Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

l2tp: remove noisy logging, use appropriate log levels

l2tp_ppp in particular had a lot of log messages for tracing
[get|set]sockopt calls. These aren't especially useful, so remove
these messages.

Several log messages flagging error conditions were logged using
l2tp_info: they're better off as l2tp_warn.

Signed-off-by: Tom Parkin <tparkin@katalix.com>
Signed-off-by: David S. Miller <davem@davemloft.net>

authored by

Tom Parkin and committed by
David S. Miller
ab141e37 12923365

+5 -43
+4 -12
net/l2tp/l2tp_core.c
··· 665 665 /* Parse and check optional cookie */ 666 666 if (session->peer_cookie_len > 0) { 667 667 if (memcmp(ptr, &session->peer_cookie[0], session->peer_cookie_len)) { 668 - l2tp_info(tunnel, L2TP_MSG_DATA, 668 + l2tp_warn(tunnel, L2TP_MSG_DATA, 669 669 "%s: cookie mismatch (%u/%u). Discarding.\n", 670 670 tunnel->name, tunnel->tunnel_id, 671 671 session->session_id); ··· 835 835 836 836 /* Short packet? */ 837 837 if (!pskb_may_pull(skb, L2TP_HDR_SIZE_MAX)) { 838 - l2tp_info(tunnel, L2TP_MSG_DATA, 838 + l2tp_warn(tunnel, L2TP_MSG_DATA, 839 839 "%s: recv short packet (len=%d)\n", 840 840 tunnel->name, skb->len); 841 841 goto error; ··· 851 851 /* Check protocol version */ 852 852 version = hdrflags & L2TP_HDR_VER_MASK; 853 853 if (version != tunnel->version) { 854 - l2tp_info(tunnel, L2TP_MSG_DATA, 854 + l2tp_warn(tunnel, L2TP_MSG_DATA, 855 855 "%s: recv protocol version mismatch: got %d expected %d\n", 856 856 tunnel->name, version, tunnel->version); 857 857 goto error; ··· 891 891 l2tp_session_dec_refcount(session); 892 892 893 893 /* Not found? Pass to userspace to deal with */ 894 - l2tp_info(tunnel, L2TP_MSG_DATA, 894 + l2tp_warn(tunnel, L2TP_MSG_DATA, 895 895 "%s: no session found (%u/%u). Passing up.\n", 896 896 tunnel->name, tunnel_id, session_id); 897 897 goto error; ··· 1149 1149 if (!tunnel) 1150 1150 goto end; 1151 1151 1152 - l2tp_info(tunnel, L2TP_MSG_CONTROL, "%s: closing...\n", tunnel->name); 1153 - 1154 1152 /* Disable udp encapsulation */ 1155 1153 switch (tunnel->encap) { 1156 1154 case L2TP_ENCAPTYPE_UDP: ··· 1207 1209 struct hlist_node *tmp; 1208 1210 struct l2tp_session *session; 1209 1211 1210 - l2tp_info(tunnel, L2TP_MSG_CONTROL, "%s: closing all sessions...\n", 1211 - tunnel->name); 1212 - 1213 1212 write_lock_bh(&tunnel->hlist_lock); 1214 1213 tunnel->acpt_newsess = false; 1215 1214 for (hash = 0; hash < L2TP_HASH_SIZE; hash++) { 1216 1215 again: 1217 1216 hlist_for_each_safe(walk, tmp, &tunnel->session_hlist[hash]) { 1218 1217 session = hlist_entry(walk, struct l2tp_session, hlist); 1219 - 1220 - l2tp_info(session, L2TP_MSG_CONTROL, 1221 - "%s: closing session\n", session->name); 1222 1218 1223 1219 hlist_del_init(&session->hlist); 1224 1220
+1 -31
net/l2tp/l2tp_ppp.c
··· 251 251 252 252 no_sock: 253 253 rcu_read_unlock(); 254 - l2tp_info(session, L2TP_MSG_DATA, "%s: no socket\n", session->name); 254 + l2tp_warn(session, L2TP_MSG_DATA, "%s: no socket\n", session->name); 255 255 kfree_skb(skb); 256 256 } 257 257 ··· 832 832 drop_refcnt = false; 833 833 834 834 sk->sk_state = PPPOX_CONNECTED; 835 - l2tp_info(session, L2TP_MSG_CONTROL, "%s: created\n", 836 - session->name); 837 835 838 836 end: 839 837 if (error) { ··· 1148 1150 switch (optname) { 1149 1151 case PPPOL2TP_SO_DEBUG: 1150 1152 tunnel->debug = val; 1151 - l2tp_info(tunnel, L2TP_MSG_CONTROL, "%s: set debug=%x\n", 1152 - tunnel->name, tunnel->debug); 1153 1153 break; 1154 1154 1155 1155 default: ··· 1173 1177 break; 1174 1178 } 1175 1179 session->recv_seq = !!val; 1176 - l2tp_info(session, L2TP_MSG_CONTROL, 1177 - "%s: set recv_seq=%d\n", 1178 - session->name, session->recv_seq); 1179 1180 break; 1180 1181 1181 1182 case PPPOL2TP_SO_SENDSEQ: ··· 1188 1195 PPPOL2TP_L2TP_HDR_SIZE_NOSEQ; 1189 1196 } 1190 1197 l2tp_session_set_header_len(session, session->tunnel->version); 1191 - l2tp_info(session, L2TP_MSG_CONTROL, 1192 - "%s: set send_seq=%d\n", 1193 - session->name, session->send_seq); 1194 1198 break; 1195 1199 1196 1200 case PPPOL2TP_SO_LNSMODE: ··· 1196 1206 break; 1197 1207 } 1198 1208 session->lns_mode = !!val; 1199 - l2tp_info(session, L2TP_MSG_CONTROL, 1200 - "%s: set lns_mode=%d\n", 1201 - session->name, session->lns_mode); 1202 1209 break; 1203 1210 1204 1211 case PPPOL2TP_SO_DEBUG: 1205 1212 session->debug = val; 1206 - l2tp_info(session, L2TP_MSG_CONTROL, "%s: set debug=%x\n", 1207 - session->name, session->debug); 1208 1213 break; 1209 1214 1210 1215 case PPPOL2TP_SO_REORDERTO: 1211 1216 session->reorder_timeout = msecs_to_jiffies(val); 1212 - l2tp_info(session, L2TP_MSG_CONTROL, 1213 - "%s: set reorder_timeout=%d\n", 1214 - session->name, session->reorder_timeout); 1215 1217 break; 1216 1218 1217 1219 default: ··· 1272 1290 switch (optname) { 1273 1291 case PPPOL2TP_SO_DEBUG: 1274 1292 *val = tunnel->debug; 1275 - l2tp_info(tunnel, L2TP_MSG_CONTROL, "%s: get debug=%x\n", 1276 - tunnel->name, tunnel->debug); 1277 1293 break; 1278 1294 1279 1295 default: ··· 1293 1313 switch (optname) { 1294 1314 case PPPOL2TP_SO_RECVSEQ: 1295 1315 *val = session->recv_seq; 1296 - l2tp_info(session, L2TP_MSG_CONTROL, 1297 - "%s: get recv_seq=%d\n", session->name, *val); 1298 1316 break; 1299 1317 1300 1318 case PPPOL2TP_SO_SENDSEQ: 1301 1319 *val = session->send_seq; 1302 - l2tp_info(session, L2TP_MSG_CONTROL, 1303 - "%s: get send_seq=%d\n", session->name, *val); 1304 1320 break; 1305 1321 1306 1322 case PPPOL2TP_SO_LNSMODE: 1307 1323 *val = session->lns_mode; 1308 - l2tp_info(session, L2TP_MSG_CONTROL, 1309 - "%s: get lns_mode=%d\n", session->name, *val); 1310 1324 break; 1311 1325 1312 1326 case PPPOL2TP_SO_DEBUG: 1313 1327 *val = session->debug; 1314 - l2tp_info(session, L2TP_MSG_CONTROL, "%s: get debug=%d\n", 1315 - session->name, *val); 1316 1328 break; 1317 1329 1318 1330 case PPPOL2TP_SO_REORDERTO: 1319 1331 *val = (int)jiffies_to_msecs(session->reorder_timeout); 1320 - l2tp_info(session, L2TP_MSG_CONTROL, 1321 - "%s: get reorder_timeout=%d\n", session->name, *val); 1322 1332 break; 1323 1333 1324 1334 default: