diff options
| author | Stephen Hemminger <shemminger@osdl.org> | 2006-08-29 20:49:31 -0400 |
|---|---|---|
| committer | David S. Miller <davem@sunset.davemloft.net> | 2006-09-22 18:18:32 -0400 |
| commit | 8394e9b2faf539f82470b36c86f0485cab5278bd (patch) | |
| tree | a386a99ed0563c94d802a8e21ae8a675787fdf74 | |
| parent | 9bcfcaf5e9cc887eb39236e43bdbe4b4b2572229 (diff) | |
[NETFILTER] bridge: debug message fixes
If CONFIG_NETFILTER_DEBUG is enabled, it shouldn't change the
actions of the filtering. The message about skb->dst being NULL
is commonly triggered by dhclient, so it is useless. Make sure all
messages end in newline.
Signed-off-by: Stephen Hemminger <shemminger@osdl.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
| -rw-r--r-- | net/bridge/br_netfilter.c | 15 |
1 files changed, 3 insertions, 12 deletions
diff --git a/net/bridge/br_netfilter.c b/net/bridge/br_netfilter.c index b498efcfe451..cf80dd0e896d 100644 --- a/net/bridge/br_netfilter.c +++ b/net/bridge/br_netfilter.c | |||
| @@ -718,16 +718,6 @@ static unsigned int br_nf_local_out(unsigned int hook, struct sk_buff **pskb, | |||
| 718 | else | 718 | else |
| 719 | pf = PF_INET6; | 719 | pf = PF_INET6; |
| 720 | 720 | ||
| 721 | #ifdef CONFIG_NETFILTER_DEBUG | ||
| 722 | /* Sometimes we get packets with NULL ->dst here (for example, | ||
| 723 | * running a dhcp client daemon triggers this). This should now | ||
| 724 | * be fixed, but let's keep the check around. */ | ||
| 725 | if (skb->dst == NULL) { | ||
| 726 | printk(KERN_CRIT "br_netfilter: skb->dst == NULL."); | ||
| 727 | return NF_ACCEPT; | ||
| 728 | } | ||
| 729 | #endif | ||
| 730 | |||
| 731 | nf_bridge = skb->nf_bridge; | 721 | nf_bridge = skb->nf_bridge; |
| 732 | nf_bridge->physoutdev = skb->dev; | 722 | nf_bridge->physoutdev = skb->dev; |
| 733 | realindev = nf_bridge->physindev; | 723 | realindev = nf_bridge->physindev; |
| @@ -809,7 +799,7 @@ static unsigned int br_nf_post_routing(unsigned int hook, struct sk_buff **pskb, | |||
| 809 | * keep the check just to be sure... */ | 799 | * keep the check just to be sure... */ |
| 810 | if (skb->mac.raw < skb->head || skb->mac.raw + ETH_HLEN > skb->data) { | 800 | if (skb->mac.raw < skb->head || skb->mac.raw + ETH_HLEN > skb->data) { |
| 811 | printk(KERN_CRIT "br_netfilter: Argh!! br_nf_post_routing: " | 801 | printk(KERN_CRIT "br_netfilter: Argh!! br_nf_post_routing: " |
| 812 | "bad mac.raw pointer."); | 802 | "bad mac.raw pointer.\n"); |
| 813 | goto print_error; | 803 | goto print_error; |
| 814 | } | 804 | } |
| 815 | #endif | 805 | #endif |
| @@ -827,7 +817,7 @@ static unsigned int br_nf_post_routing(unsigned int hook, struct sk_buff **pskb, | |||
| 827 | 817 | ||
| 828 | #ifdef CONFIG_NETFILTER_DEBUG | 818 | #ifdef CONFIG_NETFILTER_DEBUG |
| 829 | if (skb->dst == NULL) { | 819 | if (skb->dst == NULL) { |
| 830 | printk(KERN_CRIT "br_netfilter: skb->dst == NULL."); | 820 | printk(KERN_INFO "br_netfilter post_routing: skb->dst == NULL\n"); |
| 831 | goto print_error; | 821 | goto print_error; |
| 832 | } | 822 | } |
| 833 | #endif | 823 | #endif |
| @@ -864,6 +854,7 @@ print_error: | |||
| 864 | } | 854 | } |
| 865 | printk(" head:%p, raw:%p, data:%p\n", skb->head, skb->mac.raw, | 855 | printk(" head:%p, raw:%p, data:%p\n", skb->head, skb->mac.raw, |
| 866 | skb->data); | 856 | skb->data); |
| 857 | dump_stack(); | ||
| 867 | return NF_ACCEPT; | 858 | return NF_ACCEPT; |
| 868 | #endif | 859 | #endif |
| 869 | } | 860 | } |
