Commit 654d0fbdc8fe1041918741ed5b6abc8ad6b4c1d8
Committed by
Patrick McHardy
1 parent
af5676039a
Exists in
master
and in
4 other branches
netfilter: cleanup printk messages
Make sure all printk messages have a severity level. Signed-off-by: Stephen Hemminger <shemminger@vyatta.com> Signed-off-by: Patrick McHardy <kaber@trash.net>
Showing 24 changed files with 64 additions and 64 deletions Side-by-side Diff
- net/ipv4/netfilter/arp_tables.c
- net/ipv4/netfilter/ip_tables.c
- net/ipv4/netfilter/iptable_filter.c
- net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c
- net/ipv4/netfilter/nf_nat_h323.c
- net/ipv4/netfilter/nf_nat_snmp_basic.c
- net/ipv4/netfilter/nf_nat_standalone.c
- net/ipv6/netfilter/ip6_tables.c
- net/ipv6/netfilter/ip6table_filter.c
- net/ipv6/netfilter/ip6table_mangle.c
- net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c
- net/netfilter/nf_conntrack_amanda.c
- net/netfilter/nf_conntrack_core.c
- net/netfilter/nf_conntrack_ftp.c
- net/netfilter/nf_conntrack_h323_main.c
- net/netfilter/nf_conntrack_irc.c
- net/netfilter/nf_conntrack_netlink.c
- net/netfilter/nf_conntrack_proto_sctp.c
- net/netfilter/nf_conntrack_sip.c
- net/netfilter/nf_conntrack_standalone.c
- net/netfilter/nf_conntrack_tftp.c
- net/netfilter/nf_internals.h
- net/netfilter/nfnetlink.c
- net/netfilter/nfnetlink_log.c
net/ipv4/netfilter/arp_tables.c
... | ... | @@ -222,7 +222,7 @@ |
222 | 222 | arpt_error(struct sk_buff *skb, const struct xt_action_param *par) |
223 | 223 | { |
224 | 224 | if (net_ratelimit()) |
225 | - printk("arp_tables: error: '%s'\n", | |
225 | + pr_err("arp_tables: error: '%s'\n", | |
226 | 226 | (const char *)par->targinfo); |
227 | 227 | |
228 | 228 | return NF_DROP; |
... | ... | @@ -385,7 +385,7 @@ |
385 | 385 | int visited = e->comefrom & (1 << hook); |
386 | 386 | |
387 | 387 | if (e->comefrom & (1 << NF_ARP_NUMHOOKS)) { |
388 | - printk("arptables: loop hook %u pos %u %08X.\n", | |
388 | + pr_notice("arptables: loop hook %u pos %u %08X.\n", | |
389 | 389 | hook, pos, e->comefrom); |
390 | 390 | return 0; |
391 | 391 | } |
net/ipv4/netfilter/ip_tables.c
... | ... | @@ -466,7 +466,7 @@ |
466 | 466 | int visited = e->comefrom & (1 << hook); |
467 | 467 | |
468 | 468 | if (e->comefrom & (1 << NF_INET_NUMHOOKS)) { |
469 | - printk("iptables: loop hook %u pos %u %08X.\n", | |
469 | + pr_err("iptables: loop hook %u pos %u %08X.\n", | |
470 | 470 | hook, pos, e->comefrom); |
471 | 471 | return 0; |
472 | 472 | } |
net/ipv4/netfilter/iptable_filter.c
net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c
... | ... | @@ -382,32 +382,32 @@ |
382 | 382 | |
383 | 383 | ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_tcp4); |
384 | 384 | if (ret < 0) { |
385 | - printk("nf_conntrack_ipv4: can't register tcp.\n"); | |
385 | + pr_err("nf_conntrack_ipv4: can't register tcp.\n"); | |
386 | 386 | goto cleanup_sockopt; |
387 | 387 | } |
388 | 388 | |
389 | 389 | ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_udp4); |
390 | 390 | if (ret < 0) { |
391 | - printk("nf_conntrack_ipv4: can't register udp.\n"); | |
391 | + pr_err("nf_conntrack_ipv4: can't register udp.\n"); | |
392 | 392 | goto cleanup_tcp; |
393 | 393 | } |
394 | 394 | |
395 | 395 | ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_icmp); |
396 | 396 | if (ret < 0) { |
397 | - printk("nf_conntrack_ipv4: can't register icmp.\n"); | |
397 | + pr_err("nf_conntrack_ipv4: can't register icmp.\n"); | |
398 | 398 | goto cleanup_udp; |
399 | 399 | } |
400 | 400 | |
401 | 401 | ret = nf_conntrack_l3proto_register(&nf_conntrack_l3proto_ipv4); |
402 | 402 | if (ret < 0) { |
403 | - printk("nf_conntrack_ipv4: can't register ipv4\n"); | |
403 | + pr_err("nf_conntrack_ipv4: can't register ipv4\n"); | |
404 | 404 | goto cleanup_icmp; |
405 | 405 | } |
406 | 406 | |
407 | 407 | ret = nf_register_hooks(ipv4_conntrack_ops, |
408 | 408 | ARRAY_SIZE(ipv4_conntrack_ops)); |
409 | 409 | if (ret < 0) { |
410 | - printk("nf_conntrack_ipv4: can't register hooks.\n"); | |
410 | + pr_err("nf_conntrack_ipv4: can't register hooks.\n"); | |
411 | 411 | goto cleanup_ipv4; |
412 | 412 | } |
413 | 413 | #if defined(CONFIG_PROC_FS) && defined(CONFIG_NF_CONNTRACK_PROC_COMPAT) |
net/ipv4/netfilter/nf_nat_h323.c
... | ... | @@ -43,7 +43,7 @@ |
43 | 43 | addroff, sizeof(buf), |
44 | 44 | (char *) &buf, sizeof(buf))) { |
45 | 45 | if (net_ratelimit()) |
46 | - printk("nf_nat_h323: nf_nat_mangle_tcp_packet" | |
46 | + pr_notice("nf_nat_h323: nf_nat_mangle_tcp_packet" | |
47 | 47 | " error\n"); |
48 | 48 | return -1; |
49 | 49 | } |
... | ... | @@ -59,7 +59,7 @@ |
59 | 59 | addroff, sizeof(buf), |
60 | 60 | (char *) &buf, sizeof(buf))) { |
61 | 61 | if (net_ratelimit()) |
62 | - printk("nf_nat_h323: nf_nat_mangle_udp_packet" | |
62 | + pr_notice("nf_nat_h323: nf_nat_mangle_udp_packet" | |
63 | 63 | " error\n"); |
64 | 64 | return -1; |
65 | 65 | } |
... | ... | @@ -215,7 +215,7 @@ |
215 | 215 | /* Run out of expectations */ |
216 | 216 | if (i >= H323_RTP_CHANNEL_MAX) { |
217 | 217 | if (net_ratelimit()) |
218 | - printk("nf_nat_h323: out of expectations\n"); | |
218 | + pr_notice("nf_nat_h323: out of expectations\n"); | |
219 | 219 | return 0; |
220 | 220 | } |
221 | 221 | |
... | ... | @@ -234,7 +234,7 @@ |
234 | 234 | |
235 | 235 | if (nated_port == 0) { /* No port available */ |
236 | 236 | if (net_ratelimit()) |
237 | - printk("nf_nat_h323: out of RTP ports\n"); | |
237 | + pr_notice("nf_nat_h323: out of RTP ports\n"); | |
238 | 238 | return 0; |
239 | 239 | } |
240 | 240 | |
... | ... | @@ -291,7 +291,7 @@ |
291 | 291 | |
292 | 292 | if (nated_port == 0) { /* No port available */ |
293 | 293 | if (net_ratelimit()) |
294 | - printk("nf_nat_h323: out of TCP ports\n"); | |
294 | + pr_notice("nf_nat_h323: out of TCP ports\n"); | |
295 | 295 | return 0; |
296 | 296 | } |
297 | 297 | |
... | ... | @@ -341,7 +341,7 @@ |
341 | 341 | |
342 | 342 | if (nated_port == 0) { /* No port available */ |
343 | 343 | if (net_ratelimit()) |
344 | - printk("nf_nat_q931: out of TCP ports\n"); | |
344 | + pr_notice("nf_nat_q931: out of TCP ports\n"); | |
345 | 345 | return 0; |
346 | 346 | } |
347 | 347 | |
... | ... | @@ -425,7 +425,7 @@ |
425 | 425 | |
426 | 426 | if (nated_port == 0) { /* No port available */ |
427 | 427 | if (net_ratelimit()) |
428 | - printk("nf_nat_ras: out of TCP ports\n"); | |
428 | + pr_notice("nf_nat_ras: out of TCP ports\n"); | |
429 | 429 | return 0; |
430 | 430 | } |
431 | 431 | |
... | ... | @@ -507,7 +507,7 @@ |
507 | 507 | |
508 | 508 | if (nated_port == 0) { /* No port available */ |
509 | 509 | if (net_ratelimit()) |
510 | - printk("nf_nat_q931: out of TCP ports\n"); | |
510 | + pr_notice("nf_nat_q931: out of TCP ports\n"); | |
511 | 511 | return 0; |
512 | 512 | } |
513 | 513 |
net/ipv4/netfilter/nf_nat_snmp_basic.c
... | ... | @@ -401,7 +401,7 @@ |
401 | 401 | *octets = kmalloc(eoc - ctx->pointer, GFP_ATOMIC); |
402 | 402 | if (*octets == NULL) { |
403 | 403 | if (net_ratelimit()) |
404 | - printk("OOM in bsalg (%d)\n", __LINE__); | |
404 | + pr_notice("OOM in bsalg (%d)\n", __LINE__); | |
405 | 405 | return 0; |
406 | 406 | } |
407 | 407 | |
... | ... | @@ -452,7 +452,7 @@ |
452 | 452 | *oid = kmalloc(size * sizeof(unsigned long), GFP_ATOMIC); |
453 | 453 | if (*oid == NULL) { |
454 | 454 | if (net_ratelimit()) |
455 | - printk("OOM in bsalg (%d)\n", __LINE__); | |
455 | + pr_notice("OOM in bsalg (%d)\n", __LINE__); | |
456 | 456 | return 0; |
457 | 457 | } |
458 | 458 | |
... | ... | @@ -729,7 +729,7 @@ |
729 | 729 | if (*obj == NULL) { |
730 | 730 | kfree(id); |
731 | 731 | if (net_ratelimit()) |
732 | - printk("OOM in bsalg (%d)\n", __LINE__); | |
732 | + pr_notice("OOM in bsalg (%d)\n", __LINE__); | |
733 | 733 | return 0; |
734 | 734 | } |
735 | 735 | (*obj)->syntax.l[0] = l; |
... | ... | @@ -746,7 +746,7 @@ |
746 | 746 | kfree(p); |
747 | 747 | kfree(id); |
748 | 748 | if (net_ratelimit()) |
749 | - printk("OOM in bsalg (%d)\n", __LINE__); | |
749 | + pr_notice("OOM in bsalg (%d)\n", __LINE__); | |
750 | 750 | return 0; |
751 | 751 | } |
752 | 752 | memcpy((*obj)->syntax.c, p, len); |
... | ... | @@ -761,7 +761,7 @@ |
761 | 761 | if (*obj == NULL) { |
762 | 762 | kfree(id); |
763 | 763 | if (net_ratelimit()) |
764 | - printk("OOM in bsalg (%d)\n", __LINE__); | |
764 | + pr_notice("OOM in bsalg (%d)\n", __LINE__); | |
765 | 765 | return 0; |
766 | 766 | } |
767 | 767 | if (!asn1_null_decode(ctx, end)) { |
... | ... | @@ -782,7 +782,7 @@ |
782 | 782 | kfree(lp); |
783 | 783 | kfree(id); |
784 | 784 | if (net_ratelimit()) |
785 | - printk("OOM in bsalg (%d)\n", __LINE__); | |
785 | + pr_notice("OOM in bsalg (%d)\n", __LINE__); | |
786 | 786 | return 0; |
787 | 787 | } |
788 | 788 | memcpy((*obj)->syntax.ul, lp, len); |
... | ... | @@ -803,7 +803,7 @@ |
803 | 803 | kfree(p); |
804 | 804 | kfree(id); |
805 | 805 | if (net_ratelimit()) |
806 | - printk("OOM in bsalg (%d)\n", __LINE__); | |
806 | + pr_notice("OOM in bsalg (%d)\n", __LINE__); | |
807 | 807 | return 0; |
808 | 808 | } |
809 | 809 | memcpy((*obj)->syntax.uc, p, len); |
... | ... | @@ -821,7 +821,7 @@ |
821 | 821 | if (*obj == NULL) { |
822 | 822 | kfree(id); |
823 | 823 | if (net_ratelimit()) |
824 | - printk("OOM in bsalg (%d)\n", __LINE__); | |
824 | + pr_notice("OOM in bsalg (%d)\n", __LINE__); | |
825 | 825 | return 0; |
826 | 826 | } |
827 | 827 | (*obj)->syntax.ul[0] = ul; |
net/ipv4/netfilter/nf_nat_standalone.c
... | ... | @@ -293,12 +293,12 @@ |
293 | 293 | #endif |
294 | 294 | ret = nf_nat_rule_init(); |
295 | 295 | if (ret < 0) { |
296 | - printk("nf_nat_init: can't setup rules.\n"); | |
296 | + pr_err("nf_nat_init: can't setup rules.\n"); | |
297 | 297 | goto cleanup_decode_session; |
298 | 298 | } |
299 | 299 | ret = nf_register_hooks(nf_nat_ops, ARRAY_SIZE(nf_nat_ops)); |
300 | 300 | if (ret < 0) { |
301 | - printk("nf_nat_init: can't register hooks.\n"); | |
301 | + pr_err("nf_nat_init: can't register hooks.\n"); | |
302 | 302 | goto cleanup_rule_init; |
303 | 303 | } |
304 | 304 | return ret; |
net/ipv6/netfilter/ip6_tables.c
... | ... | @@ -481,7 +481,7 @@ |
481 | 481 | int visited = e->comefrom & (1 << hook); |
482 | 482 | |
483 | 483 | if (e->comefrom & (1 << NF_INET_NUMHOOKS)) { |
484 | - printk("iptables: loop hook %u pos %u %08X.\n", | |
484 | + pr_err("iptables: loop hook %u pos %u %08X.\n", | |
485 | 485 | hook, pos, e->comefrom); |
486 | 486 | return 0; |
487 | 487 | } |
net/ipv6/netfilter/ip6table_filter.c
net/ipv6/netfilter/ip6table_mangle.c
net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c
... | ... | @@ -280,7 +280,7 @@ |
280 | 280 | /* root is playing with raw sockets. */ |
281 | 281 | if (skb->len < sizeof(struct ipv6hdr)) { |
282 | 282 | if (net_ratelimit()) |
283 | - printk("ipv6_conntrack_local: packet too short\n"); | |
283 | + pr_notice("ipv6_conntrack_local: packet too short\n"); | |
284 | 284 | return NF_ACCEPT; |
285 | 285 | } |
286 | 286 | return __ipv6_conntrack_in(dev_net(out), hooknum, skb, okfn); |
287 | 287 | |
288 | 288 | |
289 | 289 | |
290 | 290 | |
291 | 291 | |
... | ... | @@ -406,37 +406,37 @@ |
406 | 406 | |
407 | 407 | ret = nf_ct_frag6_init(); |
408 | 408 | if (ret < 0) { |
409 | - printk("nf_conntrack_ipv6: can't initialize frag6.\n"); | |
409 | + pr_err("nf_conntrack_ipv6: can't initialize frag6.\n"); | |
410 | 410 | return ret; |
411 | 411 | } |
412 | 412 | ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_tcp6); |
413 | 413 | if (ret < 0) { |
414 | - printk("nf_conntrack_ipv6: can't register tcp.\n"); | |
414 | + pr_err("nf_conntrack_ipv6: can't register tcp.\n"); | |
415 | 415 | goto cleanup_frag6; |
416 | 416 | } |
417 | 417 | |
418 | 418 | ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_udp6); |
419 | 419 | if (ret < 0) { |
420 | - printk("nf_conntrack_ipv6: can't register udp.\n"); | |
420 | + pr_err("nf_conntrack_ipv6: can't register udp.\n"); | |
421 | 421 | goto cleanup_tcp; |
422 | 422 | } |
423 | 423 | |
424 | 424 | ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_icmpv6); |
425 | 425 | if (ret < 0) { |
426 | - printk("nf_conntrack_ipv6: can't register icmpv6.\n"); | |
426 | + pr_err("nf_conntrack_ipv6: can't register icmpv6.\n"); | |
427 | 427 | goto cleanup_udp; |
428 | 428 | } |
429 | 429 | |
430 | 430 | ret = nf_conntrack_l3proto_register(&nf_conntrack_l3proto_ipv6); |
431 | 431 | if (ret < 0) { |
432 | - printk("nf_conntrack_ipv6: can't register ipv6\n"); | |
432 | + pr_err("nf_conntrack_ipv6: can't register ipv6\n"); | |
433 | 433 | goto cleanup_icmpv6; |
434 | 434 | } |
435 | 435 | |
436 | 436 | ret = nf_register_hooks(ipv6_conntrack_ops, |
437 | 437 | ARRAY_SIZE(ipv6_conntrack_ops)); |
438 | 438 | if (ret < 0) { |
439 | - printk("nf_conntrack_ipv6: can't register pre-routing defrag " | |
439 | + pr_err("nf_conntrack_ipv6: can't register pre-routing defrag " | |
440 | 440 | "hook.\n"); |
441 | 441 | goto cleanup_ipv6; |
442 | 442 | } |
net/netfilter/nf_conntrack_amanda.c
... | ... | @@ -108,7 +108,7 @@ |
108 | 108 | dataoff = protoff + sizeof(struct udphdr); |
109 | 109 | if (dataoff >= skb->len) { |
110 | 110 | if (net_ratelimit()) |
111 | - printk("amanda_help: skblen = %u\n", skb->len); | |
111 | + printk(KERN_ERR "amanda_help: skblen = %u\n", skb->len); | |
112 | 112 | return NF_ACCEPT; |
113 | 113 | } |
114 | 114 |
net/netfilter/nf_conntrack_core.c
... | ... | @@ -1335,7 +1335,7 @@ |
1335 | 1335 | } |
1336 | 1336 | nf_conntrack_max = max_factor * nf_conntrack_htable_size; |
1337 | 1337 | |
1338 | - printk("nf_conntrack version %s (%u buckets, %d max)\n", | |
1338 | + printk(KERN_INFO "nf_conntrack version %s (%u buckets, %d max)\n", | |
1339 | 1339 | NF_CONNTRACK_VERSION, nf_conntrack_htable_size, |
1340 | 1340 | nf_conntrack_max); |
1341 | 1341 |
net/netfilter/nf_conntrack_ftp.c
... | ... | @@ -573,8 +573,8 @@ |
573 | 573 | ftp[i][j].tuple.src.l3num, ports[i]); |
574 | 574 | ret = nf_conntrack_helper_register(&ftp[i][j]); |
575 | 575 | if (ret) { |
576 | - printk("nf_ct_ftp: failed to register helper " | |
577 | - " for pf: %d port: %d\n", | |
576 | + printk(KERN_ERR "nf_ct_ftp: failed to register" | |
577 | + " helper for pf: %d port: %d\n", | |
578 | 578 | ftp[i][j].tuple.src.l3num, ports[i]); |
579 | 579 | nf_conntrack_ftp_fini(); |
580 | 580 | return ret; |
net/netfilter/nf_conntrack_h323_main.c
... | ... | @@ -607,7 +607,7 @@ |
607 | 607 | drop: |
608 | 608 | spin_unlock_bh(&nf_h323_lock); |
609 | 609 | if (net_ratelimit()) |
610 | - printk("nf_ct_h245: packet dropped\n"); | |
610 | + pr_info("nf_ct_h245: packet dropped\n"); | |
611 | 611 | return NF_DROP; |
612 | 612 | } |
613 | 613 | |
... | ... | @@ -1152,7 +1152,7 @@ |
1152 | 1152 | drop: |
1153 | 1153 | spin_unlock_bh(&nf_h323_lock); |
1154 | 1154 | if (net_ratelimit()) |
1155 | - printk("nf_ct_q931: packet dropped\n"); | |
1155 | + pr_info("nf_ct_q931: packet dropped\n"); | |
1156 | 1156 | return NF_DROP; |
1157 | 1157 | } |
1158 | 1158 | |
... | ... | @@ -1727,7 +1727,7 @@ |
1727 | 1727 | drop: |
1728 | 1728 | spin_unlock_bh(&nf_h323_lock); |
1729 | 1729 | if (net_ratelimit()) |
1730 | - printk("nf_ct_ras: packet dropped\n"); | |
1730 | + pr_info("nf_ct_ras: packet dropped\n"); | |
1731 | 1731 | return NF_DROP; |
1732 | 1732 | } |
1733 | 1733 |
net/netfilter/nf_conntrack_irc.c
... | ... | @@ -235,7 +235,7 @@ |
235 | 235 | char *tmpname; |
236 | 236 | |
237 | 237 | if (max_dcc_channels < 1) { |
238 | - printk("nf_ct_irc: max_dcc_channels must not be zero\n"); | |
238 | + printk(KERN_ERR "nf_ct_irc: max_dcc_channels must not be zero\n"); | |
239 | 239 | return -EINVAL; |
240 | 240 | } |
241 | 241 | |
... | ... | @@ -267,7 +267,7 @@ |
267 | 267 | |
268 | 268 | ret = nf_conntrack_helper_register(&irc[i]); |
269 | 269 | if (ret) { |
270 | - printk("nf_ct_irc: failed to register helper " | |
270 | + printk(KERN_ERR "nf_ct_irc: failed to register helper " | |
271 | 271 | "for pf: %u port: %u\n", |
272 | 272 | irc[i].tuple.src.l3num, ports[i]); |
273 | 273 | nf_conntrack_irc_fini(); |
net/netfilter/nf_conntrack_netlink.c
... | ... | @@ -2057,29 +2057,29 @@ |
2057 | 2057 | { |
2058 | 2058 | int ret; |
2059 | 2059 | |
2060 | - printk("ctnetlink v%s: registering with nfnetlink.\n", version); | |
2060 | + pr_info("ctnetlink v%s: registering with nfnetlink.\n", version); | |
2061 | 2061 | ret = nfnetlink_subsys_register(&ctnl_subsys); |
2062 | 2062 | if (ret < 0) { |
2063 | - printk("ctnetlink_init: cannot register with nfnetlink.\n"); | |
2063 | + pr_err("ctnetlink_init: cannot register with nfnetlink.\n"); | |
2064 | 2064 | goto err_out; |
2065 | 2065 | } |
2066 | 2066 | |
2067 | 2067 | ret = nfnetlink_subsys_register(&ctnl_exp_subsys); |
2068 | 2068 | if (ret < 0) { |
2069 | - printk("ctnetlink_init: cannot register exp with nfnetlink.\n"); | |
2069 | + pr_err("ctnetlink_init: cannot register exp with nfnetlink.\n"); | |
2070 | 2070 | goto err_unreg_subsys; |
2071 | 2071 | } |
2072 | 2072 | |
2073 | 2073 | #ifdef CONFIG_NF_CONNTRACK_EVENTS |
2074 | 2074 | ret = nf_conntrack_register_notifier(&ctnl_notifier); |
2075 | 2075 | if (ret < 0) { |
2076 | - printk("ctnetlink_init: cannot register notifier.\n"); | |
2076 | + pr_err("ctnetlink_init: cannot register notifier.\n"); | |
2077 | 2077 | goto err_unreg_exp_subsys; |
2078 | 2078 | } |
2079 | 2079 | |
2080 | 2080 | ret = nf_ct_expect_register_notifier(&ctnl_notifier_exp); |
2081 | 2081 | if (ret < 0) { |
2082 | - printk("ctnetlink_init: cannot expect register notifier.\n"); | |
2082 | + pr_err("ctnetlink_init: cannot expect register notifier.\n"); | |
2083 | 2083 | goto err_unreg_notifier; |
2084 | 2084 | } |
2085 | 2085 | #endif |
... | ... | @@ -2100,7 +2100,7 @@ |
2100 | 2100 | |
2101 | 2101 | static void __exit ctnetlink_exit(void) |
2102 | 2102 | { |
2103 | - printk("ctnetlink: unregistering from nfnetlink.\n"); | |
2103 | + pr_info("ctnetlink: unregistering from nfnetlink.\n"); | |
2104 | 2104 | |
2105 | 2105 | #ifdef CONFIG_NF_CONNTRACK_EVENTS |
2106 | 2106 | nf_ct_expect_unregister_notifier(&ctnl_notifier_exp); |
net/netfilter/nf_conntrack_proto_sctp.c
... | ... | @@ -717,12 +717,12 @@ |
717 | 717 | |
718 | 718 | ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_sctp4); |
719 | 719 | if (ret) { |
720 | - printk("nf_conntrack_l4proto_sctp4: protocol register failed\n"); | |
720 | + pr_err("nf_conntrack_l4proto_sctp4: protocol register failed\n"); | |
721 | 721 | goto out; |
722 | 722 | } |
723 | 723 | ret = nf_conntrack_l4proto_register(&nf_conntrack_l4proto_sctp6); |
724 | 724 | if (ret) { |
725 | - printk("nf_conntrack_l4proto_sctp6: protocol register failed\n"); | |
725 | + pr_err("nf_conntrack_l4proto_sctp6: protocol register failed\n"); | |
726 | 726 | goto cleanup_sctp4; |
727 | 727 | } |
728 | 728 |
net/netfilter/nf_conntrack_sip.c
... | ... | @@ -1549,8 +1549,8 @@ |
1549 | 1549 | |
1550 | 1550 | ret = nf_conntrack_helper_register(&sip[i][j]); |
1551 | 1551 | if (ret) { |
1552 | - printk("nf_ct_sip: failed to register helper " | |
1553 | - "for pf: %u port: %u\n", | |
1552 | + printk(KERN_ERR "nf_ct_sip: failed to register" | |
1553 | + " helper for pf: %u port: %u\n", | |
1554 | 1554 | sip[i][j].tuple.src.l3num, ports[i]); |
1555 | 1555 | nf_conntrack_sip_fini(); |
1556 | 1556 | return ret; |
net/netfilter/nf_conntrack_standalone.c
... | ... | @@ -446,7 +446,7 @@ |
446 | 446 | if (net_eq(net, &init_net)) |
447 | 447 | unregister_sysctl_table(nf_ct_netfilter_header); |
448 | 448 | out: |
449 | - printk("nf_conntrack: can't register to sysctl.\n"); | |
449 | + printk(KERN_ERR "nf_conntrack: can't register to sysctl.\n"); | |
450 | 450 | return -ENOMEM; |
451 | 451 | } |
452 | 452 |
net/netfilter/nf_conntrack_tftp.c
... | ... | @@ -138,8 +138,8 @@ |
138 | 138 | |
139 | 139 | ret = nf_conntrack_helper_register(&tftp[i][j]); |
140 | 140 | if (ret) { |
141 | - printk("nf_ct_tftp: failed to register helper " | |
142 | - "for pf: %u port: %u\n", | |
141 | + printk(KERN_ERR "nf_ct_tftp: failed to register" | |
142 | + " helper for pf: %u port: %u\n", | |
143 | 143 | tftp[i][j].tuple.src.l3num, ports[i]); |
144 | 144 | nf_conntrack_tftp_fini(); |
145 | 145 | return ret; |
net/netfilter/nf_internals.h
net/netfilter/nfnetlink.c
... | ... | @@ -212,13 +212,13 @@ |
212 | 212 | |
213 | 213 | static int __init nfnetlink_init(void) |
214 | 214 | { |
215 | - printk("Netfilter messages via NETLINK v%s.\n", nfversion); | |
215 | + pr_info("Netfilter messages via NETLINK v%s.\n", nfversion); | |
216 | 216 | return register_pernet_subsys(&nfnetlink_net_ops); |
217 | 217 | } |
218 | 218 | |
219 | 219 | static void __exit nfnetlink_exit(void) |
220 | 220 | { |
221 | - printk("Removing netfilter NETLINK layer.\n"); | |
221 | + pr_info("Removing netfilter NETLINK layer.\n"); | |
222 | 222 | unregister_pernet_subsys(&nfnetlink_net_ops); |
223 | 223 | } |
224 | 224 | module_init(nfnetlink_init); |
net/netfilter/nfnetlink_log.c
... | ... | @@ -297,7 +297,7 @@ |
297 | 297 | n = max(inst_size, pkt_size); |
298 | 298 | skb = alloc_skb(n, GFP_ATOMIC); |
299 | 299 | if (!skb) { |
300 | - PRINTR("nfnetlink_log: can't alloc whole buffer (%u bytes)\n", | |
300 | + pr_notice("nfnetlink_log: can't alloc whole buffer (%u bytes)\n", | |
301 | 301 | inst_size); |
302 | 302 | |
303 | 303 | if (n > pkt_size) { |
... | ... | @@ -306,7 +306,7 @@ |
306 | 306 | |
307 | 307 | skb = alloc_skb(pkt_size, GFP_ATOMIC); |
308 | 308 | if (!skb) |
309 | - PRINTR("nfnetlink_log: can't even alloc %u " | |
309 | + pr_err("nfnetlink_log: can't even alloc %u " | |
310 | 310 | "bytes\n", pkt_size); |
311 | 311 | } |
312 | 312 | } |