Commit ad06e4bd authored by Chuck Lever's avatar Chuck Lever Committed by Linus Torvalds

[PATCH] knfsd: SUNRPC: Add a function to format the address in an svc_rqst for printing

There are loads of places where the RPC server assumes that the rq_addr fields
contains an IPv4 address.  Top among these are error and debugging messages
that display the server's IP address.

Let's refactor the address printing into a separate function that's smart
enough to figure out the difference between IPv4 and IPv6 addresses.
Signed-off-by: default avatarChuck Lever <chuck.lever@oracle.com>
Cc: Aurelien Charbon <aurelien.charbon@ext.bull.net>
Signed-off-by: default avatarNeil Brown <neilb@suse.de>
Signed-off-by: default avatarAndrew Morton <akpm@linux-foundation.org>
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
parent 1ba95105
...@@ -141,6 +141,7 @@ lockd(struct svc_rqst *rqstp) ...@@ -141,6 +141,7 @@ lockd(struct svc_rqst *rqstp)
*/ */
while ((nlmsvc_users || !signalled()) && nlmsvc_pid == current->pid) { while ((nlmsvc_users || !signalled()) && nlmsvc_pid == current->pid) {
long timeout = MAX_SCHEDULE_TIMEOUT; long timeout = MAX_SCHEDULE_TIMEOUT;
char buf[RPC_MAX_ADDRBUFLEN];
if (signalled()) { if (signalled()) {
flush_signals(current); flush_signals(current);
...@@ -175,11 +176,10 @@ lockd(struct svc_rqst *rqstp) ...@@ -175,11 +176,10 @@ lockd(struct svc_rqst *rqstp)
break; break;
} }
dprintk("lockd: request from %08x\n", dprintk("lockd: request from %s\n",
(unsigned)ntohl(rqstp->rq_addr.sin_addr.s_addr)); svc_print_addr(rqstp, buf, sizeof(buf)));
svc_process(rqstp); svc_process(rqstp);
} }
flush_signals(current); flush_signals(current);
......
...@@ -426,10 +426,9 @@ nlm4svc_proc_sm_notify(struct svc_rqst *rqstp, struct nlm_reboot *argp, ...@@ -426,10 +426,9 @@ nlm4svc_proc_sm_notify(struct svc_rqst *rqstp, struct nlm_reboot *argp,
dprintk("lockd: SM_NOTIFY called\n"); dprintk("lockd: SM_NOTIFY called\n");
if (saddr.sin_addr.s_addr != htonl(INADDR_LOOPBACK) if (saddr.sin_addr.s_addr != htonl(INADDR_LOOPBACK)
|| ntohs(saddr.sin_port) >= 1024) { || ntohs(saddr.sin_port) >= 1024) {
printk(KERN_WARNING char buf[RPC_MAX_ADDRBUFLEN];
"lockd: rejected NSM callback from %08x:%d\n", printk(KERN_WARNING "lockd: rejected NSM callback from %s\n",
ntohl(rqstp->rq_addr.sin_addr.s_addr), svc_print_addr(rqstp, buf, sizeof(buf)));
ntohs(rqstp->rq_addr.sin_port));
return rpc_system_err; return rpc_system_err;
} }
......
...@@ -457,10 +457,9 @@ nlmsvc_proc_sm_notify(struct svc_rqst *rqstp, struct nlm_reboot *argp, ...@@ -457,10 +457,9 @@ nlmsvc_proc_sm_notify(struct svc_rqst *rqstp, struct nlm_reboot *argp,
dprintk("lockd: SM_NOTIFY called\n"); dprintk("lockd: SM_NOTIFY called\n");
if (saddr.sin_addr.s_addr != htonl(INADDR_LOOPBACK) if (saddr.sin_addr.s_addr != htonl(INADDR_LOOPBACK)
|| ntohs(saddr.sin_port) >= 1024) { || ntohs(saddr.sin_port) >= 1024) {
printk(KERN_WARNING char buf[RPC_MAX_ADDRBUFLEN];
"lockd: rejected NSM callback from %08x:%d\n", printk(KERN_WARNING "lockd: rejected NSM callback from %s\n",
ntohl(rqstp->rq_addr.sin_addr.s_addr), svc_print_addr(rqstp, buf, sizeof(buf)));
ntohs(rqstp->rq_addr.sin_port));
return rpc_system_err; return rpc_system_err;
} }
......
...@@ -71,6 +71,8 @@ static void nfs_callback_svc(struct svc_rqst *rqstp) ...@@ -71,6 +71,8 @@ static void nfs_callback_svc(struct svc_rqst *rqstp)
complete(&nfs_callback_info.started); complete(&nfs_callback_info.started);
for(;;) { for(;;) {
char buf[RPC_MAX_ADDRBUFLEN];
if (signalled()) { if (signalled()) {
if (nfs_callback_info.users == 0) if (nfs_callback_info.users == 0)
break; break;
...@@ -88,8 +90,8 @@ static void nfs_callback_svc(struct svc_rqst *rqstp) ...@@ -88,8 +90,8 @@ static void nfs_callback_svc(struct svc_rqst *rqstp)
__FUNCTION__, -err); __FUNCTION__, -err);
break; break;
} }
dprintk("%s: request from %u.%u.%u.%u\n", __FUNCTION__, dprintk("%s: request from %s\n", __FUNCTION__,
NIPQUAD(rqstp->rq_addr.sin_addr.s_addr)); svc_print_addr(rqstp, buf, sizeof(buf)));
svc_process(rqstp); svc_process(rqstp);
} }
...@@ -166,13 +168,17 @@ static int nfs_callback_authenticate(struct svc_rqst *rqstp) ...@@ -166,13 +168,17 @@ static int nfs_callback_authenticate(struct svc_rqst *rqstp)
{ {
struct sockaddr_in *addr = &rqstp->rq_addr; struct sockaddr_in *addr = &rqstp->rq_addr;
struct nfs_client *clp; struct nfs_client *clp;
char buf[RPC_MAX_ADDRBUFLEN];
/* Don't talk to strangers */ /* Don't talk to strangers */
clp = nfs_find_client(addr, 4); clp = nfs_find_client(addr, 4);
if (clp == NULL) if (clp == NULL)
return SVC_DROP; return SVC_DROP;
dprintk("%s: %u.%u.%u.%u NFSv4 callback!\n", __FUNCTION__, NIPQUAD(addr->sin_addr));
dprintk("%s: %s NFSv4 callback!\n", __FUNCTION__,
svc_print_addr(rqstp, buf, sizeof(buf)));
nfs_put_client(clp); nfs_put_client(clp);
switch (rqstp->rq_authop->flavour) { switch (rqstp->rq_authop->flavour) {
case RPC_AUTH_NULL: case RPC_AUTH_NULL:
if (rqstp->rq_proc != CB_NULL) if (rqstp->rq_proc != CB_NULL)
......
...@@ -20,6 +20,7 @@ ...@@ -20,6 +20,7 @@
#include <linux/mount.h> #include <linux/mount.h>
#include <asm/pgtable.h> #include <asm/pgtable.h>
#include <linux/sunrpc/clnt.h>
#include <linux/sunrpc/svc.h> #include <linux/sunrpc/svc.h>
#include <linux/nfsd/nfsd.h> #include <linux/nfsd/nfsd.h>
...@@ -180,10 +181,10 @@ fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, int type, int access) ...@@ -180,10 +181,10 @@ fh_verify(struct svc_rqst *rqstp, struct svc_fh *fhp, int type, int access)
/* Check if the request originated from a secure port. */ /* Check if the request originated from a secure port. */
error = nfserr_perm; error = nfserr_perm;
if (!rqstp->rq_secure && EX_SECURE(exp)) { if (!rqstp->rq_secure && EX_SECURE(exp)) {
char buf[RPC_MAX_ADDRBUFLEN];
printk(KERN_WARNING printk(KERN_WARNING
"nfsd: request from insecure port (%u.%u.%u.%u:%d)!\n", "nfsd: request from insecure port %s!\n",
NIPQUAD(rqstp->rq_addr.sin_addr.s_addr), svc_print_addr(rqstp, buf, sizeof(buf)));
ntohs(rqstp->rq_addr.sin_port));
goto out; goto out;
} }
......
...@@ -19,6 +19,7 @@ ...@@ -19,6 +19,7 @@
#include <linux/unistd.h> #include <linux/unistd.h>
#include <linux/slab.h> #include <linux/slab.h>
#include <linux/sunrpc/clnt.h>
#include <linux/sunrpc/svc.h> #include <linux/sunrpc/svc.h>
#include <linux/nfsd/nfsd.h> #include <linux/nfsd/nfsd.h>
#include <linux/nfsd/cache.h> #include <linux/nfsd/cache.h>
...@@ -147,10 +148,10 @@ nfsd_proc_read(struct svc_rqst *rqstp, struct nfsd_readargs *argp, ...@@ -147,10 +148,10 @@ nfsd_proc_read(struct svc_rqst *rqstp, struct nfsd_readargs *argp,
*/ */
if (NFSSVC_MAXBLKSIZE_V2 < argp->count) { if (NFSSVC_MAXBLKSIZE_V2 < argp->count) {
char buf[RPC_MAX_ADDRBUFLEN];
printk(KERN_NOTICE printk(KERN_NOTICE
"oversized read request from %u.%u.%u.%u:%d (%d bytes)\n", "oversized read request from %s (%d bytes)\n",
NIPQUAD(rqstp->rq_addr.sin_addr.s_addr), svc_print_addr(rqstp, buf, sizeof(buf)),
ntohs(rqstp->rq_addr.sin_port),
argp->count); argp->count);
argp->count = NFSSVC_MAXBLKSIZE_V2; argp->count = NFSSVC_MAXBLKSIZE_V2;
} }
......
...@@ -368,5 +368,8 @@ int svc_register(struct svc_serv *, int, unsigned short); ...@@ -368,5 +368,8 @@ int svc_register(struct svc_serv *, int, unsigned short);
void svc_wake_up(struct svc_serv *); void svc_wake_up(struct svc_serv *);
void svc_reserve(struct svc_rqst *rqstp, int space); void svc_reserve(struct svc_rqst *rqstp, int space);
struct svc_pool * svc_pool_for_cpu(struct svc_serv *serv, int cpu); struct svc_pool * svc_pool_for_cpu(struct svc_serv *serv, int cpu);
char * svc_print_addr(struct svc_rqst *, char *, size_t);
#define RPC_MAX_ADDRBUFLEN (63U)
#endif /* SUNRPC_SVC_H */ #endif /* SUNRPC_SVC_H */
...@@ -41,6 +41,7 @@ ...@@ -41,6 +41,7 @@
#include <asm/ioctls.h> #include <asm/ioctls.h>
#include <linux/sunrpc/types.h> #include <linux/sunrpc/types.h>
#include <linux/sunrpc/clnt.h>
#include <linux/sunrpc/xdr.h> #include <linux/sunrpc/xdr.h>
#include <linux/sunrpc/svcsock.h> #include <linux/sunrpc/svcsock.h>
#include <linux/sunrpc/stats.h> #include <linux/sunrpc/stats.h>
...@@ -121,6 +122,41 @@ static inline void svc_reclassify_socket(struct socket *sock) ...@@ -121,6 +122,41 @@ static inline void svc_reclassify_socket(struct socket *sock)
} }
#endif #endif
static char *__svc_print_addr(struct sockaddr *addr, char *buf, size_t len)
{
switch (addr->sa_family) {
case AF_INET:
snprintf(buf, len, "%u.%u.%u.%u, port=%u",
NIPQUAD(((struct sockaddr_in *) addr)->sin_addr),
htons(((struct sockaddr_in *) addr)->sin_port));
break;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
case AF_INET6:
snprintf(buf, len, "%x:%x:%x:%x:%x:%x:%x:%x, port=%u",
NIP6(((struct sockaddr_in6 *) addr)->sin6_addr),
htons(((struct sockaddr_in6 *) addr)->sin6_port));
break;
#endif
default:
snprintf(buf, len, "unknown address type: %d", addr->sa_family);
break;
}
return buf;
}
/**
* svc_print_addr - Format rq_addr field for printing
* @rqstp: svc_rqst struct containing address to print
* @buf: target buffer for formatted address
* @len: length of target buffer
*
*/
char *svc_print_addr(struct svc_rqst *rqstp, char *buf, size_t len)
{
return __svc_print_addr((struct sockaddr *) &rqstp->rq_addr, buf, len);
}
EXPORT_SYMBOL_GPL(svc_print_addr);
/* /*
* Queue up an idle server thread. Must have pool->sp_lock held. * Queue up an idle server thread. Must have pool->sp_lock held.
* Note: this is really a stack rather than a queue, so that we only * Note: this is really a stack rather than a queue, so that we only
...@@ -429,6 +465,7 @@ svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr) ...@@ -429,6 +465,7 @@ svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr)
size_t base = xdr->page_base; size_t base = xdr->page_base;
unsigned int pglen = xdr->page_len; unsigned int pglen = xdr->page_len;
unsigned int flags = MSG_MORE; unsigned int flags = MSG_MORE;
char buf[RPC_MAX_ADDRBUFLEN];
slen = xdr->len; slen = xdr->len;
...@@ -491,9 +528,9 @@ svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr) ...@@ -491,9 +528,9 @@ svc_sendto(struct svc_rqst *rqstp, struct xdr_buf *xdr)
len += result; len += result;
} }
out: out:
dprintk("svc: socket %p sendto([%p %Zu... ], %d) = %d (addr %x)\n", dprintk("svc: socket %p sendto([%p %Zu... ], %d) = %d (addr %s)\n",
rqstp->rq_sock, xdr->head[0].iov_base, xdr->head[0].iov_len, xdr->len, len, rqstp->rq_sock, xdr->head[0].iov_base, xdr->head[0].iov_len,
rqstp->rq_addr.sin_addr.s_addr); xdr->len, len, svc_print_addr(rqstp, buf, sizeof(buf)));
return len; return len;
} }
...@@ -878,6 +915,7 @@ svc_tcp_accept(struct svc_sock *svsk) ...@@ -878,6 +915,7 @@ svc_tcp_accept(struct svc_sock *svsk)
struct socket *newsock; struct socket *newsock;
struct svc_sock *newsvsk; struct svc_sock *newsvsk;
int err, slen; int err, slen;
char buf[RPC_MAX_ADDRBUFLEN];
dprintk("svc: tcp_accept %p sock %p\n", svsk, sock); dprintk("svc: tcp_accept %p sock %p\n", svsk, sock);
if (!sock) if (!sock)
...@@ -908,18 +946,19 @@ svc_tcp_accept(struct svc_sock *svsk) ...@@ -908,18 +946,19 @@ svc_tcp_accept(struct svc_sock *svsk)
} }
/* Ideally, we would want to reject connections from unauthorized /* Ideally, we would want to reject connections from unauthorized
* hosts here, but when we get encription, the IP of the host won't * hosts here, but when we get encryption, the IP of the host won't
* tell us anything. For now just warn about unpriv connections. * tell us anything. For now just warn about unpriv connections.
*/ */
if (ntohs(sin.sin_port) >= 1024) { if (ntohs(sin.sin_port) >= 1024) {
dprintk(KERN_WARNING dprintk(KERN_WARNING
"%s: connect from unprivileged port: %u.%u.%u.%u:%d\n", "%s: connect from unprivileged port: %s\n",
serv->sv_name, serv->sv_name,
NIPQUAD(sin.sin_addr.s_addr), ntohs(sin.sin_port)); __svc_print_addr((struct sockaddr *) &sin, buf,
sizeof(buf)));
} }
dprintk("%s: connect from %s\n", serv->sv_name,
dprintk("%s: connect from %u.%u.%u.%u:%04x\n", serv->sv_name, __svc_print_addr((struct sockaddr *) &sin, buf,
NIPQUAD(sin.sin_addr.s_addr), ntohs(sin.sin_port)); sizeof(buf)));
/* make sure that a write doesn't block forever when /* make sure that a write doesn't block forever when
* low on memory * low on memory
...@@ -955,11 +994,9 @@ svc_tcp_accept(struct svc_sock *svsk) ...@@ -955,11 +994,9 @@ svc_tcp_accept(struct svc_sock *svsk)
"sockets, consider increasing the " "sockets, consider increasing the "
"number of nfsd threads\n", "number of nfsd threads\n",
serv->sv_name); serv->sv_name);
printk(KERN_NOTICE "%s: last TCP connect from " printk(KERN_NOTICE
"%u.%u.%u.%u:%d\n", "%s: last TCP connect from %s\n",
serv->sv_name, serv->sv_name, buf);
NIPQUAD(sin.sin_addr.s_addr),
ntohs(sin.sin_port));
} }
/* /*
* Always select the oldest socket. It's not fair, * Always select the oldest socket. It's not fair,
...@@ -1587,11 +1624,12 @@ static int svc_create_socket(struct svc_serv *serv, int protocol, ...@@ -1587,11 +1624,12 @@ static int svc_create_socket(struct svc_serv *serv, int protocol,
struct socket *sock; struct socket *sock;
int error; int error;
int type; int type;
char buf[RPC_MAX_ADDRBUFLEN];
dprintk("svc: svc_create_socket(%s, %d, %u.%u.%u.%u:%d)\n", dprintk("svc: svc_create_socket(%s, %d, %s)\n",
serv->sv_program->pg_name, protocol, serv->sv_program->pg_name, protocol,
NIPQUAD(sin->sin_addr.s_addr), __svc_print_addr((struct sockaddr *) sin, buf,
ntohs(sin->sin_port)); sizeof(buf)));
if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) { if (protocol != IPPROTO_UDP && protocol != IPPROTO_TCP) {
printk(KERN_WARNING "svc: only UDP and TCP " printk(KERN_WARNING "svc: only UDP and TCP "
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment