From patchwork Thu Jan 9 13:22:16 2014 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Roy, UjjaL" X-Patchwork-Id: 3460181 Return-Path: X-Original-To: patchwork-linux-wireless@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.19.201]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 5E3FA9F384 for ; Thu, 9 Jan 2014 13:22:43 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 2198620123 for ; Thu, 9 Jan 2014 13:22:42 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id C288F20121 for ; Thu, 9 Jan 2014 13:22:40 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751671AbaAINWi (ORCPT ); Thu, 9 Jan 2014 08:22:38 -0500 Received: from mail-pa0-f49.google.com ([209.85.220.49]:64574 "EHLO mail-pa0-f49.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751402AbaAINWi (ORCPT ); Thu, 9 Jan 2014 08:22:38 -0500 Received: by mail-pa0-f49.google.com with SMTP id kx10so3300346pab.22 for ; Thu, 09 Jan 2014 05:22:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=from:to:cc:subject:date:message-id; bh=mknDHx+cY74k30T0u683Pn1BKnZyqr+XpZAW2sAP/3w=; b=uBZizmhTHw2m7S00nlHivDLzMbpOM9Da5dTSydDNHeKDmH0WXdbOfSmn9grgLsC9oa NzDogStvFKON8CsgpQlvH+PIGgUEVHrWMc7+clpHetqOFTmPAgGgl3MmqO575+A3LI9S X2rRQUY/PnzvIDW6pcqqZ21at6Cx8uVMiq51vfPGlPCSvPRUAInPhBlUJNSWlg5eZpNY SxSyQw7voZ0nYjJya2a7arQ36dKw2IXoRN7yCwibJkvODPFvax8VGRwFrQjzvDNHaIA8 hA4UN5yGNNBZ15oxxIg0X9tsL7WEqnggfg+O8c7IpZRokGLWeLVCtH+9SxTJveuDY+/u 7m4w== X-Received: by 10.68.59.202 with SMTP id b10mr3731382pbr.78.1389273755657; Thu, 09 Jan 2014 05:22:35 -0800 (PST) Received: from localhost.localdomain (gw.alumnux.com. [121.243.14.254]) by mx.google.com with ESMTPSA id pe3sm9966813pbc.23.2014.01.09.05.22.33 for (version=TLSv1.2 cipher=AES128-GCM-SHA256 bits=128/128); Thu, 09 Jan 2014 05:22:35 -0800 (PST) From: Ujjal Roy To: Johannes Berg Cc: WiFi Mailing List Subject: [RFC] iw: add support for retry limit Date: Thu, 9 Jan 2014 18:52:16 +0530 Message-Id: <1389273736-9486-1-git-send-email-royujjal@gmail.com> X-Mailer: git-send-email 1.8.1.4 Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED, DKIM_SIGNED, FREEMAIL_FROM, RCVD_IN_DNSWL_HI, RP_MATCHES_RCVD, T_DKIM_INVALID, UNPARSEABLE_RELAY autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP Show the retry limit in phy details and also configure the retry limit. Signed-off-by: Ujjal Roy --- info.c | 16 ++++++++++++++++ phy.c | 39 +++++++++++++++++++++++++++++++++++++++ 2 files changed, 55 insertions(+) diff --git a/info.c b/info.c index a696503..08b3292 100644 --- a/info.c +++ b/info.c @@ -246,6 +246,22 @@ next: printf("\tRTS threshold: %d\n", rts); } + if (tb_msg[NL80211_ATTR_WIPHY_RETRY_SHORT] || + tb_msg[NL80211_ATTR_WIPHY_RETRY_LONG]) { + unsigned char retry_s = 0, retry_l = 0; + + if (tb_msg[NL80211_ATTR_WIPHY_RETRY_SHORT]) + retry_s = nla_get_u8(tb_msg[NL80211_ATTR_WIPHY_RETRY_SHORT]); + if (tb_msg[NL80211_ATTR_WIPHY_RETRY_LONG]) + retry_l = nla_get_u8(tb_msg[NL80211_ATTR_WIPHY_RETRY_LONG]); + if (retry_s == retry_l) { + printf("\tRetry short long limit: %d\n", retry_s); + } else { + printf("\tRetry short limit: %d\n", retry_s); + printf("\tRetry long limit: %d\n", retry_l); + } + } + if (tb_msg[NL80211_ATTR_WIPHY_COVERAGE_CLASS]) { unsigned char coverage; diff --git a/phy.c b/phy.c index 68f40f6..da05103 100644 --- a/phy.c +++ b/phy.c @@ -232,6 +232,45 @@ COMMAND(set, rts, "", NL80211_CMD_SET_WIPHY, 0, CIB_PHY, handle_rts, "Set rts threshold."); +static int handle_retry(struct nl80211_state *state, + struct nl_cb *cb, struct nl_msg *msg, + int argc, char **argv, + enum id_input id) +{ + unsigned int retry_short = 0, retry_long = 0; + char *end; + + if (!argc || argc > 2) + return 1; + + if (!*argv[0]) + return 1; + retry_short = strtoul(argv[0], &end, 10); + if (*end != '\0') + return 1; + if (!retry_short || retry_short > 255) + return -EINVAL; + NLA_PUT_U8(msg, NL80211_ATTR_WIPHY_RETRY_SHORT, retry_short); + + if (argc == 2) { + if (!*argv[1]) + return 1; + retry_long = strtoul(argv[1], &end, 10); + if (*end != '\0') + return 1; + if (!retry_long || retry_long > 255) + return -EINVAL; + NLA_PUT_U8(msg, NL80211_ATTR_WIPHY_RETRY_LONG, retry_long); + } + + return 0; + nla_put_failure: + return -ENOBUFS; +} +COMMAND(set, retry, " []", + NL80211_CMD_SET_WIPHY, 0, CIB_PHY, handle_retry, + "Set retry limit."); + static int handle_netns(struct nl80211_state *state, struct nl_cb *cb, struct nl_msg *msg,