diff options
author | Pavel Emelyanov <xemul@openvz.org> | 2008-02-21 02:57:45 -0500 |
---|---|---|
committer | Trond Myklebust <Trond.Myklebust@netapp.com> | 2008-02-21 18:42:29 -0500 |
commit | 5216a8e70e25b01cbd2915cd0442fb96deb2c262 (patch) | |
tree | f372bd3cb3fc2f4a2d3e4ad303e6c4d3f8f48865 | |
parent | 90dc7d2796edf94a9eaa838321a9734c8513e717 (diff) |
Wrap buffers used for rpc debug printks into RPC_IFDEBUG
Sorry for the noise, but here's the v3 of this compilation fix :)
There are some places, which declare the char buf[...] on the stack
to push it later into dprintk(). Since the dprintk sometimes (if the
CONFIG_SYSCTL=n) becomes an empty do { } while (0) stub, these buffers
cause gcc to produce appropriate warnings.
Wrap these buffers with RPC_IFDEBUG macro, as Trond proposed, to
compile them out when not needed.
Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
Acked-by: J. Bruce Fields <bfields@citi.umich.edu>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
-rw-r--r-- | fs/lockd/svc.c | 2 | ||||
-rw-r--r-- | fs/nfs/callback.c | 2 | ||||
-rw-r--r-- | fs/nfsd/nfsfh.c | 2 | ||||
-rw-r--r-- | net/sunrpc/svcsock.c | 6 |
4 files changed, 6 insertions, 6 deletions
diff --git a/fs/lockd/svc.c b/fs/lockd/svc.c index 08226464e563..1ed8bd4de941 100644 --- a/fs/lockd/svc.c +++ b/fs/lockd/svc.c | |||
@@ -153,7 +153,7 @@ lockd(struct svc_rqst *rqstp) | |||
153 | */ | 153 | */ |
154 | while ((nlmsvc_users || !signalled()) && nlmsvc_pid == current->pid) { | 154 | while ((nlmsvc_users || !signalled()) && nlmsvc_pid == current->pid) { |
155 | long timeout = MAX_SCHEDULE_TIMEOUT; | 155 | long timeout = MAX_SCHEDULE_TIMEOUT; |
156 | char buf[RPC_MAX_ADDRBUFLEN]; | 156 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); |
157 | 157 | ||
158 | if (signalled()) { | 158 | if (signalled()) { |
159 | flush_signals(current); | 159 | flush_signals(current); |
diff --git a/fs/nfs/callback.c b/fs/nfs/callback.c index 0d784f6f609f..66648dd92d97 100644 --- a/fs/nfs/callback.c +++ b/fs/nfs/callback.c | |||
@@ -172,7 +172,7 @@ void nfs_callback_down(void) | |||
172 | static int nfs_callback_authenticate(struct svc_rqst *rqstp) | 172 | static int nfs_callback_authenticate(struct svc_rqst *rqstp) |
173 | { | 173 | { |
174 | struct nfs_client *clp; | 174 | struct nfs_client *clp; |
175 | char buf[RPC_MAX_ADDRBUFLEN]; | 175 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); |
176 | 176 | ||
177 | /* Don't talk to strangers */ | 177 | /* Don't talk to strangers */ |
178 | clp = nfs_find_client(svc_addr(rqstp), 4); | 178 | clp = nfs_find_client(svc_addr(rqstp), 4); |
diff --git a/fs/nfsd/nfsfh.c b/fs/nfsd/nfsfh.c index 0130b345234d..1eb771d79cca 100644 --- a/fs/nfsd/nfsfh.c +++ b/fs/nfsd/nfsfh.c | |||
@@ -101,7 +101,7 @@ static __be32 nfsd_setuser_and_check_port(struct svc_rqst *rqstp, | |||
101 | { | 101 | { |
102 | /* Check if the request originated from a secure port. */ | 102 | /* Check if the request originated from a secure port. */ |
103 | if (!rqstp->rq_secure && EX_SECURE(exp)) { | 103 | if (!rqstp->rq_secure && EX_SECURE(exp)) { |
104 | char buf[RPC_MAX_ADDRBUFLEN]; | 104 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); |
105 | dprintk(KERN_WARNING | 105 | dprintk(KERN_WARNING |
106 | "nfsd: request from insecure port %s!\n", | 106 | "nfsd: request from insecure port %s!\n", |
107 | svc_print_addr(rqstp, buf, sizeof(buf))); | 107 | svc_print_addr(rqstp, buf, sizeof(buf))); |
diff --git a/net/sunrpc/svcsock.c b/net/sunrpc/svcsock.c index 1d3e5fcc2cc4..c475977de05a 100644 --- a/net/sunrpc/svcsock.c +++ b/net/sunrpc/svcsock.c | |||
@@ -175,7 +175,7 @@ static int svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr) | |||
175 | size_t base = xdr->page_base; | 175 | size_t base = xdr->page_base; |
176 | unsigned int pglen = xdr->page_len; | 176 | unsigned int pglen = xdr->page_len; |
177 | unsigned int flags = MSG_MORE; | 177 | unsigned int flags = MSG_MORE; |
178 | char buf[RPC_MAX_ADDRBUFLEN]; | 178 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); |
179 | 179 | ||
180 | slen = xdr->len; | 180 | slen = xdr->len; |
181 | 181 | ||
@@ -716,7 +716,7 @@ static struct svc_xprt *svc_tcp_accept(struct svc_xprt *xprt) | |||
716 | struct socket *newsock; | 716 | struct socket *newsock; |
717 | struct svc_sock *newsvsk; | 717 | struct svc_sock *newsvsk; |
718 | int err, slen; | 718 | int err, slen; |
719 | char buf[RPC_MAX_ADDRBUFLEN]; | 719 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); |
720 | 720 | ||
721 | dprintk("svc: tcp_accept %p sock %p\n", svsk, sock); | 721 | dprintk("svc: tcp_accept %p sock %p\n", svsk, sock); |
722 | if (!sock) | 722 | if (!sock) |
@@ -1206,10 +1206,10 @@ static struct svc_xprt *svc_create_socket(struct svc_serv *serv, | |||
1206 | struct socket *sock; | 1206 | struct socket *sock; |
1207 | int error; | 1207 | int error; |
1208 | int type; | 1208 | int type; |
1209 | char buf[RPC_MAX_ADDRBUFLEN]; | ||
1210 | struct sockaddr_storage addr; | 1209 | struct sockaddr_storage addr; |
1211 | struct sockaddr *newsin = (struct sockaddr *)&addr; | 1210 | struct sockaddr *newsin = (struct sockaddr *)&addr; |
1212 | int newlen; | 1211 | int newlen; |
1212 | RPC_IFDEBUG(char buf[RPC_MAX_ADDRBUFLEN]); | ||
1213 | 1213 | ||
1214 | dprintk("svc: svc_create_socket(%s, %d, %s)\n", | 1214 | dprintk("svc: svc_create_socket(%s, %d, %s)\n", |
1215 | serv->sv_program->pg_name, protocol, | 1215 | serv->sv_program->pg_name, protocol, |