Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp4702018rwn; Sun, 11 Sep 2022 19:25:32 -0700 (PDT) X-Google-Smtp-Source: AA6agR78a9PGv0JUF2ZUagSKBFy80emf9SaUsHvCnSLRoYEJ/63+pFCihjg57uZ85EWpdhqUSERW X-Received: by 2002:a17:902:e945:b0:16a:1c41:f66 with SMTP id b5-20020a170902e94500b0016a1c410f66mr24302328pll.129.1662949532050; Sun, 11 Sep 2022 19:25:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662949532; cv=none; d=google.com; s=arc-20160816; b=QoTwZu3wjE8GwBc5DAI9R6qvUfYApZESa5HYi6lsFh/sHO+SQpyDafyRqZLl2TNMkp qf7GLyAjWjand0wJd/4iNsh/qU+CD5LjlV6AtzemjUVqbNUJXvHiqEPppbKgPkQW0ovv qY3cHqWNYLJIKRzt3QKdovrASJK+GiQ+wy7c8hChdSGA+xm7LSC00yHcJRtW4nLDlICK hhX5QNd+29gUZUbC4DBZRZX95K37hDxHFfjaOo77TmVXUJNOtoojJEHXghL97xF7G2X/ YlKEzYBwSTktOcYhlZjXm4giAEK78jAjfPGwfbxVBHKbhnyvcYxHRI0MxLdpydmmoGFp HwLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:authenticated-by; bh=HB5QwEBbhcvrRODxnPUERd9k0od1+l0gM6VCSyCYAk0=; b=GZbYbbhP7NuWFsmccIaSl6fD+RJizT2GvQ9a5iaUe1U9gLnYjjnoFrlvfg2mmNHN6T DRMmDepdWhKkx6rpQTX7wo7xyeqvv5FkI6f4jileIRUuzQ8QTC4wYta9s09HRs3Kf7wS Gt1rnWAxOKt6AtehkrvNH5ZltRIFiXUmgewfURep1IK8CPHtP9SLy067Y0OqkYC9NCco 8IEHLEuYJM0RKiSr67DgHWEk8fh7ft/6MXvHTMCwDGC8uMKFCfWFoI4Q/+2jafA6Entb U2NMxDIrT2WTebeAwZq77mgz0yGmwa2h/lxR2bxQNobW0ePjtmADIOQ6K/RfNdMe+egb G7PA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id s22-20020a632c16000000b0043087ac1272si7834097pgs.586.2022.09.11.19.25.20; Sun, 11 Sep 2022 19:25:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229577AbiILCKt (ORCPT + 64 others); Sun, 11 Sep 2022 22:10:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47506 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229456AbiILCKs (ORCPT ); Sun, 11 Sep 2022 22:10:48 -0400 Received: from rtits2.realtek.com.tw (rtits2.realtek.com [211.75.126.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 142EE2717C for ; Sun, 11 Sep 2022 19:10:46 -0700 (PDT) Authenticated-By: X-SpamFilter-By: ArmorX SpamTrap 5.77 with qID 28C2AEQ30026258, This message is accepted by code: ctloc85258 Received: from mail.realtek.com (rtexh36504.realtek.com.tw[172.21.6.27]) by rtits2.realtek.com.tw (8.15.2/2.81/5.90) with ESMTPS id 28C2AEQ30026258 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=FAIL); Mon, 12 Sep 2022 10:10:14 +0800 Received: from RTEXMBS04.realtek.com.tw (172.21.6.97) by RTEXH36504.realtek.com.tw (172.21.6.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Mon, 12 Sep 2022 10:10:34 +0800 Received: from localhost (172.21.69.188) by RTEXMBS04.realtek.com.tw (172.21.6.97) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.7; Mon, 12 Sep 2022 10:10:34 +0800 From: Ping-Ke Shih To: CC: Subject: [PATCH] wifi: rtw89: coex: show connecting state in debug message Date: Mon, 12 Sep 2022 10:10:09 +0800 Message-ID: <20220912021009.6011-1-pkshih@realtek.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [172.21.69.188] X-ClientProxiedBy: RTEXMBS02.realtek.com.tw (172.21.6.95) To RTEXMBS04.realtek.com.tw (172.21.6.97) X-KSE-ServerInfo: RTEXMBS04.realtek.com.tw, 9 X-KSE-AntiSpam-Interceptor-Info: trusted connection X-KSE-Antiphishing-Info: Clean X-KSE-Antiphishing-ScanningType: Deterministic X-KSE-Antiphishing-Method: None X-KSE-Antiphishing-Bases: 09/12/2022 01:41:00 X-KSE-AttachmentFiltering-Interceptor-Info: no applicable attachment filtering rules found X-KSE-Antivirus-Interceptor-Info: scan successful X-KSE-Antivirus-Info: =?big5?B?Q2xlYW4sIGJhc2VzOiAyMDIyLzkvMTEgpFWkyCAxMTozMjowMA==?= X-KSE-BulkMessagesFiltering-Scan-Result: protection disabled X-KSE-ServerInfo: RTEXH36504.realtek.com.tw, 9 X-KSE-AntiSpam-Interceptor-Info: fallback X-KSE-Antivirus-Interceptor-Info: fallback X-KSE-AntiSpam-Interceptor-Info: fallback X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org The variable cnt_connecting is to indicate if we are connecting to an AP. This is an important clue for coexistence to assign more time slot to WiFi side in this situation to ensure WiFi can establish connection. Without this patch, compiler warns: drivers/net/wireless/realtek/rtw89/coex.c:3244:25: warning: variable 'cnt_connecting' set but not used [-Wunused-but-set-variable] Reported-by: kernel test robot Signed-off-by: Ping-Ke Shih --- drivers/net/wireless/realtek/rtw89/coex.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/net/wireless/realtek/rtw89/coex.c b/drivers/net/wireless/realtek/rtw89/coex.c index 732502b64b255..e3d1b165c322e 100644 --- a/drivers/net/wireless/realtek/rtw89/coex.c +++ b/drivers/net/wireless/realtek/rtw89/coex.c @@ -4088,8 +4088,8 @@ static void _update_wl_info(struct rtw89_dev *rtwdev) } rtw89_debug(rtwdev, RTW89_DBG_BTC, - "[BTC], cnt_connect = %d, link_mode = %d\n", - cnt_connect, wl_rinfo->link_mode); + "[BTC], cnt_connect = %d, connecting = %d, link_mode = %d\n", + cnt_connect, cnt_connecting, wl_rinfo->link_mode); _fw_set_drv_info(rtwdev, CXDRVINFO_ROLE); } -- 2.25.1