diff options
author | Stephen Hemminger <shemminger@osdl.org> | 2006-08-29 20:49:31 -0400 |
---|---|---|
committer | David S. Miller <davem@sunset.davemloft.net> | 2006-09-22 18:18:32 -0400 |
commit | 8394e9b2faf539f82470b36c86f0485cab5278bd (patch) | |
tree | a386a99ed0563c94d802a8e21ae8a675787fdf74 /net/bridge | |
parent | 9bcfcaf5e9cc887eb39236e43bdbe4b4b2572229 (diff) |
[NETFILTER] bridge: debug message fixes
If CONFIG_NETFILTER_DEBUG is enabled, it shouldn't change the
actions of the filtering. The message about skb->dst being NULL
is commonly triggered by dhclient, so it is useless. Make sure all
messages end in newline.
Signed-off-by: Stephen Hemminger <shemminger@osdl.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/bridge')
-rw-r--r-- | net/bridge/br_netfilter.c | 15 |
1 files changed, 3 insertions, 12 deletions
diff --git a/net/bridge/br_netfilter.c b/net/bridge/br_netfilter.c index b498efcfe451..cf80dd0e896d 100644 --- a/net/bridge/br_netfilter.c +++ b/net/bridge/br_netfilter.c | |||
@@ -718,16 +718,6 @@ static unsigned int br_nf_local_out(unsigned int hook, struct sk_buff **pskb, | |||
718 | else | 718 | else |
719 | pf = PF_INET6; | 719 | pf = PF_INET6; |
720 | 720 | ||
721 | #ifdef CONFIG_NETFILTER_DEBUG | ||
722 | /* Sometimes we get packets with NULL ->dst here (for example, | ||
723 | * running a dhcp client daemon triggers this). This should now | ||
724 | * be fixed, but let's keep the check around. */ | ||
725 | if (skb->dst == NULL) { | ||
726 | printk(KERN_CRIT "br_netfilter: skb->dst == NULL."); | ||
727 | return NF_ACCEPT; | ||
728 | } | ||
729 | #endif | ||
730 | |||
731 | nf_bridge = skb->nf_bridge; | 721 | nf_bridge = skb->nf_bridge; |
732 | nf_bridge->physoutdev = skb->dev; | 722 | nf_bridge->physoutdev = skb->dev; |
733 | realindev = nf_bridge->physindev; | 723 | realindev = nf_bridge->physindev; |
@@ -809,7 +799,7 @@ static unsigned int br_nf_post_routing(unsigned int hook, struct sk_buff **pskb, | |||
809 | * keep the check just to be sure... */ | 799 | * keep the check just to be sure... */ |
810 | if (skb->mac.raw < skb->head || skb->mac.raw + ETH_HLEN > skb->data) { | 800 | if (skb->mac.raw < skb->head || skb->mac.raw + ETH_HLEN > skb->data) { |
811 | printk(KERN_CRIT "br_netfilter: Argh!! br_nf_post_routing: " | 801 | printk(KERN_CRIT "br_netfilter: Argh!! br_nf_post_routing: " |
812 | "bad mac.raw pointer."); | 802 | "bad mac.raw pointer.\n"); |
813 | goto print_error; | 803 | goto print_error; |
814 | } | 804 | } |
815 | #endif | 805 | #endif |
@@ -827,7 +817,7 @@ static unsigned int br_nf_post_routing(unsigned int hook, struct sk_buff **pskb, | |||
827 | 817 | ||
828 | #ifdef CONFIG_NETFILTER_DEBUG | 818 | #ifdef CONFIG_NETFILTER_DEBUG |
829 | if (skb->dst == NULL) { | 819 | if (skb->dst == NULL) { |
830 | printk(KERN_CRIT "br_netfilter: skb->dst == NULL."); | 820 | printk(KERN_INFO "br_netfilter post_routing: skb->dst == NULL\n"); |
831 | goto print_error; | 821 | goto print_error; |
832 | } | 822 | } |
833 | #endif | 823 | #endif |
@@ -864,6 +854,7 @@ print_error: | |||
864 | } | 854 | } |
865 | printk(" head:%p, raw:%p, data:%p\n", skb->head, skb->mac.raw, | 855 | printk(" head:%p, raw:%p, data:%p\n", skb->head, skb->mac.raw, |
866 | skb->data); | 856 | skb->data); |
857 | dump_stack(); | ||
867 | return NF_ACCEPT; | 858 | return NF_ACCEPT; |
868 | #endif | 859 | #endif |
869 | } | 860 | } |