Fix the printk() without KERN_* constant in net/ipv4. Signed-off-by: Wang Chen <[EMAIL PROTECTED]> --- af_inet.c | 4 ++-- devinet.c | 2 +- fib_hash.c | 2 +- fib_semantics.c | 2 +- ipconfig.c | 18 +++++++++--------- netfilter/arp_tables.c | 6 +++--- netfilter/ip_tables.c | 8 ++++---- netfilter/ipt_CLUSTERIP.c | 4 ++-- netfilter/ipt_MASQUERADE.c | 2 +- netfilter/ipt_REJECT.c | 4 ++-- netfilter/ipt_owner.c | 2 +- netfilter/iptable_filter.c | 4 ++-- netfilter/iptable_mangle.c | 2 +- netfilter/iptable_raw.c | 2 +- netfilter/nf_conntrack_l3proto_ipv4.c | 12 ++++++------ netfilter/nf_nat_h323.c | 16 ++++++++-------- netfilter/nf_nat_rule.c | 8 ++++---- netfilter/nf_nat_snmp_basic.c | 16 ++++++++-------- 18 files changed, 57 insertions(+), 57 deletions(-)
diff --git a/net/ipv4/af_inet.c b/net/ipv4/af_inet.c index d2f22e7..dd73e78 100644 --- a/net/ipv4/af_inet.c +++ b/net/ipv4/af_inet.c @@ -136,12 +136,12 @@ void inet_sock_destruct(struct sock *sk) __skb_queue_purge(&sk->sk_error_queue); if (sk->sk_type == SOCK_STREAM && sk->sk_state != TCP_CLOSE) { - printk("Attempt to release TCP socket in state %d %p\n", + printk(KERN_ERR "Attempt to release TCP socket in state %d %p\n", sk->sk_state, sk); return; } if (!sock_flag(sk, SOCK_DEAD)) { - printk("Attempt to release alive inet socket %p\n", sk); + printk(KERN_ERR "Attempt to release alive inet socket %p\n", sk); return; } diff --git a/net/ipv4/devinet.c b/net/ipv4/devinet.c index 55d199e..350bf14 100644 --- a/net/ipv4/devinet.c +++ b/net/ipv4/devinet.c @@ -141,7 +141,7 @@ void in_dev_finish_destroy(struct in_device *idev) #endif dev_put(dev); if (!idev->dead) - printk("Freeing alive in_device %p\n", idev); + printk(KERN_ERR "Freeing alive in_device %p\n", idev); else { kfree(idev); } diff --git a/net/ipv4/fib_hash.c b/net/ipv4/fib_hash.c index 527a6e0..aef7830 100644 --- a/net/ipv4/fib_hash.c +++ b/net/ipv4/fib_hash.c @@ -168,7 +168,7 @@ static void fn_rehash_zone(struct fn_zone *fz) new_hashmask = (new_divisor - 1); #if RT_CACHE_DEBUG >= 2 - printk("fn_rehash_zone: hash for zone %d grows from %d\n", fz->fz_order, old_divisor); + printk(KERN_DEBUG "fn_rehash_zone: hash for zone %d grows from %d\n", fz->fz_order, old_divisor); #endif ht = fz_hash_alloc(new_divisor); diff --git a/net/ipv4/fib_semantics.c b/net/ipv4/fib_semantics.c index 1351a26..e350b00 100644 --- a/net/ipv4/fib_semantics.c +++ b/net/ipv4/fib_semantics.c @@ -145,7 +145,7 @@ static const struct void free_fib_info(struct fib_info *fi) { if (fi->fib_dead == 0) { - printk("Freeing alive fib_info %p\n", fi); + printk(KERN_ERR "Freeing alive fib_info %p\n", fi); return; } change_nexthops(fi) { diff --git a/net/ipv4/ipconfig.c b/net/ipv4/ipconfig.c index c5c107a..c0bc86c 100644 --- a/net/ipv4/ipconfig.c +++ b/net/ipv4/ipconfig.c @@ -208,7 +208,7 @@ static int __init ic_open_devs(void) if (dev->mtu >= 364) able |= IC_BOOTP; else - printk(KERN_WARNING "DHCP/BOOTP: Ignoring device %s, MTU %d too small", dev->name, dev->mtu); + printk(KERN_WARNING "DHCP/BOOTP: Ignoring device %s, MTU %d too small\n", dev->name, dev->mtu); if (!(dev->flags & IFF_NOARP)) able |= IC_RARP; able &= ic_proto_enabled; @@ -389,7 +389,7 @@ static int __init ic_defaults(void) NIPQUAD(ic_myaddr)); return -1; } - printk("IP-Config: Guessing netmask %u.%u.%u.%u\n", NIPQUAD(ic_netmask)); + printk(KERN_INFO "IP-Config: Guessing netmask %u.%u.%u.%u\n", NIPQUAD(ic_netmask)); } return 0; @@ -590,7 +590,7 @@ ic_dhcp_init_options(u8 *options) u8 *e = options; #ifdef IPCONFIG_DEBUG - printk("DHCP: Sending message type %d\n", mt); + printk(KERN_DEBUG "DHCP: Sending message type %d\n", mt); #endif memcpy(e, ic_bootp_cookie, 4); /* RFC1048 Magic Cookie */ @@ -736,7 +736,7 @@ static void __init ic_bootp_send_if(struct ic_device *d, unsigned long jiffies_d else if (dev->type == ARPHRD_FDDI) b->htype = ARPHRD_ETHER; else { - printk("Unknown ARP type 0x%04x for device %s\n", dev->type, dev->name); + printk(KERN_WARNING "Unknown ARP type 0x%04x for device %s\n", dev->type, dev->name); b->htype = dev->type; /* can cause undefined behavior */ } b->hlen = dev->addr_len; @@ -790,7 +790,7 @@ static void __init ic_do_bootp_ext(u8 *ext) #ifdef IPCONFIG_DEBUG u8 *c; - printk("DHCP/BOOTP: Got extension %d:",*ext); + printk(KERN_DEBUG "DHCP/BOOTP: Got extension %d:",*ext); for (c=ext+2; c<ext+2+ext[1]; c++) printk(" %02x", *c); printk("\n"); @@ -954,7 +954,7 @@ static int __init ic_bootp_recv(struct sk_buff *skb, struct net_device *dev, str } #ifdef IPCONFIG_DEBUG - printk("DHCP: Got message type %d\n", mt); + printk(KERN_DEBUG "DHCP: Got message type %d\n", mt); #endif switch (mt) { @@ -969,7 +969,7 @@ static int __init ic_bootp_recv(struct sk_buff *skb, struct net_device *dev, str ic_myaddr = b->your_ip; ic_servaddr = server_id; #ifdef IPCONFIG_DEBUG - printk("DHCP: Offered address %u.%u.%u.%u", + printk(KERN_DEBUG "DHCP: Offered address %u.%u.%u.%u", NIPQUAD(ic_myaddr)); printk(" by server %u.%u.%u.%u\n", NIPQUAD(ic_servaddr)); @@ -1167,7 +1167,7 @@ static int __init ic_dynamic(void) return -1; } - printk("IP-Config: Got %s answer from %u.%u.%u.%u, ", + printk(KERN_INFO "IP-Config: Got %s answer from %u.%u.%u.%u, ", ((ic_got_reply & IC_RARP) ? "RARP" : (ic_proto_enabled & IC_USE_DHCP) ? "DHCP" : "BOOTP"), NIPQUAD(ic_servaddr)); @@ -1375,7 +1375,7 @@ static int __init ip_auto_config(void) /* * Clue in the operator. */ - printk("IP-Config: Complete:"); + printk(KERN_INFO "IP-Config: Complete:"); printk("\n device=%s", ic_dev->name); printk(", addr=%u.%u.%u.%u", NIPQUAD(ic_myaddr)); printk(", mask=%u.%u.%u.%u", NIPQUAD(ic_netmask)); diff --git a/net/ipv4/netfilter/arp_tables.c b/net/ipv4/netfilter/arp_tables.c index 2909c92..1e60653 100644 --- a/net/ipv4/netfilter/arp_tables.c +++ b/net/ipv4/netfilter/arp_tables.c @@ -49,7 +49,7 @@ MODULE_DESCRIPTION("arptables core"); #define ARP_NF_ASSERT(x) \ do { \ if (!(x)) \ - printk("ARP_NF_ASSERT: %s:%s:%u\n", \ + printk(KERN_DEBUG "ARP_NF_ASSERT: %s:%s:%u\n", \ __FUNCTION__, __FILE__, __LINE__); \ } while(0) #else @@ -205,7 +205,7 @@ static unsigned int arpt_error(struct sk_buff *skb, const void *targinfo) { if (net_ratelimit()) - printk("arp_tables: error: '%s'\n", (char *)targinfo); + printk(KERN_ERR "arp_tables: '%s'\n", (char *)targinfo); return NF_DROP; } @@ -357,7 +357,7 @@ static int mark_source_chains(struct xt_table_info *newinfo, int visited = e->comefrom & (1 << hook); if (e->comefrom & (1 << NF_ARP_NUMHOOKS)) { - printk("arptables: loop hook %u pos %u %08X.\n", + printk(KERN_INFO "arptables: loop hook %u pos %u %08X.\n", hook, pos, e->comefrom); return 0; } diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c index 4b10b98..59b41c1 100644 --- a/net/ipv4/netfilter/ip_tables.c +++ b/net/ipv4/netfilter/ip_tables.c @@ -51,7 +51,7 @@ MODULE_DESCRIPTION("IPv4 packet filter"); #define IP_NF_ASSERT(x) \ do { \ if (!(x)) \ - printk("IP_NF_ASSERT: %s:%s:%u\n", \ + printk(KERN_DEBUG "IP_NF_ASSERT: %s:%s:%u\n", \ __FUNCTION__, __FILE__, __LINE__); \ } while(0) #else @@ -177,7 +177,7 @@ ipt_error(struct sk_buff *skb, const void *targinfo) { if (net_ratelimit()) - printk("ip_tables: error: `%s'\n", (char *)targinfo); + printk(KERN_ERR "ip_tables: `%s'\n", (char *)targinfo); return NF_DROP; } @@ -420,7 +420,7 @@ ipt_do_table(struct sk_buff *skb, if (((struct ipt_entry *)table_base)->comefrom != 0xeeeeeeec && verdict == IPT_CONTINUE) { - printk("Target %s reentered!\n", + printk(KERN_DEBUG "Target %s reentered!\n", t->u.kernel.target->name); verdict = NF_DROP; } @@ -482,7 +482,7 @@ mark_source_chains(struct xt_table_info *newinfo, int visited = e->comefrom & (1 << hook); if (e->comefrom & (1 << NF_IP_NUMHOOKS)) { - printk("iptables: loop hook %u pos %u %08X.\n", + printk(KERN_INFO "iptables: loop hook %u pos %u %08X.\n", hook, pos, e->comefrom); return 0; } diff --git a/net/ipv4/netfilter/ipt_CLUSTERIP.c b/net/ipv4/netfilter/ipt_CLUSTERIP.c index 2f544da..ac2bde8 100644 --- a/net/ipv4/netfilter/ipt_CLUSTERIP.c +++ b/net/ipv4/netfilter/ipt_CLUSTERIP.c @@ -269,7 +269,7 @@ clusterip_hashfn(const struct sk_buff *skb, hashval = 0; /* This cannot happen, unless the check function wasn't called * at rule load time */ - printk("CLUSTERIP: unknown mode `%u'\n", config->hash_mode); + printk(KERN_NOTICE "CLUSTERIP: unknown mode `%u'\n", config->hash_mode); BUG(); break; } @@ -497,7 +497,7 @@ static void arp_print(struct arp_payload *payload) } hbuffer[--k]='\0'; - printk("src [EMAIL PROTECTED], dst %u.%u.%u.%u\n", + printk(KERN_DEBUG "src [EMAIL PROTECTED], dst %u.%u.%u.%u\n", NIPQUAD(payload->src_ip), hbuffer, NIPQUAD(payload->dst_ip)); } diff --git a/net/ipv4/netfilter/ipt_MASQUERADE.c b/net/ipv4/netfilter/ipt_MASQUERADE.c index 44b516e..156b843 100644 --- a/net/ipv4/netfilter/ipt_MASQUERADE.c +++ b/net/ipv4/netfilter/ipt_MASQUERADE.c @@ -85,7 +85,7 @@ masquerade_target(struct sk_buff *skb, rt = (struct rtable *)skb->dst; newsrc = inet_select_addr(out, rt->rt_gateway, RT_SCOPE_UNIVERSE); if (!newsrc) { - printk("MASQUERADE: %s ate my IP address\n", out->name); + printk(KERN_WARNING "MASQUERADE: %s ate my IP address\n", out->name); return NF_DROP; } diff --git a/net/ipv4/netfilter/ipt_REJECT.c b/net/ipv4/netfilter/ipt_REJECT.c index dcf4d21..16de76a 100644 --- a/net/ipv4/netfilter/ipt_REJECT.c +++ b/net/ipv4/netfilter/ipt_REJECT.c @@ -221,13 +221,13 @@ static bool check(const char *tablename, const struct ipt_entry *e = e_void; if (rejinfo->with == IPT_ICMP_ECHOREPLY) { - printk("ipt_REJECT: ECHOREPLY no longer supported.\n"); + printk(KERN_WARNING "ipt_REJECT: ECHOREPLY no longer supported.\n"); return false; } else if (rejinfo->with == IPT_TCP_RESET) { /* Must specify that it's a TCP packet */ if (e->ip.proto != IPPROTO_TCP || (e->ip.invflags & XT_INV_PROTO)) { - printk("ipt_REJECT: TCP_RESET invalid for non-tcp\n"); + printk(KERN_WARNING "ipt_REJECT: TCP_RESET invalid for non-tcp\n"); return false; } } diff --git a/net/ipv4/netfilter/ipt_owner.c b/net/ipv4/netfilter/ipt_owner.c index b14e77d..13cfc7f 100644 --- a/net/ipv4/netfilter/ipt_owner.c +++ b/net/ipv4/netfilter/ipt_owner.c @@ -61,7 +61,7 @@ checkentry(const char *tablename, const struct ipt_owner_info *info = matchinfo; if (info->match & (IPT_OWNER_PID|IPT_OWNER_SID|IPT_OWNER_COMM)) { - printk("ipt_owner: pid, sid and command matching " + printk(KERN_WARNING "ipt_owner: pid, sid and command matching " "not supported anymore\n"); return false; } diff --git a/net/ipv4/netfilter/iptable_filter.c b/net/ipv4/netfilter/iptable_filter.c index ba3262c..6a0b7cf 100644 --- a/net/ipv4/netfilter/iptable_filter.c +++ b/net/ipv4/netfilter/iptable_filter.c @@ -81,7 +81,7 @@ ipt_local_out_hook(unsigned int hook, if (skb->len < sizeof(struct iphdr) || ip_hdrlen(skb) < sizeof(struct iphdr)) { if (net_ratelimit()) - printk("iptable_filter: ignoring short SOCK_RAW " + printk(KERN_WARNING "iptable_filter: ignoring short SOCK_RAW " "packet.\n"); return NF_ACCEPT; } @@ -122,7 +122,7 @@ static int __init iptable_filter_init(void) int ret; if (forward < 0 || forward > NF_MAX_VERDICT) { - printk("iptables forward must be 0 or 1\n"); + printk(KERN_ERR "iptables forward must be 0 or 1\n"); return -EINVAL; } diff --git a/net/ipv4/netfilter/iptable_mangle.c b/net/ipv4/netfilter/iptable_mangle.c index b4360a6..9bab631 100644 --- a/net/ipv4/netfilter/iptable_mangle.c +++ b/net/ipv4/netfilter/iptable_mangle.c @@ -100,7 +100,7 @@ ipt_local_hook(unsigned int hook, if (skb->len < sizeof(struct iphdr) || ip_hdrlen(skb) < sizeof(struct iphdr)) { if (net_ratelimit()) - printk("iptable_mangle: ignoring short SOCK_RAW " + printk(KERN_WARNING "iptable_mangle: ignoring short SOCK_RAW " "packet.\n"); return NF_ACCEPT; } diff --git a/net/ipv4/netfilter/iptable_raw.c b/net/ipv4/netfilter/iptable_raw.c index 5de6e57..a8ce34f 100644 --- a/net/ipv4/netfilter/iptable_raw.c +++ b/net/ipv4/netfilter/iptable_raw.c @@ -66,7 +66,7 @@ ipt_local_hook(unsigned int hook, if (skb->len < sizeof(struct iphdr) || ip_hdrlen(skb) < sizeof(struct iphdr)) { if (net_ratelimit()) - printk("iptable_raw: ignoring short SOCK_RAW" + printk(KERN_WARNING "iptable_raw: ignoring short SOCK_RAW" "packet.\n"); return NF_ACCEPT; } diff --git a/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c b/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c index 831e9b2..531c2fa 100644 --- a/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c +++ b/net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c @@ -177,7 +177,7 @@ static unsigned int ipv4_conntrack_local(unsigned int hooknum, if (skb->len < sizeof(struct iphdr) || ip_hdrlen(skb) < sizeof(struct iphdr)) { if (net_ratelimit()) - printk("ipt_hook: happy cracking.\n"); + printk(KERN_DEBUG "ipt_hook: happy cracking.\n"); return NF_ACCEPT; } return nf_conntrack_in(PF_INET, hooknum, skb); @@ -437,32 +437,32 @@ static int __init nf_conntrack_l3proto_ipv4_init(void) ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_tcp4); if (ret < 0) { - printk("nf_conntrack_ipv4: can't register tcp.\n"); + printk(KERN_ERR "nf_conntrack_ipv4: can't register tcp.\n"); goto cleanup_sockopt; } ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_udp4); if (ret < 0) { - printk("nf_conntrack_ipv4: can't register udp.\n"); + printk(KERN_ERR "nf_conntrack_ipv4: can't register udp.\n"); goto cleanup_tcp; } ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_icmp); if (ret < 0) { - printk("nf_conntrack_ipv4: can't register icmp.\n"); + printk(KERN_ERR "nf_conntrack_ipv4: can't register icmp.\n"); goto cleanup_udp; } ret = nf_conntrack_l3proto_register(&nf_conntrack_l3proto_ipv4); if (ret < 0) { - printk("nf_conntrack_ipv4: can't register ipv4\n"); + printk(KERN_ERR "nf_conntrack_ipv4: can't register ipv4\n"); goto cleanup_icmp; } ret = nf_register_hooks(ipv4_conntrack_ops, ARRAY_SIZE(ipv4_conntrack_ops)); if (ret < 0) { - printk("nf_conntrack_ipv4: can't register hooks.\n"); + printk(KERN_ERR "nf_conntrack_ipv4: can't register hooks.\n"); goto cleanup_ipv4; } #if defined(CONFIG_PROC_FS) && defined(CONFIG_NF_CONNTRACK_PROC_COMPAT) diff --git a/net/ipv4/netfilter/nf_nat_h323.c b/net/ipv4/netfilter/nf_nat_h323.c index a868c8c..4446369 100644 --- a/net/ipv4/netfilter/nf_nat_h323.c +++ b/net/ipv4/netfilter/nf_nat_h323.c @@ -43,7 +43,7 @@ static int set_addr(struct sk_buff *skb, addroff, sizeof(buf), (char *) &buf, sizeof(buf))) { if (net_ratelimit()) - printk("nf_nat_h323: nf_nat_mangle_tcp_packet" + printk(KERN_ERR "nf_nat_h323: nf_nat_mangle_tcp_packet" " error\n"); return -1; } @@ -59,7 +59,7 @@ static int set_addr(struct sk_buff *skb, addroff, sizeof(buf), (char *) &buf, sizeof(buf))) { if (net_ratelimit()) - printk("nf_nat_h323: nf_nat_mangle_udp_packet" + printk(KERN_ERR "nf_nat_h323: nf_nat_mangle_udp_packet" " error\n"); return -1; } @@ -218,7 +218,7 @@ static int nat_rtp_rtcp(struct sk_buff *skb, struct nf_conn *ct, /* Run out of expectations */ if (i >= H323_RTP_CHANNEL_MAX) { if (net_ratelimit()) - printk("nf_nat_h323: out of expectations\n"); + printk(KERN_WARNING "nf_nat_h323: out of expectations\n"); return 0; } @@ -237,7 +237,7 @@ static int nat_rtp_rtcp(struct sk_buff *skb, struct nf_conn *ct, if (nated_port == 0) { /* No port available */ if (net_ratelimit()) - printk("nf_nat_h323: out of RTP ports\n"); + printk(KERN_WARNING "nf_nat_h323: out of RTP ports\n"); return 0; } @@ -294,7 +294,7 @@ static int nat_t120(struct sk_buff *skb, struct nf_conn *ct, if (nated_port == 0) { /* No port available */ if (net_ratelimit()) - printk("nf_nat_h323: out of TCP ports\n"); + printk(KERN_WARNING "nf_nat_h323: out of TCP ports\n"); return 0; } @@ -344,7 +344,7 @@ static int nat_h245(struct sk_buff *skb, struct nf_conn *ct, if (nated_port == 0) { /* No port available */ if (net_ratelimit()) - printk("nf_nat_q931: out of TCP ports\n"); + printk(KERN_WARNING "nf_nat_q931: out of TCP ports\n"); return 0; } @@ -432,7 +432,7 @@ static int nat_q931(struct sk_buff *skb, struct nf_conn *ct, if (nated_port == 0) { /* No port available */ if (net_ratelimit()) - printk("nf_nat_ras: out of TCP ports\n"); + printk(KERN_WARNING "nf_nat_ras: out of TCP ports\n"); return 0; } @@ -518,7 +518,7 @@ static int nat_callforwarding(struct sk_buff *skb, struct nf_conn *ct, if (nated_port == 0) { /* No port available */ if (net_ratelimit()) - printk("nf_nat_q931: out of TCP ports\n"); + printk(KERN_WARNING "nf_nat_q931: out of TCP ports\n"); return 0; } diff --git a/net/ipv4/netfilter/nf_nat_rule.c b/net/ipv4/netfilter/nf_nat_rule.c index 46b25ab..7fa78c8 100644 --- a/net/ipv4/netfilter/nf_nat_rule.c +++ b/net/ipv4/netfilter/nf_nat_rule.c @@ -99,8 +99,8 @@ static void warn_if_extra_mangle(__be32 dstip, __be32 srcip) return; if (rt->rt_src != srcip && !warned) { - printk("NAT: no longer support implicit source local NAT\n"); - printk("NAT: packet src %u.%u.%u.%u -> dst %u.%u.%u.%u\n", + printk(KERN_WARNING "NAT: no longer support implicit source local NAT\n"); + printk(KERN_WARNING "NAT: packet src %u.%u.%u.%u -> dst %u.%u.%u.%u\n", NIPQUAD(srcip), NIPQUAD(dstip)); warned = 1; } @@ -144,7 +144,7 @@ static bool ipt_snat_checkentry(const char *tablename, /* Must be a valid range */ if (mr->rangesize != 1) { - printk("SNAT: multiple ranges no longer supported\n"); + printk(KERN_ERR "SNAT: multiple ranges no longer supported\n"); return false; } return true; @@ -160,7 +160,7 @@ static bool ipt_dnat_checkentry(const char *tablename, /* Must be a valid range */ if (mr->rangesize != 1) { - printk("DNAT: multiple ranges no longer supported\n"); + printk(KERN_ERR "DNAT: multiple ranges no longer supported\n"); return false; } return true; diff --git a/net/ipv4/netfilter/nf_nat_snmp_basic.c b/net/ipv4/netfilter/nf_nat_snmp_basic.c index 03709d6..1be8350 100644 --- a/net/ipv4/netfilter/nf_nat_snmp_basic.c +++ b/net/ipv4/netfilter/nf_nat_snmp_basic.c @@ -390,7 +390,7 @@ static unsigned char asn1_octets_decode(struct asn1_ctx *ctx, *octets = kmalloc(eoc - ctx->pointer, GFP_ATOMIC); if (*octets == NULL) { if (net_ratelimit()) - printk("OOM in bsalg (%d)\n", __LINE__); + printk(KERN_WARNING "OOM in bsalg (%d)\n", __LINE__); return 0; } @@ -436,7 +436,7 @@ static unsigned char asn1_oid_decode(struct asn1_ctx *ctx, *oid = kmalloc(size * sizeof(unsigned long), GFP_ATOMIC); if (*oid == NULL) { if (net_ratelimit()) - printk("OOM in bsalg (%d)\n", __LINE__); + printk(KERN_WARNING "OOM in bsalg (%d)\n", __LINE__); return 0; } @@ -714,7 +714,7 @@ static unsigned char snmp_object_decode(struct asn1_ctx *ctx, if (*obj == NULL) { kfree(id); if (net_ratelimit()) - printk("OOM in bsalg (%d)\n", __LINE__); + printk(KERN_WARNING "OOM in bsalg (%d)\n", __LINE__); return 0; } (*obj)->syntax.l[0] = l; @@ -730,7 +730,7 @@ static unsigned char snmp_object_decode(struct asn1_ctx *ctx, if (*obj == NULL) { kfree(id); if (net_ratelimit()) - printk("OOM in bsalg (%d)\n", __LINE__); + printk(KERN_WARNING "OOM in bsalg (%d)\n", __LINE__); return 0; } memcpy((*obj)->syntax.c, p, len); @@ -745,7 +745,7 @@ static unsigned char snmp_object_decode(struct asn1_ctx *ctx, if (*obj == NULL) { kfree(id); if (net_ratelimit()) - printk("OOM in bsalg (%d)\n", __LINE__); + printk(KERN_WARNING "OOM in bsalg (%d)\n", __LINE__); return 0; } if (!asn1_null_decode(ctx, end)) { @@ -766,7 +766,7 @@ static unsigned char snmp_object_decode(struct asn1_ctx *ctx, kfree(lp); kfree(id); if (net_ratelimit()) - printk("OOM in bsalg (%d)\n", __LINE__); + printk(KERN_WARNING "OOM in bsalg (%d)\n", __LINE__); return 0; } memcpy((*obj)->syntax.ul, lp, len); @@ -787,7 +787,7 @@ static unsigned char snmp_object_decode(struct asn1_ctx *ctx, kfree(p); kfree(id); if (net_ratelimit()) - printk("OOM in bsalg (%d)\n", __LINE__); + printk(KERN_WARNING "OOM in bsalg (%d)\n", __LINE__); return 0; } memcpy((*obj)->syntax.uc, p, len); @@ -805,7 +805,7 @@ static unsigned char snmp_object_decode(struct asn1_ctx *ctx, if (*obj == NULL) { kfree(id); if (net_ratelimit()) - printk("OOM in bsalg (%d)\n", __LINE__); + printk(KERN_WARNING "OOM in bsalg (%d)\n", __LINE__); return 0; } (*obj)->syntax.ul[0] = ul; - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html