lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 31 Oct 2011 23:10:48 +0200 From: Daniel Baluta <dbaluta@...acom.com> To: davem@...emloft.net Cc: eric.dumazet@...il.com, gregory.v.rose@...el.com, jeffrey.t.kirsher@...el.com, netdev@...r.kernel.org, Daniel Baluta <daniel.baluta@...il.com>, Daniel Baluta <dbaluta@...acom.com> Subject: [PATCH] neigh: print nud_state in neigh timer handler. From: Daniel Baluta <daniel.baluta@...il.com> For debugging purposes it is useful to know the exact state of a non NUD_IN_TIMER neighbour entry whose timer handler just expired. Signed-off-by: Daniel Baluta <dbaluta@...acom.com> --- net/core/neighbour.c | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/net/core/neighbour.c b/net/core/neighbour.c index 909ecb3..6a8a311 100644 --- a/net/core/neighbour.c +++ b/net/core/neighbour.c @@ -874,7 +874,7 @@ static void neigh_timer_handler(unsigned long arg) if (!(state & NUD_IN_TIMER)) { #ifndef CONFIG_SMP - printk(KERN_WARNING "neigh: timer & !nud_in_timer\n"); + printk(KERN_WARNING "neigh: timer & !nud_in_timer, state:0x%x\n", state); #endif goto out; } -- 1.7.1 -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists