Browse Source

qcacld-3.0: Reduce the log spam in wlan_hdd_disa.c

Move the logs to appropriate log levels to reduce
the log spam in wlan_hdd_disa.c

Change-Id: I8c29331562a3eacc8891e52f5eaa5c7b73e7cf15
CRs-Fixed: 2014745
Srinivas Girigowda 8 years ago
parent
commit
21534c73fa
1 changed files with 11 additions and 11 deletions
  1. 11 11
      core/hdd/src/wlan_hdd_disa.c

+ 11 - 11
core/hdd/src/wlan_hdd_disa.c

@@ -75,7 +75,7 @@ static void hdd_encrypt_decrypt_msg_cb(void *cookie,
 		encrypt_decrypt_rsp_params->data,
 		encrypt_decrypt_rsp_params->data_length, 0);
 
-	hdd_err("vdev_id %d,status %d data_length %d",
+	hdd_debug("vdev_id: %d status:%d data_length: %d",
 		encrypt_decrypt_rsp_params->vdev_id,
 		encrypt_decrypt_rsp_params->status,
 		encrypt_decrypt_rsp_params->data_length);
@@ -124,7 +124,7 @@ static int hdd_post_encrypt_decrypt_msg_rsp(hdd_context_t *hdd_ctx,
 
 	skb = cfg80211_vendor_cmd_alloc_reply_skb(hdd_ctx->wiphy, nl_buf_len);
 	if (!skb) {
-		hdd_err(FL("cfg80211_vendor_cmd_alloc_reply_skb failed"));
+		hdd_err("cfg80211_vendor_cmd_alloc_reply_skb failed");
 		return -ENOMEM;
 	}
 
@@ -132,7 +132,7 @@ static int hdd_post_encrypt_decrypt_msg_rsp(hdd_context_t *hdd_ctx,
 		if (nla_put(skb, QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_DATA,
 				encrypt_decrypt_rsp_params->data_length,
 				encrypt_decrypt_rsp_params->data)) {
-			hdd_err(FL("put fail"));
+			hdd_err("put fail");
 			goto nla_put_failure;
 		}
 	}
@@ -174,7 +174,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
 	}
 
 	encrypt_decrypt_params->vdev_id = adapter->sessionId;
-	hdd_err("vdev_id : %d", encrypt_decrypt_params->vdev_id);
+	hdd_debug("vdev_id: %d", encrypt_decrypt_params->vdev_id);
 
 	if (!tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_NEEDS_DECRYPTION]) {
 		hdd_err("attr flag NEEDS_DECRYPTION not present");
@@ -183,7 +183,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
 		hdd_err("attr flag NEEDS_DECRYPTION present");
 		encrypt_decrypt_params->key_flag = WMI_DECRYPT;
 	}
-	hdd_err("Key flag : %d", encrypt_decrypt_params->key_flag);
+	hdd_debug("Key flag: %d", encrypt_decrypt_params->key_flag);
 
 	if (!tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_KEYID]) {
 		hdd_err("attr key id failed");
@@ -191,7 +191,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
 	}
 	encrypt_decrypt_params->key_idx = nla_get_u8(tb
 		    [QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_KEYID]);
-	hdd_err("Key Idx : %d", encrypt_decrypt_params->key_idx);
+	hdd_debug("Key Idx: %d", encrypt_decrypt_params->key_idx);
 
 	if (!tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_CIPHER]) {
 		hdd_err("attr Cipher failed");
@@ -199,7 +199,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
 	}
 	encrypt_decrypt_params->key_cipher = nla_get_u32(tb
 		    [QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_CIPHER]);
-	hdd_err("key_cipher : %d", encrypt_decrypt_params->key_cipher);
+	hdd_debug("key_cipher: %d", encrypt_decrypt_params->key_cipher);
 
 	if (!tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_TK]) {
 		hdd_err("attr TK failed");
@@ -211,7 +211,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
 		hdd_err("Invalid TK length");
 		return -EINVAL;
 	}
-	hdd_err("Key len : %d", encrypt_decrypt_params->key_len);
+	hdd_debug("Key len: %d", encrypt_decrypt_params->key_len);
 
 	if (encrypt_decrypt_params->key_len > SIR_MAC_MAX_KEY_LENGTH)
 		encrypt_decrypt_params->key_len = SIR_MAC_MAX_KEY_LENGTH;
@@ -252,7 +252,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
 		return -EINVAL;
 	}
 
-	hdd_err("Header and Payload length %d ", len);
+	hdd_debug("Header and Payload length: %d", len);
 
 	tmp = nla_data(tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_DATA]);
 
@@ -283,7 +283,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
 		mac_hdr_len += QOS_CONTROL_LEN;
 	}
 
-	hdd_err("mac_hdr_len %d", mac_hdr_len);
+	hdd_debug("mac_hdr_len: %d", mac_hdr_len);
 
 	qdf_mem_copy(encrypt_decrypt_params->mac_header,
 			tmp, mac_hdr_len);
@@ -296,7 +296,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
 	encrypt_decrypt_params->data_len =
 			len - mac_hdr_len;
 
-	hdd_err("Payload length : %d", encrypt_decrypt_params->data_len);
+	hdd_debug("Payload length: %d", encrypt_decrypt_params->data_len);
 
 	if (encrypt_decrypt_params->data_len) {
 		encrypt_decrypt_params->data =