memset(channel_set, 0, sizeof(struct rt_channel_info) * MAX_CHANNEL_NUM);
if (ChannelPlan >= RT_CHANNEL_DOMAIN_MAX && ChannelPlan != RT_CHANNEL_DOMAIN_REALTEK_DEFINE) {
- netdev_dbg(padapter->pnetdev,
- "ChannelPlan ID %x error !!!!!\n",
- ChannelPlan);
return chanset_size;
}
if (GetRetry(pframe)) {
if (precv_frame->attrib.seq_num == psta->RxMgmtFrameSeqNum) {
/* drop the duplicate management frame */
- netdev_dbg(padapter->pnetdev,
- "Drop duplicate management frame with seq_num=%d.\n",
- precv_frame->attrib.seq_num);
return;
}
}
return _SUCCESS;
} else if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_GONEGO_ING)) {
if (pwdinfo->nego_req_info.benable) {
- netdev_dbg(padapter->pnetdev,
- "P2P State is GONEGO ING!\n");
if (!memcmp(pwdinfo->nego_req_info.peerDevAddr, GetAddr2Ptr(pframe), ETH_ALEN)) {
pwdinfo->nego_req_info.benable = false;
issue_p2p_GO_request(padapter, pwdinfo->nego_req_info.peerDevAddr);
}
} else if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_TX_INVITE_REQ)) {
if (pwdinfo->invitereq_info.benable) {
- netdev_dbg(padapter->pnetdev,
- "P2P_STATE_TX_INVITE_REQ!\n");
if (!memcmp(pwdinfo->invitereq_info.peer_macaddr, GetAddr2Ptr(pframe), ETH_ALEN)) {
pwdinfo->invitereq_info.benable = false;
issue_p2p_invitation_request(padapter, pwdinfo->invitereq_info.peer_macaddr);
seq = le16_to_cpu(*(__le16 *)((size_t)pframe + WLAN_HDR_A3_LEN + 2));
algorithm = le16_to_cpu(*(__le16 *)((size_t)pframe + WLAN_HDR_A3_LEN));
- netdev_dbg(padapter->pnetdev, "auth alg=%x, seq=%X\n", algorithm, seq);
-
if (auth_mode == 2 && psecuritypriv->dot11PrivacyAlgrthm != _WEP40_ &&
psecuritypriv->dot11PrivacyAlgrthm != _WEP104_)
auth_mode = 0;
if ((algorithm > 0 && auth_mode == 0) || /* rx a shared-key auth but shared not enabled */
(algorithm == 0 && auth_mode == 1)) { /* rx a open-system auth but shared-key is enabled */
- netdev_dbg(padapter->pnetdev,
- "auth rejected due to bad alg [alg=%d, auth_mib=%d] %02X%02X%02X%02X%02X%02X\n",
- algorithm, auth_mode, sa[0], sa[1], sa[2], sa[3], sa[4], sa[5]);
status = _STATS_NO_SUPP_ALG_;
pstat = rtw_get_stainfo(pstapriv, sa);
if (!pstat) {
/* allocate a new one */
- netdev_dbg(padapter->pnetdev,
- "going to alloc stainfo for sa=%pM\n", sa);
pstat = rtw_alloc_stainfo(pstapriv, sa);
if (!pstat) {
- netdev_dbg(padapter->pnetdev,
- "Exceed the upper limit of supported clients...\n");
status = _STATS_UNABLE_HANDLE_STA_;
goto auth_fail;
}
pstat->expire_to = pstapriv->auth_to;
if ((pstat->auth_seq + 1) != seq) {
- netdev_dbg(padapter->pnetdev,
- "(1)auth rejected because out of seq [rx_seq=%d, exp_seq=%d]!\n",
- seq, pstat->auth_seq + 1);
status = _STATS_OUT_OF_AUTH_SEQ_;
goto auth_fail;
}
pstat->expire_to = pstapriv->assoc_to;
pstat->authalg = algorithm;
} else {
- netdev_dbg(padapter->pnetdev,
- "(2)auth rejected because out of seq [rx_seq=%d, exp_seq=%d]!\n",
- seq, pstat->auth_seq + 1);
status = _STATS_OUT_OF_AUTH_SEQ_;
goto auth_fail;
}
pstat->auth_seq = 2;
} else if (seq == 3) {
/* checking for challenging txt... */
- netdev_dbg(padapter->pnetdev, "checking for challenging txt...\n");
p = rtw_get_ie(pframe + WLAN_HDR_A3_LEN + 4 + _AUTH_IE_OFFSET_, _CHLGETXT_IE_, (int *)&ie_len,
len - WLAN_HDR_A3_LEN - _AUTH_IE_OFFSET_ - 4);
if (!p || ie_len <= 0) {
- netdev_dbg(padapter->pnetdev,
- "auth rejected because challenge failure!(1)\n");
status = _STATS_CHALLENGE_FAIL_;
goto auth_fail;
}
/* challenging txt is correct... */
pstat->expire_to = pstapriv->assoc_to;
} else {
- netdev_dbg(padapter->pnetdev,
- "auth rejected because challenge failure!\n");
status = _STATS_CHALLENGE_FAIL_;
goto auth_fail;
}
} else {
- netdev_dbg(padapter->pnetdev,
- "(3)auth rejected because out of seq [rx_seq=%d, exp_seq=%d]!\n",
- seq, pstat->auth_seq + 1);
status = _STATS_OUT_OF_AUTH_SEQ_;
goto auth_fail;
}
status = le16_to_cpu(*(__le16 *)((size_t)pframe + WLAN_HDR_A3_LEN + offset + 4));
if (status != 0) {
- netdev_dbg(padapter->pnetdev,
- "clnt auth fail, status: %d\n", status);
if (status == 13) { /* pmlmeinfo->auth_algo == dot11AuthAlgrthm_Auto) */
if (pmlmeinfo->auth_algo == dot11AuthAlgrthm_Shared)
pmlmeinfo->auth_algo = dot11AuthAlgrthm_Open;
u16 capab_info;
struct rtw_ieee802_11_elems elems;
struct sta_info *pstat;
- unsigned char reassoc, *p, *pos, *wpa_ie;
+ unsigned char *p, *pos, *wpa_ie;
unsigned char WMM_IE[] = {0x00, 0x50, 0xf2, 0x02, 0x00, 0x01};
int i, ie_len, wpa_ie_len, left;
unsigned char supportRate[16];
frame_type = GetFrameSubType(pframe);
if (frame_type == WIFI_ASSOCREQ) {
- reassoc = 0;
ie_offset = _ASOCREQ_IE_OFFSET_;
} else { /* WIFI_REASSOCREQ */
- reassoc = 1;
ie_offset = _REASOCREQ_IE_OFFSET_;
}
if (pkt_len < IEEE80211_3ADDR_LEN + ie_offset) {
- netdev_dbg(padapter->pnetdev,
- "handle_assoc(reassoc=%d) - too short payload (len=%lu)\n",
- reassoc, (unsigned long)pkt_len);
return _FAIL;
}
/* now parse all ieee802_11 ie to point to elems */
if (rtw_ieee802_11_parse_elems(pos, left, &elems, 1) == ParseFailed ||
!elems.ssid) {
- netdev_dbg(padapter->pnetdev,
- "STA %pM sent invalid association request\n",
- pstat->hwaddr);
status = _STATS_FAILURE_;
goto OnAssocReqFail;
}
/* check if the supported rate is ok */
p = rtw_get_ie(pframe + WLAN_HDR_A3_LEN + ie_offset, _SUPPORTEDRATES_IE_, &ie_len, pkt_len - WLAN_HDR_A3_LEN - ie_offset);
if (!p) {
- netdev_dbg(padapter->pnetdev,
- "Rx a sta assoc-req which supported rate is empty!\n");
/* use our own rate set as statoin used */
/* memcpy(supportRate, AP_BSSRATE, AP_BSSRATE_LEN); */
/* supportRateNum = AP_BSSRATE_LEN; */
pstat->flags &= ~(WLAN_STA_WPS | WLAN_STA_MAYBE_WPS);
if (!wpa_ie) {
if (elems.wps_ie) {
- netdev_dbg(padapter->pnetdev,
- "STA included WPS IE in (Re)Association Request - assume WPS is used\n");
pstat->flags |= WLAN_STA_WPS;
/* wpabuf_free(sta->wps_ie); */
/* sta->wps_ie = wpabuf_alloc_copy(elems.wps_ie + 4, */
/* elems.wps_ie_len - 4); */
} else {
- netdev_dbg(padapter->pnetdev,
- "STA did not include WPA/RSN IE in (Re)Association Request - possible WPS use\n");
pstat->flags |= WLAN_STA_MAYBE_WPS;
}
rtw_get_wps_attr_content(pmlmepriv->wps_beacon_ie, pmlmepriv->wps_beacon_ie_len, WPS_ATTR_SELECTED_REGISTRAR, &selected_registrar, NULL);
if (!selected_registrar) {
- netdev_dbg(padapter->pnetdev,
- "selected_registrar is false , or AP is not ready to do WPS\n");
status = _STATS_UNABLE_HANDLE_STA_;
int copy_len;
if (psecuritypriv->wpa_psk == 0) {
- netdev_dbg(padapter->pnetdev,
- "STA %pM: WPA/RSN IE in association request, but AP don't support WPA/RSN\n",
- pstat->hwaddr);
status = WLAN_STATUS_INVALID_IE;
}
if (elems.wps_ie) {
- netdev_dbg(padapter->pnetdev,
- "STA included WPS IE in (Re)Association Request - WPS is used\n");
pstat->flags |= WLAN_STA_WPS;
copy_len = 0;
} else {
if ((pstat->flags & WLAN_STA_HT) &&
((pstat->wpa2_pairwise_cipher & WPA_CIPHER_TKIP) ||
(pstat->wpa_pairwise_cipher & WPA_CIPHER_TKIP))) {
- netdev_dbg(padapter->pnetdev,
- "HT: %pM tried to use TKIP with HT association\n",
- pstat->hwaddr);
/* status = WLAN_STATUS_CIPHER_REJECTED_PER_POLICY; */
/* goto OnAssocReqFail; */
/* get a unique AID */
if (pstat->aid > 0) {
- netdev_dbg(padapter->pnetdev, "old AID %d\n", pstat->aid);
} else {
for (pstat->aid = 1; pstat->aid <= NUM_STA; pstat->aid++)
if (!pstapriv->sta_aid[pstat->aid - 1])
if (pstat->aid > pstapriv->max_num_sta) {
pstat->aid = 0;
- netdev_dbg(padapter->pnetdev,
- "no room for more AIDs\n");
-
status = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
goto OnAssocReqFail;
} else {
pstapriv->sta_aid[pstat->aid - 1] = pstat;
- netdev_dbg(padapter->pnetdev,
- "allocate new AID=(%d)\n", pstat->aid);
}
}
issue_asocrsp(padapter, status, pstat, WIFI_REASSOCRSP);
/* 2 - report to upper layer */
- netdev_dbg(padapter->pnetdev,
- "indicate_sta_join_event to upper layer - hostapd\n");
rtw_indicate_sta_assoc_event(padapter, pstat);
/* 3-(1) report sta add event */
/* status */
status = le16_to_cpu(*(__le16 *)(pframe + WLAN_HDR_A3_LEN + 2));
if (status > 0) {
- netdev_dbg(padapter->pnetdev,
- "assoc reject, status code: %d\n", status);
pmlmeinfo->state = WIFI_FW_NULL_STATE;
res = -4;
goto report_assoc_result;
reason = le16_to_cpu(*(__le16 *)(pframe + WLAN_HDR_A3_LEN));
- netdev_dbg(padapter->pnetdev, "Reason code(%d)\n", reason);
-
if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
struct sta_info *psta;
struct sta_priv *pstapriv = &padapter->stapriv;
reason = le16_to_cpu(*(__le16 *)(pframe + WLAN_HDR_A3_LEN));
- netdev_dbg(padapter->pnetdev, "Reason code(%d)\n", reason);
-
if (check_fwstate(pmlmepriv, WIFI_AP_STATE)) {
struct sta_info *psta;
struct sta_priv *pstapriv = &padapter->stapriv;
struct recv_reorder_ctrl *preorder_ctrl;
unsigned char *frame_body;
unsigned char category, action;
- unsigned short tid, status, reason_code = 0;
+ unsigned short tid, status;
struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
struct mlme_ext_info *pmlmeinfo = &pmlmeext->mlmext_info;
u8 *pframe = precv_frame->rx_data;
if (!pmlmeinfo->HT_enable)
return _SUCCESS;
action = frame_body[1];
- netdev_dbg(padapter->pnetdev, "action=%d\n", action);
switch (action) {
case RTW_WLAN_ACTION_ADDBA_REQ: /* ADDBA request */
memcpy(&pmlmeinfo->ADDBA_req, &frame_body[2], sizeof(struct ADDBA_request));
status = get_unaligned_le16(&frame_body[3]);
tid = ((frame_body[5] >> 2) & 0x7);
if (status == 0) { /* successful */
- netdev_dbg(padapter->pnetdev,
- "agg_enable for TID=%d\n", tid);
psta->htpriv.agg_enable_bitmap |= 1 << tid;
psta->htpriv.candidate_tid_bitmap &= ~BIT(tid);
} else {
if ((frame_body[3] & BIT(3)) == 0) {
psta->htpriv.agg_enable_bitmap &= ~(1 << ((frame_body[3] >> 4) & 0xf));
psta->htpriv.candidate_tid_bitmap &= ~(1 << ((frame_body[3] >> 4) & 0xf));
- reason_code = get_unaligned_le16(&frame_body[4]);
} else if ((frame_body[3] & BIT(3)) == BIT(3)) {
tid = (frame_body[3] >> 4) & 0x0F;
preorder_ctrl = &psta->recvreorder_ctrl[tid];
preorder_ctrl->enable = false;
preorder_ctrl->indicate_seq = 0xffff;
}
- netdev_dbg(padapter->pnetdev,
- "DELBA: %x(%x)\n",
- pmlmeinfo->agg_enable_bitmap,
- reason_code);
/* todo: how to notify the host while receiving DELETE BA */
break;
default:
if (!pmgntframe)
return;
- netdev_dbg(padapter->pnetdev, "result=%d\n", result);
/* update attribute */
pattrib = &pmgntframe->attrib;
update_mgntframe_attrib(padapter, pattrib);
{
u8 i, match_result = 0;
- pr_debug("peermac=%.2X %.2X %.2X %.2X %.2X %.2X\n",
- peermacaddr[0], peermacaddr[1], peermacaddr[2],
- peermacaddr[3], peermacaddr[4], peermacaddr[5]);
-
for (i = 0; i < P2P_MAX_PERSISTENT_GROUP_NUM; i++, profileinfo++) {
- pr_debug("profileinfo_mac=%.2X %.2X %.2X %.2X %.2X %.2X\n",
- profileinfo->peermac[0], profileinfo->peermac[1],
- profileinfo->peermac[2], profileinfo->peermac[3],
- profileinfo->peermac[4], profileinfo->peermac[5]);
if (!memcmp(peermacaddr, profileinfo->peermac, ETH_ALEN)) {
match_result = 1;
- pr_debug("Match!\n");
break;
}
}
if (GetRetry(frame)) {
if (token >= 0) {
if ((seq_ctrl == mlmeext->action_public_rxseq) && (token == mlmeext->action_public_dialog_token)) {
- netdev_dbg(adapter->pnetdev,
- "seq_ctrl = 0x%x, rxseq = 0x%x, token:%d\n",
- seq_ctrl, mlmeext->action_public_rxseq, token);
return _FAIL;
}
} else {
if (seq_ctrl == mlmeext->action_public_rxseq) {
- netdev_dbg(adapter->pnetdev,
- "seq_ctrl = 0x%x, rxseq = 0x%x\n",
- seq_ctrl, mlmeext->action_public_rxseq);
return _FAIL;
}
}
switch (frame_body[6]) { /* OUI Subtype */
case P2P_GO_NEGO_REQ:
- netdev_dbg(padapter->pnetdev, "Got GO Nego Req Frame\n");
memset(&pwdinfo->groupid_info, 0x00, sizeof(struct group_id_info));
if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_RX_PROVISION_DIS_REQ))
_cancel_timer_ex(&pwdinfo->restore_p2p_state_timer);
/* Restore the previous p2p state */
rtw_p2p_set_state(pwdinfo, rtw_p2p_pre_state(pwdinfo));
- netdev_dbg(padapter->pnetdev,
- "Restore the previous p2p state to %d\n",
- rtw_p2p_state(pwdinfo));
}
/* Commented by Kurt 20110902 */
_set_timer(&pwdinfo->restore_p2p_state_timer, 5000);
break;
case P2P_GO_NEGO_RESP:
- netdev_dbg(padapter->pnetdev, "Got GO Nego Resp Frame\n");
-
if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_GONEGO_ING)) {
/* Commented by Albert 20110425 */
/* The restore timer is enabled when issuing the nego request frame of rtw_p2p_connect function. */
if (rtw_p2p_chk_state(pwdinfo, P2P_STATE_GONEGO_FAIL))
_set_timer(&pwdinfo->restore_p2p_state_timer, 5000);
} else {
- netdev_dbg(padapter->pnetdev,
- "Skipped GO Nego Resp Frame (p2p_state != P2P_STATE_GONEGO_ING)\n");
}
break;
case P2P_GO_NEGO_CONF:
- netdev_dbg(padapter->pnetdev, "Got GO Nego Confirm Frame\n");
result = process_p2p_group_negotation_confirm(pwdinfo, frame_body, len);
if (P2P_STATUS_SUCCESS == result) {
if (rtw_p2p_role(pwdinfo) == P2P_ROLE_CLIENT) {
/* Added by Albert 2010/10/05 */
/* Received the P2P Invite Request frame. */
- netdev_dbg(padapter->pnetdev, "Got invite request frame!\n");
p2p_ie = rtw_get_p2p_ie(frame_body + _PUBLIC_ACTION_IE_OFFSET_, len - _PUBLIC_ACTION_IE_OFFSET_, NULL, &p2p_ielen);
if (p2p_ie) {
/* Parse the necessary information from the P2P Invitation Request frame. */
/* After having the peer interface address, the sigma can find the correct conf file for wpa_supplicant. */
if (attr_contentlen) {
- netdev_dbg(padapter->pnetdev,
- "GO's BSSID = %.2X %.2X %.2X %.2X %.2X %.2X\n",
- pwdinfo->p2p_peer_interface_addr[0],
- pwdinfo->p2p_peer_interface_addr[1],
- pwdinfo->p2p_peer_interface_addr[2],
- pwdinfo->p2p_peer_interface_addr[3],
- pwdinfo->p2p_peer_interface_addr[4],
- pwdinfo->p2p_peer_interface_addr[5]);
}
if (invitation_flag & P2P_INVITATION_FLAGS_PERSISTENT) {
}
}
} else {
- netdev_dbg(padapter->pnetdev,
- "P2P Group ID Attribute NOT FOUND!\n");
status_code = P2P_STATUS_FAIL_INFO_UNAVAILABLE;
}
} else {
status_code = P2P_STATUS_SUCCESS;
}
} else {
- netdev_dbg(padapter->pnetdev,
- "P2P Group ID Attribute NOT FOUND!\n");
status_code = P2P_STATUS_FAIL_INFO_UNAVAILABLE;
}
}
} else {
- netdev_dbg(padapter->pnetdev,
- "P2P Invitation Flags Attribute NOT FOUND!\n");
status_code = P2P_STATUS_FAIL_INFO_UNAVAILABLE;
}
- netdev_dbg(padapter->pnetdev,
- "status_code = %d\n", status_code);
-
pwdinfo->inviteresp_info.token = frame_body[7];
issue_p2p_invitation_response(padapter, GetAddr2Ptr(pframe), pwdinfo->inviteresp_info.token, status_code);
}
u8 attr_content = 0x00;
u32 attr_contentlen = 0;
- netdev_dbg(padapter->pnetdev, "Got invite response frame!\n");
_cancel_timer_ex(&pwdinfo->restore_p2p_state_timer);
p2p_ie = rtw_get_p2p_ie(frame_body + _PUBLIC_ACTION_IE_OFFSET_, len - _PUBLIC_ACTION_IE_OFFSET_, NULL, &p2p_ielen);
if (p2p_ie) {
rtw_get_p2p_attr_content(p2p_ie, p2p_ielen, P2P_ATTR_STATUS, &attr_content, &attr_contentlen);
if (attr_contentlen == 1) {
- netdev_dbg(padapter->pnetdev,
- "Status = %d\n", attr_content);
pwdinfo->invitereq_info.benable = false;
if (attr_content == P2P_STATUS_SUCCESS) {
process_p2p_devdisc_resp(pwdinfo, pframe, len);
break;
case P2P_PROVISION_DISC_REQ:
- netdev_dbg(padapter->pnetdev,
- "Got Provisioning Discovery Request Frame\n");
process_p2p_provdisc_req(pwdinfo, pframe, len);
memcpy(pwdinfo->rx_prov_disc_info.peerDevAddr, GetAddr2Ptr(pframe), ETH_ALEN);
case P2P_PROVISION_DISC_RESP:
/* Commented by Albert 20110707 */
/* Should we check the pwdinfo->tx_prov_disc_info.bsent flag here?? */
- netdev_dbg(padapter->pnetdev,
- "Got Provisioning Discovery Response Frame\n");
/* Commented by Albert 20110426 */
/* The restore timer is enabled when issuing the provisioing request frame in rtw_p2p_prov_disc function. */
_cancel_timer_ex(&pwdinfo->restore_p2p_state_timer);
pmgntframe = rtw_alloc_xmitframe(pxmitpriv);
if (!pmgntframe) {
- pr_debug("alloc xmitframe fail\n");
return NULL;
}
pxmitbuf = rtw_alloc_xmitbuf_ext(pxmitpriv);
if (!pxmitbuf) {
- pr_debug("alloc xmitbuf fail\n");
rtw_free_xmitframe(pxmitpriv, pmgntframe);
return NULL;
}
struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
pmlmeext->tx_rate = rate;
- netdev_dbg(padapter->pnetdev, "rate = %x\n", rate);
}
void update_mgntframe_attrib(struct adapter *padapter, struct pkt_attrib *pattrib)
pmgntframe = alloc_mgtxmitframe(pxmitpriv);
if (!pmgntframe) {
- netdev_dbg(padapter->pnetdev, "alloc mgnt frame fail\n");
return;
}
spin_lock_bh(&pmlmepriv->bcn_update_lock);
spin_unlock_bh(&pmlmepriv->bcn_update_lock);
if ((pattrib->pktlen + TXDESC_SIZE) > 512) {
- netdev_dbg(padapter->pnetdev, "beacon frame too large\n");
return;
}
pmgntframe = alloc_mgtxmitframe(pxmitpriv);
if (!pmgntframe) {
- netdev_dbg(padapter->pnetdev,
- "alloc mgnt frame fail\n");
return;
}
{
int ret;
int i = 0;
- u32 start = jiffies;
do {
ret = _issue_probereq(padapter, pssid, da, wait_ms > 0);
if (try_cnt && wait_ms) {
if (da)
- netdev_dbg(padapter->pnetdev,
- "to %pM, ch:%u%s, %d/%d in %u ms\n",
- da, rtw_get_oper_ch(padapter),
- ret == _SUCCESS ? ", acked" : "",
- i, try_cnt, rtw_get_passing_time_ms(start));
+ ;
else
- netdev_dbg(padapter->pnetdev,
- "ch:%u%s, %d/%d in %u ms\n",
- rtw_get_oper_ch(padapter),
- ret == _SUCCESS ? ", acked" : "",
- i, try_cnt, rtw_get_passing_time_ms(start));
+ ;
}
exit:
return ret;
for (i = 0; i < NDIS_802_11_LENGTH_RATES_EX; i++) {
if (pmlmeinfo->network.SupportedRates[i] == 0)
break;
- netdev_dbg(padapter->pnetdev,
- "network.SupportedRates[%d]=%02X\n",
- i, pmlmeinfo->network.SupportedRates[i]);
}
for (i = 0; i < NDIS_802_11_LENGTH_RATES_EX; i++) {
if (j == sta_bssrate_len) {
/* the rate is not supported by STA */
- netdev_dbg(padapter->pnetdev,
- "the rate[%d]=%02X is not supported by STA!\n",
- i, pmlmeinfo->network.SupportedRates[i]);
} else {
/* the rate is supported by STA */
bssrate[index++] = pmlmeinfo->network.SupportedRates[i];
}
bssrate_len = index;
- netdev_dbg(padapter->pnetdev, "bssrate_len=%d\n", bssrate_len);
if (bssrate_len == 0) {
rtw_free_xmitbuf(pxmitpriv, pmgntframe->pxmitbuf);
{
int ret;
int i = 0;
- u32 start = jiffies;
struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
struct mlme_ext_info *pmlmeinfo = &pmlmeext->mlmext_info;
if (try_cnt && wait_ms) {
if (da)
- netdev_dbg(padapter->pnetdev,
- "to %pM, ch:%u%s, %d/%d in %u ms\n",
- da, rtw_get_oper_ch(padapter),
- ret == _SUCCESS ? ", acked" : "",
- i, try_cnt, rtw_get_passing_time_ms(start));
+ ;
else
- netdev_dbg(padapter->pnetdev,
- "ch:%u%s, %d/%d in %u ms\n",
- rtw_get_oper_ch(padapter),
- ret == _SUCCESS ? ", acked" : "",
- i, try_cnt, rtw_get_passing_time_ms(start));
+ ;
}
exit:
return ret;
{
int ret;
int i = 0;
- u32 start = jiffies;
struct mlme_ext_priv *pmlmeext = &padapter->mlmeextpriv;
struct mlme_ext_info *pmlmeinfo = &pmlmeext->mlmext_info;
if (try_cnt && wait_ms) {
if (da)
- netdev_dbg(padapter->pnetdev,
- "to %pM, ch:%u%s, %d/%d in %u ms\n",
- da, rtw_get_oper_ch(padapter),
- ret == _SUCCESS ? ", acked" : "",
- i, try_cnt, rtw_get_passing_time_ms(start));
+ ;
else
- netdev_dbg(padapter->pnetdev,
- "ch:%u%s, %d/%d in %u ms\n",
- rtw_get_oper_ch(padapter),
- ret == _SUCCESS ? ", acked" : "",
- i, try_cnt, rtw_get_passing_time_ms(start));
+ ;
}
exit:
return ret;
int issue_deauth(struct adapter *padapter, unsigned char *da, unsigned short reason)
{
- netdev_dbg(padapter->pnetdev, "to %pM\n", da);
return _issue_deauth(padapter, da, reason, false);
}
{
int ret;
int i = 0;
- u32 start = jiffies;
do {
ret = _issue_deauth(padapter, da, reason, wait_ms > 0);
if (try_cnt && wait_ms) {
if (da)
- netdev_dbg(padapter->pnetdev,
- "to %pM, ch:%u%s, %d/%d in %u ms\n",
- da, rtw_get_oper_ch(padapter),
- ret == _SUCCESS ? ", acked" : "",
- i, try_cnt, rtw_get_passing_time_ms(start));
+ ;
else
- netdev_dbg(padapter->pnetdev,
- "ch:%u%s, %d/%d in %u ms\n",
- rtw_get_oper_ch(padapter),
- ret == _SUCCESS ? ", acked" : "",
- i, try_cnt, rtw_get_passing_time_ms(start));
+ ;
}
exit:
return ret;
struct sta_priv *pstapriv = &padapter->stapriv;
struct registry_priv *pregpriv = &padapter->registrypriv;
- netdev_dbg(padapter->pnetdev,
- "category=%d, action=%d, status=%d\n",
- category, action, status);
-
pmgntframe = alloc_mgtxmitframe(pxmitpriv);
if (!pmgntframe)
return;
if (psta) {
start_seq = (psta->sta_xmitpriv.txseq_tid[status & 0x07] & 0xfff) + 1;
- netdev_dbg(padapter->pnetdev,
- "BA_starting_seqctrl=%d for TID=%d\n",
- start_seq, status & 0x07);
-
psta->BA_starting_seqctrl[status & 0x07] = start_seq;
BA_starting_seqctrl = start_seq << 4;
if (initiator == 0) { /* recipient */
for (tid = 0; tid < MAXTID; tid++) {
if (psta->recvreorder_ctrl[tid].enable) {
- netdev_dbg(padapter->pnetdev,
- "rx agg disable tid(%d)\n", tid);
issue_action_BA(padapter, addr, RTW_WLAN_ACTION_DELBA, (((tid << 1) | initiator) & 0x1F));
psta->recvreorder_ctrl[tid].enable = false;
psta->recvreorder_ctrl[tid].indicate_seq = 0xffff;
} else if (initiator == 1) { /* originator */
for (tid = 0; tid < MAXTID; tid++) {
if (psta->htpriv.agg_enable_bitmap & BIT(tid)) {
- netdev_dbg(padapter->pnetdev,
- "tx agg disable tid(%d)\n", tid);
issue_action_BA(padapter, addr, RTW_WLAN_ACTION_DELBA, (((tid << 1) | initiator) & 0x1F));
psta->htpriv.agg_enable_bitmap &= ~BIT(tid);
psta->htpriv.candidate_tid_bitmap &= ~BIT(tid);
if (padapter->bSurpriseRemoved || padapter->bDriverStopped)
return _FAIL;
if (!bxmitok) {
- netdev_dbg(padapter->pnetdev, "fail! %u ms\n",
- rtw_get_passing_time_ms(start));
return _FAIL;
} else {
u32 passing_time = rtw_get_passing_time_ms(start);
if (passing_time > 100 || issue > 3)
- netdev_dbg(padapter->pnetdev,
- "success, issue:%d, poll:%d, %u ms\n",
- issue, poll, rtw_get_passing_time_ms(start));
+ ;
+
return _SUCCESS;
}
}
/* checking SSID */
p = rtw_get_ie(bssid->IEs + ie_offset, _SSID_IE_, &len, bssid->IELength - ie_offset);
if (!p) {
- netdev_dbg(padapter->pnetdev,
- "marc: cannot find SSID for survey event\n");
return _FAIL;
}
if (*(p + 1)) {
if (len > NDIS_802_11_LENGTH_SSID) {
- netdev_dbg(padapter->pnetdev,
- "IE too long (%d) for survey event\n",
- len);
return _FAIL;
}
memcpy(bssid->Ssid.Ssid, (p + 2), *(p + 1));
p = rtw_get_ie(bssid->IEs + ie_offset, _SUPPORTEDRATES_IE_, &len, bssid->IELength - ie_offset);
if (p) {
if (len > NDIS_802_11_LENGTH_RATES_EX) {
- netdev_dbg(padapter->pnetdev,
- "IE too long (%d) for survey event\n",
- len);
return _FAIL;
}
memcpy(bssid->SupportedRates, (p + 2), len);
p = rtw_get_ie(bssid->IEs + ie_offset, _EXT_SUPPORTEDRATES_IE_, &len, bssid->IELength - ie_offset);
if (p) {
if (len > (NDIS_802_11_LENGTH_RATES_EX - i)) {
- netdev_dbg(padapter->pnetdev,
- "IE too long (%d) for survey event\n",
- len);
return _FAIL;
}
memcpy(bssid->SupportedRates + i, (p + 2), len);
rtw_indicate_connect(padapter);
}
} else {
- netdev_dbg(padapter->pnetdev, "invalid cap:%x\n", caps);
return;
}
/* update bc/mc sta_info */
psurveydone_evt = (struct surveydone_event *)(pevtcmd + sizeof(struct C2HEvent_Header));
psurveydone_evt->bss_cnt = pmlmeext->sitesurvey_res.bss_cnt;
- netdev_dbg(padapter->pnetdev, "survey done event(%x)\n",
- psurveydone_evt->bss_cnt);
-
rtw_enqueue_cmd(pcmdpriv, pcmd_obj);
}
pjoinbss_evt->network.join_res = res;
pjoinbss_evt->network.aid = res;
- netdev_dbg(padapter->pnetdev, "res=%d\n", res);
-
rtw_joinbss_event_prehandle(padapter, (u8 *)&pjoinbss_evt->network);
rtw_enqueue_cmd(pcmdpriv, pcmd_obj);
pdel_sta_evt->mac_id = mac_id;
- netdev_dbg(padapter->pnetdev, "delete STA, mac_id = %d\n", mac_id);
-
rtw_enqueue_cmd(pcmdpriv, pcmd_obj);
}
memcpy((unsigned char *)(&padd_sta_evt->macaddr), MacAddr, ETH_ALEN);
padd_sta_evt->cam_id = cam_idx;
- netdev_dbg(padapter->pnetdev, "add STA\n");
-
rtw_enqueue_cmd(pcmdpriv, pcmd_obj);
}
GetHalDefVar8188EUsb(padapter, HW_DEF_RA_INFO_DUMP, &mac_id);
GetHalDefVar8188EUsb(padapter, HAL_DEF_UNDERCORATEDSMOOTHEDPWDB, &UndecoratedSmoothedPWDB);
- netdev_dbg(padapter->pnetdev,
- "UndecoratedSmoothedPWDB:%d\n", UndecoratedSmoothedPWDB);
}
static u8 chk_ap_is_alive(struct sta_info *psta)
u8 fw_status;
if (rx_dma_status != 0x00) {
- netdev_dbg(padapter->pnetdev, "REG_RXDMA_STATUS:0x%08x\n",
- rx_dma_status);
rtw_write32(padapter, REG_RXDMA_STATUS, rx_dma_status);
}
fw_status = rtw_read8(padapter, REG_FMETHR);
if (fw_status == 1)
- netdev_dbg(padapter->pnetdev,
- "REG_FW_STATUS (0x%02x), Read_Efuse_Fail !!\n",
- fw_status);
+ ;
else if (fw_status == 2)
- netdev_dbg(padapter->pnetdev,
- "REG_FW_STATUS (0x%02x), Condition_No_Match !!\n",
- fw_status);
+ ;
}
void linked_status_chk(struct adapter *padapter)
if (!rtw_p2p_chk_state(&padapter->wdinfo, P2P_STATE_NONE)) {
rtw_p2p_findphase_ex_set(pwdinfo, P2P_FINDPHASE_EX_MAX);
pmlmeext->sitesurvey_res.channel_idx = 3;
- netdev_dbg(padapter->pnetdev,
- "idx:%d, cnt:%u\n",
- pmlmeext->sitesurvey_res.channel_idx,
- pwdinfo->find_phase_state_exchange_cnt);
} else {
pmlmeext->sitesurvey_res.channel_idx = pmlmeext->sitesurvey_res.ch_num;
- netdev_dbg(padapter->pnetdev,
- "idx:%d\n",
- pmlmeext->sitesurvey_res.channel_idx);
}
pmlmeext->scan_abort = false;/* reset */
struct mlme_ext_info *pmlmeinfo = &pmlmeext->mlmext_info;
if (pmlmeinfo->state & WIFI_FW_AUTH_NULL) {
- netdev_dbg(padapter->pnetdev, "no beacon while connecting\n");
pmlmeinfo->state = WIFI_FW_NULL_STATE;
report_join_res(padapter, -3);
} else if (pmlmeinfo->state & WIFI_FW_AUTH_STATE) {
return;
}
- netdev_dbg(padapter->pnetdev, "auth timeout and try again\n");
pmlmeinfo->auth_seq = 1;
issue_auth(padapter, NULL, 0);
set_link_timer(pmlmeext, REAUTH_TO);
return;
}
- netdev_dbg(padapter->pnetdev, "assoc timeout and try again\n");
issue_assocreq(padapter);
set_link_timer(pmlmeext, REASSOC_TO);
}
break;
}
- netdev_dbg(padapter->pnetdev,
- "set ch/bw before connected\n");
}
}
break;
if (psta) {
ctrl = (BIT(15) | ((pparm->algorithm) << 2));
- netdev_dbg(padapter->pnetdev, "enc_algorithm=%d\n",
- pparm->algorithm);
-
if ((psta->mac_id < 1) || (psta->mac_id > (NUM_STA - 4))) {
- netdev_dbg(padapter->pnetdev,
- "set_stakey failed, mac_id(aid)=%d\n",
- psta->mac_id);
return H2C_REJECTED;
}
cam_id = (psta->mac_id + 3);/* 0~3 for default key, cmd_id = macid + 3, macid = aid+1; */
- netdev_dbg(padapter->pnetdev,
- "Write CAM, mac_addr =%x:%x:%x:%x:%x:%x, cam_entry=%d\n",
- pparm->addr[0], pparm->addr[1], pparm->addr[2],
- pparm->addr[3], pparm->addr[4], pparm->addr[5],
- cam_id);
-
write_cam(padapter, cam_id, ctrl, pparm->addr, pparm->key);
return H2C_SUCCESS_RSP;
} else {
- netdev_dbg(padapter->pnetdev, "sta has been free\n");
return H2C_REJECTED;
}
}
u8 tx_beacon_hdl(struct adapter *padapter, unsigned char *pbuf)
{
if (send_beacon(padapter) == _FAIL) {
- netdev_dbg(padapter->pnetdev, "issue_beacon, fail!\n");
return H2C_PARAMETERS_ERROR;
} else {
/* tx bc/mc frames after update TIM */
set_ch_parm = (struct set_ch_parm *)pbuf;
- netdev_dbg(padapter->pnetdev, "ch:%u, bw:%u, ch_offset:%u\n",
- set_ch_parm->ch, set_ch_parm->bw, set_ch_parm->ch_offset);
-
pmlmeext->cur_channel = set_ch_parm->ch;
pmlmeext->cur_ch_offset = set_ch_parm->ch_offset;
pmlmeext->cur_bwmode = set_ch_parm->bw;