Commit 5ee759cd authored by Tom Parkin's avatar Tom Parkin Committed by David S. Miller

l2tp: use standard API for warning log messages

The l2tp_* log wrappers only emit messages of a given category if the
tunnel or session structure has the appropriate flag set in its debug
field.  Flags default to being unset.

For warning messages, this doesn't make a lot of sense since an
administrator is likely to want to know about datapath warnings without
needing to tweak the debug flags setting for a given tunnel or session
instance.

Modify l2tp_warn callsites to use pr_warn_ratelimited instead for
unconditional output of warning messages.
Signed-off-by: default avatarTom Parkin <tparkin@katalix.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent ab141e37
...@@ -665,10 +665,9 @@ void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb, ...@@ -665,10 +665,9 @@ void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb,
/* Parse and check optional cookie */ /* Parse and check optional cookie */
if (session->peer_cookie_len > 0) { if (session->peer_cookie_len > 0) {
if (memcmp(ptr, &session->peer_cookie[0], session->peer_cookie_len)) { if (memcmp(ptr, &session->peer_cookie[0], session->peer_cookie_len)) {
l2tp_warn(tunnel, L2TP_MSG_DATA, pr_warn_ratelimited("%s: cookie mismatch (%u/%u). Discarding.\n",
"%s: cookie mismatch (%u/%u). Discarding.\n", tunnel->name, tunnel->tunnel_id,
tunnel->name, tunnel->tunnel_id, session->session_id);
session->session_id);
atomic_long_inc(&session->stats.rx_cookie_discards); atomic_long_inc(&session->stats.rx_cookie_discards);
goto discard; goto discard;
} }
...@@ -721,9 +720,8 @@ void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb, ...@@ -721,9 +720,8 @@ void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb,
* If user has configured mandatory sequence numbers, discard. * If user has configured mandatory sequence numbers, discard.
*/ */
if (session->recv_seq) { if (session->recv_seq) {
l2tp_warn(session, L2TP_MSG_SEQ, pr_warn_ratelimited("%s: recv data has no seq numbers when required. Discarding.\n",
"%s: recv data has no seq numbers when required. Discarding.\n", session->name);
session->name);
atomic_long_inc(&session->stats.rx_seq_discards); atomic_long_inc(&session->stats.rx_seq_discards);
goto discard; goto discard;
} }
...@@ -740,9 +738,8 @@ void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb, ...@@ -740,9 +738,8 @@ void l2tp_recv_common(struct l2tp_session *session, struct sk_buff *skb,
session->send_seq = 0; session->send_seq = 0;
l2tp_session_set_header_len(session, tunnel->version); l2tp_session_set_header_len(session, tunnel->version);
} else if (session->send_seq) { } else if (session->send_seq) {
l2tp_warn(session, L2TP_MSG_SEQ, pr_warn_ratelimited("%s: recv data has no seq numbers when required. Discarding.\n",
"%s: recv data has no seq numbers when required. Discarding.\n", session->name);
session->name);
atomic_long_inc(&session->stats.rx_seq_discards); atomic_long_inc(&session->stats.rx_seq_discards);
goto discard; goto discard;
} }
...@@ -835,9 +832,8 @@ static int l2tp_udp_recv_core(struct l2tp_tunnel *tunnel, struct sk_buff *skb) ...@@ -835,9 +832,8 @@ static int l2tp_udp_recv_core(struct l2tp_tunnel *tunnel, struct sk_buff *skb)
/* Short packet? */ /* Short packet? */
if (!pskb_may_pull(skb, L2TP_HDR_SIZE_MAX)) { if (!pskb_may_pull(skb, L2TP_HDR_SIZE_MAX)) {
l2tp_warn(tunnel, L2TP_MSG_DATA, pr_warn_ratelimited("%s: recv short packet (len=%d)\n",
"%s: recv short packet (len=%d)\n", tunnel->name, skb->len);
tunnel->name, skb->len);
goto error; goto error;
} }
...@@ -851,9 +847,8 @@ static int l2tp_udp_recv_core(struct l2tp_tunnel *tunnel, struct sk_buff *skb) ...@@ -851,9 +847,8 @@ static int l2tp_udp_recv_core(struct l2tp_tunnel *tunnel, struct sk_buff *skb)
/* Check protocol version */ /* Check protocol version */
version = hdrflags & L2TP_HDR_VER_MASK; version = hdrflags & L2TP_HDR_VER_MASK;
if (version != tunnel->version) { if (version != tunnel->version) {
l2tp_warn(tunnel, L2TP_MSG_DATA, pr_warn_ratelimited("%s: recv protocol version mismatch: got %d expected %d\n",
"%s: recv protocol version mismatch: got %d expected %d\n", tunnel->name, version, tunnel->version);
tunnel->name, version, tunnel->version);
goto error; goto error;
} }
...@@ -891,9 +886,8 @@ static int l2tp_udp_recv_core(struct l2tp_tunnel *tunnel, struct sk_buff *skb) ...@@ -891,9 +886,8 @@ static int l2tp_udp_recv_core(struct l2tp_tunnel *tunnel, struct sk_buff *skb)
l2tp_session_dec_refcount(session); l2tp_session_dec_refcount(session);
/* Not found? Pass to userspace to deal with */ /* Not found? Pass to userspace to deal with */
l2tp_warn(tunnel, L2TP_MSG_DATA, pr_warn_ratelimited("%s: no session found (%u/%u). Passing up.\n",
"%s: no session found (%u/%u). Passing up.\n", tunnel->name, tunnel_id, session_id);
tunnel->name, tunnel_id, session_id);
goto error; goto error;
} }
......
...@@ -251,7 +251,7 @@ static void pppol2tp_recv(struct l2tp_session *session, struct sk_buff *skb, int ...@@ -251,7 +251,7 @@ static void pppol2tp_recv(struct l2tp_session *session, struct sk_buff *skb, int
no_sock: no_sock:
rcu_read_unlock(); rcu_read_unlock();
l2tp_warn(session, L2TP_MSG_DATA, "%s: no socket\n", session->name); pr_warn_ratelimited("%s: no socket in recv\n", session->name);
kfree_skb(skb); kfree_skb(skb);
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment