diff options
-rw-r--r-- | net/ipv4/tcp_output.c | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/net/ipv4/tcp_output.c b/net/ipv4/tcp_output.c index f37a50e55b68..7114031fdc70 100644 --- a/net/ipv4/tcp_output.c +++ b/net/ipv4/tcp_output.c | |||
@@ -436,11 +436,13 @@ int tcp_fragment(struct sock *sk, struct sk_buff *skb, u32 len, unsigned int mss | |||
436 | u16 flags; | 436 | u16 flags; |
437 | 437 | ||
438 | if (unlikely(len >= skb->len)) { | 438 | if (unlikely(len >= skb->len)) { |
439 | printk(KERN_DEBUG "TCP: seg_size=%u, mss=%u, seq=%u, " | 439 | if (net_ratelimit()) { |
440 | "end_seq=%u, skb->len=%u.\n", len, mss_now, | 440 | printk(KERN_DEBUG "TCP: seg_size=%u, mss=%u, seq=%u, " |
441 | TCP_SKB_CB(skb)->seq, TCP_SKB_CB(skb)->end_seq, | 441 | "end_seq=%u, skb->len=%u.\n", len, mss_now, |
442 | skb->len); | 442 | TCP_SKB_CB(skb)->seq, TCP_SKB_CB(skb)->end_seq, |
443 | WARN_ON(1); | 443 | skb->len); |
444 | WARN_ON(1); | ||
445 | } | ||
444 | return 0; | 446 | return 0; |
445 | } | 447 | } |
446 | 448 | ||