[NET]: Make NETDEBUG pure printk wrappers
Signed-off-by: Patrick McHardy <kaber@trash.net> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
committed by
David S. Miller
parent
64cf1e5d8b
commit
64ce207306
@ -131,10 +131,10 @@ static int ipv6_clear_mutable_options(struct ipv6hdr *iph, int len)
|
||||
case NEXTHDR_HOP:
|
||||
case NEXTHDR_DEST:
|
||||
if (!zero_out_mutable_opts(exthdr.opth)) {
|
||||
LIMIT_NETDEBUG(printk(
|
||||
LIMIT_NETDEBUG(
|
||||
KERN_WARNING "overrun %sopts\n",
|
||||
nexthdr == NEXTHDR_HOP ?
|
||||
"hop" : "dest"));
|
||||
"hop" : "dest");
|
||||
return -EINVAL;
|
||||
}
|
||||
break;
|
||||
@ -293,8 +293,7 @@ static int ah6_input(struct xfrm_state *x, struct xfrm_decap_state *decap, struc
|
||||
skb_push(skb, skb->data - skb->nh.raw);
|
||||
ahp->icv(ahp, skb, ah->auth_data);
|
||||
if (memcmp(ah->auth_data, auth_data, ahp->icv_trunc_len)) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_WARNING "ipsec ah authentication error\n"));
|
||||
LIMIT_NETDEBUG(KERN_WARNING "ipsec ah authentication error\n");
|
||||
x->stats.integrity_failed++;
|
||||
goto free_out;
|
||||
}
|
||||
@ -332,9 +331,9 @@ static void ah6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
|
||||
if (!x)
|
||||
return;
|
||||
|
||||
NETDEBUG(printk(KERN_DEBUG "pmtu discovery on SA AH/%08x/"
|
||||
"%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x\n",
|
||||
ntohl(ah->spi), NIP6(iph->daddr)));
|
||||
NETDEBUG(KERN_DEBUG "pmtu discovery on SA AH/%08x/"
|
||||
"%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x\n",
|
||||
ntohl(ah->spi), NIP6(iph->daddr));
|
||||
|
||||
xfrm_state_put(x);
|
||||
}
|
||||
|
@ -589,8 +589,8 @@ int datagram_send_ctl(struct msghdr *msg, struct flowi *fl,
|
||||
break;
|
||||
|
||||
default:
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "invalid cmsg type: %d\n", cmsg->cmsg_type));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "invalid cmsg type: %d\n",
|
||||
cmsg->cmsg_type);
|
||||
err = -EINVAL;
|
||||
break;
|
||||
};
|
||||
|
@ -212,8 +212,7 @@ static int esp6_input(struct xfrm_state *x, struct xfrm_decap_state *decap, stru
|
||||
|
||||
padlen = nexthdr[0];
|
||||
if (padlen+2 >= elen) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_WARNING "ipsec esp packet is garbage padlen=%d, elen=%d\n", padlen+2, elen));
|
||||
LIMIT_NETDEBUG(KERN_WARNING "ipsec esp packet is garbage padlen=%d, elen=%d\n", padlen+2, elen);
|
||||
ret = -EINVAL;
|
||||
goto out;
|
||||
}
|
||||
|
@ -424,8 +424,8 @@ static int ipv6_hop_ra(struct sk_buff *skb, int optoff)
|
||||
IP6CB(skb)->ra = optoff;
|
||||
return 1;
|
||||
}
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "ipv6_hop_ra: wrong RA length %d\n", skb->nh.raw[optoff+1]));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "ipv6_hop_ra: wrong RA length %d\n",
|
||||
skb->nh.raw[optoff+1]);
|
||||
kfree_skb(skb);
|
||||
return 0;
|
||||
}
|
||||
@ -437,8 +437,8 @@ static int ipv6_hop_jumbo(struct sk_buff *skb, int optoff)
|
||||
u32 pkt_len;
|
||||
|
||||
if (skb->nh.raw[optoff+1] != 4 || (optoff&3) != 2) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "ipv6_hop_jumbo: wrong jumbo opt length/alignment %d\n", skb->nh.raw[optoff+1]));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "ipv6_hop_jumbo: wrong jumbo opt length/alignment %d\n",
|
||||
skb->nh.raw[optoff+1]);
|
||||
IP6_INC_STATS_BH(IPSTATS_MIB_INHDRERRORS);
|
||||
goto drop;
|
||||
}
|
||||
|
@ -332,8 +332,7 @@ void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info,
|
||||
* for now we don't know that.
|
||||
*/
|
||||
if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "icmpv6_send: addr_any/mcast source\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: addr_any/mcast source\n");
|
||||
return;
|
||||
}
|
||||
|
||||
@ -341,8 +340,7 @@ void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info,
|
||||
* Never answer to a ICMP packet.
|
||||
*/
|
||||
if (is_ineligible(skb)) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "icmpv6_send: no reply to icmp error\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: no reply to icmp error\n");
|
||||
return;
|
||||
}
|
||||
|
||||
@ -393,8 +391,7 @@ void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info,
|
||||
len = skb->len - msg.offset;
|
||||
len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) -sizeof(struct icmp6hdr));
|
||||
if (len < 0) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "icmp: len problem\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "icmp: len problem\n");
|
||||
goto out_dst_release;
|
||||
}
|
||||
|
||||
@ -584,17 +581,15 @@ static int icmpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp)
|
||||
skb->ip_summed = CHECKSUM_UNNECESSARY;
|
||||
if (csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6,
|
||||
skb->csum)) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "ICMPv6 hw checksum failed\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "ICMPv6 hw checksum failed\n");
|
||||
skb->ip_summed = CHECKSUM_NONE;
|
||||
}
|
||||
}
|
||||
if (skb->ip_summed == CHECKSUM_NONE) {
|
||||
if (csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6,
|
||||
skb_checksum(skb, 0, skb->len, 0))) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "ICMPv6 checksum failed [%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x > %04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x]\n",
|
||||
NIP6(*saddr), NIP6(*daddr)));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "ICMPv6 checksum failed [%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x > %04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x]\n",
|
||||
NIP6(*saddr), NIP6(*daddr));
|
||||
goto discard_it;
|
||||
}
|
||||
}
|
||||
@ -670,8 +665,7 @@ static int icmpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp)
|
||||
break;
|
||||
|
||||
default:
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "icmpv6: msg of unknown type\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "icmpv6: msg of unknown type\n");
|
||||
|
||||
/* informational */
|
||||
if (type & ICMPV6_INFOMSG_MASK)
|
||||
|
@ -625,7 +625,7 @@ slow_path:
|
||||
*/
|
||||
|
||||
if ((frag = alloc_skb(len+hlen+sizeof(struct frag_hdr)+LL_RESERVED_SPACE(rt->u.dst.dev), GFP_ATOMIC)) == NULL) {
|
||||
NETDEBUG(printk(KERN_INFO "IPv6: frag: no memory for new fragment!\n"));
|
||||
NETDEBUG(KERN_INFO "IPv6: frag: no memory for new fragment!\n");
|
||||
IP6_INC_STATS(IPSTATS_MIB_FRAGFAILS);
|
||||
err = -ENOMEM;
|
||||
goto fail;
|
||||
|
@ -28,8 +28,7 @@ int ip6_route_me_harder(struct sk_buff *skb)
|
||||
|
||||
if (dst->error) {
|
||||
IP6_INC_STATS(IPSTATS_MIB_OUTNOROUTES);
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "ip6_route_me_harder: No more route.\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "ip6_route_me_harder: No more route.\n");
|
||||
dst_release(dst);
|
||||
return -EINVAL;
|
||||
}
|
||||
|
@ -343,8 +343,7 @@ int rawv6_rcv(struct sock *sk, struct sk_buff *skb)
|
||||
if (csum_ipv6_magic(&skb->nh.ipv6h->saddr,
|
||||
&skb->nh.ipv6h->daddr,
|
||||
skb->len, inet->num, skb->csum)) {
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_DEBUG "raw v6 hw csum failure.\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "raw v6 hw csum failure.\n");
|
||||
skb->ip_summed = CHECKSUM_NONE;
|
||||
}
|
||||
}
|
||||
|
@ -1564,7 +1564,7 @@ static int tcp_v6_checksum_init(struct sk_buff *skb)
|
||||
if (!tcp_v6_check(skb->h.th,skb->len,&skb->nh.ipv6h->saddr,
|
||||
&skb->nh.ipv6h->daddr,skb->csum))
|
||||
return 0;
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "hw tcp v6 csum failed\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "hw tcp v6 csum failed\n");
|
||||
}
|
||||
if (skb->len <= 76) {
|
||||
if (tcp_v6_check(skb->h.th,skb->len,&skb->nh.ipv6h->saddr,
|
||||
|
@ -478,8 +478,7 @@ static int udpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp)
|
||||
/* RFC 2460 section 8.1 says that we SHOULD log
|
||||
this error. Well, it is reasonable.
|
||||
*/
|
||||
LIMIT_NETDEBUG(
|
||||
printk(KERN_INFO "IPv6: udp checksum is 0\n"));
|
||||
LIMIT_NETDEBUG(KERN_INFO "IPv6: udp checksum is 0\n");
|
||||
goto discard;
|
||||
}
|
||||
|
||||
@ -494,7 +493,7 @@ static int udpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp)
|
||||
if (skb->ip_summed==CHECKSUM_HW) {
|
||||
skb->ip_summed = CHECKSUM_UNNECESSARY;
|
||||
if (csum_ipv6_magic(saddr, daddr, ulen, IPPROTO_UDP, skb->csum)) {
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp v6 hw csum failure.\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "udp v6 hw csum failure.\n");
|
||||
skb->ip_summed = CHECKSUM_NONE;
|
||||
}
|
||||
}
|
||||
@ -826,7 +825,7 @@ back_from_confirm:
|
||||
/* ... which is an evident application bug. --ANK */
|
||||
release_sock(sk);
|
||||
|
||||
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp cork app bug 2\n"));
|
||||
LIMIT_NETDEBUG(KERN_DEBUG "udp cork app bug 2\n");
|
||||
err = -EINVAL;
|
||||
goto out;
|
||||
}
|
||||
|
Reference in New Issue
Block a user