[NET]: Make NETDEBUG pure printk wrappers
Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
parent
64cf1e5d8b
commit
64ce207306
21 changed files with 75 additions and 89 deletions
|
@ -331,8 +331,8 @@ static void esp4_err(struct sk_buff *skb, u32 info)
|
|||
x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, esph->spi, IPPROTO_ESP, AF_INET);
|
||||
if (!x)
|
||||
return;
|
||||
NETDEBUG(printk(KERN_DEBUG "pmtu discovery on SA ESP/%08x/%08x\n",
|
||||
ntohl(esph->spi), ntohl(iph->daddr)));
|
||||
NETDEBUG(KERN_DEBUG "pmtu discovery on SA ESP/%08x/%08x\n",
|
||||
ntohl(esph->spi), ntohl(iph->daddr));
|
||||
xfrm_state_put(x);
|
||||
}
|
||||
|
||||
|
@ -395,10 +395,10 @@ static int esp_init_state(struct xfrm_state *x)
|
|||
|
||||
if (aalg_desc->uinfo.auth.icv_fullbits/8 !=
|
||||
crypto_tfm_alg_digestsize(esp->auth.tfm)) {
|
||||
NETDEBUG(printk(KERN_INFO "ESP: %s digestsize %u != %hu\n",
|
||||
x->aalg->alg_name,
|
||||
crypto_tfm_alg_digestsize(esp->auth.tfm),
|
||||
aalg_desc->uinfo.auth.icv_fullbits/8));
|
||||
NETDEBUG(KERN_INFO "ESP: %s digestsize %u != %hu\n",
|
||||
x->aalg->alg_name,
|
||||
crypto_tfm_alg_digestsize(esp->auth.tfm),
|
||||
aalg_desc->uinfo.auth.icv_fullbits/8);
|
||||
goto error;
|
||||
}
|
||||
|
||||
|
|
|
@ -627,11 +627,10 @@ static void icmp_unreach(struct sk_buff *skb)
|
|||
break;
|
||||
case ICMP_FRAG_NEEDED:
|
||||
if (ipv4_config.no_pmtu_disc) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_INFO "ICMP: %u.%u.%u.%u: "
|
||||
LIMIT_NETDEBUG(KERN_INFO "ICMP: %u.%u.%u.%u: "
|
||||
"fragmentation needed "
|
||||
"and DF set.\n",
|
||||
NIPQUAD(iph->daddr)));
|
||||
NIPQUAD(iph->daddr));
|
||||
} else {
|
||||
info = ip_rt_frag_needed(iph,
|
||||
ntohs(icmph->un.frag.mtu));
|
||||
|
@ -640,10 +639,9 @@ static void icmp_unreach(struct sk_buff *skb)
|
|||
}
|
||||
break;
|
||||
case ICMP_SR_FAILED:
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_INFO "ICMP: %u.%u.%u.%u: Source "
|
||||
LIMIT_NETDEBUG(KERN_INFO "ICMP: %u.%u.%u.%u: Source "
|
||||
"Route Failed.\n",
|
||||
NIPQUAD(iph->daddr)));
|
||||
NIPQUAD(iph->daddr));
|
||||
break;
|
||||
default:
|
||||
break;
|
||||
|
@ -936,7 +934,7 @@ int icmp_rcv(struct sk_buff *skb)
|
|||
case CHECKSUM_HW:
|
||||
if (!(u16)csum_fold(skb->csum))
|
||||
break;
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "icmp v4 hw csum failure\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "icmp v4 hw csum failure\n");
|
||||
case CHECKSUM_NONE:
|
||||
if ((u16)csum_fold(skb_checksum(skb, 0, skb->len, 0)))
|
||||
goto error;
|
||||
|
|
|
@ -904,7 +904,7 @@ int igmp_rcv(struct sk_buff *skb)
|
|||
case IGMP_MTRACE_RESP:
|
||||
break;
|
||||
default:
|
||||
NETDEBUG(printk(KERN_DEBUG "New IGMP type=%d, why we do not know about it?\n", ih->type));
|
||||
NETDEBUG(KERN_DEBUG "New IGMP type=%d, why we do not know about it?\n", ih->type);
|
||||
}
|
||||
in_dev_put(in_dev);
|
||||
kfree_skb(skb);
|
||||
|
|
|
@ -377,7 +377,7 @@ static struct ipq *ip_frag_create(unsigned hash, struct iphdr *iph, u32 user)
|
|||
return ip_frag_intern(hash, qp);
|
||||
|
||||
out_nomem:
|
||||
LIMIT_NETDEBUG(printk(KERN_ERR "ip_frag_create: no memory left !\n"));
|
||||
LIMIT_NETDEBUG(KERN_ERR "ip_frag_create: no memory left !\n");
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
@ -625,8 +625,8 @@ static struct sk_buff *ip_frag_reasm(struct ipq *qp, struct net_device *dev)
|
|||
return head;
|
||||
|
||||
out_nomem:
|
||||
LIMIT_NETDEBUG(printk(KERN_ERR "IP: queue_glue: no memory for gluing "
|
||||
"queue %p\n", qp));
|
||||
LIMIT_NETDEBUG(KERN_ERR "IP: queue_glue: no memory for gluing "
|
||||
"queue %p\n", qp);
|
||||
goto out_fail;
|
||||
out_oversize:
|
||||
if (net_ratelimit())
|
||||
|
|
|
@ -573,7 +573,7 @@ slow_path:
|
|||
*/
|
||||
|
||||
if ((skb2 = alloc_skb(len+hlen+ll_rs, GFP_ATOMIC)) == NULL) {
|
||||
NETDEBUG(printk(KERN_INFO "IP: frag: no memory for new fragment!\n"));
|
||||
NETDEBUG(KERN_INFO "IP: frag: no memory for new fragment!\n");
|
||||
err = -ENOMEM;
|
||||
goto fail;
|
||||
}
|
||||
|
|
|
@ -214,8 +214,8 @@ static void ipcomp4_err(struct sk_buff *skb, u32 info)
|
|||
spi, IPPROTO_COMP, AF_INET);
|
||||
if (!x)
|
||||
return;
|
||||
NETDEBUG(printk(KERN_DEBUG "pmtu discovery on SA IPCOMP/%08x/%u.%u.%u.%u\n",
|
||||
spi, NIPQUAD(iph->daddr)));
|
||||
NETDEBUG(KERN_DEBUG "pmtu discovery on SA IPCOMP/%08x/%u.%u.%u.%u\n",
|
||||
spi, NIPQUAD(iph->daddr));
|
||||
xfrm_state_put(x);
|
||||
}
|
||||
|
||||
|
|
|
@ -990,11 +990,10 @@ int tcp_v4_conn_request(struct sock *sk, struct sk_buff *skb)
|
|||
* to destinations, already remembered
|
||||
* to the moment of synflood.
|
||||
*/
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "TCP: drop open "
|
||||
"request from %u.%u."
|
||||
"%u.%u/%u\n",
|
||||
NIPQUAD(saddr),
|
||||
ntohs(skb->h.th->source)));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "TCP: drop open "
|
||||
"request from %u.%u.%u.%u/%u\n",
|
||||
NIPQUAD(saddr),
|
||||
ntohs(skb->h.th->source));
|
||||
dst_release(dst);
|
||||
goto drop_and_free;
|
||||
}
|
||||
|
@ -1118,7 +1117,7 @@ static int tcp_v4_checksum_init(struct sk_buff *skb)
|
|||
skb->nh.iph->daddr, skb->csum))
|
||||
return 0;
|
||||
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "hw tcp v4 csum failed\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "hw tcp v4 csum failed\n");
|
||||
skb->ip_summed = CHECKSUM_NONE;
|
||||
}
|
||||
if (skb->len <= 76) {
|
||||
|
|
|
@ -629,7 +629,7 @@ back_from_confirm:
|
|||
/* ... which is an evident application bug. --ANK */
|
||||
release_sock(sk);
|
||||
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp cork app bug 2\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "udp cork app bug 2\n");
|
||||
err = -EINVAL;
|
||||
goto out;
|
||||
}
|
||||
|
@ -694,7 +694,7 @@ static int udp_sendpage(struct sock *sk, struct page *page, int offset,
|
|||
if (unlikely(!up->pending)) {
|
||||
release_sock(sk);
|
||||
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp cork app bug 3\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "udp cork app bug 3\n");
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
|
@ -1103,7 +1103,7 @@ static int udp_checksum_init(struct sk_buff *skb, struct udphdr *uh,
|
|||
skb->ip_summed = CHECKSUM_UNNECESSARY;
|
||||
if (!udp_check(uh, ulen, saddr, daddr, skb->csum))
|
||||
return 0;
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp v4 hw csum failure.\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "udp v4 hw csum failure.\n");
|
||||
skb->ip_summed = CHECKSUM_NONE;
|
||||
}
|
||||
if (skb->ip_summed != CHECKSUM_UNNECESSARY)
|
||||
|
@ -1182,13 +1182,13 @@ int udp_rcv(struct sk_buff *skb)
|
|||
return(0);
|
||||
|
||||
short_packet:
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u\n",
|
||||
NIPQUAD(saddr),
|
||||
ntohs(uh->source),
|
||||
ulen,
|
||||
len,
|
||||
NIPQUAD(daddr),
|
||||
ntohs(uh->dest)));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u\n",
|
||||
NIPQUAD(saddr),
|
||||
ntohs(uh->source),
|
||||
ulen,
|
||||
len,
|
||||
NIPQUAD(daddr),
|
||||
ntohs(uh->dest));
|
||||
no_header:
|
||||
UDP_INC_STATS_BH(UDP_MIB_INERRORS);
|
||||
kfree_skb(skb);
|
||||
|
@ -1199,12 +1199,12 @@ csum_error:
|
|||
* RFC1122: OK. Discards the bad packet silently (as far as
|
||||
* the network is concerned, anyway) as per 4.1.3.4 (MUST).
|
||||
*/
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d\n",
|
||||
NIPQUAD(saddr),
|
||||
ntohs(uh->source),
|
||||
NIPQUAD(daddr),
|
||||
ntohs(uh->dest),
|
||||
ulen));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d\n",
|
||||
NIPQUAD(saddr),
|
||||
ntohs(uh->source),
|
||||
NIPQUAD(daddr),
|
||||
ntohs(uh->dest),
|
||||
ulen);
|
||||
drop:
|
||||
UDP_INC_STATS_BH(UDP_MIB_INERRORS);
|
||||
kfree_skb(skb);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue