Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp789853ybe; Fri, 13 Sep 2019 06:25:51 -0700 (PDT) X-Google-Smtp-Source: APXvYqzwko60MbSmMmDcEWwIKpqHozUA1Y0ntds4t8XPMULhPAcAsKwXMwDc8x3JqUscsxjzqnl6 X-Received: by 2002:a50:e691:: with SMTP id z17mr47815635edm.84.1568381151288; Fri, 13 Sep 2019 06:25:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568381151; cv=none; d=google.com; s=arc-20160816; b=ejDXgcFqRUdwEVtMFei+xQSmW6L4o8yg93bvS0a01/3p90eGuKLSvvUe29lBnlJWsH 9T/J5dQls8uI6nh0RsHTklAtYXbcd7XoKAcemIRmMaXMkRFn0D7h1Y4JPpyR0g4JBSku 6WT1efjZsTRW1MJIrLOWcQU1PTi/3a3c38RbHuYV4MC1dNG1OSbc/fLvpef2okPKRAow RaTRtSLeCibxiqYuhOx4sEZozy6yCtOseCzUp2vYZmYOfgIgqAwaCPExv0TDnv1SJ57w qkGbqL21rXGCETr9MNNn81jIg4j6/86X9fuJWqkkBAN85l2O7Zhqbvv69lsH5Awx4S79 XOpw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=VhKFuPr+xPOMUBK/Uo1QLXp9aADTWUde0Zj4823EMcY=; b=QgfMjq7ivtlktcTGQ0E/09+TgIgt60ReT4pqtQFPfBkjtCkCWEr+9/00GC9660HRN7 U3CKAOlLGj5+ZOzz2eEkJSQ10mPBN6/L1cdDsqZUD3oSP4j3fSvEXaDDyfu0Wqb9APe1 r2tRnEU74gbEmie547OlEv7FairNp2+A5wmxSOf5ydZSDbfnPj1O5jyeRtH5tliJl5+0 TIYV0ZGcWLDIATOlAJ/7Y0PoWpRjlg/aWW8YrDNU74mhgqm+axfZam5MUA7Ittem9M3/ DXMhTg1bWkwlbgIKyR/D3CjgN5Sp+NnlGPkkxEYhYjgEuZEd8owdKwuXE23HBLwgU7ln lSBw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OYIuSF2h; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id qx16si14606412ejb.279.2019.09.13.06.25.25; Fri, 13 Sep 2019 06:25:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=OYIuSF2h; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390602AbfIMNUh (ORCPT + 99 others); Fri, 13 Sep 2019 09:20:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:49524 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389666AbfIMNUb (ORCPT ); Fri, 13 Sep 2019 09:20:31 -0400 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DA0F3214D8; Fri, 13 Sep 2019 13:20:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568380830; bh=VoqOr//yZFOicsBULwh4G3FSgIQORcRzufwM9JsAIrg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=OYIuSF2hziHE7vZWwEOZbl/pMIJ6Z8ync+jbiNVGix9VDGn4xtFwMJ7PiP7APsD5c OAqV/BqUh21v8t0KI+C/v3FXQ1ntCf5IQpd94L9b0BVWAa0CQk7wOWz31ci0G3SIPO D+Gxnta0KsQvnAqoZaGlb5AN4Y9OPNTdlzXDCNTE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bart Van Assche , Jason Gunthorpe , Sasha Levin Subject: [PATCH 4.19 160/190] RDMA/srp: Accept again source addresses that do not have a port number Date: Fri, 13 Sep 2019 14:06:55 +0100 Message-Id: <20190913130612.699690892@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190913130559.669563815@linuxfoundation.org> References: <20190913130559.669563815@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit bcef5b7215681250c4bf8961dfe15e9e4fef97d0 ] The function srp_parse_in() is used both for parsing source address specifications and for target address specifications. Target addresses must have a port number. Having to specify a port number for source addresses is inconvenient. Make sure that srp_parse_in() supports again parsing addresses with no port number. Cc: Fixes: c62adb7def71 ("IB/srp: Fix IPv6 address parsing") Signed-off-by: Bart Van Assche Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/ulp/srp/ib_srp.c | 21 +++++++++++++++------ 1 file changed, 15 insertions(+), 6 deletions(-) diff --git a/drivers/infiniband/ulp/srp/ib_srp.c b/drivers/infiniband/ulp/srp/ib_srp.c index 9da30d88a615e..bc6a44a16445c 100644 --- a/drivers/infiniband/ulp/srp/ib_srp.c +++ b/drivers/infiniband/ulp/srp/ib_srp.c @@ -3404,13 +3404,14 @@ static const match_table_t srp_opt_tokens = { * @net: [in] Network namespace. * @sa: [out] Address family, IP address and port number. * @addr_port_str: [in] IP address and port number. + * @has_port: [out] Whether or not @addr_port_str includes a port number. * * Parse the following address formats: * - IPv4: :, e.g. 1.2.3.4:5. * - IPv6: \[\]:, e.g. [1::2:3%4]:5. */ static int srp_parse_in(struct net *net, struct sockaddr_storage *sa, - const char *addr_port_str) + const char *addr_port_str, bool *has_port) { char *addr_end, *addr = kstrdup(addr_port_str, GFP_KERNEL); char *port_str; @@ -3419,9 +3420,12 @@ static int srp_parse_in(struct net *net, struct sockaddr_storage *sa, if (!addr) return -ENOMEM; port_str = strrchr(addr, ':'); - if (!port_str) - return -EINVAL; - *port_str++ = '\0'; + if (port_str && strchr(port_str, ']')) + port_str = NULL; + if (port_str) + *port_str++ = '\0'; + if (has_port) + *has_port = port_str != NULL; ret = inet_pton_with_scope(net, AF_INET, addr, port_str, sa); if (ret && addr[0]) { addr_end = addr + strlen(addr) - 1; @@ -3443,6 +3447,7 @@ static int srp_parse_options(struct net *net, const char *buf, char *p; substring_t args[MAX_OPT_ARGS]; unsigned long long ull; + bool has_port; int opt_mask = 0; int token; int ret = -EINVAL; @@ -3541,7 +3546,8 @@ static int srp_parse_options(struct net *net, const char *buf, ret = -ENOMEM; goto out; } - ret = srp_parse_in(net, &target->rdma_cm.src.ss, p); + ret = srp_parse_in(net, &target->rdma_cm.src.ss, p, + NULL); if (ret < 0) { pr_warn("bad source parameter '%s'\n", p); kfree(p); @@ -3557,7 +3563,10 @@ static int srp_parse_options(struct net *net, const char *buf, ret = -ENOMEM; goto out; } - ret = srp_parse_in(net, &target->rdma_cm.dst.ss, p); + ret = srp_parse_in(net, &target->rdma_cm.dst.ss, p, + &has_port); + if (!has_port) + ret = -EINVAL; if (ret < 0) { pr_warn("bad dest parameter '%s'\n", p); kfree(p); -- 2.20.1