提交 64ce2073 编写于 作者: P Patrick McHardy 提交者: David S. Miller

[NET]: Make NETDEBUG pure printk wrappers

Signed-off-by: NPatrick McHardy <kaber@trash.net>
Signed-off-by: NDavid S. Miller <davem@davemloft.net>
上级 64cf1e5d
...@@ -1316,11 +1316,11 @@ extern int sock_get_timestamp(struct sock *, struct timeval __user *); ...@@ -1316,11 +1316,11 @@ extern int sock_get_timestamp(struct sock *, struct timeval __user *);
*/ */
#if 0 #if 0
#define NETDEBUG(x) do { } while (0) #define NETDEBUG(fmt, args...) do { } while (0)
#define LIMIT_NETDEBUG(x) do {} while(0) #define LIMIT_NETDEBUG(fmt, args...) do { } while(0)
#else #else
#define NETDEBUG(x) do { x; } while (0) #define NETDEBUG(fmt, args...) printk(fmt,##args)
#define LIMIT_NETDEBUG(x) do { if (net_ratelimit()) { x; } } while(0) #define LIMIT_NETDEBUG(fmt, args...) do { if (net_ratelimit()) printk(fmt,##args); } while(0)
#endif #endif
/* /*
......
...@@ -161,7 +161,7 @@ int dccp_rcv_established(struct sock *sk, struct sk_buff *skb, ...@@ -161,7 +161,7 @@ int dccp_rcv_established(struct sock *sk, struct sk_buff *skb,
if (dccp_ackpkts_add(dp->dccps_hc_rx_ackpkts, if (dccp_ackpkts_add(dp->dccps_hc_rx_ackpkts,
DCCP_SKB_CB(skb)->dccpd_seq, DCCP_SKB_CB(skb)->dccpd_seq,
DCCP_ACKPKTS_STATE_RECEIVED)) { DCCP_ACKPKTS_STATE_RECEIVED)) {
LIMIT_NETDEBUG(pr_info("DCCP: acknowledgeable packets buffer full!\n")); LIMIT_NETDEBUG(KERN_INFO "DCCP: acknowledgeable packets buffer full!\n");
ap->dccpap_ack_seqno = DCCP_MAX_SEQNO + 1; ap->dccpap_ack_seqno = DCCP_MAX_SEQNO + 1;
inet_csk_schedule_ack(sk); inet_csk_schedule_ack(sk);
inet_csk_reset_xmit_timer(sk, ICSK_TIME_DACK, TCP_DELACK_MIN, TCP_RTO_MAX); inet_csk_reset_xmit_timer(sk, ICSK_TIME_DACK, TCP_DELACK_MIN, TCP_RTO_MAX);
......
...@@ -231,7 +231,7 @@ void dccp_insert_option(struct sock *sk, struct sk_buff *skb, ...@@ -231,7 +231,7 @@ void dccp_insert_option(struct sock *sk, struct sk_buff *skb,
unsigned char *to; unsigned char *to;
if (DCCP_SKB_CB(skb)->dccpd_opt_len + len + 2 > DCCP_MAX_OPT_LEN) { if (DCCP_SKB_CB(skb)->dccpd_opt_len + len + 2 > DCCP_MAX_OPT_LEN) {
LIMIT_NETDEBUG(pr_info("DCCP: packet too small to insert %d option!\n", option)); LIMIT_NETDEBUG(KERN_INFO "DCCP: packet too small to insert %d option!\n", option);
return; return;
} }
...@@ -299,7 +299,7 @@ void dccp_insert_option_elapsed_time(struct sock *sk, ...@@ -299,7 +299,7 @@ void dccp_insert_option_elapsed_time(struct sock *sk,
return; return;
if (DCCP_SKB_CB(skb)->dccpd_opt_len + len > DCCP_MAX_OPT_LEN) { if (DCCP_SKB_CB(skb)->dccpd_opt_len + len > DCCP_MAX_OPT_LEN) {
LIMIT_NETDEBUG(pr_info("DCCP: packet too small to insert elapsed time!\n")); LIMIT_NETDEBUG(KERN_INFO "DCCP: packet too small to insert elapsed time!\n");
return; return;
} }
...@@ -335,7 +335,7 @@ static void dccp_insert_option_ack_vector(struct sock *sk, struct sk_buff *skb) ...@@ -335,7 +335,7 @@ static void dccp_insert_option_ack_vector(struct sock *sk, struct sk_buff *skb)
dccp_insert_option_elapsed_time(sk, skb, elapsed_time); dccp_insert_option_elapsed_time(sk, skb, elapsed_time);
if (DCCP_SKB_CB(skb)->dccpd_opt_len + len > DCCP_MAX_OPT_LEN) { if (DCCP_SKB_CB(skb)->dccpd_opt_len + len > DCCP_MAX_OPT_LEN) {
LIMIT_NETDEBUG(pr_info("DCCP: packet too small to insert ACK Vector!\n")); LIMIT_NETDEBUG(KERN_INFO "DCCP: packet too small to insert ACK Vector!\n");
return; return;
} }
...@@ -412,7 +412,7 @@ static void dccp_insert_option_timestamp_echo(struct sock *sk, struct sk_buff *s ...@@ -412,7 +412,7 @@ static void dccp_insert_option_timestamp_echo(struct sock *sk, struct sk_buff *s
unsigned char *to; unsigned char *to;
if (DCCP_SKB_CB(skb)->dccpd_opt_len + len > DCCP_MAX_OPT_LEN) { if (DCCP_SKB_CB(skb)->dccpd_opt_len + len > DCCP_MAX_OPT_LEN) {
LIMIT_NETDEBUG(pr_info("DCCP: packet too small to insert timestamp echo!\n")); LIMIT_NETDEBUG(KERN_INFO "DCCP: packet too small to insert timestamp echo!\n");
return; return;
} }
......
...@@ -331,8 +331,8 @@ static void esp4_err(struct sk_buff *skb, u32 info) ...@@ -331,8 +331,8 @@ static void esp4_err(struct sk_buff *skb, u32 info)
x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, esph->spi, IPPROTO_ESP, AF_INET); x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, esph->spi, IPPROTO_ESP, AF_INET);
if (!x) if (!x)
return; return;
NETDEBUG(printk(KERN_DEBUG "pmtu discovery on SA ESP/%08x/%08x\n", NETDEBUG(KERN_DEBUG "pmtu discovery on SA ESP/%08x/%08x\n",
ntohl(esph->spi), ntohl(iph->daddr))); ntohl(esph->spi), ntohl(iph->daddr));
xfrm_state_put(x); xfrm_state_put(x);
} }
...@@ -395,10 +395,10 @@ static int esp_init_state(struct xfrm_state *x) ...@@ -395,10 +395,10 @@ static int esp_init_state(struct xfrm_state *x)
if (aalg_desc->uinfo.auth.icv_fullbits/8 != if (aalg_desc->uinfo.auth.icv_fullbits/8 !=
crypto_tfm_alg_digestsize(esp->auth.tfm)) { crypto_tfm_alg_digestsize(esp->auth.tfm)) {
NETDEBUG(printk(KERN_INFO "ESP: %s digestsize %u != %hu\n", NETDEBUG(KERN_INFO "ESP: %s digestsize %u != %hu\n",
x->aalg->alg_name, x->aalg->alg_name,
crypto_tfm_alg_digestsize(esp->auth.tfm), crypto_tfm_alg_digestsize(esp->auth.tfm),
aalg_desc->uinfo.auth.icv_fullbits/8)); aalg_desc->uinfo.auth.icv_fullbits/8);
goto error; goto error;
} }
......
...@@ -627,11 +627,10 @@ static void icmp_unreach(struct sk_buff *skb) ...@@ -627,11 +627,10 @@ static void icmp_unreach(struct sk_buff *skb)
break; break;
case ICMP_FRAG_NEEDED: case ICMP_FRAG_NEEDED:
if (ipv4_config.no_pmtu_disc) { if (ipv4_config.no_pmtu_disc) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_INFO "ICMP: %u.%u.%u.%u: "
printk(KERN_INFO "ICMP: %u.%u.%u.%u: "
"fragmentation needed " "fragmentation needed "
"and DF set.\n", "and DF set.\n",
NIPQUAD(iph->daddr))); NIPQUAD(iph->daddr));
} else { } else {
info = ip_rt_frag_needed(iph, info = ip_rt_frag_needed(iph,
ntohs(icmph->un.frag.mtu)); ntohs(icmph->un.frag.mtu));
...@@ -640,10 +639,9 @@ static void icmp_unreach(struct sk_buff *skb) ...@@ -640,10 +639,9 @@ static void icmp_unreach(struct sk_buff *skb)
} }
break; break;
case ICMP_SR_FAILED: case ICMP_SR_FAILED:
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_INFO "ICMP: %u.%u.%u.%u: Source "
printk(KERN_INFO "ICMP: %u.%u.%u.%u: Source "
"Route Failed.\n", "Route Failed.\n",
NIPQUAD(iph->daddr))); NIPQUAD(iph->daddr));
break; break;
default: default:
break; break;
...@@ -936,7 +934,7 @@ int icmp_rcv(struct sk_buff *skb) ...@@ -936,7 +934,7 @@ int icmp_rcv(struct sk_buff *skb)
case CHECKSUM_HW: case CHECKSUM_HW:
if (!(u16)csum_fold(skb->csum)) if (!(u16)csum_fold(skb->csum))
break; break;
LIMIT_NETDEBUG(printk(KERN_DEBUG "icmp v4 hw csum failure\n")); LIMIT_NETDEBUG(KERN_DEBUG "icmp v4 hw csum failure\n");
case CHECKSUM_NONE: case CHECKSUM_NONE:
if ((u16)csum_fold(skb_checksum(skb, 0, skb->len, 0))) if ((u16)csum_fold(skb_checksum(skb, 0, skb->len, 0)))
goto error; goto error;
......
...@@ -904,7 +904,7 @@ int igmp_rcv(struct sk_buff *skb) ...@@ -904,7 +904,7 @@ int igmp_rcv(struct sk_buff *skb)
case IGMP_MTRACE_RESP: case IGMP_MTRACE_RESP:
break; break;
default: default:
NETDEBUG(printk(KERN_DEBUG "New IGMP type=%d, why we do not know about it?\n", ih->type)); NETDEBUG(KERN_DEBUG "New IGMP type=%d, why we do not know about it?\n", ih->type);
} }
in_dev_put(in_dev); in_dev_put(in_dev);
kfree_skb(skb); kfree_skb(skb);
......
...@@ -377,7 +377,7 @@ static struct ipq *ip_frag_create(unsigned hash, struct iphdr *iph, u32 user) ...@@ -377,7 +377,7 @@ static struct ipq *ip_frag_create(unsigned hash, struct iphdr *iph, u32 user)
return ip_frag_intern(hash, qp); return ip_frag_intern(hash, qp);
out_nomem: out_nomem:
LIMIT_NETDEBUG(printk(KERN_ERR "ip_frag_create: no memory left !\n")); LIMIT_NETDEBUG(KERN_ERR "ip_frag_create: no memory left !\n");
return NULL; return NULL;
} }
...@@ -625,8 +625,8 @@ static struct sk_buff *ip_frag_reasm(struct ipq *qp, struct net_device *dev) ...@@ -625,8 +625,8 @@ static struct sk_buff *ip_frag_reasm(struct ipq *qp, struct net_device *dev)
return head; return head;
out_nomem: out_nomem:
LIMIT_NETDEBUG(printk(KERN_ERR "IP: queue_glue: no memory for gluing " LIMIT_NETDEBUG(KERN_ERR "IP: queue_glue: no memory for gluing "
"queue %p\n", qp)); "queue %p\n", qp);
goto out_fail; goto out_fail;
out_oversize: out_oversize:
if (net_ratelimit()) if (net_ratelimit())
......
...@@ -573,7 +573,7 @@ int ip_fragment(struct sk_buff *skb, int (*output)(struct sk_buff*)) ...@@ -573,7 +573,7 @@ int ip_fragment(struct sk_buff *skb, int (*output)(struct sk_buff*))
*/ */
if ((skb2 = alloc_skb(len+hlen+ll_rs, GFP_ATOMIC)) == NULL) { if ((skb2 = alloc_skb(len+hlen+ll_rs, GFP_ATOMIC)) == NULL) {
NETDEBUG(printk(KERN_INFO "IP: frag: no memory for new fragment!\n")); NETDEBUG(KERN_INFO "IP: frag: no memory for new fragment!\n");
err = -ENOMEM; err = -ENOMEM;
goto fail; goto fail;
} }
......
...@@ -214,8 +214,8 @@ static void ipcomp4_err(struct sk_buff *skb, u32 info) ...@@ -214,8 +214,8 @@ static void ipcomp4_err(struct sk_buff *skb, u32 info)
spi, IPPROTO_COMP, AF_INET); spi, IPPROTO_COMP, AF_INET);
if (!x) if (!x)
return; return;
NETDEBUG(printk(KERN_DEBUG "pmtu discovery on SA IPCOMP/%08x/%u.%u.%u.%u\n", NETDEBUG(KERN_DEBUG "pmtu discovery on SA IPCOMP/%08x/%u.%u.%u.%u\n",
spi, NIPQUAD(iph->daddr))); spi, NIPQUAD(iph->daddr));
xfrm_state_put(x); xfrm_state_put(x);
} }
......
...@@ -990,11 +990,10 @@ int tcp_v4_conn_request(struct sock *sk, struct sk_buff *skb) ...@@ -990,11 +990,10 @@ int tcp_v4_conn_request(struct sock *sk, struct sk_buff *skb)
* to destinations, already remembered * to destinations, already remembered
* to the moment of synflood. * to the moment of synflood.
*/ */
LIMIT_NETDEBUG(printk(KERN_DEBUG "TCP: drop open " LIMIT_NETDEBUG(KERN_DEBUG "TCP: drop open "
"request from %u.%u." "request from %u.%u.%u.%u/%u\n",
"%u.%u/%u\n", NIPQUAD(saddr),
NIPQUAD(saddr), ntohs(skb->h.th->source));
ntohs(skb->h.th->source)));
dst_release(dst); dst_release(dst);
goto drop_and_free; goto drop_and_free;
} }
...@@ -1118,7 +1117,7 @@ static int tcp_v4_checksum_init(struct sk_buff *skb) ...@@ -1118,7 +1117,7 @@ static int tcp_v4_checksum_init(struct sk_buff *skb)
skb->nh.iph->daddr, skb->csum)) skb->nh.iph->daddr, skb->csum))
return 0; return 0;
LIMIT_NETDEBUG(printk(KERN_DEBUG "hw tcp v4 csum failed\n")); LIMIT_NETDEBUG(KERN_DEBUG "hw tcp v4 csum failed\n");
skb->ip_summed = CHECKSUM_NONE; skb->ip_summed = CHECKSUM_NONE;
} }
if (skb->len <= 76) { if (skb->len <= 76) {
......
...@@ -629,7 +629,7 @@ int udp_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg, ...@@ -629,7 +629,7 @@ int udp_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg,
/* ... which is an evident application bug. --ANK */ /* ... which is an evident application bug. --ANK */
release_sock(sk); release_sock(sk);
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp cork app bug 2\n")); LIMIT_NETDEBUG(KERN_DEBUG "udp cork app bug 2\n");
err = -EINVAL; err = -EINVAL;
goto out; goto out;
} }
...@@ -694,7 +694,7 @@ static int udp_sendpage(struct sock *sk, struct page *page, int offset, ...@@ -694,7 +694,7 @@ static int udp_sendpage(struct sock *sk, struct page *page, int offset,
if (unlikely(!up->pending)) { if (unlikely(!up->pending)) {
release_sock(sk); release_sock(sk);
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp cork app bug 3\n")); LIMIT_NETDEBUG(KERN_DEBUG "udp cork app bug 3\n");
return -EINVAL; return -EINVAL;
} }
...@@ -1103,7 +1103,7 @@ static int udp_checksum_init(struct sk_buff *skb, struct udphdr *uh, ...@@ -1103,7 +1103,7 @@ static int udp_checksum_init(struct sk_buff *skb, struct udphdr *uh,
skb->ip_summed = CHECKSUM_UNNECESSARY; skb->ip_summed = CHECKSUM_UNNECESSARY;
if (!udp_check(uh, ulen, saddr, daddr, skb->csum)) if (!udp_check(uh, ulen, saddr, daddr, skb->csum))
return 0; return 0;
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp v4 hw csum failure.\n")); LIMIT_NETDEBUG(KERN_DEBUG "udp v4 hw csum failure.\n");
skb->ip_summed = CHECKSUM_NONE; skb->ip_summed = CHECKSUM_NONE;
} }
if (skb->ip_summed != CHECKSUM_UNNECESSARY) if (skb->ip_summed != CHECKSUM_UNNECESSARY)
...@@ -1182,13 +1182,13 @@ int udp_rcv(struct sk_buff *skb) ...@@ -1182,13 +1182,13 @@ int udp_rcv(struct sk_buff *skb)
return(0); return(0);
short_packet: short_packet:
LIMIT_NETDEBUG(printk(KERN_DEBUG "UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u\n", LIMIT_NETDEBUG(KERN_DEBUG "UDP: short packet: From %u.%u.%u.%u:%u %d/%d to %u.%u.%u.%u:%u\n",
NIPQUAD(saddr), NIPQUAD(saddr),
ntohs(uh->source), ntohs(uh->source),
ulen, ulen,
len, len,
NIPQUAD(daddr), NIPQUAD(daddr),
ntohs(uh->dest))); ntohs(uh->dest));
no_header: no_header:
UDP_INC_STATS_BH(UDP_MIB_INERRORS); UDP_INC_STATS_BH(UDP_MIB_INERRORS);
kfree_skb(skb); kfree_skb(skb);
...@@ -1199,12 +1199,12 @@ int udp_rcv(struct sk_buff *skb) ...@@ -1199,12 +1199,12 @@ int udp_rcv(struct sk_buff *skb)
* RFC1122: OK. Discards the bad packet silently (as far as * RFC1122: OK. Discards the bad packet silently (as far as
* the network is concerned, anyway) as per 4.1.3.4 (MUST). * the network is concerned, anyway) as per 4.1.3.4 (MUST).
*/ */
LIMIT_NETDEBUG(printk(KERN_DEBUG "UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d\n", LIMIT_NETDEBUG(KERN_DEBUG "UDP: bad checksum. From %d.%d.%d.%d:%d to %d.%d.%d.%d:%d ulen %d\n",
NIPQUAD(saddr), NIPQUAD(saddr),
ntohs(uh->source), ntohs(uh->source),
NIPQUAD(daddr), NIPQUAD(daddr),
ntohs(uh->dest), ntohs(uh->dest),
ulen)); ulen);
drop: drop:
UDP_INC_STATS_BH(UDP_MIB_INERRORS); UDP_INC_STATS_BH(UDP_MIB_INERRORS);
kfree_skb(skb); kfree_skb(skb);
......
...@@ -131,10 +131,10 @@ static int ipv6_clear_mutable_options(struct ipv6hdr *iph, int len) ...@@ -131,10 +131,10 @@ static int ipv6_clear_mutable_options(struct ipv6hdr *iph, int len)
case NEXTHDR_HOP: case NEXTHDR_HOP:
case NEXTHDR_DEST: case NEXTHDR_DEST:
if (!zero_out_mutable_opts(exthdr.opth)) { if (!zero_out_mutable_opts(exthdr.opth)) {
LIMIT_NETDEBUG(printk( LIMIT_NETDEBUG(
KERN_WARNING "overrun %sopts\n", KERN_WARNING "overrun %sopts\n",
nexthdr == NEXTHDR_HOP ? nexthdr == NEXTHDR_HOP ?
"hop" : "dest")); "hop" : "dest");
return -EINVAL; return -EINVAL;
} }
break; break;
...@@ -293,8 +293,7 @@ static int ah6_input(struct xfrm_state *x, struct xfrm_decap_state *decap, struc ...@@ -293,8 +293,7 @@ static int ah6_input(struct xfrm_state *x, struct xfrm_decap_state *decap, struc
skb_push(skb, skb->data - skb->nh.raw); skb_push(skb, skb->data - skb->nh.raw);
ahp->icv(ahp, skb, ah->auth_data); ahp->icv(ahp, skb, ah->auth_data);
if (memcmp(ah->auth_data, auth_data, ahp->icv_trunc_len)) { if (memcmp(ah->auth_data, auth_data, ahp->icv_trunc_len)) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_WARNING "ipsec ah authentication error\n");
printk(KERN_WARNING "ipsec ah authentication error\n"));
x->stats.integrity_failed++; x->stats.integrity_failed++;
goto free_out; goto free_out;
} }
...@@ -332,9 +331,9 @@ static void ah6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, ...@@ -332,9 +331,9 @@ static void ah6_err(struct sk_buff *skb, struct inet6_skb_parm *opt,
if (!x) if (!x)
return; return;
NETDEBUG(printk(KERN_DEBUG "pmtu discovery on SA AH/%08x/" NETDEBUG(KERN_DEBUG "pmtu discovery on SA AH/%08x/"
"%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x\n", "%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x\n",
ntohl(ah->spi), NIP6(iph->daddr))); ntohl(ah->spi), NIP6(iph->daddr));
xfrm_state_put(x); xfrm_state_put(x);
} }
......
...@@ -589,8 +589,8 @@ int datagram_send_ctl(struct msghdr *msg, struct flowi *fl, ...@@ -589,8 +589,8 @@ int datagram_send_ctl(struct msghdr *msg, struct flowi *fl,
break; break;
default: default:
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "invalid cmsg type: %d\n",
printk(KERN_DEBUG "invalid cmsg type: %d\n", cmsg->cmsg_type)); cmsg->cmsg_type);
err = -EINVAL; err = -EINVAL;
break; break;
}; };
......
...@@ -212,8 +212,7 @@ static int esp6_input(struct xfrm_state *x, struct xfrm_decap_state *decap, stru ...@@ -212,8 +212,7 @@ static int esp6_input(struct xfrm_state *x, struct xfrm_decap_state *decap, stru
padlen = nexthdr[0]; padlen = nexthdr[0];
if (padlen+2 >= elen) { if (padlen+2 >= elen) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_WARNING "ipsec esp packet is garbage padlen=%d, elen=%d\n", padlen+2, elen);
printk(KERN_WARNING "ipsec esp packet is garbage padlen=%d, elen=%d\n", padlen+2, elen));
ret = -EINVAL; ret = -EINVAL;
goto out; goto out;
} }
......
...@@ -424,8 +424,8 @@ static int ipv6_hop_ra(struct sk_buff *skb, int optoff) ...@@ -424,8 +424,8 @@ static int ipv6_hop_ra(struct sk_buff *skb, int optoff)
IP6CB(skb)->ra = optoff; IP6CB(skb)->ra = optoff;
return 1; return 1;
} }
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "ipv6_hop_ra: wrong RA length %d\n",
printk(KERN_DEBUG "ipv6_hop_ra: wrong RA length %d\n", skb->nh.raw[optoff+1])); skb->nh.raw[optoff+1]);
kfree_skb(skb); kfree_skb(skb);
return 0; return 0;
} }
...@@ -437,8 +437,8 @@ static int ipv6_hop_jumbo(struct sk_buff *skb, int optoff) ...@@ -437,8 +437,8 @@ static int ipv6_hop_jumbo(struct sk_buff *skb, int optoff)
u32 pkt_len; u32 pkt_len;
if (skb->nh.raw[optoff+1] != 4 || (optoff&3) != 2) { if (skb->nh.raw[optoff+1] != 4 || (optoff&3) != 2) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "ipv6_hop_jumbo: wrong jumbo opt length/alignment %d\n",
printk(KERN_DEBUG "ipv6_hop_jumbo: wrong jumbo opt length/alignment %d\n", skb->nh.raw[optoff+1])); skb->nh.raw[optoff+1]);
IP6_INC_STATS_BH(IPSTATS_MIB_INHDRERRORS); IP6_INC_STATS_BH(IPSTATS_MIB_INHDRERRORS);
goto drop; goto drop;
} }
......
...@@ -332,8 +332,7 @@ void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info, ...@@ -332,8 +332,7 @@ void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info,
* for now we don't know that. * for now we don't know that.
*/ */
if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) { if ((addr_type == IPV6_ADDR_ANY) || (addr_type & IPV6_ADDR_MULTICAST)) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: addr_any/mcast source\n");
printk(KERN_DEBUG "icmpv6_send: addr_any/mcast source\n"));
return; return;
} }
...@@ -341,8 +340,7 @@ void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info, ...@@ -341,8 +340,7 @@ void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info,
* Never answer to a ICMP packet. * Never answer to a ICMP packet.
*/ */
if (is_ineligible(skb)) { if (is_ineligible(skb)) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "icmpv6_send: no reply to icmp error\n");
printk(KERN_DEBUG "icmpv6_send: no reply to icmp error\n"));
return; return;
} }
...@@ -393,8 +391,7 @@ void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info, ...@@ -393,8 +391,7 @@ void icmpv6_send(struct sk_buff *skb, int type, int code, __u32 info,
len = skb->len - msg.offset; len = skb->len - msg.offset;
len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) -sizeof(struct icmp6hdr)); len = min_t(unsigned int, len, IPV6_MIN_MTU - sizeof(struct ipv6hdr) -sizeof(struct icmp6hdr));
if (len < 0) { if (len < 0) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "icmp: len problem\n");
printk(KERN_DEBUG "icmp: len problem\n"));
goto out_dst_release; goto out_dst_release;
} }
...@@ -584,17 +581,15 @@ static int icmpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp) ...@@ -584,17 +581,15 @@ static int icmpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp)
skb->ip_summed = CHECKSUM_UNNECESSARY; skb->ip_summed = CHECKSUM_UNNECESSARY;
if (csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6, if (csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6,
skb->csum)) { skb->csum)) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "ICMPv6 hw checksum failed\n");
printk(KERN_DEBUG "ICMPv6 hw checksum failed\n"));
skb->ip_summed = CHECKSUM_NONE; skb->ip_summed = CHECKSUM_NONE;
} }
} }
if (skb->ip_summed == CHECKSUM_NONE) { if (skb->ip_summed == CHECKSUM_NONE) {
if (csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6, if (csum_ipv6_magic(saddr, daddr, skb->len, IPPROTO_ICMPV6,
skb_checksum(skb, 0, skb->len, 0))) { skb_checksum(skb, 0, skb->len, 0))) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "ICMPv6 checksum failed [%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x > %04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x]\n",
printk(KERN_DEBUG "ICMPv6 checksum failed [%04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x > %04x:%04x:%04x:%04x:%04x:%04x:%04x:%04x]\n", NIP6(*saddr), NIP6(*daddr));
NIP6(*saddr), NIP6(*daddr)));
goto discard_it; goto discard_it;
} }
} }
...@@ -670,8 +665,7 @@ static int icmpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp) ...@@ -670,8 +665,7 @@ static int icmpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp)
break; break;
default: default:
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "icmpv6: msg of unknown type\n");
printk(KERN_DEBUG "icmpv6: msg of unknown type\n"));
/* informational */ /* informational */
if (type & ICMPV6_INFOMSG_MASK) if (type & ICMPV6_INFOMSG_MASK)
......
...@@ -625,7 +625,7 @@ static int ip6_fragment(struct sk_buff *skb, int (*output)(struct sk_buff *)) ...@@ -625,7 +625,7 @@ static int ip6_fragment(struct sk_buff *skb, int (*output)(struct sk_buff *))
*/ */
if ((frag = alloc_skb(len+hlen+sizeof(struct frag_hdr)+LL_RESERVED_SPACE(rt->u.dst.dev), GFP_ATOMIC)) == NULL) { if ((frag = alloc_skb(len+hlen+sizeof(struct frag_hdr)+LL_RESERVED_SPACE(rt->u.dst.dev), GFP_ATOMIC)) == NULL) {
NETDEBUG(printk(KERN_INFO "IPv6: frag: no memory for new fragment!\n")); NETDEBUG(KERN_INFO "IPv6: frag: no memory for new fragment!\n");
IP6_INC_STATS(IPSTATS_MIB_FRAGFAILS); IP6_INC_STATS(IPSTATS_MIB_FRAGFAILS);
err = -ENOMEM; err = -ENOMEM;
goto fail; goto fail;
......
...@@ -28,8 +28,7 @@ int ip6_route_me_harder(struct sk_buff *skb) ...@@ -28,8 +28,7 @@ int ip6_route_me_harder(struct sk_buff *skb)
if (dst->error) { if (dst->error) {
IP6_INC_STATS(IPSTATS_MIB_OUTNOROUTES); IP6_INC_STATS(IPSTATS_MIB_OUTNOROUTES);
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "ip6_route_me_harder: No more route.\n");
printk(KERN_DEBUG "ip6_route_me_harder: No more route.\n"));
dst_release(dst); dst_release(dst);
return -EINVAL; return -EINVAL;
} }
......
...@@ -343,8 +343,7 @@ int rawv6_rcv(struct sock *sk, struct sk_buff *skb) ...@@ -343,8 +343,7 @@ int rawv6_rcv(struct sock *sk, struct sk_buff *skb)
if (csum_ipv6_magic(&skb->nh.ipv6h->saddr, if (csum_ipv6_magic(&skb->nh.ipv6h->saddr,
&skb->nh.ipv6h->daddr, &skb->nh.ipv6h->daddr,
skb->len, inet->num, skb->csum)) { skb->len, inet->num, skb->csum)) {
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_DEBUG "raw v6 hw csum failure.\n");
printk(KERN_DEBUG "raw v6 hw csum failure.\n"));
skb->ip_summed = CHECKSUM_NONE; skb->ip_summed = CHECKSUM_NONE;
} }
} }
......
...@@ -1564,7 +1564,7 @@ static int tcp_v6_checksum_init(struct sk_buff *skb) ...@@ -1564,7 +1564,7 @@ static int tcp_v6_checksum_init(struct sk_buff *skb)
if (!tcp_v6_check(skb->h.th,skb->len,&skb->nh.ipv6h->saddr, if (!tcp_v6_check(skb->h.th,skb->len,&skb->nh.ipv6h->saddr,
&skb->nh.ipv6h->daddr,skb->csum)) &skb->nh.ipv6h->daddr,skb->csum))
return 0; return 0;
LIMIT_NETDEBUG(printk(KERN_DEBUG "hw tcp v6 csum failed\n")); LIMIT_NETDEBUG(KERN_DEBUG "hw tcp v6 csum failed\n");
} }
if (skb->len <= 76) { if (skb->len <= 76) {
if (tcp_v6_check(skb->h.th,skb->len,&skb->nh.ipv6h->saddr, if (tcp_v6_check(skb->h.th,skb->len,&skb->nh.ipv6h->saddr,
......
...@@ -478,8 +478,7 @@ static int udpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp) ...@@ -478,8 +478,7 @@ static int udpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp)
/* RFC 2460 section 8.1 says that we SHOULD log /* RFC 2460 section 8.1 says that we SHOULD log
this error. Well, it is reasonable. this error. Well, it is reasonable.
*/ */
LIMIT_NETDEBUG( LIMIT_NETDEBUG(KERN_INFO "IPv6: udp checksum is 0\n");
printk(KERN_INFO "IPv6: udp checksum is 0\n"));
goto discard; goto discard;
} }
...@@ -494,7 +493,7 @@ static int udpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp) ...@@ -494,7 +493,7 @@ static int udpv6_rcv(struct sk_buff **pskb, unsigned int *nhoffp)
if (skb->ip_summed==CHECKSUM_HW) { if (skb->ip_summed==CHECKSUM_HW) {
skb->ip_summed = CHECKSUM_UNNECESSARY; skb->ip_summed = CHECKSUM_UNNECESSARY;
if (csum_ipv6_magic(saddr, daddr, ulen, IPPROTO_UDP, skb->csum)) { if (csum_ipv6_magic(saddr, daddr, ulen, IPPROTO_UDP, skb->csum)) {
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp v6 hw csum failure.\n")); LIMIT_NETDEBUG(KERN_DEBUG "udp v6 hw csum failure.\n");
skb->ip_summed = CHECKSUM_NONE; skb->ip_summed = CHECKSUM_NONE;
} }
} }
...@@ -826,7 +825,7 @@ static int udpv6_sendmsg(struct kiocb *iocb, struct sock *sk, ...@@ -826,7 +825,7 @@ static int udpv6_sendmsg(struct kiocb *iocb, struct sock *sk,
/* ... which is an evident application bug. --ANK */ /* ... which is an evident application bug. --ANK */
release_sock(sk); release_sock(sk);
LIMIT_NETDEBUG(printk(KERN_DEBUG "udp cork app bug 2\n")); LIMIT_NETDEBUG(KERN_DEBUG "udp cork app bug 2\n");
err = -EINVAL; err = -EINVAL;
goto out; goto out;
} }
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册