diff options
author | Chuck Lever <chuck.lever@oracle.com> | 2007-01-31 12:14:08 -0500 |
---|---|---|
committer | Trond Myklebust <Trond.Myklebust@netapp.com> | 2007-02-03 18:35:10 -0500 |
commit | 46121cf7d85869bfe9588bac7ccf55aa0bc7f278 (patch) | |
tree | 51172f1b47dd8aa99e6f96c495fe7f8e2c0bbc34 /net/sunrpc/clnt.c | |
parent | 8885cb367f86ce02bed3bf18192d74a53ac3b81f (diff) |
SUNRPC: fix print format for tk_pid
The tk_pid field is an unsigned short. The proper print format specifier for
that type is %5u, not %4d.
Also clean up some miscellaneous print formatting nits.
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
Diffstat (limited to 'net/sunrpc/clnt.c')
-rw-r--r-- | net/sunrpc/clnt.c | 129 |
1 files changed, 69 insertions, 60 deletions
diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c index e9d5f3c562e5..393e70aee181 100644 --- a/net/sunrpc/clnt.c +++ b/net/sunrpc/clnt.c | |||
@@ -42,6 +42,10 @@ | |||
42 | # define RPCDBG_FACILITY RPCDBG_CALL | 42 | # define RPCDBG_FACILITY RPCDBG_CALL |
43 | #endif | 43 | #endif |
44 | 44 | ||
45 | #define dprint_status(t) \ | ||
46 | dprintk("RPC: %5u %s (status %d)\n", t->tk_pid, \ | ||
47 | __FUNCTION__, t->tk_status) | ||
48 | |||
45 | static DECLARE_WAIT_QUEUE_HEAD(destroy_wait); | 49 | static DECLARE_WAIT_QUEUE_HEAD(destroy_wait); |
46 | 50 | ||
47 | 51 | ||
@@ -106,8 +110,8 @@ static struct rpc_clnt * rpc_new_client(struct rpc_xprt *xprt, char *servname, s | |||
106 | int err; | 110 | int err; |
107 | int len; | 111 | int len; |
108 | 112 | ||
109 | dprintk("RPC: creating %s client for %s (xprt %p)\n", | 113 | dprintk("RPC: creating %s client for %s (xprt %p)\n", |
110 | program->name, servname, xprt); | 114 | program->name, servname, xprt); |
111 | 115 | ||
112 | err = -EINVAL; | 116 | err = -EINVAL; |
113 | if (!xprt) | 117 | if (!xprt) |
@@ -220,7 +224,7 @@ struct rpc_clnt *rpc_create(struct rpc_create_args *args) | |||
220 | xprt->resvport = 0; | 224 | xprt->resvport = 0; |
221 | 225 | ||
222 | dprintk("RPC: creating %s client for %s (xprt %p)\n", | 226 | dprintk("RPC: creating %s client for %s (xprt %p)\n", |
223 | args->program->name, args->servername, xprt); | 227 | args->program->name, args->servername, xprt); |
224 | 228 | ||
225 | clnt = rpc_new_client(xprt, args->servername, args->program, | 229 | clnt = rpc_new_client(xprt, args->servername, args->program, |
226 | args->version, args->authflavor); | 230 | args->version, args->authflavor); |
@@ -288,7 +292,7 @@ out_no_path: | |||
288 | out_no_stats: | 292 | out_no_stats: |
289 | kfree(new); | 293 | kfree(new); |
290 | out_no_clnt: | 294 | out_no_clnt: |
291 | dprintk("RPC: %s returned error %d\n", __FUNCTION__, err); | 295 | dprintk("RPC: %s: returned error %d\n", __FUNCTION__, err); |
292 | return ERR_PTR(err); | 296 | return ERR_PTR(err); |
293 | } | 297 | } |
294 | 298 | ||
@@ -301,7 +305,7 @@ out_no_clnt: | |||
301 | int | 305 | int |
302 | rpc_shutdown_client(struct rpc_clnt *clnt) | 306 | rpc_shutdown_client(struct rpc_clnt *clnt) |
303 | { | 307 | { |
304 | dprintk("RPC: shutting down %s client for %s, tasks=%d\n", | 308 | dprintk("RPC: shutting down %s client for %s, tasks=%d\n", |
305 | clnt->cl_protname, clnt->cl_server, | 309 | clnt->cl_protname, clnt->cl_server, |
306 | atomic_read(&clnt->cl_users)); | 310 | atomic_read(&clnt->cl_users)); |
307 | 311 | ||
@@ -336,7 +340,7 @@ rpc_destroy_client(struct rpc_clnt *clnt) | |||
336 | return 1; | 340 | return 1; |
337 | BUG_ON(atomic_read(&clnt->cl_users) != 0); | 341 | BUG_ON(atomic_read(&clnt->cl_users) != 0); |
338 | 342 | ||
339 | dprintk("RPC: destroying %s client for %s\n", | 343 | dprintk("RPC: destroying %s client for %s\n", |
340 | clnt->cl_protname, clnt->cl_server); | 344 | clnt->cl_protname, clnt->cl_server); |
341 | if (clnt->cl_auth) { | 345 | if (clnt->cl_auth) { |
342 | rpcauth_destroy(clnt->cl_auth); | 346 | rpcauth_destroy(clnt->cl_auth); |
@@ -366,8 +370,8 @@ out_free: | |||
366 | void | 370 | void |
367 | rpc_release_client(struct rpc_clnt *clnt) | 371 | rpc_release_client(struct rpc_clnt *clnt) |
368 | { | 372 | { |
369 | dprintk("RPC: rpc_release_client(%p, %d)\n", | 373 | dprintk("RPC: rpc_release_client(%p, %d)\n", |
370 | clnt, atomic_read(&clnt->cl_users)); | 374 | clnt, atomic_read(&clnt->cl_users)); |
371 | 375 | ||
372 | if (!atomic_dec_and_test(&clnt->cl_users)) | 376 | if (!atomic_dec_and_test(&clnt->cl_users)) |
373 | return; | 377 | return; |
@@ -654,9 +658,10 @@ call_start(struct rpc_task *task) | |||
654 | { | 658 | { |
655 | struct rpc_clnt *clnt = task->tk_client; | 659 | struct rpc_clnt *clnt = task->tk_client; |
656 | 660 | ||
657 | dprintk("RPC: %4d call_start %s%d proc %d (%s)\n", task->tk_pid, | 661 | dprintk("RPC: %5u call_start %s%d proc %d (%s)\n", task->tk_pid, |
658 | clnt->cl_protname, clnt->cl_vers, task->tk_msg.rpc_proc->p_proc, | 662 | clnt->cl_protname, clnt->cl_vers, |
659 | (RPC_IS_ASYNC(task) ? "async" : "sync")); | 663 | task->tk_msg.rpc_proc->p_proc, |
664 | (RPC_IS_ASYNC(task) ? "async" : "sync")); | ||
660 | 665 | ||
661 | /* Increment call count */ | 666 | /* Increment call count */ |
662 | task->tk_msg.rpc_proc->p_count++; | 667 | task->tk_msg.rpc_proc->p_count++; |
@@ -670,7 +675,7 @@ call_start(struct rpc_task *task) | |||
670 | static void | 675 | static void |
671 | call_reserve(struct rpc_task *task) | 676 | call_reserve(struct rpc_task *task) |
672 | { | 677 | { |
673 | dprintk("RPC: %4d call_reserve\n", task->tk_pid); | 678 | dprint_status(task); |
674 | 679 | ||
675 | if (!rpcauth_uptodatecred(task)) { | 680 | if (!rpcauth_uptodatecred(task)) { |
676 | task->tk_action = call_refresh; | 681 | task->tk_action = call_refresh; |
@@ -690,8 +695,7 @@ call_reserveresult(struct rpc_task *task) | |||
690 | { | 695 | { |
691 | int status = task->tk_status; | 696 | int status = task->tk_status; |
692 | 697 | ||
693 | dprintk("RPC: %4d call_reserveresult (status %d)\n", | 698 | dprint_status(task); |
694 | task->tk_pid, task->tk_status); | ||
695 | 699 | ||
696 | /* | 700 | /* |
697 | * After a call to xprt_reserve(), we must have either | 701 | * After a call to xprt_reserve(), we must have either |
@@ -745,8 +749,8 @@ call_allocate(struct rpc_task *task) | |||
745 | struct rpc_xprt *xprt = task->tk_xprt; | 749 | struct rpc_xprt *xprt = task->tk_xprt; |
746 | unsigned int bufsiz; | 750 | unsigned int bufsiz; |
747 | 751 | ||
748 | dprintk("RPC: %4d call_allocate (status %d)\n", | 752 | dprint_status(task); |
749 | task->tk_pid, task->tk_status); | 753 | |
750 | task->tk_action = call_bind; | 754 | task->tk_action = call_bind; |
751 | if (req->rq_buffer) | 755 | if (req->rq_buffer) |
752 | return; | 756 | return; |
@@ -757,7 +761,8 @@ call_allocate(struct rpc_task *task) | |||
757 | 761 | ||
758 | if (xprt->ops->buf_alloc(task, bufsiz << 1) != NULL) | 762 | if (xprt->ops->buf_alloc(task, bufsiz << 1) != NULL) |
759 | return; | 763 | return; |
760 | printk(KERN_INFO "RPC: buffer allocation failed for task %p\n", task); | 764 | |
765 | dprintk("RPC: %5u rpc_buffer allocation failed\n", task->tk_pid); | ||
761 | 766 | ||
762 | if (RPC_IS_ASYNC(task) || !signalled()) { | 767 | if (RPC_IS_ASYNC(task) || !signalled()) { |
763 | xprt_release(task); | 768 | xprt_release(task); |
@@ -794,8 +799,7 @@ call_encode(struct rpc_task *task) | |||
794 | kxdrproc_t encode; | 799 | kxdrproc_t encode; |
795 | __be32 *p; | 800 | __be32 *p; |
796 | 801 | ||
797 | dprintk("RPC: %4d call_encode (status %d)\n", | 802 | dprint_status(task); |
798 | task->tk_pid, task->tk_status); | ||
799 | 803 | ||
800 | /* Default buffer setup */ | 804 | /* Default buffer setup */ |
801 | bufsiz = req->rq_bufsize >> 1; | 805 | bufsiz = req->rq_bufsize >> 1; |
@@ -841,8 +845,7 @@ call_bind(struct rpc_task *task) | |||
841 | { | 845 | { |
842 | struct rpc_xprt *xprt = task->tk_xprt; | 846 | struct rpc_xprt *xprt = task->tk_xprt; |
843 | 847 | ||
844 | dprintk("RPC: %4d call_bind (status %d)\n", | 848 | dprint_status(task); |
845 | task->tk_pid, task->tk_status); | ||
846 | 849 | ||
847 | task->tk_action = call_connect; | 850 | task->tk_action = call_connect; |
848 | if (!xprt_bound(xprt)) { | 851 | if (!xprt_bound(xprt)) { |
@@ -861,8 +864,7 @@ call_bind_status(struct rpc_task *task) | |||
861 | int status = -EACCES; | 864 | int status = -EACCES; |
862 | 865 | ||
863 | if (task->tk_status >= 0) { | 866 | if (task->tk_status >= 0) { |
864 | dprintk("RPC: %4d call_bind_status (status %d)\n", | 867 | dprint_status(task); |
865 | task->tk_pid, task->tk_status); | ||
866 | task->tk_status = 0; | 868 | task->tk_status = 0; |
867 | task->tk_action = call_connect; | 869 | task->tk_action = call_connect; |
868 | return; | 870 | return; |
@@ -870,24 +872,24 @@ call_bind_status(struct rpc_task *task) | |||
870 | 872 | ||
871 | switch (task->tk_status) { | 873 | switch (task->tk_status) { |
872 | case -EACCES: | 874 | case -EACCES: |
873 | dprintk("RPC: %4d remote rpcbind: RPC program/version unavailable\n", | 875 | dprintk("RPC: %5u remote rpcbind: RPC program/version " |
874 | task->tk_pid); | 876 | "unavailable\n", task->tk_pid); |
875 | rpc_delay(task, 3*HZ); | 877 | rpc_delay(task, 3*HZ); |
876 | goto retry_timeout; | 878 | goto retry_timeout; |
877 | case -ETIMEDOUT: | 879 | case -ETIMEDOUT: |
878 | dprintk("RPC: %4d rpcbind request timed out\n", | 880 | dprintk("RPC: %5u rpcbind request timed out\n", |
879 | task->tk_pid); | 881 | task->tk_pid); |
880 | goto retry_timeout; | 882 | goto retry_timeout; |
881 | case -EPFNOSUPPORT: | 883 | case -EPFNOSUPPORT: |
882 | dprintk("RPC: %4d remote rpcbind service unavailable\n", | 884 | dprintk("RPC: %5u remote rpcbind service unavailable\n", |
883 | task->tk_pid); | 885 | task->tk_pid); |
884 | break; | 886 | break; |
885 | case -EPROTONOSUPPORT: | 887 | case -EPROTONOSUPPORT: |
886 | dprintk("RPC: %4d remote rpcbind version 2 unavailable\n", | 888 | dprintk("RPC: %5u remote rpcbind version 2 unavailable\n", |
887 | task->tk_pid); | 889 | task->tk_pid); |
888 | break; | 890 | break; |
889 | default: | 891 | default: |
890 | dprintk("RPC: %4d unrecognized rpcbind error (%d)\n", | 892 | dprintk("RPC: %5u unrecognized rpcbind error (%d)\n", |
891 | task->tk_pid, -task->tk_status); | 893 | task->tk_pid, -task->tk_status); |
892 | status = -EIO; | 894 | status = -EIO; |
893 | } | 895 | } |
@@ -907,7 +909,7 @@ call_connect(struct rpc_task *task) | |||
907 | { | 909 | { |
908 | struct rpc_xprt *xprt = task->tk_xprt; | 910 | struct rpc_xprt *xprt = task->tk_xprt; |
909 | 911 | ||
910 | dprintk("RPC: %4d call_connect xprt %p %s connected\n", | 912 | dprintk("RPC: %5u call_connect xprt %p %s connected\n", |
911 | task->tk_pid, xprt, | 913 | task->tk_pid, xprt, |
912 | (xprt_connected(xprt) ? "is" : "is not")); | 914 | (xprt_connected(xprt) ? "is" : "is not")); |
913 | 915 | ||
@@ -929,8 +931,7 @@ call_connect_status(struct rpc_task *task) | |||
929 | struct rpc_clnt *clnt = task->tk_client; | 931 | struct rpc_clnt *clnt = task->tk_client; |
930 | int status = task->tk_status; | 932 | int status = task->tk_status; |
931 | 933 | ||
932 | dprintk("RPC: %5u call_connect_status (status %d)\n", | 934 | dprint_status(task); |
933 | task->tk_pid, task->tk_status); | ||
934 | 935 | ||
935 | task->tk_status = 0; | 936 | task->tk_status = 0; |
936 | if (status >= 0) { | 937 | if (status >= 0) { |
@@ -962,8 +963,7 @@ call_connect_status(struct rpc_task *task) | |||
962 | static void | 963 | static void |
963 | call_transmit(struct rpc_task *task) | 964 | call_transmit(struct rpc_task *task) |
964 | { | 965 | { |
965 | dprintk("RPC: %4d call_transmit (status %d)\n", | 966 | dprint_status(task); |
966 | task->tk_pid, task->tk_status); | ||
967 | 967 | ||
968 | task->tk_action = call_status; | 968 | task->tk_action = call_status; |
969 | if (task->tk_status < 0) | 969 | if (task->tk_status < 0) |
@@ -1024,8 +1024,7 @@ call_status(struct rpc_task *task) | |||
1024 | if (req->rq_received > 0 && !req->rq_bytes_sent) | 1024 | if (req->rq_received > 0 && !req->rq_bytes_sent) |
1025 | task->tk_status = req->rq_received; | 1025 | task->tk_status = req->rq_received; |
1026 | 1026 | ||
1027 | dprintk("RPC: %4d call_status (status %d)\n", | 1027 | dprint_status(task); |
1028 | task->tk_pid, task->tk_status); | ||
1029 | 1028 | ||
1030 | status = task->tk_status; | 1029 | status = task->tk_status; |
1031 | if (status >= 0) { | 1030 | if (status >= 0) { |
@@ -1076,11 +1075,11 @@ call_timeout(struct rpc_task *task) | |||
1076 | struct rpc_clnt *clnt = task->tk_client; | 1075 | struct rpc_clnt *clnt = task->tk_client; |
1077 | 1076 | ||
1078 | if (xprt_adjust_timeout(task->tk_rqstp) == 0) { | 1077 | if (xprt_adjust_timeout(task->tk_rqstp) == 0) { |
1079 | dprintk("RPC: %4d call_timeout (minor)\n", task->tk_pid); | 1078 | dprintk("RPC: %5u call_timeout (minor)\n", task->tk_pid); |
1080 | goto retry; | 1079 | goto retry; |
1081 | } | 1080 | } |
1082 | 1081 | ||
1083 | dprintk("RPC: %4d call_timeout (major)\n", task->tk_pid); | 1082 | dprintk("RPC: %5u call_timeout (major)\n", task->tk_pid); |
1084 | task->tk_timeouts++; | 1083 | task->tk_timeouts++; |
1085 | 1084 | ||
1086 | if (RPC_IS_SOFT(task)) { | 1085 | if (RPC_IS_SOFT(task)) { |
@@ -1114,8 +1113,8 @@ call_decode(struct rpc_task *task) | |||
1114 | kxdrproc_t decode = task->tk_msg.rpc_proc->p_decode; | 1113 | kxdrproc_t decode = task->tk_msg.rpc_proc->p_decode; |
1115 | __be32 *p; | 1114 | __be32 *p; |
1116 | 1115 | ||
1117 | dprintk("RPC: %4d call_decode (status %d)\n", | 1116 | dprintk("RPC: %5u call_decode (status %d)\n", |
1118 | task->tk_pid, task->tk_status); | 1117 | task->tk_pid, task->tk_status); |
1119 | 1118 | ||
1120 | if (task->tk_flags & RPC_CALL_MAJORSEEN) { | 1119 | if (task->tk_flags & RPC_CALL_MAJORSEEN) { |
1121 | printk(KERN_NOTICE "%s: server %s OK\n", | 1120 | printk(KERN_NOTICE "%s: server %s OK\n", |
@@ -1129,8 +1128,8 @@ call_decode(struct rpc_task *task) | |||
1129 | clnt->cl_stats->rpcretrans++; | 1128 | clnt->cl_stats->rpcretrans++; |
1130 | goto out_retry; | 1129 | goto out_retry; |
1131 | } | 1130 | } |
1132 | dprintk("%s: too small RPC reply size (%d bytes)\n", | 1131 | dprintk("RPC: %s: too small RPC reply size (%d bytes)\n", |
1133 | clnt->cl_protname, task->tk_status); | 1132 | clnt->cl_protname, task->tk_status); |
1134 | task->tk_action = call_timeout; | 1133 | task->tk_action = call_timeout; |
1135 | goto out_retry; | 1134 | goto out_retry; |
1136 | } | 1135 | } |
@@ -1162,8 +1161,8 @@ call_decode(struct rpc_task *task) | |||
1162 | task->tk_msg.rpc_resp); | 1161 | task->tk_msg.rpc_resp); |
1163 | unlock_kernel(); | 1162 | unlock_kernel(); |
1164 | } | 1163 | } |
1165 | dprintk("RPC: %4d call_decode result %d\n", task->tk_pid, | 1164 | dprintk("RPC: %5u call_decode result %d\n", task->tk_pid, |
1166 | task->tk_status); | 1165 | task->tk_status); |
1167 | return; | 1166 | return; |
1168 | out_retry: | 1167 | out_retry: |
1169 | req->rq_received = req->rq_private_buf.len = 0; | 1168 | req->rq_received = req->rq_private_buf.len = 0; |
@@ -1176,7 +1175,7 @@ out_retry: | |||
1176 | static void | 1175 | static void |
1177 | call_refresh(struct rpc_task *task) | 1176 | call_refresh(struct rpc_task *task) |
1178 | { | 1177 | { |
1179 | dprintk("RPC: %4d call_refresh\n", task->tk_pid); | 1178 | dprint_status(task); |
1180 | 1179 | ||
1181 | xprt_release(task); /* Must do to obtain new XID */ | 1180 | xprt_release(task); /* Must do to obtain new XID */ |
1182 | task->tk_action = call_refreshresult; | 1181 | task->tk_action = call_refreshresult; |
@@ -1192,8 +1191,8 @@ static void | |||
1192 | call_refreshresult(struct rpc_task *task) | 1191 | call_refreshresult(struct rpc_task *task) |
1193 | { | 1192 | { |
1194 | int status = task->tk_status; | 1193 | int status = task->tk_status; |
1195 | dprintk("RPC: %4d call_refreshresult (status %d)\n", | 1194 | |
1196 | task->tk_pid, task->tk_status); | 1195 | dprint_status(task); |
1197 | 1196 | ||
1198 | task->tk_status = 0; | 1197 | task->tk_status = 0; |
1199 | task->tk_action = call_reserve; | 1198 | task->tk_action = call_reserve; |
@@ -1271,11 +1270,15 @@ call_verify(struct rpc_task *task) | |||
1271 | case RPC_AUTH_ERROR: | 1270 | case RPC_AUTH_ERROR: |
1272 | break; | 1271 | break; |
1273 | case RPC_MISMATCH: | 1272 | case RPC_MISMATCH: |
1274 | dprintk("%s: RPC call version mismatch!\n", __FUNCTION__); | 1273 | dprintk("RPC: %5u %s: RPC call version " |
1274 | "mismatch!\n", | ||
1275 | task->tk_pid, __FUNCTION__); | ||
1275 | error = -EPROTONOSUPPORT; | 1276 | error = -EPROTONOSUPPORT; |
1276 | goto out_err; | 1277 | goto out_err; |
1277 | default: | 1278 | default: |
1278 | dprintk("%s: RPC call rejected, unknown error: %x\n", __FUNCTION__, n); | 1279 | dprintk("RPC: %5u %s: RPC call rejected, " |
1280 | "unknown error: %x\n", | ||
1281 | task->tk_pid, __FUNCTION__, n); | ||
1279 | goto out_eio; | 1282 | goto out_eio; |
1280 | } | 1283 | } |
1281 | if (--len < 0) | 1284 | if (--len < 0) |
@@ -1288,8 +1291,8 @@ call_verify(struct rpc_task *task) | |||
1288 | if (!task->tk_cred_retry) | 1291 | if (!task->tk_cred_retry) |
1289 | break; | 1292 | break; |
1290 | task->tk_cred_retry--; | 1293 | task->tk_cred_retry--; |
1291 | dprintk("RPC: %4d call_verify: retry stale creds\n", | 1294 | dprintk("RPC: %5u %s: retry stale creds\n", |
1292 | task->tk_pid); | 1295 | task->tk_pid, __FUNCTION__); |
1293 | rpcauth_invalcred(task); | 1296 | rpcauth_invalcred(task); |
1294 | task->tk_action = call_refresh; | 1297 | task->tk_action = call_refresh; |
1295 | goto out_retry; | 1298 | goto out_retry; |
@@ -1299,8 +1302,8 @@ call_verify(struct rpc_task *task) | |||
1299 | if (!task->tk_garb_retry) | 1302 | if (!task->tk_garb_retry) |
1300 | break; | 1303 | break; |
1301 | task->tk_garb_retry--; | 1304 | task->tk_garb_retry--; |
1302 | dprintk("RPC: %4d call_verify: retry garbled creds\n", | 1305 | dprintk("RPC: %5u %s: retry garbled creds\n", |
1303 | task->tk_pid); | 1306 | task->tk_pid, __FUNCTION__); |
1304 | task->tk_action = call_bind; | 1307 | task->tk_action = call_bind; |
1305 | goto out_retry; | 1308 | goto out_retry; |
1306 | case RPC_AUTH_TOOWEAK: | 1309 | case RPC_AUTH_TOOWEAK: |
@@ -1311,8 +1314,8 @@ call_verify(struct rpc_task *task) | |||
1311 | printk(KERN_WARNING "call_verify: unknown auth error: %x\n", n); | 1314 | printk(KERN_WARNING "call_verify: unknown auth error: %x\n", n); |
1312 | error = -EIO; | 1315 | error = -EIO; |
1313 | } | 1316 | } |
1314 | dprintk("RPC: %4d call_verify: call rejected %d\n", | 1317 | dprintk("RPC: %5u %s: call rejected %d\n", |
1315 | task->tk_pid, n); | 1318 | task->tk_pid, __FUNCTION__, n); |
1316 | goto out_err; | 1319 | goto out_err; |
1317 | } | 1320 | } |
1318 | if (!(p = rpcauth_checkverf(task, p))) { | 1321 | if (!(p = rpcauth_checkverf(task, p))) { |
@@ -1326,20 +1329,24 @@ call_verify(struct rpc_task *task) | |||
1326 | case RPC_SUCCESS: | 1329 | case RPC_SUCCESS: |
1327 | return p; | 1330 | return p; |
1328 | case RPC_PROG_UNAVAIL: | 1331 | case RPC_PROG_UNAVAIL: |
1329 | dprintk("RPC: call_verify: program %u is unsupported by server %s\n", | 1332 | dprintk("RPC: %5u %s: program %u is unsupported by server %s\n", |
1333 | task->tk_pid, __FUNCTION__, | ||
1330 | (unsigned int)task->tk_client->cl_prog, | 1334 | (unsigned int)task->tk_client->cl_prog, |
1331 | task->tk_client->cl_server); | 1335 | task->tk_client->cl_server); |
1332 | error = -EPFNOSUPPORT; | 1336 | error = -EPFNOSUPPORT; |
1333 | goto out_err; | 1337 | goto out_err; |
1334 | case RPC_PROG_MISMATCH: | 1338 | case RPC_PROG_MISMATCH: |
1335 | dprintk("RPC: call_verify: program %u, version %u unsupported by server %s\n", | 1339 | dprintk("RPC: %5u %s: program %u, version %u unsupported by " |
1340 | "server %s\n", task->tk_pid, __FUNCTION__, | ||
1336 | (unsigned int)task->tk_client->cl_prog, | 1341 | (unsigned int)task->tk_client->cl_prog, |
1337 | (unsigned int)task->tk_client->cl_vers, | 1342 | (unsigned int)task->tk_client->cl_vers, |
1338 | task->tk_client->cl_server); | 1343 | task->tk_client->cl_server); |
1339 | error = -EPROTONOSUPPORT; | 1344 | error = -EPROTONOSUPPORT; |
1340 | goto out_err; | 1345 | goto out_err; |
1341 | case RPC_PROC_UNAVAIL: | 1346 | case RPC_PROC_UNAVAIL: |
1342 | dprintk("RPC: call_verify: proc %p unsupported by program %u, version %u on server %s\n", | 1347 | dprintk("RPC: %5u %s: proc %p unsupported by program %u, " |
1348 | "version %u on server %s\n", | ||
1349 | task->tk_pid, __FUNCTION__, | ||
1343 | task->tk_msg.rpc_proc, | 1350 | task->tk_msg.rpc_proc, |
1344 | task->tk_client->cl_prog, | 1351 | task->tk_client->cl_prog, |
1345 | task->tk_client->cl_vers, | 1352 | task->tk_client->cl_vers, |
@@ -1347,7 +1354,8 @@ call_verify(struct rpc_task *task) | |||
1347 | error = -EOPNOTSUPP; | 1354 | error = -EOPNOTSUPP; |
1348 | goto out_err; | 1355 | goto out_err; |
1349 | case RPC_GARBAGE_ARGS: | 1356 | case RPC_GARBAGE_ARGS: |
1350 | dprintk("RPC: %4d %s: server saw garbage\n", task->tk_pid, __FUNCTION__); | 1357 | dprintk("RPC: %5u %s: server saw garbage\n", |
1358 | task->tk_pid, __FUNCTION__); | ||
1351 | break; /* retry */ | 1359 | break; /* retry */ |
1352 | default: | 1360 | default: |
1353 | printk(KERN_WARNING "call_verify: server accept status: %x\n", n); | 1361 | printk(KERN_WARNING "call_verify: server accept status: %x\n", n); |
@@ -1358,7 +1366,8 @@ out_garbage: | |||
1358 | task->tk_client->cl_stats->rpcgarbage++; | 1366 | task->tk_client->cl_stats->rpcgarbage++; |
1359 | if (task->tk_garb_retry) { | 1367 | if (task->tk_garb_retry) { |
1360 | task->tk_garb_retry--; | 1368 | task->tk_garb_retry--; |
1361 | dprintk("RPC %s: retrying %4d\n", __FUNCTION__, task->tk_pid); | 1369 | dprintk("RPC: %5u %s: retrying\n", |
1370 | task->tk_pid, __FUNCTION__); | ||
1362 | task->tk_action = call_bind; | 1371 | task->tk_action = call_bind; |
1363 | out_retry: | 1372 | out_retry: |
1364 | return ERR_PTR(-EAGAIN); | 1373 | return ERR_PTR(-EAGAIN); |