diff options
author | Johannes Berg <johannes@sipsolutions.net> | 2009-12-23 07:15:36 -0500 |
---|---|---|
committer | John W. Linville <linville@tuxdriver.com> | 2009-12-28 16:54:56 -0500 |
commit | 7d3a1c3b03c3a571a2c8c393b75558a5f4a7532a (patch) | |
tree | 8d872b4bc49349cc3b07e50a4dbae759e3f2b2e8 /net/mac80211/work.c | |
parent | af6b63741cc4e4dfd575d06beb333b11a8a6e0c0 (diff) |
mac80211: rewrite a few work messages
The station we're authenticating/associating with
may not always be an AP in the sense that word is
mostly understood, so print only the MAC address
of the peer instead.
Signed-off-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: John W. Linville <linville@tuxdriver.com>
Diffstat (limited to 'net/mac80211/work.c')
-rw-r--r-- | net/mac80211/work.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/net/mac80211/work.c b/net/mac80211/work.c index 8b8961d806ab..874345918e83 100644 --- a/net/mac80211/work.c +++ b/net/mac80211/work.c | |||
@@ -376,7 +376,7 @@ ieee80211_direct_probe(struct ieee80211_work *wk) | |||
376 | 376 | ||
377 | wk->probe_auth.tries++; | 377 | wk->probe_auth.tries++; |
378 | if (wk->probe_auth.tries > IEEE80211_AUTH_MAX_TRIES) { | 378 | if (wk->probe_auth.tries > IEEE80211_AUTH_MAX_TRIES) { |
379 | printk(KERN_DEBUG "%s: direct probe to AP %pM timed out\n", | 379 | printk(KERN_DEBUG "%s: direct probe to %pM timed out\n", |
380 | sdata->name, wk->filter_ta); | 380 | sdata->name, wk->filter_ta); |
381 | 381 | ||
382 | /* | 382 | /* |
@@ -394,7 +394,7 @@ ieee80211_direct_probe(struct ieee80211_work *wk) | |||
394 | return WORK_ACT_TIMEOUT; | 394 | return WORK_ACT_TIMEOUT; |
395 | } | 395 | } |
396 | 396 | ||
397 | printk(KERN_DEBUG "%s: direct probe to AP %pM (try %d)\n", | 397 | printk(KERN_DEBUG "%s: direct probe to %pM (try %d)\n", |
398 | sdata->name, wk->filter_ta, wk->probe_auth.tries); | 398 | sdata->name, wk->filter_ta, wk->probe_auth.tries); |
399 | 399 | ||
400 | /* | 400 | /* |
@@ -419,7 +419,7 @@ ieee80211_authenticate(struct ieee80211_work *wk) | |||
419 | 419 | ||
420 | wk->probe_auth.tries++; | 420 | wk->probe_auth.tries++; |
421 | if (wk->probe_auth.tries > IEEE80211_AUTH_MAX_TRIES) { | 421 | if (wk->probe_auth.tries > IEEE80211_AUTH_MAX_TRIES) { |
422 | printk(KERN_DEBUG "%s: authentication with AP %pM" | 422 | printk(KERN_DEBUG "%s: authentication with %pM" |
423 | " timed out\n", sdata->name, wk->filter_ta); | 423 | " timed out\n", sdata->name, wk->filter_ta); |
424 | 424 | ||
425 | /* | 425 | /* |
@@ -437,7 +437,7 @@ ieee80211_authenticate(struct ieee80211_work *wk) | |||
437 | return WORK_ACT_TIMEOUT; | 437 | return WORK_ACT_TIMEOUT; |
438 | } | 438 | } |
439 | 439 | ||
440 | printk(KERN_DEBUG "%s: authenticate with AP %pM (try %d)\n", | 440 | printk(KERN_DEBUG "%s: authenticate with %pM (try %d)\n", |
441 | sdata->name, wk->filter_ta, wk->probe_auth.tries); | 441 | sdata->name, wk->filter_ta, wk->probe_auth.tries); |
442 | 442 | ||
443 | ieee80211_send_auth(sdata, 1, wk->probe_auth.algorithm, wk->ie, | 443 | ieee80211_send_auth(sdata, 1, wk->probe_auth.algorithm, wk->ie, |
@@ -458,7 +458,7 @@ ieee80211_associate(struct ieee80211_work *wk) | |||
458 | 458 | ||
459 | wk->assoc.tries++; | 459 | wk->assoc.tries++; |
460 | if (wk->assoc.tries > IEEE80211_ASSOC_MAX_TRIES) { | 460 | if (wk->assoc.tries > IEEE80211_ASSOC_MAX_TRIES) { |
461 | printk(KERN_DEBUG "%s: association with AP %pM" | 461 | printk(KERN_DEBUG "%s: association with %pM" |
462 | " timed out\n", | 462 | " timed out\n", |
463 | sdata->name, wk->filter_ta); | 463 | sdata->name, wk->filter_ta); |
464 | 464 | ||
@@ -479,7 +479,7 @@ ieee80211_associate(struct ieee80211_work *wk) | |||
479 | return WORK_ACT_TIMEOUT; | 479 | return WORK_ACT_TIMEOUT; |
480 | } | 480 | } |
481 | 481 | ||
482 | printk(KERN_DEBUG "%s: associate with AP %pM (try %d)\n", | 482 | printk(KERN_DEBUG "%s: associate with %pM (try %d)\n", |
483 | sdata->name, wk->filter_ta, wk->assoc.tries); | 483 | sdata->name, wk->filter_ta, wk->assoc.tries); |
484 | ieee80211_send_assoc(sdata, wk); | 484 | ieee80211_send_assoc(sdata, wk); |
485 | 485 | ||
@@ -592,9 +592,9 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_work *wk, | |||
592 | u32 tu, ms; | 592 | u32 tu, ms; |
593 | tu = get_unaligned_le32(elems.timeout_int + 1); | 593 | tu = get_unaligned_le32(elems.timeout_int + 1); |
594 | ms = tu * 1024 / 1000; | 594 | ms = tu * 1024 / 1000; |
595 | printk(KERN_DEBUG "%s: AP rejected association temporarily; " | 595 | printk(KERN_DEBUG "%s: %pM rejected association temporarily; " |
596 | "comeback duration %u TU (%u ms)\n", | 596 | "comeback duration %u TU (%u ms)\n", |
597 | sdata->name, tu, ms); | 597 | sdata->name, mgmt->sa, tu, ms); |
598 | wk->timeout = jiffies + msecs_to_jiffies(ms); | 598 | wk->timeout = jiffies + msecs_to_jiffies(ms); |
599 | if (ms > IEEE80211_ASSOC_TIMEOUT) | 599 | if (ms > IEEE80211_ASSOC_TIMEOUT) |
600 | run_again(local, wk->timeout); | 600 | run_again(local, wk->timeout); |
@@ -602,8 +602,8 @@ ieee80211_rx_mgmt_assoc_resp(struct ieee80211_work *wk, | |||
602 | } | 602 | } |
603 | 603 | ||
604 | if (status_code != WLAN_STATUS_SUCCESS) | 604 | if (status_code != WLAN_STATUS_SUCCESS) |
605 | printk(KERN_DEBUG "%s: AP denied association (code=%d)\n", | 605 | printk(KERN_DEBUG "%s: %pM denied association (code=%d)\n", |
606 | sdata->name, status_code); | 606 | sdata->name, mgmt->sa, status_code); |
607 | else | 607 | else |
608 | printk(KERN_DEBUG "%s: associated\n", sdata->name); | 608 | printk(KERN_DEBUG "%s: associated\n", sdata->name); |
609 | 609 | ||