aboutsummaryrefslogtreecommitdiffstats
path: root/net/sctp/socket.c
diff options
context:
space:
mode:
authorDaniel Borkmann <dborkman@redhat.com>2013-06-28 13:49:40 -0400
committerDavid S. Miller <davem@davemloft.net>2013-07-02 02:22:13 -0400
commitbb33381d0c97cdee25f2cdab540b6e2bd16fa03b (patch)
treea4def6ec9f554908e07efa8671ca52f60f9a2a18 /net/sctp/socket.c
parent1067964305df131ede2c08c2f3c9b3892640f1c6 (diff)
net: sctp: rework debugging framework to use pr_debug and friends
We should get rid of all own SCTP debug printk macros and use the ones that the kernel offers anyway instead. This makes the code more readable and conform to the kernel code, and offers all the features of dynamic debbuging that pr_debug() et al has, such as only turning on/off portions of debug messages at runtime through debugfs. The runtime cost of having CONFIG_DYNAMIC_DEBUG enabled, but none of the debug statements printing, is negligible [1]. If kernel debugging is completly turned off, then these statements will also compile into "empty" functions. While we're at it, we also need to change the Kconfig option as it /now/ only refers to the ifdef'ed code portions in outqueue.c that enable further debugging/tracing of SCTP transaction fields. Also, since SCTP_ASSERT code was enabled with this Kconfig option and has now been removed, we transform those code parts into WARNs resp. where appropriate BUG_ONs so that those bugs can be more easily detected as probably not many people have SCTP debugging permanently turned on. To turn on all SCTP debugging, the following steps are needed: # mount -t debugfs none /sys/kernel/debug # echo -n 'module sctp +p' > /sys/kernel/debug/dynamic_debug/control This can be done more fine-grained on a per file, per line basis and others as described in [2]. [1] https://www.kernel.org/doc/ols/2009/ols2009-pages-39-46.pdf [2] Documentation/dynamic-debug-howto.txt Signed-off-by: Daniel Borkmann <dborkman@redhat.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/sctp/socket.c')
-rw-r--r--net/sctp/socket.c168
1 files changed, 80 insertions, 88 deletions
diff --git a/net/sctp/socket.c b/net/sctp/socket.c
index 66fcdcfe1b74..d5c6a2870473 100644
--- a/net/sctp/socket.c
+++ b/net/sctp/socket.c
@@ -281,8 +281,8 @@ static int sctp_bind(struct sock *sk, struct sockaddr *addr, int addr_len)
281 281
282 sctp_lock_sock(sk); 282 sctp_lock_sock(sk);
283 283
284 SCTP_DEBUG_PRINTK("sctp_bind(sk: %p, addr: %p, addr_len: %d)\n", 284 pr_debug("%s: sk:%p, addr:%p, addr_len:%d\n", __func__, sk,
285 sk, addr, addr_len); 285 addr, addr_len);
286 286
287 /* Disallow binding twice. */ 287 /* Disallow binding twice. */
288 if (!sctp_sk(sk)->ep->base.bind_addr.port) 288 if (!sctp_sk(sk)->ep->base.bind_addr.port)
@@ -342,19 +342,15 @@ static int sctp_do_bind(struct sock *sk, union sctp_addr *addr, int len)
342 /* Common sockaddr verification. */ 342 /* Common sockaddr verification. */
343 af = sctp_sockaddr_af(sp, addr, len); 343 af = sctp_sockaddr_af(sp, addr, len);
344 if (!af) { 344 if (!af) {
345 SCTP_DEBUG_PRINTK("sctp_do_bind(sk: %p, newaddr: %p, len: %d) EINVAL\n", 345 pr_debug("%s: sk:%p, newaddr:%p, len:%d EINVAL\n",
346 sk, addr, len); 346 __func__, sk, addr, len);
347 return -EINVAL; 347 return -EINVAL;
348 } 348 }
349 349
350 snum = ntohs(addr->v4.sin_port); 350 snum = ntohs(addr->v4.sin_port);
351 351
352 SCTP_DEBUG_PRINTK_IPADDR("sctp_do_bind(sk: %p, new addr: ", 352 pr_debug("%s: sk:%p, new addr:%pISc, port:%d, new port:%d, len:%d\n",
353 ", port: %d, new port: %d, len: %d)\n", 353 __func__, sk, &addr->sa, bp->port, snum, len);
354 sk,
355 addr,
356 bp->port, snum,
357 len);
358 354
359 /* PF specific bind() address verification. */ 355 /* PF specific bind() address verification. */
360 if (!sp->pf->bind_verify(sp, addr)) 356 if (!sp->pf->bind_verify(sp, addr))
@@ -368,9 +364,8 @@ static int sctp_do_bind(struct sock *sk, union sctp_addr *addr, int len)
368 if (!snum) 364 if (!snum)
369 snum = bp->port; 365 snum = bp->port;
370 else if (snum != bp->port) { 366 else if (snum != bp->port) {
371 SCTP_DEBUG_PRINTK("sctp_do_bind:" 367 pr_debug("%s: new port %d doesn't match existing port "
372 " New port %d does not match existing port " 368 "%d\n", __func__, snum, bp->port);
373 "%d.\n", snum, bp->port);
374 return -EINVAL; 369 return -EINVAL;
375 } 370 }
376 } 371 }
@@ -468,8 +463,8 @@ static int sctp_bindx_add(struct sock *sk, struct sockaddr *addrs, int addrcnt)
468 struct sockaddr *sa_addr; 463 struct sockaddr *sa_addr;
469 struct sctp_af *af; 464 struct sctp_af *af;
470 465
471 SCTP_DEBUG_PRINTK("sctp_bindx_add (sk: %p, addrs: %p, addrcnt: %d)\n", 466 pr_debug("%s: sk:%p, addrs:%p, addrcnt:%d\n", __func__, sk,
472 sk, addrs, addrcnt); 467 addrs, addrcnt);
473 468
474 addr_buf = addrs; 469 addr_buf = addrs;
475 for (cnt = 0; cnt < addrcnt; cnt++) { 470 for (cnt = 0; cnt < addrcnt; cnt++) {
@@ -535,11 +530,10 @@ static int sctp_send_asconf_add_ip(struct sock *sk,
535 sp = sctp_sk(sk); 530 sp = sctp_sk(sk);
536 ep = sp->ep; 531 ep = sp->ep;
537 532
538 SCTP_DEBUG_PRINTK("%s: (sk: %p, addrs: %p, addrcnt: %d)\n", 533 pr_debug("%s: sk:%p, addrs:%p, addrcnt:%d\n",
539 __func__, sk, addrs, addrcnt); 534 __func__, sk, addrs, addrcnt);
540 535
541 list_for_each_entry(asoc, &ep->asocs, asocs) { 536 list_for_each_entry(asoc, &ep->asocs, asocs) {
542
543 if (!asoc->peer.asconf_capable) 537 if (!asoc->peer.asconf_capable)
544 continue; 538 continue;
545 539
@@ -646,8 +640,8 @@ static int sctp_bindx_rem(struct sock *sk, struct sockaddr *addrs, int addrcnt)
646 union sctp_addr *sa_addr; 640 union sctp_addr *sa_addr;
647 struct sctp_af *af; 641 struct sctp_af *af;
648 642
649 SCTP_DEBUG_PRINTK("sctp_bindx_rem (sk: %p, addrs: %p, addrcnt: %d)\n", 643 pr_debug("%s: sk:%p, addrs:%p, addrcnt:%d\n",
650 sk, addrs, addrcnt); 644 __func__, sk, addrs, addrcnt);
651 645
652 addr_buf = addrs; 646 addr_buf = addrs;
653 for (cnt = 0; cnt < addrcnt; cnt++) { 647 for (cnt = 0; cnt < addrcnt; cnt++) {
@@ -740,8 +734,8 @@ static int sctp_send_asconf_del_ip(struct sock *sk,
740 sp = sctp_sk(sk); 734 sp = sctp_sk(sk);
741 ep = sp->ep; 735 ep = sp->ep;
742 736
743 SCTP_DEBUG_PRINTK("%s: (sk: %p, addrs: %p, addrcnt: %d)\n", 737 pr_debug("%s: sk:%p, addrs:%p, addrcnt:%d\n",
744 __func__, sk, addrs, addrcnt); 738 __func__, sk, addrs, addrcnt);
745 739
746 list_for_each_entry(asoc, &ep->asocs, asocs) { 740 list_for_each_entry(asoc, &ep->asocs, asocs) {
747 741
@@ -808,9 +802,11 @@ static int sctp_send_asconf_del_ip(struct sock *sk,
808 sin6 = (struct sockaddr_in6 *)addrs; 802 sin6 = (struct sockaddr_in6 *)addrs;
809 asoc->asconf_addr_del_pending->v6.sin6_addr = sin6->sin6_addr; 803 asoc->asconf_addr_del_pending->v6.sin6_addr = sin6->sin6_addr;
810 } 804 }
811 SCTP_DEBUG_PRINTK_IPADDR("send_asconf_del_ip: keep the last address asoc: %p ", 805
812 " at %p\n", asoc, asoc->asconf_addr_del_pending, 806 pr_debug("%s: keep the last address asoc:%p %pISc at %p\n",
813 asoc->asconf_addr_del_pending); 807 __func__, asoc, &asoc->asconf_addr_del_pending->sa,
808 asoc->asconf_addr_del_pending);
809
814 asoc->src_out_of_asoc_ok = 1; 810 asoc->src_out_of_asoc_ok = 1;
815 stored = 1; 811 stored = 1;
816 goto skip_mkasconf; 812 goto skip_mkasconf;
@@ -972,8 +968,8 @@ static int sctp_setsockopt_bindx(struct sock* sk,
972 void *addr_buf; 968 void *addr_buf;
973 struct sctp_af *af; 969 struct sctp_af *af;
974 970
975 SCTP_DEBUG_PRINTK("sctp_setsockopt_bindx: sk %p addrs %p" 971 pr_debug("%s: sk:%p addrs:%p addrs_size:%d opt:%d\n",
976 " addrs_size %d opt %d\n", sk, addrs, addrs_size, op); 972 __func__, sk, addrs, addrs_size, op);
977 973
978 if (unlikely(addrs_size <= 0)) 974 if (unlikely(addrs_size <= 0))
979 return -EINVAL; 975 return -EINVAL;
@@ -1231,10 +1227,9 @@ static int __sctp_connect(struct sock* sk,
1231 asoc = NULL; 1227 asoc = NULL;
1232 1228
1233out_free: 1229out_free:
1230 pr_debug("%s: took out_free path with asoc:%p kaddrs:%p err:%d\n",
1231 __func__, asoc, kaddrs, err);
1234 1232
1235 SCTP_DEBUG_PRINTK("About to exit __sctp_connect() free asoc: %p"
1236 " kaddrs: %p err: %d\n",
1237 asoc, kaddrs, err);
1238 if (asoc) { 1233 if (asoc) {
1239 /* sctp_primitive_ASSOCIATE may have added this association 1234 /* sctp_primitive_ASSOCIATE may have added this association
1240 * To the hash table, try to unhash it, just in case, its a noop 1235 * To the hash table, try to unhash it, just in case, its a noop
@@ -1316,8 +1311,8 @@ static int __sctp_setsockopt_connectx(struct sock* sk,
1316 int err = 0; 1311 int err = 0;
1317 struct sockaddr *kaddrs; 1312 struct sockaddr *kaddrs;
1318 1313
1319 SCTP_DEBUG_PRINTK("%s - sk %p addrs %p addrs_size %d\n", 1314 pr_debug("%s: sk:%p addrs:%p addrs_size:%d\n",
1320 __func__, sk, addrs, addrs_size); 1315 __func__, sk, addrs, addrs_size);
1321 1316
1322 if (unlikely(addrs_size <= 0)) 1317 if (unlikely(addrs_size <= 0))
1323 return -EINVAL; 1318 return -EINVAL;
@@ -1468,7 +1463,7 @@ static void sctp_close(struct sock *sk, long timeout)
1468 struct list_head *pos, *temp; 1463 struct list_head *pos, *temp;
1469 unsigned int data_was_unread; 1464 unsigned int data_was_unread;
1470 1465
1471 SCTP_DEBUG_PRINTK("sctp_close(sk: 0x%p, timeout:%ld)\n", sk, timeout); 1466 pr_debug("%s: sk:%p, timeout:%ld\n", __func__, sk, timeout);
1472 1467
1473 sctp_lock_sock(sk); 1468 sctp_lock_sock(sk);
1474 sk->sk_shutdown = SHUTDOWN_MASK; 1469 sk->sk_shutdown = SHUTDOWN_MASK;
@@ -1594,14 +1589,12 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1594 struct sctp_datamsg *datamsg; 1589 struct sctp_datamsg *datamsg;
1595 int msg_flags = msg->msg_flags; 1590 int msg_flags = msg->msg_flags;
1596 1591
1597 SCTP_DEBUG_PRINTK("sctp_sendmsg(sk: %p, msg: %p, msg_len: %zu)\n",
1598 sk, msg, msg_len);
1599
1600 err = 0; 1592 err = 0;
1601 sp = sctp_sk(sk); 1593 sp = sctp_sk(sk);
1602 ep = sp->ep; 1594 ep = sp->ep;
1603 1595
1604 SCTP_DEBUG_PRINTK("Using endpoint: %p.\n", ep); 1596 pr_debug("%s: sk:%p, msg:%p, msg_len:%zu ep:%p\n", __func__, sk,
1597 msg, msg_len, ep);
1605 1598
1606 /* We cannot send a message over a TCP-style listening socket. */ 1599 /* We cannot send a message over a TCP-style listening socket. */
1607 if (sctp_style(sk, TCP) && sctp_sstate(sk, LISTENING)) { 1600 if (sctp_style(sk, TCP) && sctp_sstate(sk, LISTENING)) {
@@ -1611,9 +1604,8 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1611 1604
1612 /* Parse out the SCTP CMSGs. */ 1605 /* Parse out the SCTP CMSGs. */
1613 err = sctp_msghdr_parse(msg, &cmsgs); 1606 err = sctp_msghdr_parse(msg, &cmsgs);
1614
1615 if (err) { 1607 if (err) {
1616 SCTP_DEBUG_PRINTK("msghdr parse err = %x\n", err); 1608 pr_debug("%s: msghdr parse err:%x\n", __func__, err);
1617 goto out_nounlock; 1609 goto out_nounlock;
1618 } 1610 }
1619 1611
@@ -1645,8 +1637,8 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1645 associd = sinfo->sinfo_assoc_id; 1637 associd = sinfo->sinfo_assoc_id;
1646 } 1638 }
1647 1639
1648 SCTP_DEBUG_PRINTK("msg_len: %zu, sinfo_flags: 0x%x\n", 1640 pr_debug("%s: msg_len:%zu, sinfo_flags:0x%x\n", __func__,
1649 msg_len, sinfo_flags); 1641 msg_len, sinfo_flags);
1650 1642
1651 /* SCTP_EOF or SCTP_ABORT cannot be set on a TCP-style socket. */ 1643 /* SCTP_EOF or SCTP_ABORT cannot be set on a TCP-style socket. */
1652 if (sctp_style(sk, TCP) && (sinfo_flags & (SCTP_EOF | SCTP_ABORT))) { 1644 if (sctp_style(sk, TCP) && (sinfo_flags & (SCTP_EOF | SCTP_ABORT))) {
@@ -1675,7 +1667,7 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1675 1667
1676 transport = NULL; 1668 transport = NULL;
1677 1669
1678 SCTP_DEBUG_PRINTK("About to look up association.\n"); 1670 pr_debug("%s: about to look up association\n", __func__);
1679 1671
1680 sctp_lock_sock(sk); 1672 sctp_lock_sock(sk);
1681 1673
@@ -1705,7 +1697,7 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1705 } 1697 }
1706 1698
1707 if (asoc) { 1699 if (asoc) {
1708 SCTP_DEBUG_PRINTK("Just looked up association: %p.\n", asoc); 1700 pr_debug("%s: just looked up association:%p\n", __func__, asoc);
1709 1701
1710 /* We cannot send a message on a TCP-style SCTP_SS_ESTABLISHED 1702 /* We cannot send a message on a TCP-style SCTP_SS_ESTABLISHED
1711 * socket that has an association in CLOSED state. This can 1703 * socket that has an association in CLOSED state. This can
@@ -1718,8 +1710,9 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1718 } 1710 }
1719 1711
1720 if (sinfo_flags & SCTP_EOF) { 1712 if (sinfo_flags & SCTP_EOF) {
1721 SCTP_DEBUG_PRINTK("Shutting down association: %p\n", 1713 pr_debug("%s: shutting down association:%p\n",
1722 asoc); 1714 __func__, asoc);
1715
1723 sctp_primitive_SHUTDOWN(net, asoc, NULL); 1716 sctp_primitive_SHUTDOWN(net, asoc, NULL);
1724 err = 0; 1717 err = 0;
1725 goto out_unlock; 1718 goto out_unlock;
@@ -1732,7 +1725,9 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1732 goto out_unlock; 1725 goto out_unlock;
1733 } 1726 }
1734 1727
1735 SCTP_DEBUG_PRINTK("Aborting association: %p\n", asoc); 1728 pr_debug("%s: aborting association:%p\n",
1729 __func__, asoc);
1730
1736 sctp_primitive_ABORT(net, asoc, chunk); 1731 sctp_primitive_ABORT(net, asoc, chunk);
1737 err = 0; 1732 err = 0;
1738 goto out_unlock; 1733 goto out_unlock;
@@ -1741,7 +1736,7 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1741 1736
1742 /* Do we need to create the association? */ 1737 /* Do we need to create the association? */
1743 if (!asoc) { 1738 if (!asoc) {
1744 SCTP_DEBUG_PRINTK("There is no association yet.\n"); 1739 pr_debug("%s: there is no association yet\n", __func__);
1745 1740
1746 if (sinfo_flags & (SCTP_EOF | SCTP_ABORT)) { 1741 if (sinfo_flags & (SCTP_EOF | SCTP_ABORT)) {
1747 err = -EINVAL; 1742 err = -EINVAL;
@@ -1840,7 +1835,7 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1840 } 1835 }
1841 1836
1842 /* ASSERT: we have a valid association at this point. */ 1837 /* ASSERT: we have a valid association at this point. */
1843 SCTP_DEBUG_PRINTK("We have a valid association.\n"); 1838 pr_debug("%s: we have a valid association\n", __func__);
1844 1839
1845 if (!sinfo) { 1840 if (!sinfo) {
1846 /* If the user didn't specify SNDRCVINFO, make up one with 1841 /* If the user didn't specify SNDRCVINFO, make up one with
@@ -1909,7 +1904,8 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1909 err = sctp_primitive_ASSOCIATE(net, asoc, NULL); 1904 err = sctp_primitive_ASSOCIATE(net, asoc, NULL);
1910 if (err < 0) 1905 if (err < 0)
1911 goto out_free; 1906 goto out_free;
1912 SCTP_DEBUG_PRINTK("We associated primitively.\n"); 1907
1908 pr_debug("%s: we associated primitively\n", __func__);
1913 } 1909 }
1914 1910
1915 /* Break the message into multiple chunks of maximum size. */ 1911 /* Break the message into multiple chunks of maximum size. */
@@ -1936,17 +1932,15 @@ static int sctp_sendmsg(struct kiocb *iocb, struct sock *sk,
1936 */ 1932 */
1937 err = sctp_primitive_SEND(net, asoc, datamsg); 1933 err = sctp_primitive_SEND(net, asoc, datamsg);
1938 /* Did the lower layer accept the chunk? */ 1934 /* Did the lower layer accept the chunk? */
1939 if (err) 1935 if (err) {
1940 sctp_datamsg_free(datamsg); 1936 sctp_datamsg_free(datamsg);
1941 else 1937 goto out_free;
1942 sctp_datamsg_put(datamsg); 1938 }
1943 1939
1944 SCTP_DEBUG_PRINTK("We sent primitively.\n"); 1940 pr_debug("%s: we sent primitively\n", __func__);
1945 1941
1946 if (err) 1942 sctp_datamsg_put(datamsg);
1947 goto out_free; 1943 err = msg_len;
1948 else
1949 err = msg_len;
1950 1944
1951 /* If we are already past ASSOCIATE, the lower 1945 /* If we are already past ASSOCIATE, the lower
1952 * layers are responsible for association cleanup. 1946 * layers are responsible for association cleanup.
@@ -2041,10 +2035,9 @@ static int sctp_recvmsg(struct kiocb *iocb, struct sock *sk,
2041 int err = 0; 2035 int err = 0;
2042 int skb_len; 2036 int skb_len;
2043 2037
2044 SCTP_DEBUG_PRINTK("sctp_recvmsg(%s: %p, %s: %p, %s: %zd, %s: %d, %s: " 2038 pr_debug("%s: sk:%p, msghdr:%p, len:%zd, noblock:%d, flags:0x%x, "
2045 "0x%x, %s: %p)\n", "sk", sk, "msghdr", msg, 2039 "addr_len:%p)\n", __func__, sk, msg, len, noblock, flags,
2046 "len", len, "knoblauch", noblock, 2040 addr_len);
2047 "flags", flags, "addr_len", addr_len);
2048 2041
2049 sctp_lock_sock(sk); 2042 sctp_lock_sock(sk);
2050 2043
@@ -3086,7 +3079,7 @@ static int sctp_setsockopt_peer_primary_addr(struct sock *sk, char __user *optva
3086 3079
3087 err = sctp_send_asconf(asoc, chunk); 3080 err = sctp_send_asconf(asoc, chunk);
3088 3081
3089 SCTP_DEBUG_PRINTK("We set peer primary addr primitively.\n"); 3082 pr_debug("%s: we set peer primary addr primitively\n", __func__);
3090 3083
3091 return err; 3084 return err;
3092} 3085}
@@ -3561,8 +3554,7 @@ static int sctp_setsockopt(struct sock *sk, int level, int optname,
3561{ 3554{
3562 int retval = 0; 3555 int retval = 0;
3563 3556
3564 SCTP_DEBUG_PRINTK("sctp_setsockopt(sk: %p... optname: %d)\n", 3557 pr_debug("%s: sk:%p, optname:%d\n", __func__, sk, optname);
3565 sk, optname);
3566 3558
3567 /* I can hardly begin to describe how wrong this is. This is 3559 /* I can hardly begin to describe how wrong this is. This is
3568 * so broken as to be worse than useless. The API draft 3560 * so broken as to be worse than useless. The API draft
@@ -3724,8 +3716,8 @@ static int sctp_connect(struct sock *sk, struct sockaddr *addr,
3724 3716
3725 sctp_lock_sock(sk); 3717 sctp_lock_sock(sk);
3726 3718
3727 SCTP_DEBUG_PRINTK("%s - sk: %p, sockaddr: %p, addr_len: %d\n", 3719 pr_debug("%s: sk:%p, sockaddr:%p, addr_len:%d\n", __func__, sk,
3728 __func__, sk, addr, addr_len); 3720 addr, addr_len);
3729 3721
3730 /* Validate addr_len before calling common connect/connectx routine. */ 3722 /* Validate addr_len before calling common connect/connectx routine. */
3731 af = sctp_get_af_specific(addr->sa_family); 3723 af = sctp_get_af_specific(addr->sa_family);
@@ -3855,7 +3847,7 @@ static int sctp_init_sock(struct sock *sk)
3855 struct net *net = sock_net(sk); 3847 struct net *net = sock_net(sk);
3856 struct sctp_sock *sp; 3848 struct sctp_sock *sp;
3857 3849
3858 SCTP_DEBUG_PRINTK("sctp_init_sock(sk: %p)\n", sk); 3850 pr_debug("%s: sk:%p\n", __func__, sk);
3859 3851
3860 sp = sctp_sk(sk); 3852 sp = sctp_sk(sk);
3861 3853
@@ -3990,7 +3982,7 @@ static void sctp_destroy_sock(struct sock *sk)
3990{ 3982{
3991 struct sctp_sock *sp; 3983 struct sctp_sock *sp;
3992 3984
3993 SCTP_DEBUG_PRINTK("sctp_destroy_sock(sk: %p)\n", sk); 3985 pr_debug("%s: sk:%p\n", __func__, sk);
3994 3986
3995 /* Release our hold on the endpoint. */ 3987 /* Release our hold on the endpoint. */
3996 sp = sctp_sk(sk); 3988 sp = sctp_sk(sk);
@@ -4123,9 +4115,9 @@ static int sctp_getsockopt_sctp_status(struct sock *sk, int len,
4123 goto out; 4115 goto out;
4124 } 4116 }
4125 4117
4126 SCTP_DEBUG_PRINTK("sctp_getsockopt_sctp_status(%d): %d %d %d\n", 4118 pr_debug("%s: len:%d, state:%d, rwnd:%d, assoc_id:%d\n",
4127 len, status.sstat_state, status.sstat_rwnd, 4119 __func__, len, status.sstat_state, status.sstat_rwnd,
4128 status.sstat_assoc_id); 4120 status.sstat_assoc_id);
4129 4121
4130 if (copy_to_user(optval, &status, len)) { 4122 if (copy_to_user(optval, &status, len)) {
4131 retval = -EFAULT; 4123 retval = -EFAULT;
@@ -4333,8 +4325,8 @@ static int sctp_getsockopt_peeloff(struct sock *sk, int len, char __user *optval
4333 return PTR_ERR(newfile); 4325 return PTR_ERR(newfile);
4334 } 4326 }
4335 4327
4336 SCTP_DEBUG_PRINTK("%s: sk: %p newsk: %p sd: %d\n", 4328 pr_debug("%s: sk:%p, newsk:%p, sd:%d\n", __func__, sk, newsock->sk,
4337 __func__, sk, newsock->sk, retval); 4329 retval);
4338 4330
4339 /* Return the fd mapped to the new socket. */ 4331 /* Return the fd mapped to the new socket. */
4340 if (put_user(len, optlen)) { 4332 if (put_user(len, optlen)) {
@@ -4467,7 +4459,7 @@ static int sctp_getsockopt_peer_addr_params(struct sock *sk, int len,
4467 trans = sctp_addr_id2transport(sk, &params.spp_address, 4459 trans = sctp_addr_id2transport(sk, &params.spp_address,
4468 params.spp_assoc_id); 4460 params.spp_assoc_id);
4469 if (!trans) { 4461 if (!trans) {
4470 SCTP_DEBUG_PRINTK("Failed no transport\n"); 4462 pr_debug("%s: failed no transport\n", __func__);
4471 return -EINVAL; 4463 return -EINVAL;
4472 } 4464 }
4473 } 4465 }
@@ -4478,7 +4470,7 @@ static int sctp_getsockopt_peer_addr_params(struct sock *sk, int len,
4478 */ 4470 */
4479 asoc = sctp_id2assoc(sk, params.spp_assoc_id); 4471 asoc = sctp_id2assoc(sk, params.spp_assoc_id);
4480 if (!asoc && params.spp_assoc_id && sctp_style(sk, UDP)) { 4472 if (!asoc && params.spp_assoc_id && sctp_style(sk, UDP)) {
4481 SCTP_DEBUG_PRINTK("Failed no association\n"); 4473 pr_debug("%s: failed no association\n", __func__);
4482 return -EINVAL; 4474 return -EINVAL;
4483 } 4475 }
4484 4476
@@ -5698,8 +5690,7 @@ static int sctp_getsockopt_assoc_stats(struct sock *sk, int len,
5698 if (put_user(len, optlen)) 5690 if (put_user(len, optlen))
5699 return -EFAULT; 5691 return -EFAULT;
5700 5692
5701 SCTP_DEBUG_PRINTK("sctp_getsockopt_assoc_stat(%d): %d\n", 5693 pr_debug("%s: len:%d, assoc_id:%d\n", __func__, len, sas.sas_assoc_id);
5702 len, sas.sas_assoc_id);
5703 5694
5704 if (copy_to_user(optval, &sas, len)) 5695 if (copy_to_user(optval, &sas, len))
5705 return -EFAULT; 5696 return -EFAULT;
@@ -5713,8 +5704,7 @@ static int sctp_getsockopt(struct sock *sk, int level, int optname,
5713 int retval = 0; 5704 int retval = 0;
5714 int len; 5705 int len;
5715 5706
5716 SCTP_DEBUG_PRINTK("sctp_getsockopt(sk: %p... optname: %d)\n", 5707 pr_debug("%s: sk:%p, optname:%d\n", __func__, sk, optname);
5717 sk, optname);
5718 5708
5719 /* I can hardly begin to describe how wrong this is. This is 5709 /* I can hardly begin to describe how wrong this is. This is
5720 * so broken as to be worse than useless. The API draft 5710 * so broken as to be worse than useless. The API draft
@@ -5894,7 +5884,8 @@ static long sctp_get_port_local(struct sock *sk, union sctp_addr *addr)
5894 5884
5895 snum = ntohs(addr->v4.sin_port); 5885 snum = ntohs(addr->v4.sin_port);
5896 5886
5897 SCTP_DEBUG_PRINTK("sctp_get_port() begins, snum=%d\n", snum); 5887 pr_debug("%s: begins, snum:%d\n", __func__, snum);
5888
5898 sctp_local_bh_disable(); 5889 sctp_local_bh_disable();
5899 5890
5900 if (snum == 0) { 5891 if (snum == 0) {
@@ -5960,7 +5951,8 @@ pp_found:
5960 int reuse = sk->sk_reuse; 5951 int reuse = sk->sk_reuse;
5961 struct sock *sk2; 5952 struct sock *sk2;
5962 5953
5963 SCTP_DEBUG_PRINTK("sctp_get_port() found a possible match\n"); 5954 pr_debug("%s: found a possible match\n", __func__);
5955
5964 if (pp->fastreuse && sk->sk_reuse && 5956 if (pp->fastreuse && sk->sk_reuse &&
5965 sk->sk_state != SCTP_SS_LISTENING) 5957 sk->sk_state != SCTP_SS_LISTENING)
5966 goto success; 5958 goto success;
@@ -5990,7 +5982,8 @@ pp_found:
5990 goto fail_unlock; 5982 goto fail_unlock;
5991 } 5983 }
5992 } 5984 }
5993 SCTP_DEBUG_PRINTK("sctp_get_port(): Found a match\n"); 5985
5986 pr_debug("%s: found a match\n", __func__);
5994 } 5987 }
5995pp_not_found: 5988pp_not_found:
5996 /* If there was a hash table miss, create a new port. */ 5989 /* If there was a hash table miss, create a new port. */
@@ -6479,8 +6472,8 @@ static struct sk_buff *sctp_skb_recv_datagram(struct sock *sk, int flags,
6479 6472
6480 timeo = sock_rcvtimeo(sk, noblock); 6473 timeo = sock_rcvtimeo(sk, noblock);
6481 6474
6482 SCTP_DEBUG_PRINTK("Timeout: timeo: %ld, MAX: %ld.\n", 6475 pr_debug("%s: timeo:%ld, max:%ld\n", __func__, timeo,
6483 timeo, MAX_SCHEDULE_TIMEOUT); 6476 MAX_SCHEDULE_TIMEOUT);
6484 6477
6485 do { 6478 do {
6486 /* Again only user level code calls this function, 6479 /* Again only user level code calls this function,
@@ -6611,8 +6604,8 @@ static int sctp_wait_for_sndbuf(struct sctp_association *asoc, long *timeo_p,
6611 long current_timeo = *timeo_p; 6604 long current_timeo = *timeo_p;
6612 DEFINE_WAIT(wait); 6605 DEFINE_WAIT(wait);
6613 6606
6614 SCTP_DEBUG_PRINTK("wait_for_sndbuf: asoc=%p, timeo=%ld, msg_len=%zu\n", 6607 pr_debug("%s: asoc:%p, timeo:%ld, msg_len:%zu\n", __func__, asoc,
6615 asoc, (long)(*timeo_p), msg_len); 6608 *timeo_p, msg_len);
6616 6609
6617 /* Increment the association's refcnt. */ 6610 /* Increment the association's refcnt. */
6618 sctp_association_hold(asoc); 6611 sctp_association_hold(asoc);
@@ -6718,8 +6711,7 @@ static int sctp_wait_for_connect(struct sctp_association *asoc, long *timeo_p)
6718 long current_timeo = *timeo_p; 6711 long current_timeo = *timeo_p;
6719 DEFINE_WAIT(wait); 6712 DEFINE_WAIT(wait);
6720 6713
6721 SCTP_DEBUG_PRINTK("%s: asoc=%p, timeo=%ld\n", __func__, asoc, 6714 pr_debug("%s: asoc:%p, timeo:%ld\n", __func__, asoc, *timeo_p);
6722 (long)(*timeo_p));
6723 6715
6724 /* Increment the association's refcnt. */ 6716 /* Increment the association's refcnt. */
6725 sctp_association_hold(asoc); 6717 sctp_association_hold(asoc);