diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2008-04-18 21:02:35 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2008-04-18 21:02:35 -0400 |
commit | 334d094504c2fe1c44211ecb49146ae6bca8c321 (patch) | |
tree | d3c0f68e4b9f8e3d2ccc39e7dfe5de0534a5fad9 /net/sunrpc | |
parent | d1a4be630fb068f251d64b62919f143c49ca8057 (diff) | |
parent | d1643d24c61b725bef399cc1cf2944b4c9c23177 (diff) |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6.26
* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6.26: (1090 commits)
[NET]: Fix and allocate less memory for ->priv'less netdevices
[IPV6]: Fix dangling references on error in fib6_add().
[NETLABEL]: Fix NULL deref in netlbl_unlabel_staticlist_gen() if ifindex not found
[PKT_SCHED]: Fix datalen check in tcf_simp_init().
[INET]: Uninline the __inet_inherit_port call.
[INET]: Drop the inet_inherit_port() call.
SCTP: Initialize partial_bytes_acked to 0, when all of the data is acked.
[netdrvr] forcedeth: internal simplifications; changelog removal
phylib: factor out get_phy_id from within get_phy_device
PHY: add BCM5464 support to broadcom PHY driver
cxgb3: Fix __must_check warning with dev_dbg.
tc35815: Statistics cleanup
natsemi: fix MMIO for PPC 44x platforms
[TIPC]: Cleanup of TIPC reference table code
[TIPC]: Optimized initialization of TIPC reference table
[TIPC]: Remove inlining of reference table locking routines
e1000: convert uint16_t style integers to u16
ixgb: convert uint16_t style integers to u16
sb1000.c: make const arrays static
sb1000.c: stop inlining largish static functions
...
Diffstat (limited to 'net/sunrpc')
-rw-r--r-- | net/sunrpc/auth_gss/auth_gss.c | 2 | ||||
-rw-r--r-- | net/sunrpc/clnt.c | 44 | ||||
-rw-r--r-- | net/sunrpc/rpc_pipe.c | 12 | ||||
-rw-r--r-- | net/sunrpc/rpcb_clnt.c | 20 | ||||
-rw-r--r-- | net/sunrpc/xprtsock.c | 2 |
5 files changed, 40 insertions, 40 deletions
diff --git a/net/sunrpc/auth_gss/auth_gss.c b/net/sunrpc/auth_gss/auth_gss.c index 6dac38792288..5828e5c060ca 100644 --- a/net/sunrpc/auth_gss/auth_gss.c +++ b/net/sunrpc/auth_gss/auth_gss.c | |||
@@ -625,7 +625,7 @@ gss_create(struct rpc_clnt *clnt, rpc_authflavor_t flavor) | |||
625 | gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor); | 625 | gss_auth->mech = gss_mech_get_by_pseudoflavor(flavor); |
626 | if (!gss_auth->mech) { | 626 | if (!gss_auth->mech) { |
627 | printk(KERN_WARNING "%s: Pseudoflavor %d not found!\n", | 627 | printk(KERN_WARNING "%s: Pseudoflavor %d not found!\n", |
628 | __FUNCTION__, flavor); | 628 | __func__, flavor); |
629 | goto err_free; | 629 | goto err_free; |
630 | } | 630 | } |
631 | gss_auth->service = gss_pseudoflavor_to_service(gss_auth->mech, flavor); | 631 | gss_auth->service = gss_pseudoflavor_to_service(gss_auth->mech, flavor); |
diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c index 8834d68972cb..7b96ff38002f 100644 --- a/net/sunrpc/clnt.c +++ b/net/sunrpc/clnt.c | |||
@@ -43,7 +43,7 @@ | |||
43 | 43 | ||
44 | #define dprint_status(t) \ | 44 | #define dprint_status(t) \ |
45 | dprintk("RPC: %5u %s (status %d)\n", t->tk_pid, \ | 45 | dprintk("RPC: %5u %s (status %d)\n", t->tk_pid, \ |
46 | __FUNCTION__, t->tk_status) | 46 | __func__, t->tk_status) |
47 | 47 | ||
48 | /* | 48 | /* |
49 | * All RPC clients are linked into this list | 49 | * All RPC clients are linked into this list |
@@ -368,7 +368,7 @@ out_no_path: | |||
368 | out_no_stats: | 368 | out_no_stats: |
369 | kfree(new); | 369 | kfree(new); |
370 | out_no_clnt: | 370 | out_no_clnt: |
371 | dprintk("RPC: %s: returned error %d\n", __FUNCTION__, err); | 371 | dprintk("RPC: %s: returned error %d\n", __func__, err); |
372 | return ERR_PTR(err); | 372 | return ERR_PTR(err); |
373 | } | 373 | } |
374 | EXPORT_SYMBOL_GPL(rpc_clone_client); | 374 | EXPORT_SYMBOL_GPL(rpc_clone_client); |
@@ -752,7 +752,7 @@ call_reserveresult(struct rpc_task *task) | |||
752 | } | 752 | } |
753 | 753 | ||
754 | printk(KERN_ERR "%s: status=%d, but no request slot, exiting\n", | 754 | printk(KERN_ERR "%s: status=%d, but no request slot, exiting\n", |
755 | __FUNCTION__, status); | 755 | __func__, status); |
756 | rpc_exit(task, -EIO); | 756 | rpc_exit(task, -EIO); |
757 | return; | 757 | return; |
758 | } | 758 | } |
@@ -763,7 +763,7 @@ call_reserveresult(struct rpc_task *task) | |||
763 | */ | 763 | */ |
764 | if (task->tk_rqstp) { | 764 | if (task->tk_rqstp) { |
765 | printk(KERN_ERR "%s: status=%d, request allocated anyway\n", | 765 | printk(KERN_ERR "%s: status=%d, request allocated anyway\n", |
766 | __FUNCTION__, status); | 766 | __func__, status); |
767 | xprt_release(task); | 767 | xprt_release(task); |
768 | } | 768 | } |
769 | 769 | ||
@@ -775,7 +775,7 @@ call_reserveresult(struct rpc_task *task) | |||
775 | break; | 775 | break; |
776 | default: | 776 | default: |
777 | printk(KERN_ERR "%s: unrecognized error %d, exiting\n", | 777 | printk(KERN_ERR "%s: unrecognized error %d, exiting\n", |
778 | __FUNCTION__, status); | 778 | __func__, status); |
779 | break; | 779 | break; |
780 | } | 780 | } |
781 | rpc_exit(task, status); | 781 | rpc_exit(task, status); |
@@ -1323,7 +1323,7 @@ call_verify(struct rpc_task *task) | |||
1323 | * undefined results | 1323 | * undefined results |
1324 | */ | 1324 | */ |
1325 | dprintk("RPC: %5u %s: XDR representation not a multiple of" | 1325 | dprintk("RPC: %5u %s: XDR representation not a multiple of" |
1326 | " 4 bytes: 0x%x\n", task->tk_pid, __FUNCTION__, | 1326 | " 4 bytes: 0x%x\n", task->tk_pid, __func__, |
1327 | task->tk_rqstp->rq_rcv_buf.len); | 1327 | task->tk_rqstp->rq_rcv_buf.len); |
1328 | goto out_eio; | 1328 | goto out_eio; |
1329 | } | 1329 | } |
@@ -1333,7 +1333,7 @@ call_verify(struct rpc_task *task) | |||
1333 | 1333 | ||
1334 | if ((n = ntohl(*p++)) != RPC_REPLY) { | 1334 | if ((n = ntohl(*p++)) != RPC_REPLY) { |
1335 | dprintk("RPC: %5u %s: not an RPC reply: %x\n", | 1335 | dprintk("RPC: %5u %s: not an RPC reply: %x\n", |
1336 | task->tk_pid, __FUNCTION__, n); | 1336 | task->tk_pid, __func__, n); |
1337 | goto out_garbage; | 1337 | goto out_garbage; |
1338 | } | 1338 | } |
1339 | if ((n = ntohl(*p++)) != RPC_MSG_ACCEPTED) { | 1339 | if ((n = ntohl(*p++)) != RPC_MSG_ACCEPTED) { |
@@ -1345,13 +1345,13 @@ call_verify(struct rpc_task *task) | |||
1345 | case RPC_MISMATCH: | 1345 | case RPC_MISMATCH: |
1346 | dprintk("RPC: %5u %s: RPC call version " | 1346 | dprintk("RPC: %5u %s: RPC call version " |
1347 | "mismatch!\n", | 1347 | "mismatch!\n", |
1348 | task->tk_pid, __FUNCTION__); | 1348 | task->tk_pid, __func__); |
1349 | error = -EPROTONOSUPPORT; | 1349 | error = -EPROTONOSUPPORT; |
1350 | goto out_err; | 1350 | goto out_err; |
1351 | default: | 1351 | default: |
1352 | dprintk("RPC: %5u %s: RPC call rejected, " | 1352 | dprintk("RPC: %5u %s: RPC call rejected, " |
1353 | "unknown error: %x\n", | 1353 | "unknown error: %x\n", |
1354 | task->tk_pid, __FUNCTION__, n); | 1354 | task->tk_pid, __func__, n); |
1355 | goto out_eio; | 1355 | goto out_eio; |
1356 | } | 1356 | } |
1357 | if (--len < 0) | 1357 | if (--len < 0) |
@@ -1365,7 +1365,7 @@ call_verify(struct rpc_task *task) | |||
1365 | break; | 1365 | break; |
1366 | task->tk_cred_retry--; | 1366 | task->tk_cred_retry--; |
1367 | dprintk("RPC: %5u %s: retry stale creds\n", | 1367 | dprintk("RPC: %5u %s: retry stale creds\n", |
1368 | task->tk_pid, __FUNCTION__); | 1368 | task->tk_pid, __func__); |
1369 | rpcauth_invalcred(task); | 1369 | rpcauth_invalcred(task); |
1370 | /* Ensure we obtain a new XID! */ | 1370 | /* Ensure we obtain a new XID! */ |
1371 | xprt_release(task); | 1371 | xprt_release(task); |
@@ -1378,7 +1378,7 @@ call_verify(struct rpc_task *task) | |||
1378 | break; | 1378 | break; |
1379 | task->tk_garb_retry--; | 1379 | task->tk_garb_retry--; |
1380 | dprintk("RPC: %5u %s: retry garbled creds\n", | 1380 | dprintk("RPC: %5u %s: retry garbled creds\n", |
1381 | task->tk_pid, __FUNCTION__); | 1381 | task->tk_pid, __func__); |
1382 | task->tk_action = call_bind; | 1382 | task->tk_action = call_bind; |
1383 | goto out_retry; | 1383 | goto out_retry; |
1384 | case RPC_AUTH_TOOWEAK: | 1384 | case RPC_AUTH_TOOWEAK: |
@@ -1387,16 +1387,16 @@ call_verify(struct rpc_task *task) | |||
1387 | break; | 1387 | break; |
1388 | default: | 1388 | default: |
1389 | dprintk("RPC: %5u %s: unknown auth error: %x\n", | 1389 | dprintk("RPC: %5u %s: unknown auth error: %x\n", |
1390 | task->tk_pid, __FUNCTION__, n); | 1390 | task->tk_pid, __func__, n); |
1391 | error = -EIO; | 1391 | error = -EIO; |
1392 | } | 1392 | } |
1393 | dprintk("RPC: %5u %s: call rejected %d\n", | 1393 | dprintk("RPC: %5u %s: call rejected %d\n", |
1394 | task->tk_pid, __FUNCTION__, n); | 1394 | task->tk_pid, __func__, n); |
1395 | goto out_err; | 1395 | goto out_err; |
1396 | } | 1396 | } |
1397 | if (!(p = rpcauth_checkverf(task, p))) { | 1397 | if (!(p = rpcauth_checkverf(task, p))) { |
1398 | dprintk("RPC: %5u %s: auth check failed\n", | 1398 | dprintk("RPC: %5u %s: auth check failed\n", |
1399 | task->tk_pid, __FUNCTION__); | 1399 | task->tk_pid, __func__); |
1400 | goto out_garbage; /* bad verifier, retry */ | 1400 | goto out_garbage; /* bad verifier, retry */ |
1401 | } | 1401 | } |
1402 | len = p - (__be32 *)iov->iov_base - 1; | 1402 | len = p - (__be32 *)iov->iov_base - 1; |
@@ -1407,14 +1407,14 @@ call_verify(struct rpc_task *task) | |||
1407 | return p; | 1407 | return p; |
1408 | case RPC_PROG_UNAVAIL: | 1408 | case RPC_PROG_UNAVAIL: |
1409 | dprintk("RPC: %5u %s: program %u is unsupported by server %s\n", | 1409 | dprintk("RPC: %5u %s: program %u is unsupported by server %s\n", |
1410 | task->tk_pid, __FUNCTION__, | 1410 | task->tk_pid, __func__, |
1411 | (unsigned int)task->tk_client->cl_prog, | 1411 | (unsigned int)task->tk_client->cl_prog, |
1412 | task->tk_client->cl_server); | 1412 | task->tk_client->cl_server); |
1413 | error = -EPFNOSUPPORT; | 1413 | error = -EPFNOSUPPORT; |
1414 | goto out_err; | 1414 | goto out_err; |
1415 | case RPC_PROG_MISMATCH: | 1415 | case RPC_PROG_MISMATCH: |
1416 | dprintk("RPC: %5u %s: program %u, version %u unsupported by " | 1416 | dprintk("RPC: %5u %s: program %u, version %u unsupported by " |
1417 | "server %s\n", task->tk_pid, __FUNCTION__, | 1417 | "server %s\n", task->tk_pid, __func__, |
1418 | (unsigned int)task->tk_client->cl_prog, | 1418 | (unsigned int)task->tk_client->cl_prog, |
1419 | (unsigned int)task->tk_client->cl_vers, | 1419 | (unsigned int)task->tk_client->cl_vers, |
1420 | task->tk_client->cl_server); | 1420 | task->tk_client->cl_server); |
@@ -1423,7 +1423,7 @@ call_verify(struct rpc_task *task) | |||
1423 | case RPC_PROC_UNAVAIL: | 1423 | case RPC_PROC_UNAVAIL: |
1424 | dprintk("RPC: %5u %s: proc %p unsupported by program %u, " | 1424 | dprintk("RPC: %5u %s: proc %p unsupported by program %u, " |
1425 | "version %u on server %s\n", | 1425 | "version %u on server %s\n", |
1426 | task->tk_pid, __FUNCTION__, | 1426 | task->tk_pid, __func__, |
1427 | task->tk_msg.rpc_proc, | 1427 | task->tk_msg.rpc_proc, |
1428 | task->tk_client->cl_prog, | 1428 | task->tk_client->cl_prog, |
1429 | task->tk_client->cl_vers, | 1429 | task->tk_client->cl_vers, |
@@ -1432,11 +1432,11 @@ call_verify(struct rpc_task *task) | |||
1432 | goto out_err; | 1432 | goto out_err; |
1433 | case RPC_GARBAGE_ARGS: | 1433 | case RPC_GARBAGE_ARGS: |
1434 | dprintk("RPC: %5u %s: server saw garbage\n", | 1434 | dprintk("RPC: %5u %s: server saw garbage\n", |
1435 | task->tk_pid, __FUNCTION__); | 1435 | task->tk_pid, __func__); |
1436 | break; /* retry */ | 1436 | break; /* retry */ |
1437 | default: | 1437 | default: |
1438 | dprintk("RPC: %5u %s: server accept status: %x\n", | 1438 | dprintk("RPC: %5u %s: server accept status: %x\n", |
1439 | task->tk_pid, __FUNCTION__, n); | 1439 | task->tk_pid, __func__, n); |
1440 | /* Also retry */ | 1440 | /* Also retry */ |
1441 | } | 1441 | } |
1442 | 1442 | ||
@@ -1445,7 +1445,7 @@ out_garbage: | |||
1445 | if (task->tk_garb_retry) { | 1445 | if (task->tk_garb_retry) { |
1446 | task->tk_garb_retry--; | 1446 | task->tk_garb_retry--; |
1447 | dprintk("RPC: %5u %s: retrying\n", | 1447 | dprintk("RPC: %5u %s: retrying\n", |
1448 | task->tk_pid, __FUNCTION__); | 1448 | task->tk_pid, __func__); |
1449 | task->tk_action = call_bind; | 1449 | task->tk_action = call_bind; |
1450 | out_retry: | 1450 | out_retry: |
1451 | return ERR_PTR(-EAGAIN); | 1451 | return ERR_PTR(-EAGAIN); |
@@ -1455,11 +1455,11 @@ out_eio: | |||
1455 | out_err: | 1455 | out_err: |
1456 | rpc_exit(task, error); | 1456 | rpc_exit(task, error); |
1457 | dprintk("RPC: %5u %s: call failed with error %d\n", task->tk_pid, | 1457 | dprintk("RPC: %5u %s: call failed with error %d\n", task->tk_pid, |
1458 | __FUNCTION__, error); | 1458 | __func__, error); |
1459 | return ERR_PTR(error); | 1459 | return ERR_PTR(error); |
1460 | out_overflow: | 1460 | out_overflow: |
1461 | dprintk("RPC: %5u %s: server reply was truncated.\n", task->tk_pid, | 1461 | dprintk("RPC: %5u %s: server reply was truncated.\n", task->tk_pid, |
1462 | __FUNCTION__); | 1462 | __func__); |
1463 | goto out_garbage; | 1463 | goto out_garbage; |
1464 | } | 1464 | } |
1465 | 1465 | ||
diff --git a/net/sunrpc/rpc_pipe.c b/net/sunrpc/rpc_pipe.c index 1b395a41a8b2..5a9b0e7828cd 100644 --- a/net/sunrpc/rpc_pipe.c +++ b/net/sunrpc/rpc_pipe.c | |||
@@ -479,13 +479,13 @@ rpc_lookup_parent(char *path, struct nameidata *nd) | |||
479 | mnt = rpc_get_mount(); | 479 | mnt = rpc_get_mount(); |
480 | if (IS_ERR(mnt)) { | 480 | if (IS_ERR(mnt)) { |
481 | printk(KERN_WARNING "%s: %s failed to mount " | 481 | printk(KERN_WARNING "%s: %s failed to mount " |
482 | "pseudofilesystem \n", __FILE__, __FUNCTION__); | 482 | "pseudofilesystem \n", __FILE__, __func__); |
483 | return PTR_ERR(mnt); | 483 | return PTR_ERR(mnt); |
484 | } | 484 | } |
485 | 485 | ||
486 | if (vfs_path_lookup(mnt->mnt_root, mnt, path, LOOKUP_PARENT, nd)) { | 486 | if (vfs_path_lookup(mnt->mnt_root, mnt, path, LOOKUP_PARENT, nd)) { |
487 | printk(KERN_WARNING "%s: %s failed to find path %s\n", | 487 | printk(KERN_WARNING "%s: %s failed to find path %s\n", |
488 | __FILE__, __FUNCTION__, path); | 488 | __FILE__, __func__, path); |
489 | rpc_put_mount(); | 489 | rpc_put_mount(); |
490 | return -ENOENT; | 490 | return -ENOENT; |
491 | } | 491 | } |
@@ -604,7 +604,7 @@ rpc_populate(struct dentry *parent, | |||
604 | out_bad: | 604 | out_bad: |
605 | mutex_unlock(&dir->i_mutex); | 605 | mutex_unlock(&dir->i_mutex); |
606 | printk(KERN_WARNING "%s: %s failed to populate directory %s\n", | 606 | printk(KERN_WARNING "%s: %s failed to populate directory %s\n", |
607 | __FILE__, __FUNCTION__, parent->d_name.name); | 607 | __FILE__, __func__, parent->d_name.name); |
608 | return -ENOMEM; | 608 | return -ENOMEM; |
609 | } | 609 | } |
610 | 610 | ||
@@ -623,7 +623,7 @@ __rpc_mkdir(struct inode *dir, struct dentry *dentry) | |||
623 | return 0; | 623 | return 0; |
624 | out_err: | 624 | out_err: |
625 | printk(KERN_WARNING "%s: %s failed to allocate inode for dentry %s\n", | 625 | printk(KERN_WARNING "%s: %s failed to allocate inode for dentry %s\n", |
626 | __FILE__, __FUNCTION__, dentry->d_name.name); | 626 | __FILE__, __func__, dentry->d_name.name); |
627 | return -ENOMEM; | 627 | return -ENOMEM; |
628 | } | 628 | } |
629 | 629 | ||
@@ -715,7 +715,7 @@ err_depopulate: | |||
715 | err_dput: | 715 | err_dput: |
716 | dput(dentry); | 716 | dput(dentry); |
717 | printk(KERN_WARNING "%s: %s() failed to create directory %s (errno = %d)\n", | 717 | printk(KERN_WARNING "%s: %s() failed to create directory %s (errno = %d)\n", |
718 | __FILE__, __FUNCTION__, path, error); | 718 | __FILE__, __func__, path, error); |
719 | dentry = ERR_PTR(error); | 719 | dentry = ERR_PTR(error); |
720 | goto out; | 720 | goto out; |
721 | } | 721 | } |
@@ -804,7 +804,7 @@ err_dput: | |||
804 | dput(dentry); | 804 | dput(dentry); |
805 | dentry = ERR_PTR(-ENOMEM); | 805 | dentry = ERR_PTR(-ENOMEM); |
806 | printk(KERN_WARNING "%s: %s() failed to create pipe %s/%s (errno = %d)\n", | 806 | printk(KERN_WARNING "%s: %s() failed to create pipe %s/%s (errno = %d)\n", |
807 | __FILE__, __FUNCTION__, parent->d_name.name, name, | 807 | __FILE__, __func__, parent->d_name.name, name, |
808 | -ENOMEM); | 808 | -ENOMEM); |
809 | goto out; | 809 | goto out; |
810 | } | 810 | } |
diff --git a/net/sunrpc/rpcb_clnt.c b/net/sunrpc/rpcb_clnt.c index 3164a0871cf0..56aa018dce3a 100644 --- a/net/sunrpc/rpcb_clnt.c +++ b/net/sunrpc/rpcb_clnt.c | |||
@@ -224,7 +224,7 @@ int rpcb_getport_sync(struct sockaddr_in *sin, u32 prog, u32 vers, int prot) | |||
224 | int status; | 224 | int status; |
225 | 225 | ||
226 | dprintk("RPC: %s(" NIPQUAD_FMT ", %u, %u, %d)\n", | 226 | dprintk("RPC: %s(" NIPQUAD_FMT ", %u, %u, %d)\n", |
227 | __FUNCTION__, NIPQUAD(sin->sin_addr.s_addr), prog, vers, prot); | 227 | __func__, NIPQUAD(sin->sin_addr.s_addr), prog, vers, prot); |
228 | 228 | ||
229 | rpcb_clnt = rpcb_create(NULL, (struct sockaddr *)sin, | 229 | rpcb_clnt = rpcb_create(NULL, (struct sockaddr *)sin, |
230 | sizeof(*sin), prot, 2, 0); | 230 | sizeof(*sin), prot, 2, 0); |
@@ -283,7 +283,7 @@ void rpcb_getport_async(struct rpc_task *task) | |||
283 | struct rpcb_info *info; | 283 | struct rpcb_info *info; |
284 | 284 | ||
285 | dprintk("RPC: %5u %s(%s, %u, %u, %d)\n", | 285 | dprintk("RPC: %5u %s(%s, %u, %u, %d)\n", |
286 | task->tk_pid, __FUNCTION__, | 286 | task->tk_pid, __func__, |
287 | clnt->cl_server, clnt->cl_prog, clnt->cl_vers, xprt->prot); | 287 | clnt->cl_server, clnt->cl_prog, clnt->cl_vers, xprt->prot); |
288 | 288 | ||
289 | /* Autobind on cloned rpc clients is discouraged */ | 289 | /* Autobind on cloned rpc clients is discouraged */ |
@@ -292,7 +292,7 @@ void rpcb_getport_async(struct rpc_task *task) | |||
292 | if (xprt_test_and_set_binding(xprt)) { | 292 | if (xprt_test_and_set_binding(xprt)) { |
293 | status = -EAGAIN; /* tell caller to check again */ | 293 | status = -EAGAIN; /* tell caller to check again */ |
294 | dprintk("RPC: %5u %s: waiting for another binder\n", | 294 | dprintk("RPC: %5u %s: waiting for another binder\n", |
295 | task->tk_pid, __FUNCTION__); | 295 | task->tk_pid, __func__); |
296 | goto bailout_nowake; | 296 | goto bailout_nowake; |
297 | } | 297 | } |
298 | 298 | ||
@@ -304,7 +304,7 @@ void rpcb_getport_async(struct rpc_task *task) | |||
304 | if (xprt_bound(xprt)) { | 304 | if (xprt_bound(xprt)) { |
305 | status = 0; | 305 | status = 0; |
306 | dprintk("RPC: %5u %s: already bound\n", | 306 | dprintk("RPC: %5u %s: already bound\n", |
307 | task->tk_pid, __FUNCTION__); | 307 | task->tk_pid, __func__); |
308 | goto bailout_nofree; | 308 | goto bailout_nofree; |
309 | } | 309 | } |
310 | 310 | ||
@@ -321,27 +321,27 @@ void rpcb_getport_async(struct rpc_task *task) | |||
321 | default: | 321 | default: |
322 | status = -EAFNOSUPPORT; | 322 | status = -EAFNOSUPPORT; |
323 | dprintk("RPC: %5u %s: bad address family\n", | 323 | dprintk("RPC: %5u %s: bad address family\n", |
324 | task->tk_pid, __FUNCTION__); | 324 | task->tk_pid, __func__); |
325 | goto bailout_nofree; | 325 | goto bailout_nofree; |
326 | } | 326 | } |
327 | if (info[xprt->bind_index].rpc_proc == NULL) { | 327 | if (info[xprt->bind_index].rpc_proc == NULL) { |
328 | xprt->bind_index = 0; | 328 | xprt->bind_index = 0; |
329 | status = -EPFNOSUPPORT; | 329 | status = -EPFNOSUPPORT; |
330 | dprintk("RPC: %5u %s: no more getport versions available\n", | 330 | dprintk("RPC: %5u %s: no more getport versions available\n", |
331 | task->tk_pid, __FUNCTION__); | 331 | task->tk_pid, __func__); |
332 | goto bailout_nofree; | 332 | goto bailout_nofree; |
333 | } | 333 | } |
334 | bind_version = info[xprt->bind_index].rpc_vers; | 334 | bind_version = info[xprt->bind_index].rpc_vers; |
335 | 335 | ||
336 | dprintk("RPC: %5u %s: trying rpcbind version %u\n", | 336 | dprintk("RPC: %5u %s: trying rpcbind version %u\n", |
337 | task->tk_pid, __FUNCTION__, bind_version); | 337 | task->tk_pid, __func__, bind_version); |
338 | 338 | ||
339 | rpcb_clnt = rpcb_create(clnt->cl_server, sap, salen, xprt->prot, | 339 | rpcb_clnt = rpcb_create(clnt->cl_server, sap, salen, xprt->prot, |
340 | bind_version, 0); | 340 | bind_version, 0); |
341 | if (IS_ERR(rpcb_clnt)) { | 341 | if (IS_ERR(rpcb_clnt)) { |
342 | status = PTR_ERR(rpcb_clnt); | 342 | status = PTR_ERR(rpcb_clnt); |
343 | dprintk("RPC: %5u %s: rpcb_create failed, error %ld\n", | 343 | dprintk("RPC: %5u %s: rpcb_create failed, error %ld\n", |
344 | task->tk_pid, __FUNCTION__, PTR_ERR(rpcb_clnt)); | 344 | task->tk_pid, __func__, PTR_ERR(rpcb_clnt)); |
345 | goto bailout_nofree; | 345 | goto bailout_nofree; |
346 | } | 346 | } |
347 | 347 | ||
@@ -349,7 +349,7 @@ void rpcb_getport_async(struct rpc_task *task) | |||
349 | if (!map) { | 349 | if (!map) { |
350 | status = -ENOMEM; | 350 | status = -ENOMEM; |
351 | dprintk("RPC: %5u %s: no memory available\n", | 351 | dprintk("RPC: %5u %s: no memory available\n", |
352 | task->tk_pid, __FUNCTION__); | 352 | task->tk_pid, __func__); |
353 | goto bailout_nofree; | 353 | goto bailout_nofree; |
354 | } | 354 | } |
355 | map->r_prog = clnt->cl_prog; | 355 | map->r_prog = clnt->cl_prog; |
@@ -366,7 +366,7 @@ void rpcb_getport_async(struct rpc_task *task) | |||
366 | if (IS_ERR(child)) { | 366 | if (IS_ERR(child)) { |
367 | status = -EIO; | 367 | status = -EIO; |
368 | dprintk("RPC: %5u %s: rpc_run_task failed\n", | 368 | dprintk("RPC: %5u %s: rpc_run_task failed\n", |
369 | task->tk_pid, __FUNCTION__); | 369 | task->tk_pid, __func__); |
370 | goto bailout; | 370 | goto bailout; |
371 | } | 371 | } |
372 | rpc_put_task(child); | 372 | rpc_put_task(child); |
diff --git a/net/sunrpc/xprtsock.c b/net/sunrpc/xprtsock.c index 30e7ac243a90..613daf8c1ff7 100644 --- a/net/sunrpc/xprtsock.c +++ b/net/sunrpc/xprtsock.c | |||
@@ -1359,7 +1359,7 @@ static int xs_bind4(struct sock_xprt *transport, struct socket *sock) | |||
1359 | nloop++; | 1359 | nloop++; |
1360 | } while (err == -EADDRINUSE && nloop != 2); | 1360 | } while (err == -EADDRINUSE && nloop != 2); |
1361 | dprintk("RPC: %s "NIPQUAD_FMT":%u: %s (%d)\n", | 1361 | dprintk("RPC: %s "NIPQUAD_FMT":%u: %s (%d)\n", |
1362 | __FUNCTION__, NIPQUAD(myaddr.sin_addr), | 1362 | __func__, NIPQUAD(myaddr.sin_addr), |
1363 | port, err ? "failed" : "ok", err); | 1363 | port, err ? "failed" : "ok", err); |
1364 | return err; | 1364 | return err; |
1365 | } | 1365 | } |