wlan: Missing error and info logs in PE disconnect path (Part 2)
added info and error logs for disconnect path
in Dissoc req/rsp and Deauth req/rsp
Change-Id: Ib2e1d4e6feca4bb762ca7f72d3abc508cd153153
CRs-Fixed: 608938
diff --git a/CORE/MAC/src/pe/lim/limProcessMlmReqMessages.c b/CORE/MAC/src/pe/lim/limProcessMlmReqMessages.c
index 4b1bf2b..5246017 100644
--- a/CORE/MAC/src/pe/lim/limProcessMlmReqMessages.c
+++ b/CORE/MAC/src/pe/lim/limProcessMlmReqMessages.c
@@ -2362,10 +2362,18 @@
sessionId = pMac->lim.gpLimMlmAuthReq->sessionId;
if((psessionEntry= peFindSessionBySessionId(pMac,sessionId) )== NULL)
{
- limLog(pMac, LOGP, FL("Session Does not exist for given sessionId"));
+ limLog(pMac, LOGP, FL("Session Does not exist for given sessionId %d"),
+ sessionId);
return;
}
+ limLog(pMac, LOG1,FL("Process Auth Req on sessionID %d Systemrole %d"
+ "mlmstate %d from: "MAC_ADDRESS_STR" with authtype %d"), sessionId,
+ psessionEntry->limSystemRole,psessionEntry->limMlmState,
+ MAC_ADDR_ARRAY(pMac->lim.gpLimMlmAuthReq->peerMacAddr),
+ pMac->lim.gpLimMlmAuthReq->authType);
+
+
/**
* Expect Auth request only when:
* 1. STA joined/associated with a BSS or
@@ -2424,10 +2432,9 @@
(preAuthNode->authType ==
pMac->lim.gpLimMlmAuthReq->authType)))
{
- PELOG2(limLog(pMac, LOG2,
- FL("Already have pre-auth context with peer"));
- limPrintMacAddr(pMac, pMac->lim.gpLimMlmAuthReq->peerMacAddr,
- LOG2);)
+ limLog(pMac, LOG2,
+ FL("Already have pre-auth context with peer: "MAC_ADDRESS_STR),
+ MAC_ADDR_ARRAY(pMac->lim.gpLimMlmAuthReq->peerMacAddr));
mlmAuthCnf.resultCode = (tSirResultCodes)
eSIR_MAC_SUCCESS_STATUS;
@@ -2558,11 +2565,17 @@
if( (psessionEntry = peFindSessionBySessionId(pMac,pMlmAssocReq->sessionId) )== NULL)
{
- limLog(pMac, LOGP,FL("Session Does not exist for given sessionID"));
+ limLog(pMac, LOGP,FL("Session Does not exist for given sessionID %d"),
+ pMlmAssocReq->sessionId);
vos_mem_free(pMlmAssocReq);
return;
}
+ limLog(pMac, LOG1,FL("Process Assoc Req on sessionID %d Systemrole %d"
+ "mlmstate %d from: "MAC_ADDRESS_STR), pMlmAssocReq->sessionId,
+ psessionEntry->limSystemRole, psessionEntry->limMlmState,
+ MAC_ADDR_ARRAY(pMlmAssocReq->peerMacAddr));
+
#if 0
if (wlan_cfgGetStr(pMac, WNI_CFG_BSSID, currentBssId, &cfg) !=
eSIR_SUCCESS)
@@ -2623,10 +2636,9 @@
// Log error
PELOGW(limLog(pMac, LOGW,
- FL("received unexpected MLM_ASSOC_CNF in state %X for role=%d, MAC addr= "),
- psessionEntry->limMlmState,
- psessionEntry->limSystemRole);)
- limPrintMacAddr(pMac, pMlmAssocReq->peerMacAddr, LOGW);
+ FL("received unexpected MLM_ASSOC_CNF in state %X for role=%d, MAC addr= "
+ MAC_ADDRESS_STR), psessionEntry->limMlmState,
+ psessionEntry->limSystemRole, MAC_ADDR_ARRAY(pMlmAssocReq->peerMacAddr));)
limPrintMlmState(pMac, LOGW, psessionEntry->limMlmState);
mlmAssocCnf.resultCode = eSIR_SME_INVALID_PARAMETERS;
@@ -2681,14 +2693,20 @@
}
pMlmReassocReq = (tLimMlmReassocReq *) pMsgBuf;
-
+
if((psessionEntry = peFindSessionBySessionId(pMac,pMlmReassocReq->sessionId)) == NULL)
{
- PELOGE(limLog(pMac, LOGE,FL("Session Does not exist for given sessionId"));)
+ limLog(pMac, LOGE,FL("Session Does not exist for given sessionId %d"),
+ pMlmReassocReq->sessionId);
vos_mem_free(pMlmReassocReq);
return;
}
-
+
+ limLog(pMac, LOG1,FL("Process ReAssoc Req on sessionID %d Systemrole %d"
+ "mlmstate %d from: "MAC_ADDRESS_STR), pMlmReassocReq->sessionId,
+ psessionEntry->limSystemRole, psessionEntry->limMlmState,
+ MAC_ADDR_ARRAY(pMlmReassocReq->peerMacAddr));
+
if (((psessionEntry->limSystemRole != eLIM_AP_ROLE) && (psessionEntry->limSystemRole != eLIM_BT_AMP_AP_ROLE)) &&
(psessionEntry->limMlmState == eLIM_MLM_LINK_ESTABLISHED_STATE))
{
@@ -2771,12 +2789,12 @@
*/
// Log error
- PELOGW(limLog(pMac, LOGW,
- FL("received unexpected MLM_REASSOC_CNF in state %X for role=%d, MAC addr= "),
- psessionEntry->limMlmState,
- psessionEntry->limSystemRole);)
- limPrintMacAddr(pMac, pMlmReassocReq->peerMacAddr,
- LOGW);
+ limLog(pMac, LOGW,
+ FL("received unexpected MLM_REASSOC_CNF in state %X for role=%d, "
+ "MAC addr= "
+ MAC_ADDRESS_STR), psessionEntry->limMlmState,
+ psessionEntry->limSystemRole,
+ MAC_ADDR_ARRAY(pMlmReassocReq->peerMacAddr));
limPrintMlmState(pMac, LOGW, psessionEntry->limMlmState);
mlmReassocCnf.resultCode = eSIR_SME_INVALID_PARAMETERS;
@@ -2820,15 +2838,20 @@
pMlmDisassocReq = (tLimMlmDisassocReq *) pMsgBuf;
-
if((psessionEntry = peFindSessionBySessionId(pMac,pMlmDisassocReq->sessionId))== NULL)
{
- PELOGE(limLog(pMac, LOGE,
- FL("session does not exist for given sessionId"));)
+ limLog(pMac, LOGE,
+ FL("session does not exist for given sessionId %d"),
+ pMlmDisassocReq->sessionId);
mlmDisassocCnf.resultCode = eSIR_SME_INVALID_PARAMETERS;
goto end;
}
+ limLog(pMac, LOG1,FL("Process DisAssoc Req on sessionID %d Systemrole %d"
+ "mlmstate %d from: "MAC_ADDRESS_STR), pMlmDisassocReq->sessionId,
+ psessionEntry->limSystemRole, psessionEntry->limMlmState,
+ MAC_ADDR_ARRAY(pMlmDisassocReq->peerMacAddr));
+
#if 0
if (wlan_cfgGetStr(pMac, WNI_CFG_BSSID, currentBssId, &cfg) !=
eSIR_SUCCESS)
@@ -2848,8 +2871,9 @@
sizeof(tSirMacAddr)) )
{
PELOGW(limLog(pMac, LOGW,
- FL("received MLM_DISASSOC_REQ with invalid BSS id "));)
- limPrintMacAddr(pMac, pMlmDisassocReq->peerMacAddr, LOGW);
+ FL("received MLM_DISASSOC_REQ with invalid BSS id from: "
+ MAC_ADDRESS_STR),
+ MAC_ADDR_ARRAY(pMlmDisassocReq->peerMacAddr));)
/// Prepare and Send LIM_MLM_DISASSOC_CNF
@@ -2892,8 +2916,9 @@
* Log error
*/
PELOGW(limLog(pMac, LOGW,
- FL("received MLM_DISASSOC_REQ for STA that either has no context or in some transit state, Addr= "));)
- limPrintMacAddr(pMac, pMlmDisassocReq->peerMacAddr, LOGW);
+ FL("received MLM_DISASSOC_REQ for STA that either has no context "
+ "or in some transit state, Addr= "
+ MAC_ADDRESS_STR),MAC_ADDR_ARRAY(pMlmDisassocReq->peerMacAddr));)
/// Prepare and Send LIM_MLM_DISASSOC_CNF
@@ -3056,6 +3081,7 @@
void limProcessDisassocAckTimeout(tpAniSirGlobal pMac)
{
+ limLog(pMac, LOG1, FL(""));
limSendDisassocCnf(pMac);
}
@@ -3095,15 +3121,18 @@
}
pMlmDisassocReq = (tLimMlmDisassocReq *) pMsgBuf;
+ limLog(pMac, LOG1,FL("Process DisAssoc Req on sessionID %d "
+ "from: "MAC_ADDRESS_STR), pMlmDisassocReq->sessionId,
+ MAC_ADDR_ARRAY(pMlmDisassocReq->peerMacAddr));
if((psessionEntry = peFindSessionBySessionId(pMac,pMlmDisassocReq->sessionId))== NULL)
{
- PELOGE(limLog(pMac, LOGE,
- FL("session does not exist for given sessionId"));)
+ limLog(pMac, LOGE,
+ FL("session does not exist for given sessionId %d"),
+ pMlmDisassocReq->sessionId);
return;
}
-
limProcessMlmDisassocReqNtf( pMac, eHAL_STATUS_SUCCESS, (tANI_U32*) pMsgBuf );
} /*** limProcessMlmDisassocReq() ***/
@@ -3135,10 +3164,15 @@
if((psessionEntry = peFindSessionBySessionId(pMac,pMlmDeauthReq->sessionId))== NULL)
{
- PELOGE(limLog(pMac, LOGE, FL("session does not exist for given sessionId"));)
+ limLog(pMac, LOGE, FL("session does not exist for given sessionId %d"),
+ pMlmDeauthReq->sessionId);
vos_mem_free(pMlmDeauthReq);
return;
}
+ limLog(pMac, LOG1,FL("Process Deauth Req on sessionID %d Systemrole %d"
+ "mlmstate %d from: "MAC_ADDRESS_STR), pMlmDeauthReq->sessionId,
+ psessionEntry->limSystemRole, psessionEntry->limMlmState,
+ MAC_ADDR_ARRAY(pMlmDeauthReq->peerMacAddr));
#if 0
if (wlan_cfgGetStr(pMac, WNI_CFG_BSSID, currentBssId, &cfg) !=
eSIR_SUCCESS)
@@ -3169,13 +3203,12 @@
currentBssId,
sizeof(tSirMacAddr)) )
{
- PELOGW(limLog(pMac, LOGW,
- FL("received MLM_DEAUTH_REQ with invalid BSS id "));)
- PELOGE(limLog(pMac, LOGE, FL("Peer MAC Addr : "));)
- limPrintMacAddr(pMac, pMlmDeauthReq->peerMacAddr,LOGE);
-
- PELOGE(limLog(pMac, LOGE, FL("\n CFG BSSID Addr : "));)
- limPrintMacAddr(pMac, currentBssId,LOGE);
+ limLog(pMac, LOGE,
+ FL("received MLM_DEAUTH_REQ with invalid BSS id "
+ "Peer MAC: "MAC_ADDRESS_STR " CFG BSSID Addr : "
+ MAC_ADDRESS_STR),
+ MAC_ADDR_ARRAY(pMlmDeauthReq->peerMacAddr),
+ MAC_ADDR_ARRAY(currentBssId));
/// Prepare and Send LIM_MLM_DEAUTH_CNF
@@ -3215,9 +3248,8 @@
default:
PELOGW(limLog(pMac, LOGW,
- FL("received MLM_DEAUTH_REQ with in state %d for peer "),
- psessionEntry->limMlmState);)
- limPrintMacAddr(pMac, pMlmDeauthReq->peerMacAddr, LOGW);
+ FL("received MLM_DEAUTH_REQ with in state %d for peer "MAC_ADDRESS_STR),
+ psessionEntry->limMlmState,MAC_ADDR_ARRAY(pMlmDeauthReq->peerMacAddr));)
limPrintMlmState(pMac, LOGW, psessionEntry->limMlmState);
/// Prepare and Send LIM_MLM_DEAUTH_CNF
@@ -3259,8 +3291,10 @@
* Prepare and Send LIM_MLM_DEAUTH_CNF
*/
PELOGW(limLog(pMac, LOGW,
- FL("received MLM_DEAUTH_REQ for STA that does not have context, Addr="));)
- limPrintMacAddr(pMac, pMlmDeauthReq->peerMacAddr, LOGW);
+ FL("received MLM_DEAUTH_REQ in mlme state %d for STA that "
+ "does not have context, Addr="MAC_ADDRESS_STR),
+ psessionEntry->limMlmState,
+ MAC_ADDR_ARRAY(pMlmDeauthReq->peerMacAddr));)
mlmDeauthCnf.resultCode =
eSIR_SME_STA_NOT_AUTHENTICATED;
@@ -3291,8 +3325,8 @@
* some transit state. Log error.
*/
PELOGW(limLog(pMac, LOGW,
- FL("received MLM_DEAUTH_REQ for STA that either has no context or in some transit state, Addr="));)
- limPrintMacAddr(pMac, pMlmDeauthReq->peerMacAddr, LOGW);
+ FL("received MLM_DEAUTH_REQ for STA that either has no context or in some transit state, Addr="
+ MAC_ADDRESS_STR),MAC_ADDR_ARRAY(pMlmDeauthReq->peerMacAddr));)
/// Prepare and Send LIM_MLM_DEAUTH_CNF
@@ -3359,6 +3393,7 @@
void limProcessDeauthAckTimeout(tpAniSirGlobal pMac)
{
+ limLog(pMac, LOG1, FL(""));
limSendDeauthCnf(pMac);
}
@@ -3399,13 +3434,17 @@
pMlmDeauthReq = (tLimMlmDeauthReq *) pMsgBuf;
+ limLog(pMac, LOG1,FL("Process Deauth Req on sessionID %d "
+ "from: "MAC_ADDRESS_STR), pMlmDeauthReq->sessionId,
+ MAC_ADDR_ARRAY(pMlmDeauthReq->peerMacAddr));
+
if((psessionEntry = peFindSessionBySessionId(pMac,pMlmDeauthReq->sessionId))== NULL)
{
- PELOGE(limLog(pMac, LOGE, FL("session does not exist for given sessionId"));)
+ limLog(pMac, LOGE, FL("session does not exist for given sessionId %d"),
+ pMlmDeauthReq->sessionId);
return;
}
-
limProcessMlmDeauthReqNtf( pMac, eHAL_STATUS_SUCCESS, (tANI_U32*) pMsgBuf );
} /*** limProcessMlmDeauthReq() ***/
@@ -4288,8 +4327,9 @@
* in unexpected state. Log error
*/
PELOGE(limLog(pMac, LOGE,
- FL("received unexpected AUTH rsp timeout for MAC address "));
- limPrintMacAddr(pMac, pAuthNode->peerMacAddr, LOGE);)
+ FL("received AUTH rsp timeout in unexpected state "
+ "for MAC address: "MAC_ADDRESS_STR),
+ MAC_ADDR_ARRAY(pAuthNode->peerMacAddr));)
}
else
{
@@ -4298,8 +4338,8 @@
pAuthNode->mlmState = eLIM_MLM_AUTH_RSP_TIMEOUT_STATE;
pAuthNode->fTimerStarted = 0;
PELOG1( limLog(pMac, LOG1,
- FL("AUTH rsp timedout for MAC address "));
- limPrintMacAddr(pMac, pAuthNode->peerMacAddr, LOG1);)
+ FL("AUTH rsp timedout for MAC address "MAC_ADDRESS_STR),
+ MAC_ADDR_ARRAY(pAuthNode->peerMacAddr));)
// Change timer to reactivate it in future
limDeactivateAndChangePerStaIdTimer(pMac,
diff --git a/CORE/MAC/src/pe/lim/limProcessSmeReqMessages.c b/CORE/MAC/src/pe/lim/limProcessSmeReqMessages.c
index 05b1837..10d64ef 100644
--- a/CORE/MAC/src/pe/lim/limProcessSmeReqMessages.c
+++ b/CORE/MAC/src/pe/lim/limProcessSmeReqMessages.c
@@ -2351,7 +2351,6 @@
tANI_U8 smesessionId;
tANI_U16 smetransactionId;
- PELOG1(limLog(pMac, LOG1,FL("received DISASSOC_REQ message"));)
if (pMsgBuf == NULL)
{
@@ -2381,19 +2380,20 @@
return;
}
-
- PELOG1(limLog(pMac, LOG1, FL("received DISASSOC_REQ message. Reason: %d global SmeState: %d"),
- smeDisassocReq.reasonCode, pMac->lim.gLimSmeState);)
-
-
if((psessionEntry = peFindSessionByBssid(pMac,smeDisassocReq.bssId,&sessionId))== NULL)
{
- limLog(pMac, LOGE,FL("session does not exist for given bssId"));
+ limLog(pMac, LOGE,FL("session does not exist for given bssId "MAC_ADDRESS_STR),
+ MAC_ADDR_ARRAY(smeDisassocReq.bssId));
retCode = eSIR_SME_INVALID_PARAMETERS;
disassocTrigger = eLIM_HOST_DISASSOC;
goto sendDisassoc;
}
+ limLog(pMac, LOG1, FL("received DISASSOC_REQ message on sessionid %d"
+ "Systemrole %d Reason: %u SmeState: %d from: "MAC_ADDRESS_STR),
+ smesessionId,psessionEntry->limSystemRole,
+ smeDisassocReq.reasonCode, pMac->lim.gLimSmeState,
+ MAC_ADDR_ARRAY(smeDisassocReq.peerMacAddr));
#ifdef FEATURE_WLAN_DIAG_SUPPORT_LIM //FEATURE_WLAN_DIAG_SUPPORT
limDiagEventReport(pMac, WLAN_PE_DIAG_DISASSOC_REQ_EVENT, psessionEntry, 0, smeDisassocReq.reasonCode);
@@ -2419,6 +2419,8 @@
limDeleteTDLSPeers(pMac, psessionEntry);
#endif
MTRACE(macTrace(pMac, TRACE_CODE_SME_STATE, psessionEntry->peSessionId, psessionEntry->limSmeState));
+ limLog(pMac, LOG1, FL("Rcvd SME_DISASSOC_REQ while in "
+ "limSmeState: %d "),psessionEntry->limSmeState);
break;
case eLIM_SME_WT_DEAUTH_STATE:
@@ -2429,7 +2431,8 @@
*/
psessionEntry->limSmeState= eLIM_SME_WT_DISASSOC_STATE;
MTRACE(macTrace(pMac, TRACE_CODE_SME_STATE, psessionEntry->peSessionId, psessionEntry->limSmeState));
- limLog(pMac, LOG1, FL("Rcvd SME_DISASSOC_REQ while in SME_WT_DEAUTH_STATE. "));
+ limLog(pMac, LOG1, FL("Rcvd SME_DISASSOC_REQ while in "
+ "SME_WT_DEAUTH_STATE. "));
break;
case eLIM_SME_WT_DISASSOC_STATE:
@@ -2442,11 +2445,14 @@
* It will send a disassoc, which is ok. However, we can use the global flag
* sendDisassoc to not send disassoc frame.
*/
- limLog(pMac, LOG1, FL("Rcvd SME_DISASSOC_REQ while in SME_WT_DISASSOC_STATE. "));
+ limLog(pMac, LOG1, FL("Rcvd SME_DISASSOC_REQ while in "
+ "SME_WT_DISASSOC_STATE. "));
break;
case eLIM_SME_JOIN_FAILURE_STATE: {
/** Return Success as we are already in Disconnected State*/
+ limLog(pMac, LOG1, FL("Rcvd SME_DISASSOC_REQ while in "
+ "eLIM_SME_JOIN_FAILURE_STATE. "));
if (pMac->lim.gLimRspReqd) {
retCode = eSIR_SME_SUCCESS;
disassocTrigger = eLIM_HOST_DISASSOC;
@@ -2498,6 +2504,7 @@
if (smeDisassocReq.reasonCode == eLIM_LINK_MONITORING_DISASSOC)
{
/// Disassociation is triggered by Link Monitoring
+ limLog(pMac, LOG1, FL("**** Lost link with AP ****"));
disassocTrigger = eLIM_LINK_MONITORING_DISASSOC;
reasonCode = eSIR_MAC_DISASSOC_DUE_TO_INACTIVITY_REASON;
}
@@ -2509,6 +2516,7 @@
if (smeDisassocReq.doNotSendOverTheAir)
{
+ limLog(pMac, LOG1, FL("do not send dissoc over the air"));
sendDisassocFrame = 0;
}
// Trigger Disassociation frame to peer MAC entity
@@ -2594,7 +2602,7 @@
if (!limIsSmeDisassocCnfValid(pMac, &smeDisassocCnf, psessionEntry))
{
- limLog(pMac, LOGW, FL("received invalid SME_DISASSOC_CNF message"));
+ limLog(pMac, LOGE, FL("received invalid SME_DISASSOC_CNF message"));
return;
}
@@ -2643,8 +2651,9 @@
pStaDs = dphLookupHashEntry(pMac, smeDisassocCnf.peerMacAddr, &aid, &psessionEntry->dph.dphHashTable);
if (pStaDs == NULL)
{
- PELOGW(limLog(pMac, LOGW, FL("received DISASSOC_CNF for a STA that does not have context, addr= "));
- limPrintMacAddr(pMac, smeDisassocCnf.peerMacAddr, LOGW);)
+ PELOGE(limLog(pMac, LOGE, FL("received DISASSOC_CNF for a STA that "
+ "does not have context, addr= "MAC_ADDRESS_STR),
+ MAC_ADDR_ARRAY(smeDisassocCnf.peerMacAddr));)
return;
}
/* Delete FT session if there exists one */
@@ -2689,10 +2698,8 @@
tANI_U8 smesessionId;
tANI_U16 smetransactionId;
- PELOG1(limLog(pMac, LOG1,FL("received DEAUTH_REQ message"));)
status = limDeauthReqSerDes(pMac, &smeDeauthReq,(tANI_U8 *) pMsgBuf);
-
limGetSessionInfo(pMac,(tANI_U8 *)pMsgBuf,&smesessionId,&smetransactionId);
//We need to get a session first but we don't even know if the message is correct.
@@ -2719,7 +2726,11 @@
return;
}
-
+ limLog(pMac, LOG1,FL("received DEAUTH_REQ message on sessionid %d "
+ "Systemrole %d with reasoncode %u in limSmestate %d from "
+ MAC_ADDRESS_STR), smesessionId, psessionEntry->limSystemRole,
+ smeDeauthReq.reasonCode, psessionEntry->limSmeState,
+ MAC_ADDR_ARRAY(smeDeauthReq.peerMacAddr));
#ifdef FEATURE_WLAN_DIAG_SUPPORT_LIM //FEATURE_WLAN_DIAG_SUPPORT
limDiagEventReport(pMac, WLAN_PE_DIAG_DEAUTH_REQ_EVENT, psessionEntry, 0, smeDeauthReq.reasonCode);
#endif //FEATURE_WLAN_DIAG_SUPPORT
@@ -2755,7 +2766,8 @@
* peer. Log error and send response to host.
*/
limLog(pMac, LOGE,
- FL("received unexp SME_DEAUTH_REQ in state %X"),psessionEntry->limSmeState);
+ FL("received unexp SME_DEAUTH_REQ in state %X"),
+ psessionEntry->limSmeState);
limPrintSmeState(pMac, LOGE, psessionEntry->limSmeState);
if (pMac->lim.gLimRspReqd)
@@ -2783,7 +2795,8 @@
default:
limLog(pMac, LOGE,
- FL("received unexpected SME_DEAUTH_REQ for role %X"),psessionEntry->limSystemRole);
+ FL("received unexpected SME_DEAUTH_REQ for role %X"),
+ psessionEntry->limSystemRole);
return;
} // end switch (pMac->lim.gLimSystemRole)
diff --git a/CORE/MAC/src/pe/lim/limSendManagementFrames.c b/CORE/MAC/src/pe/lim/limSendManagementFrames.c
index d490afe..849158d 100644
--- a/CORE/MAC/src/pe/lim/limSendManagementFrames.c
+++ b/CORE/MAC/src/pe/lim/limSendManagementFrames.c
@@ -3736,9 +3736,11 @@
"isassociation (0x%08x)."), nStatus );
}
- PELOG1(limLog( pMac, LOG1, FL("*** Sending Disassociation frame with rea"
- "son %d to"), nReason );
- limPrintMacAddr( pMac, pMacHdr->da, LOG1 );)
+ limLog( pMac, LOG1, FL("***Sessionid %d Sending Disassociation frame with "
+ "reason %u and waitForAck %d to "MAC_ADDRESS_STR" ,From "
+ MAC_ADDRESS_STR), psessionEntry->peSessionId, nReason, waitForAck,
+ MAC_ADDR_ARRAY(pMacHdr->da),
+ MAC_ADDR_ARRAY(psessionEntry->selfMacAddr));
if( ( SIR_BAND_5_GHZ == limGetRFBand(psessionEntry->currentOperChannel))
|| ( psessionEntry->pePersona == VOS_P2P_CLIENT_MODE ) ||
@@ -3928,10 +3930,11 @@
limLog( pMac, LOGW, FL("There were warnings while packing a D"
"e-Authentication (0x%08x)."), nStatus );
}
-
- PELOG1(limLog( pMac, LOG1, FL("*** Sending De-Authentication frame with rea"
- "son %d to"), nReason );
- limPrintMacAddr( pMac, pMacHdr->da, LOG1 );)
+ limLog( pMac, LOG1, FL("***Sessionid %d Sending Deauth frame with "
+ "reason %u and waitForAck %d to "MAC_ADDRESS_STR" ,From "
+ MAC_ADDRESS_STR), psessionEntry->peSessionId, nReason, waitForAck,
+ MAC_ADDR_ARRAY(pMacHdr->da),
+ MAC_ADDR_ARRAY(psessionEntry->selfMacAddr));
if( ( SIR_BAND_5_GHZ == limGetRFBand(psessionEntry->currentOperChannel))
|| ( psessionEntry->pePersona == VOS_P2P_CLIENT_MODE ) ||
diff --git a/CORE/MAC/src/pe/lim/limSendSmeRspMessages.c b/CORE/MAC/src/pe/lim/limSendSmeRspMessages.c
index c17ce16..b4a1298 100644
--- a/CORE/MAC/src/pe/lim/limSendSmeRspMessages.c
+++ b/CORE/MAC/src/pe/lim/limSendSmeRspMessages.c
@@ -1242,7 +1242,9 @@
return;
}
-
+ limLog(pMac, LOG1, FL("send eWNI_SME_DEAUTH_RSP with "
+ "retCode: %d for "MAC_ADDRESS_STR),reasonCode,
+ MAC_ADDR_ARRAY(peerMacAddr));
pSirSmeDisassocRsp->messageType = eWNI_SME_DISASSOC_RSP;
pSirSmeDisassocRsp->length = sizeof(tSirSmeDisassocRsp);
//sessionId
@@ -1290,7 +1292,9 @@
return;
}
-
+ limLog(pMac, LOG1, FL("send eWNI_SME_DISASSOC_IND with "
+ "retCode: %d for "MAC_ADDRESS_STR),reasonCode,
+ MAC_ADDR_ARRAY(peerMacAddr));
pSirSmeDisassocInd->messageType = eWNI_SME_DISASSOC_IND;
pSirSmeDisassocInd->length = sizeof(tSirSmeDisassocInd);
@@ -1661,7 +1665,9 @@
return;
}
-
+ limLog(pMac, LOG1, FL("send eWNI_SME_DEAUTH_RSP with "
+ "retCode: %d for"MAC_ADDRESS_STR),reasonCode,
+ MAC_ADDR_ARRAY(peerMacAddr));
pSirSmeDeauthRsp->messageType = eWNI_SME_DEAUTH_RSP;
pSirSmeDeauthRsp->length = sizeof(tSirSmeDeauthRsp);
pSirSmeDeauthRsp->statusCode = reasonCode;
@@ -1694,7 +1700,9 @@
return;
}
-
+ limLog(pMac, LOG1, FL("send eWNI_SME_DEAUTH_IND with "
+ "retCode: %d for "MAC_ADDRESS_STR),reasonCode,
+ MAC_ADDR_ARRAY(peerMacAddr));
pSirSmeDeauthInd->messageType = eWNI_SME_DEAUTH_IND;
pSirSmeDeauthInd->length = sizeof(tSirSmeDeauthInd);
pSirSmeDeauthInd->reasonCode = eSIR_MAC_UNSPEC_FAILURE_REASON;