ksock_sched_t *sched;
unsigned long flags;
char ipbuf[PTL_NALFMT_SIZE];
+ char ipbuf2[PTL_NALFMT_SIZE];
if (error != 0)
CERROR("Failed to route packet from "
NTOH__u64(hdr->src_nid),
portals_nid2str(SOCKNAL, NTOH__u64(hdr->src_nid), ipbuf),
NTOH__u64(hdr->dest_nid),
- portals_nid2str(SOCKNAL, NTOH__u64(hdr->dest_nid), ipbuf),
+ portals_nid2str(SOCKNAL, NTOH__u64(hdr->dest_nid), ipbuf2),
error);
else
CDEBUG (D_NET, "routed packet from "LPX64" to "LPX64": OK\n",
ptl_nid_t src_nid = NTOH__u64 (conn->ksnc_hdr.src_nid);
int body_len = NTOH__u32 (conn->ksnc_hdr.payload_length);
char str[PTL_NALFMT_SIZE];
+ char str2[PTL_NALFMT_SIZE];
CDEBUG (D_NET, "%p "LPX64"->"LPX64" %d parsing header\n", conn,
src_nid, dest_nid, conn->ksnc_rx_nob_left);
CERROR("dropping packet from "LPX64" (%s) for "LPX64" (%s): "
"packet size %d illegal\n",
src_nid, portals_nid2str(TCPNAL, src_nid, str),
- dest_nid, portals_nid2str(TCPNAL, dest_nid, str),
+ dest_nid, portals_nid2str(TCPNAL, dest_nid, str2),
body_len);
ksocknal_new_packet (conn, 0); /* on to new packet */
CERROR("dropping packet from "LPX64" (%s) for "LPX64
" (%s): not forwarding\n",
src_nid, portals_nid2str(TCPNAL, src_nid, str),
- dest_nid, portals_nid2str(TCPNAL, dest_nid, str));
+ dest_nid, portals_nid2str(TCPNAL, dest_nid, str2));
/* on to new packet (skip this one's body) */
ksocknal_new_packet (conn, body_len);
return;
CERROR ("dropping packet from "LPX64" (%s) for "LPX64
"(%s): packet size %d too big\n",
src_nid, portals_nid2str(TCPNAL, src_nid, str),
- dest_nid, portals_nid2str(TCPNAL, dest_nid, str),
+ dest_nid, portals_nid2str(TCPNAL, dest_nid, str2),
body_len);
/* on to new packet (skip this one's body) */
ksocknal_new_packet (conn, body_len);
CERROR ("dropping packet from "LPX64" (%s) for "LPX64
"(%s): target is a peer\n",
src_nid, portals_nid2str(TCPNAL, src_nid, str),
- dest_nid, portals_nid2str(TCPNAL, dest_nid, str));
+ dest_nid, portals_nid2str(TCPNAL, dest_nid, str2));
ksocknal_put_peer (peer); /* drop ref from get above */
/* on to next packet (skip this one's body) */
ptl_hdr_t hdr;
ptl_magicversion_t *hmv = (ptl_magicversion_t *)&hdr.dest_nid;
char ipbuf[PTL_NALFMT_SIZE];
+ char ipbuf2[PTL_NALFMT_SIZE];
LASSERT (sizeof (*hmv) == sizeof (hdr.dest_nid));
portals_nid2str(SOCKNAL,
__le64_to_cpu(hdr.src_nid),
ipbuf),
- *nid, portals_nid2str(SOCKNAL, *nid, ipbuf));
+ *nid, portals_nid2str(SOCKNAL, *nid, ipbuf2));
return (-EPROTO);
}
while (!list_empty (&zombies)) {
char ipbuf[PTL_NALFMT_SIZE];
+ char ipbuf2[PTL_NALFMT_SIZE];
tx = list_entry (zombies.next, ksock_tx_t, tx_list);
CERROR ("Deleting packet type %d len %d ("LPX64" %s->"LPX64" %s)\n",
NTOH__u64 (tx->tx_hdr->dest_nid),
portals_nid2str(SOCKNAL,
NTOH__u64(tx->tx_hdr->src_nid),
- ipbuf));
+ ipbuf2));
list_del (&tx->tx_list);
/* complete now */