aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--fs/lockd/svc.c6
-rw-r--r--fs/lockd/svc4proc.c7
-rw-r--r--fs/lockd/svcproc.c7
-rw-r--r--fs/nfs/callback.c12
-rw-r--r--fs/nfsd/nfsfh.c7
-rw-r--r--fs/nfsd/nfsproc.c7
-rw-r--r--include/linux/sunrpc/svc.h3
-rw-r--r--net/sunrpc/svcsock.c76
8 files changed, 86 insertions, 39 deletions
diff --git a/fs/lockd/svc.c b/fs/lockd/svc.c
index 2c3d5ac4a3b6..80fcacc1acf9 100644
--- a/fs/lockd/svc.c
+++ b/fs/lockd/svc.c
@@ -141,6 +141,7 @@ lockd(struct svc_rqst *rqstp)
141 */ 141 */
142 while ((nlmsvc_users || !signalled()) && nlmsvc_pid == current->pid) { 142 while ((nlmsvc_users || !signalled()) && nlmsvc_pid == current->pid) {
143 long timeout = MAX_SCHEDULE_TIMEOUT; 143 long timeout = MAX_SCHEDULE_TIMEOUT;
144 char buf[RPC_MAX_ADDRBUFLEN];
144 145
145 if (signalled()) { 146 if (signalled()) {
146 flush_signals(current); 147 flush_signals(current);
@@ -175,11 +176,10 @@ lockd(struct svc_rqst *rqstp)
175 break; 176 break;
176 } 177 }
177 178
178 dprintk("lockd: request from %08x\n", 179 dprintk("lockd: request from %s\n",
179 (unsigned)ntohl(rqstp->rq_addr.sin_addr.s_addr)); 180 svc_print_addr(rqstp, buf, sizeof(buf)));
180 181
181 svc_process(rqstp); 182 svc_process(rqstp);
182
183 } 183 }
184 184
185 flush_signals(current); 185 flush_signals(current);
diff --git a/fs/lockd/svc4proc.c b/fs/lockd/svc4proc.c
index f67146a8199a..9b591bc18341 100644
--- a/fs/lockd/svc4proc.c
+++ b/fs/lockd/svc4proc.c
@@ -426,10 +426,9 @@ nlm4svc_proc_sm_notify(struct svc_rqst *rqstp, struct nlm_reboot *argp,
426 dprintk("lockd: SM_NOTIFY called\n"); 426 dprintk("lockd: SM_NOTIFY called\n");
427 if (saddr.sin_addr.s_addr != htonl(INADDR_LOOPBACK) 427 if (saddr.sin_addr.s_addr != htonl(INADDR_LOOPBACK)
428 || ntohs(saddr.sin_port) >= 1024) { 428 || ntohs(saddr.sin_port) >= 1024) {
429 printk(KERN_WARNING 429 char buf[RPC_MAX_ADDRBUFLEN];
430 "lockd: rejected NSM callback from %08x:%d\n", 430 printk(KERN_WARNING "lockd: rejected NSM callback from %s\n",
431 ntohl(rqstp->rq_addr.sin_addr.s_addr), 431 svc_print_addr(rqstp, buf, sizeof(buf)));
432 ntohs(rqstp->rq_addr.sin_port));
433 return rpc_system_err; 432 return rpc_system_err;
434 } 433 }
435 434
diff --git a/fs/lockd/svcproc.c b/fs/lockd/svcproc.c
index 3707c3a23e93..f590304d93bf 100644
--- a/fs/lockd/svcproc.c
+++ b/fs/lockd/svcproc.c
@@ -457,10 +457,9 @@ nlmsvc_proc_sm_notify(struct svc_rqst *rqstp, struct nlm_reboot *argp,
457 dprintk("lockd: SM_NOTIFY called\n"); 457 dprintk("lockd: SM_NOTIFY called\n");
458 if (saddr.sin_addr.s_addr != htonl(INADDR_LOOPBACK) 458 if (saddr.sin_addr.s_addr != htonl(INADDR_LOOPBACK)
459 || ntohs(saddr.sin_port) >= 1024) { 459 || ntohs(saddr.sin_port) >= 1024) {
460 printk(KERN_WARNING 460 char buf[RPC_MAX_ADDRBUFLEN];
461 "lockd: rejected NSM callback from %08x:%d\n", 461 printk(KERN_WARNING "lockd: rejected NSM callback from %s\n",
462 ntohl(rqstp->rq_addr.sin_addr.s_addr), 462 svc_print_addr(rqstp, buf, sizeof(buf)));
463 ntohs(rqstp->rq_addr.sin_port));
464 return rpc_system_err; 463 return rpc_system_err;
465 } 464 }
466 465
diff --git a/fs/nfs/callback.c b/fs/nfs/callback.c
index a070109fa6c7..8c790af85984 100644
--- a/fs/nfs/callback.c
+++ b/fs/nfs/callback.c
@@ -71,6 +71,8 @@ static void nfs_callback_svc(struct svc_rqst *rqstp)
71 complete(&nfs_callback_info.started); 71 complete(&nfs_callback_info.started);
72 72
73 for(;;) { 73 for(;;) {
74 char buf[RPC_MAX_ADDRBUFLEN];
75
74 if (signalled()) { 76 if (signalled()) {
75 if (nfs_callback_info.users == 0) 77 if (nfs_callback_info.users == 0)
76 break; 78 break;
@@ -88,8 +90,8 @@ static void nfs_callback_svc(struct svc_rqst *rqstp)
88 __FUNCTION__, -err); 90 __FUNCTION__, -err);
89 break; 91 break;
90 } 92 }
91 dprintk("%s: request from %u.%u.%u.%u\n", __FUNCTION__, 93 dprintk("%s: request from %s\n", __FUNCTION__,
92 NIPQUAD(rqstp->rq_addr.sin_addr.s_addr)); 94 svc_print_addr(rqstp, buf, sizeof(buf)));
93 svc_process(rqstp); 95 svc_process(rqstp);
94 } 96 }
95 97
@@ -166,13 +168,17 @@ static int nfs_callback_authenticate(struct svc_rqst *rqstp)
166{ 168{
167 struct sockaddr_in *addr = &rqstp->rq_addr; 169 struct sockaddr_in *addr = &rqstp->rq_addr;
168 struct nfs_client *clp; 170 struct nfs_client *clp;
171 char buf[RPC_MAX_ADDRBUFLEN];
169 172
170 /* Don't talk to strangers */ 173 /* Don't talk to strangers */
171 clp = nfs_find_client(addr, 4); 174 clp = nfs_find_client(addr, 4);
172 if (clp == NULL) 175 if (clp == NULL)
173 return SVC_DROP; 176 return SVC_DROP;
174 dprintk("%s: %u.%u.%u.%u NFSv4 callback!\n", __FUNCTION__, NIPQUAD(addr->sin_addr)); 177
178 dprintk("%s: %s NFSv4 callback!\n", __FUNCTION__,
179 svc_print_addr(rqstp, buf, sizeof(buf)));
175 nfs_put_client(clp); 180 nfs_put_client(clp);
181
176 switch (rqstp->rq_authop->flavour) { 182 switch (rqstp->rq_authop->flavour) {
177 case RPC_AUTH_NULL: 183 case RPC_AUTH_NULL:
178 if (rqstp->rq_proc != CB_NULL) 184 if (rqstp->rq_proc != CB_NULL)
diff --git a/fs/nfsd/nfsfh.c b/fs/nfsd/nfsfh.c
index c59d6fbb7a6b..a0b4282cb284 100644
--- a/fs/nfsd/nfsfh.c
+++ b/fs/nfsd/nfsfh.c
@@ -20,6 +20,7 @@
20#include <linux/mount.h> 20#include <linux/mount.h>
21#include <asm/pgtable.h> 21#include <asm/pgtable.h>
22 22
23#include <linux/sunrpc/clnt.h>
23#include <linux/sunrpc/svc.h> 24#include <linux/sunrpc/svc.h>
24#include <linux/nfsd/nfsd.h> 25#include <linux/nfsd/nfsd.h>
25 26
@@ -180,10 +181,10 @@ fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, int type, int access)
180 /* Check if the request originated from a secure port. */ 181 /* Check if the request originated from a secure port. */
181 error = nfserr_perm; 182 error = nfserr_perm;
182 if (!rqstp->rq_secure && EX_SECURE(exp)) { 183 if (!rqstp->rq_secure && EX_SECURE(exp)) {
184 char buf[RPC_MAX_ADDRBUFLEN];
183 printk(KERN_WARNING 185 printk(KERN_WARNING
184 "nfsd: request from insecure port (%u.%u.%u.%u:%d)!\n", 186 "nfsd: request from insecure port %s!\n",
185 NIPQUAD(rqstp->rq_addr.sin_addr.s_addr), 187 svc_print_addr(rqstp, buf, sizeof(buf)));
186 ntohs(rqstp->rq_addr.sin_port));
187 goto out; 188 goto out;
188 } 189 }
189 190
diff --git a/fs/nfsd/nfsproc.c b/fs/nfsd/nfsproc.c
index ec983b777680..5cc2eec981b8 100644
--- a/fs/nfsd/nfsproc.c
+++ b/fs/nfsd/nfsproc.c
@@ -19,6 +19,7 @@
19#include <linux/unistd.h> 19#include <linux/unistd.h>
20#include <linux/slab.h> 20#include <linux/slab.h>
21 21
22#include <linux/sunrpc/clnt.h>
22#include <linux/sunrpc/svc.h> 23#include <linux/sunrpc/svc.h>
23#include <linux/nfsd/nfsd.h> 24#include <linux/nfsd/nfsd.h>
24#include <linux/nfsd/cache.h> 25#include <linux/nfsd/cache.h>
@@ -147,10 +148,10 @@ nfsd_proc_read(struct svc_rqst *rqstp, struct nfsd_readargs *argp,
147 */ 148 */
148 149
149 if (NFSSVC_MAXBLKSIZE_V2 < argp->count) { 150 if (NFSSVC_MAXBLKSIZE_V2 < argp->count) {
151 char buf[RPC_MAX_ADDRBUFLEN];
150 printk(KERN_NOTICE 152 printk(KERN_NOTICE
151 "oversized read request from %u.%u.%u.%u:%d (%d bytes)\n", 153 "oversized read request from %s (%d bytes)\n",
152 NIPQUAD(rqstp->rq_addr.sin_addr.s_addr), 154 svc_print_addr(rqstp, buf, sizeof(buf)),
153 ntohs(rqstp->rq_addr.sin_port),
154 argp->count); 155 argp->count);
155 argp->count = NFSSVC_MAXBLKSIZE_V2; 156 argp->count = NFSSVC_MAXBLKSIZE_V2;
156 } 157 }
diff --git a/include/linux/sunrpc/svc.h b/include/linux/sunrpc/svc.h
index 64f3d60c72af..1178689b9156 100644
--- a/include/linux/sunrpc/svc.h
+++ b/include/linux/sunrpc/svc.h
@@ -368,5 +368,8 @@ int svc_register(struct svc_serv *, int, unsigned short);
368void svc_wake_up(struct svc_serv *); 368void svc_wake_up(struct svc_serv *);
369void svc_reserve(struct svc_rqst *rqstp, int space); 369void svc_reserve(struct svc_rqst *rqstp, int space);
370struct svc_pool * svc_pool_for_cpu(struct svc_serv *serv, int cpu); 370struct svc_pool * svc_pool_for_cpu(struct svc_serv *serv, int cpu);
371char * svc_print_addr(struct svc_rqst *, char *, size_t);
372
373#define RPC_MAX_ADDRBUFLEN (63U)
371 374
372#endif /* SUNRPC_SVC_H */ 375#endif /* SUNRPC_SVC_H */
diff --git a/net/sunrpc/svcsock.c b/net/sunrpc/svcsock.c
index a98be09768a0..08de328ce433 100644
--- a/net/sunrpc/svcsock.c
+++ b/net/sunrpc/svcsock.c
@@ -41,6 +41,7 @@
41#include <asm/ioctls.h> 41#include <asm/ioctls.h>
42 42
43#include <linux/sunrpc/types.h> 43#include <linux/sunrpc/types.h>
44#include <linux/sunrpc/clnt.h>
44#include <linux/sunrpc/xdr.h> 45#include <linux/sunrpc/xdr.h>
45#include <linux/sunrpc/svcsock.h> 46#include <linux/sunrpc/svcsock.h>
46#include <linux/sunrpc/stats.h> 47#include <linux/sunrpc/stats.h>
@@ -121,6 +122,41 @@ static inline void svc_reclassify_socket(struct socket *sock)
121} 122}
122#endif 123#endif
123 124
125static char *__svc_print_addr(struct sockaddr *addr, char *buf, size_t len)
126{
127 switch (addr->sa_family) {
128 case AF_INET:
129 snprintf(buf, len, "%u.%u.%u.%u, port=%u",
130 NIPQUAD(((struct sockaddr_in *) addr)->sin_addr),
131 htons(((struct sockaddr_in *) addr)->sin_port));
132 break;
133#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
134 case AF_INET6:
135 snprintf(buf, len, "%x:%x:%x:%x:%x:%x:%x:%x, port=%u",
136 NIP6(((struct sockaddr_in6 *) addr)->sin6_addr),
137 htons(((struct sockaddr_in6 *) addr)->sin6_port));
138 break;
139#endif
140 default:
141 snprintf(buf, len, "unknown address type: %d", addr->sa_family);
142 break;
143 }
144 return buf;
145}
146
147/**
148 * svc_print_addr - Format rq_addr field for printing
149 * @rqstp: svc_rqst struct containing address to print
150 * @buf: target buffer for formatted address
151 * @len: length of target buffer
152 *
153 */
154char *svc_print_addr(struct svc_rqst *rqstp, char *buf, size_t len)
155{
156 return __svc_print_addr((struct sockaddr *) &rqstp->rq_addr, buf, len);
157}
158EXPORT_SYMBOL_GPL(svc_print_addr);
159
124/* 160/*
125 * Queue up an idle server thread. Must have pool->sp_lock held. 161 * Queue up an idle server thread. Must have pool->sp_lock held.
126 * Note: this is really a stack rather than a queue, so that we only 162 * Note: this is really a stack rather than a queue, so that we only
@@ -429,6 +465,7 @@ svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr)
429 size_t base = xdr->page_base; 465 size_t base = xdr->page_base;
430 unsigned int pglen = xdr->page_len; 466 unsigned int pglen = xdr->page_len;
431 unsigned int flags = MSG_MORE; 467 unsigned int flags = MSG_MORE;
468 char buf[RPC_MAX_ADDRBUFLEN];
432 469
433 slen = xdr->len; 470 slen = xdr->len;
434 471
@@ -491,9 +528,9 @@ svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr)
491 len += result; 528 len += result;
492 } 529 }
493out: 530out:
494 dprintk("svc: socket %p sendto([%p %Zu... ], %d) = %d (addr %x)\n", 531 dprintk("svc: socket %p sendto([%p %Zu... ], %d) = %d (addr %s)\n",
495 rqstp->rq_sock, xdr->head[0].iov_base, xdr->head[0].iov_len, xdr->len, len, 532 rqstp->rq_sock, xdr->head[0].iov_base, xdr->head[0].iov_len,
496 rqstp->rq_addr.sin_addr.s_addr); 533 xdr->len, len, svc_print_addr(rqstp, buf, sizeof(buf)));
497 534
498 return len; 535 return len;
499} 536}
@@ -878,6 +915,7 @@ svc_tcp_accept(struct svc_sock *svsk)
878 struct socket *newsock; 915 struct socket *newsock;
879 struct svc_sock *newsvsk; 916 struct svc_sock *newsvsk;
880 int err, slen; 917 int err, slen;
918 char buf[RPC_MAX_ADDRBUFLEN];
881 919
882 dprintk("svc: tcp_accept %p sock %p\n", svsk, sock); 920 dprintk("svc: tcp_accept %p sock %p\n", svsk, sock);
883 if (!sock) 921 if (!sock)
@@ -908,18 +946,19 @@ svc_tcp_accept(struct svc_sock *svsk)
908 } 946 }
909 947
910 /* Ideally, we would want to reject connections from unauthorized 948 /* Ideally, we would want to reject connections from unauthorized
911 * hosts here, but when we get encription, the IP of the host won't 949 * hosts here, but when we get encryption, the IP of the host won't
912 * tell us anything. For now just warn about unpriv connections. 950 * tell us anything. For now just warn about unpriv connections.
913 */ 951 */
914 if (ntohs(sin.sin_port) >= 1024) { 952 if (ntohs(sin.sin_port) >= 1024) {
915 dprintk(KERN_WARNING 953 dprintk(KERN_WARNING
916 "%s: connect from unprivileged port: %u.%u.%u.%u:%d\n", 954 "%s: connect from unprivileged port: %s\n",
917 serv->sv_name, 955 serv->sv_name,
918 NIPQUAD(sin.sin_addr.s_addr), ntohs(sin.sin_port)); 956 __svc_print_addr((struct sockaddr *) &sin, buf,
957 sizeof(buf)));
919 } 958 }
920 959 dprintk("%s: connect from %s\n", serv->sv_name,
921 dprintk("%s: connect from %u.%u.%u.%u:%04x\n", serv->sv_name, 960 __svc_print_addr((struct sockaddr *) &sin, buf,
922 NIPQUAD(sin.sin_addr.s_addr), ntohs(sin.sin_port)); 961 sizeof(buf)));
923 962
924 /* make sure that a write doesn't block forever when 963 /* make sure that a write doesn't block forever when
925 * low on memory 964 * low on memory
@@ -955,11 +994,9 @@ svc_tcp_accept(struct svc_sock *svsk)
955 "sockets, consider increasing the " 994 "sockets, consider increasing the "
956 "number of nfsd threads\n", 995 "number of nfsd threads\n",
957 serv->sv_name); 996 serv->sv_name);
958 printk(KERN_NOTICE "%s: last TCP connect from " 997 printk(KERN_NOTICE
959 "%u.%u.%u.%u:%d\n", 998 "%s: last TCP connect from %s\n",
960 serv->sv_name, 999 serv->sv_name, buf);
961 NIPQUAD(sin.sin_addr.s_addr),
962 ntohs(sin.sin_port));
963 } 1000 }
964 /* 1001 /*
965 * Always select the oldest socket. It's not fair, 1002 * Always select the oldest socket. It's not fair,
@@ -1587,11 +1624,12 @@ static int svc_create_socket(struct svc_serv *serv, int protocol,
1587 struct socket *sock; 1624 struct socket *sock;
1588 int error; 1625 int error;
1589 int type; 1626 int type;
1627 char buf[RPC_MAX_ADDRBUFLEN];
1590 1628
1591 dprintk("svc: svc_create_socket(%s, %d, %u.%u.%u.%u:%d)\n", 1629 dprintk("svc: svc_create_socket(%s, %d, %s)\n",
1592 serv->sv_program->pg_name, protocol, 1630 serv->sv_program->pg_name, protocol,
1593 NIPQUAD(sin->sin_addr.s_addr), 1631 __svc_print_addr((struct sockaddr *) sin, buf,
1594 ntohs(sin->sin_port)); 1632 sizeof(buf)));
1595 1633
1596 if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) { 1634 if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) {
1597 printk(KERN_WARNING "svc: only UDP and TCP " 1635 printk(KERN_WARNING "svc: only UDP and TCP "