Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp1375978ybi; Wed, 17 Jul 2019 14:13:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqx19quNKG5Tq/AkwiDmm7wmdpwjKNnSi6J77Gx/9js6cYpAB7wsMCIpNpGdPhNzMgyOKwPU X-Received: by 2002:a63:6eca:: with SMTP id j193mr42676590pgc.74.1563398038151; Wed, 17 Jul 2019 14:13:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563398038; cv=none; d=google.com; s=arc-20160816; b=vBYzM5lQAdyx3W2Keuy7Vnty7/6eTGScMzqSB7TmXtYHy3+RLGWve1AtJlxwI+7zQ9 /+miJcWhLmqufA1iZ8diaF5biMw7YZ3wfcjyvXwcEz7S/KeE8KMeEMqguGe6JToytyl8 m4H3aueho9qv1SvPkgVG1N5eqRhCXIPGpfXk2M7gDG2X2QmnYCRWLqcnmafwvJc4Hdlv fYZADvmV7KxhptLid3eXBoFCSUnxgCTiTqG9acSz6n7unH7UN9PDZv50NUfFU6WMW/sS 9CuxGUJVWTbX68j0C81XyskSu+D1qxEIeL5X2eK92AlNetS5Atr2JPs/PECDvn/dgCZk aXkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:from:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:date; bh=QMdn+1niYT8mYc2fWywLNyv4FyDc705q4rSgaGZVh+4=; b=x5OW3ehl3L8yHaZOR6j1levv2kUDJGwWiXV/2YPz/CaDjkPPDYoXlRJiNEXErMGUWa IE2xfN1iiDc/CIajyLk/qXY8lSyT8SuXgeRCBM97f2Jr5x0qHc6GZ8nqYxDjH8GGXIgE g5SmSaf1IGrLlxQ+8MsIxSpemJJgCBuA6qzbHUPmhus9heXIT+IXK1huIJBMMIxsNf4L vwKGxwySr+0TDMhMeAt50uRPimNgwHXWnQJvPJyuZgCbsFgFXmjNRGUr4RPcw7Ga66mm vGUOz00ePmuni+G3JUUOKZTFxEOP6Rljii4z/D3ElJLC+14vcei13e1AvJklSTYFQNI+ MgoA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i18si263544pfa.23.2019.07.17.14.13.30; Wed, 17 Jul 2019 14:13:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727205AbfGQVNR (ORCPT + 99 others); Wed, 17 Jul 2019 17:13:17 -0400 Received: from fieldses.org ([173.255.197.46]:59344 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727184AbfGQVNR (ORCPT ); Wed, 17 Jul 2019 17:13:17 -0400 Received: by fieldses.org (Postfix, from userid 2815) id 0C8991E29; Wed, 17 Jul 2019 17:13:17 -0400 (EDT) Date: Wed, 17 Jul 2019 17:13:17 -0400 To: Olga Kornievskaia Cc: bfields@redhat.com, linux-nfs@vger.kernel.org Subject: Re: [PATCH v4 1/8] NFSD fill-in netloc4 structure Message-ID: <20190717211317.GM24608@fieldses.org> References: <20190708192352.12614-1-olga.kornievskaia@gmail.com> <20190708192352.12614-2-olga.kornievskaia@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190708192352.12614-2-olga.kornievskaia@gmail.com> User-Agent: Mutt/1.5.21 (2010-09-15) From: bfields@fieldses.org (J. Bruce Fields) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Mon, Jul 08, 2019 at 03:23:45PM -0400, Olga Kornievskaia wrote: > From: Olga Kornievskaia > > nfs.4 defines nfs42_netaddr structure that represents netloc4. > > Populate needed fields from the sockaddr structure. > > This will be used by flexfiles and 4.2 inter copy > > Signed-off-by: Olga Kornievskaia > --- > fs/nfsd/nfsd.h | 32 ++++++++++++++++++++++++++++++++ > 1 file changed, 32 insertions(+) > > diff --git a/fs/nfsd/nfsd.h b/fs/nfsd/nfsd.h > index 24187b5..8f4fc50 100644 > --- a/fs/nfsd/nfsd.h > +++ b/fs/nfsd/nfsd.h > @@ -19,6 +19,7 @@ > #include > #include > #include > +#include > > #include > > @@ -375,6 +376,37 @@ static inline bool nfsd4_spo_must_allow(struct svc_rqst *rqstp) > > extern const u32 nfsd_suppattrs[3][3]; > > +static inline u32 nfsd4_set_netaddr(struct sockaddr *addr, > + struct nfs42_netaddr *netaddr) > +{ > + struct sockaddr_in *sin = (struct sockaddr_in *)addr; > + struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)addr; > + unsigned int port; > + size_t ret_addr, ret_port; > + > + switch (addr->sa_family) { > + case AF_INET: > + port = ntohs(sin->sin_port); > + sprintf(netaddr->netid, "tcp"); > + netaddr->netid_len = 3; > + break; > + case AF_INET6: > + port = ntohs(sin6->sin6_port); > + sprintf(netaddr->netid, "tcp6"); > + netaddr->netid_len = 4; > + break; > + default: > + return nfserr_inval; > + } > + ret_addr = rpc_ntop(addr, netaddr->addr, sizeof(netaddr->addr)); > + ret_port = snprintf(netaddr->addr + ret_addr, > + RPCBIND_MAXUADDRLEN + 1 - ret_addr, > + ".%u.%u", port >> 8, port & 0xff); > + WARN_ON(ret_port >= RPCBIND_MAXUADDRLEN + 1 - ret_addr); > + netaddr->addr_len = ret_addr + ret_port; > + return 0; > +} Kinda surprised we don't already do something like this elsewhere, but I don't see anything exactly the same. Might be possible to put this in net/sunrpc/addr.c and share some code with rpc_sockaddr2uaddr? I'll leave it to you whether that looks worth it. --b. > + > static inline bool bmval_is_subset(const u32 *bm1, const u32 *bm2) > { > return !((bm1[0] & ~bm2[0]) || > -- > 1.8.3.1