[PATCH] knfsd: ratelimit some nfsd messages that are triggered by external events
Also remove {NFSD,RPC}_PARANOIA as having the defines doesn't really add anything. The printks covered by RPC_PARANOIA were triggered by badly formatted packets and so should be ratelimited. Signed-off-by: Neil Brown <neilb@suse.de> Signed-off-by: Andrew Morton <akpm@osdl.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
This commit is contained in:
committed by
Linus Torvalds
parent
d019bcf0eb
commit
34e9a63b4f
@@ -1062,15 +1062,19 @@ svc_tcp_recvfrom(struct svc_rqst *rqstp)
|
||||
* bit set in the fragment length header.
|
||||
* But apparently no known nfs clients send fragmented
|
||||
* records. */
|
||||
printk(KERN_NOTICE "RPC: bad TCP reclen 0x%08lx (non-terminal)\n",
|
||||
(unsigned long) svsk->sk_reclen);
|
||||
if (net_ratelimit())
|
||||
printk(KERN_NOTICE "RPC: bad TCP reclen 0x%08lx"
|
||||
" (non-terminal)\n",
|
||||
(unsigned long) svsk->sk_reclen);
|
||||
goto err_delete;
|
||||
}
|
||||
svsk->sk_reclen &= 0x7fffffff;
|
||||
dprintk("svc: TCP record, %d bytes\n", svsk->sk_reclen);
|
||||
if (svsk->sk_reclen > serv->sv_max_mesg) {
|
||||
printk(KERN_NOTICE "RPC: bad TCP reclen 0x%08lx (large)\n",
|
||||
(unsigned long) svsk->sk_reclen);
|
||||
if (net_ratelimit())
|
||||
printk(KERN_NOTICE "RPC: bad TCP reclen 0x%08lx"
|
||||
" (large)\n",
|
||||
(unsigned long) svsk->sk_reclen);
|
||||
goto err_delete;
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user