d aid %d sta mac " QDF_MAC_ADDR_STR " status %d",
|
||||
params->smesessionId, params->assocId,
|
||||
QDF_MAC_ADDR_ARRAY(params->bssId), params->status);
|
||||
/* Don't send a response during roam sync operation */
|
||||
if (!wma_is_roam_synch_in_progress(wma, params->smesessionId))
|
||||
wma_send_msg_high_priority(wma, WMA_ADD_STA_RSP,
|
||||
@ -4600,11 +4590,7 @@ void wma_add_sta(tp_wma_handle wma, tpAddStaParams add_sta)
|
||||
return;
|
||||
}
|
||||
|
||||
WMA_LOGD("%s: add_sta->sessionId = %d.", __func__,
|
||||
add_sta->smesessionId);
|
||||
WMA_LOGD("%s: add_sta->bssId = %x:%x:%x:%x:%x:%x", __func__,
|
||||
add_sta->bssId[0], add_sta->bssId[1], add_sta->bssId[2],
|
||||
add_sta->bssId[3], add_sta->bssId[4], add_sta->bssId[5]);
|
||||
wma_debug("Vdev %d BSSID %pM", add_sta->smesessionId, add_sta->bssId);
|
||||
|
||||
if (wma_is_vdev_in_ap_mode(wma, add_sta->smesessionId))
|
||||
oper_mode = BSS_OPERATIONAL_MODE_AP;
|
||||
|
Loading…
Reference in New Issue
Block a user