qcacld-3.0: Reduce the log spam in wlan_hdd_disa.c

Move the logs to appropriate log levels to reduce
the log spam in wlan_hdd_disa.c

Change-Id: I8c29331562a3eacc8891e52f5eaa5c7b73e7cf15
CRs-Fixed: 2014745
Cette révision appartient à :
Srinivas Girigowda
2017-03-06 16:16:31 -08:00
révisé par Sandeep Puligilla
Parent 73bfe25d6f
révision 21534c73fa

Voir le fichier

@@ -75,7 +75,7 @@ static void hdd_encrypt_decrypt_msg_cb(void *cookie,
encrypt_decrypt_rsp_params->data,
encrypt_decrypt_rsp_params->data_length, 0);
hdd_err("vdev_id %d,status %d data_length %d",
hdd_debug("vdev_id: %d status:%d data_length: %d",
encrypt_decrypt_rsp_params->vdev_id,
encrypt_decrypt_rsp_params->status,
encrypt_decrypt_rsp_params->data_length);
@@ -124,7 +124,7 @@ static int hdd_post_encrypt_decrypt_msg_rsp(hdd_context_t *hdd_ctx,
skb = cfg80211_vendor_cmd_alloc_reply_skb(hdd_ctx->wiphy, nl_buf_len);
if (!skb) {
hdd_err(FL("cfg80211_vendor_cmd_alloc_reply_skb failed"));
hdd_err("cfg80211_vendor_cmd_alloc_reply_skb failed");
return -ENOMEM;
}
@@ -132,7 +132,7 @@ static int hdd_post_encrypt_decrypt_msg_rsp(hdd_context_t *hdd_ctx,
if (nla_put(skb, QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_DATA,
encrypt_decrypt_rsp_params->data_length,
encrypt_decrypt_rsp_params->data)) {
hdd_err(FL("put fail"));
hdd_err("put fail");
goto nla_put_failure;
}
}
@@ -174,7 +174,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
}
encrypt_decrypt_params->vdev_id = adapter->sessionId;
hdd_err("vdev_id : %d", encrypt_decrypt_params->vdev_id);
hdd_debug("vdev_id: %d", encrypt_decrypt_params->vdev_id);
if (!tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_NEEDS_DECRYPTION]) {
hdd_err("attr flag NEEDS_DECRYPTION not present");
@@ -183,7 +183,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
hdd_err("attr flag NEEDS_DECRYPTION present");
encrypt_decrypt_params->key_flag = WMI_DECRYPT;
}
hdd_err("Key flag : %d", encrypt_decrypt_params->key_flag);
hdd_debug("Key flag: %d", encrypt_decrypt_params->key_flag);
if (!tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_KEYID]) {
hdd_err("attr key id failed");
@@ -191,7 +191,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
}
encrypt_decrypt_params->key_idx = nla_get_u8(tb
[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_KEYID]);
hdd_err("Key Idx : %d", encrypt_decrypt_params->key_idx);
hdd_debug("Key Idx: %d", encrypt_decrypt_params->key_idx);
if (!tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_CIPHER]) {
hdd_err("attr Cipher failed");
@@ -199,7 +199,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
}
encrypt_decrypt_params->key_cipher = nla_get_u32(tb
[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_CIPHER]);
hdd_err("key_cipher : %d", encrypt_decrypt_params->key_cipher);
hdd_debug("key_cipher: %d", encrypt_decrypt_params->key_cipher);
if (!tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_TK]) {
hdd_err("attr TK failed");
@@ -211,7 +211,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
hdd_err("Invalid TK length");
return -EINVAL;
}
hdd_err("Key len : %d", encrypt_decrypt_params->key_len);
hdd_debug("Key len: %d", encrypt_decrypt_params->key_len);
if (encrypt_decrypt_params->key_len > SIR_MAC_MAX_KEY_LENGTH)
encrypt_decrypt_params->key_len = SIR_MAC_MAX_KEY_LENGTH;
@@ -252,7 +252,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
return -EINVAL;
}
hdd_err("Header and Payload length %d ", len);
hdd_debug("Header and Payload length: %d", len);
tmp = nla_data(tb[QCA_WLAN_VENDOR_ATTR_ENCRYPTION_TEST_DATA]);
@@ -283,7 +283,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
mac_hdr_len += QOS_CONTROL_LEN;
}
hdd_err("mac_hdr_len %d", mac_hdr_len);
hdd_debug("mac_hdr_len: %d", mac_hdr_len);
qdf_mem_copy(encrypt_decrypt_params->mac_header,
tmp, mac_hdr_len);
@@ -296,7 +296,7 @@ static int hdd_fill_encrypt_decrypt_params(struct encrypt_decrypt_req_params
encrypt_decrypt_params->data_len =
len - mac_hdr_len;
hdd_err("Payload length : %d", encrypt_decrypt_params->data_len);
hdd_debug("Payload length: %d", encrypt_decrypt_params->data_len);
if (encrypt_decrypt_params->data_len) {
encrypt_decrypt_params->data =