Re: [PATCH 1/2] CIFS: Simplify ipv*_connect functions into one (try #2)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 16 Nov 2010 13:17:55 -0500
Jeff Layton <jlayton@xxxxxxxxxx> wrote:

> On Tue, 16 Nov 2010 10:48:29 +0300
> Pavel Shilovsky <piastryyy@xxxxxxxxx> wrote:
> 
> > Make connect logic more ip-protocol independent. Also move RFC1001 stuff into
> > separate function.
> > 
> > Signed-off-by: Pavel Shilovsky <piastryyy@xxxxxxxxx>
> > ---
> >  fs/cifs/connect.c |  314 ++++++++++++++++++++---------------------------------
> >  1 files changed, 116 insertions(+), 198 deletions(-)
> > 
> > diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
> > index 251a17c..8bdf1cc 100644
> > --- a/fs/cifs/connect.c
> > +++ b/fs/cifs/connect.c
> > @@ -114,8 +114,8 @@ struct smb_vol {
> >  #define TLINK_ERROR_EXPIRE	(1 * HZ)
> >  #define TLINK_IDLE_EXPIRE	(600 * HZ)
> >  
> > -static int ipv4_connect(struct TCP_Server_Info *server);
> > -static int ipv6_connect(struct TCP_Server_Info *server);
> > +static int ip_connect(struct TCP_Server_Info *server);
> > +static int generic_ip_connect(struct TCP_Server_Info *server);
> >  static void tlink_rb_insert(struct rb_root *root, struct tcon_link *new_tlink);
> >  static void cifs_prune_tlinks(struct work_struct *work);
> >  
> > @@ -199,10 +199,10 @@ cifs_reconnect(struct TCP_Server_Info *server)
> >  	while ((server->tcpStatus != CifsExiting) &&
> >  	       (server->tcpStatus != CifsGood)) {
> >  		try_to_freeze();
> > -		if (server->addr.sockAddr6.sin6_family == AF_INET6)
> > -			rc = ipv6_connect(server);
> > -		else
> > -			rc = ipv4_connect(server);
> > +
> > +		/* on reconnect we should try only the port we connected
> > +		   before */
> > +		rc = generic_ip_connect(server);
> >  		if (rc) {
> >  			cFYI(1, "reconnect error %d", rc);
> >  			msleep(3000);
> > @@ -1668,12 +1668,11 @@ cifs_get_tcp_session(struct smb_vol *volume_info)
> >  		/* other OS never observed in Wild doing 139 with v6 */
> >  		memcpy(&tcp_ses->addr.sockAddr6, sin_server6,
> >  			sizeof(struct sockaddr_in6));
> > -		rc = ipv6_connect(tcp_ses);
> > -	} else {
> > +	} else
> >  		memcpy(&tcp_ses->addr.sockAddr, sin_server,
> >  			sizeof(struct sockaddr_in));
> > -		rc = ipv4_connect(tcp_ses);
> > -	}
> > +
> > +	rc = ip_connect(tcp_ses);
> >  	if (rc < 0) {
> >  		cERROR(1, "Error connecting to socket. Aborting operation");
> >  		goto out_err_crypto_release;
> > @@ -2121,19 +2120,97 @@ bind_socket(struct TCP_Server_Info *server)
> >  }
> >  
> >  static int
> > -ipv4_connect(struct TCP_Server_Info *server)
> > +ip_rfc1001_connect(struct TCP_Server_Info *server)
> > +{
> > +	int rc = 0;
> > +	/* some servers require RFC1001 sessinit before sending
> > +	negprot - BB check reconnection in case where second
> > +	sessinit is sent but no second negprot */
> > +	struct rfc1002_session_packet *ses_init_buf;
> > +	struct smb_hdr *smb_buf;
> > +	ses_init_buf = kzalloc(sizeof(struct rfc1002_session_packet),
> > +			       GFP_KERNEL);
> > +	if (ses_init_buf) {
> > +		ses_init_buf->trailer.session_req.called_len = 32;
> > +
> > +		if (server->server_RFC1001_name &&
> > +		    server->server_RFC1001_name[0] != 0)
> > +			rfc1002mangle(ses_init_buf->trailer.
> > +				      session_req.called_name,
> > +				      server->server_RFC1001_name,
> > +				      RFC1001_NAME_LEN_WITH_NULL);
> > +		else
> > +			rfc1002mangle(ses_init_buf->trailer.
> > +				      session_req.called_name,
> > +				      DEFAULT_CIFS_CALLED_NAME,
> > +				      RFC1001_NAME_LEN_WITH_NULL);
> > +
> > +		ses_init_buf->trailer.session_req.calling_len = 32;
> > +
> > +		/* calling name ends in null (byte 16) from old smb
> > +		convention. */
> > +		if (server->workstation_RFC1001_name &&
> > +		    server->workstation_RFC1001_name[0] != 0)
> > +			rfc1002mangle(ses_init_buf->trailer.
> > +				      session_req.calling_name,
> > +				      server->workstation_RFC1001_name,
> > +				      RFC1001_NAME_LEN_WITH_NULL);
> > +		else
> > +			rfc1002mangle(ses_init_buf->trailer.
> > +				      session_req.calling_name,
> > +				      "LINUX_CIFS_CLNT",
> > +				      RFC1001_NAME_LEN_WITH_NULL);
> > +
> > +		ses_init_buf->trailer.session_req.scope1 = 0;
> > +		ses_init_buf->trailer.session_req.scope2 = 0;
> > +		smb_buf = (struct smb_hdr *)ses_init_buf;
> > +
> > +		/* sizeof RFC1002_SESSION_REQUEST with no scope */
> > +		smb_buf->smb_buf_length = 0x81000044;
> > +		rc = smb_send(server, smb_buf, 0x44);
> > +		kfree(ses_init_buf);
> > +		msleep(1); /* RFC1001 layer in at least one server
> > +			      requires very short break before negprot
> > +			      presumably because not expecting negprot
> > +			      to follow so fast.  This is a simple
> > +			      solution that works without
> > +			      complicating the code and causes no
> > +			      significant slowing down on mount
> > +			      for everyone else */
> > +	}
> > +	/* else the negprot may still work without this
> > +	even though malloc failed */
> > +
> > +	return rc;
> > +}
> > +
> > +static int
> > +generic_ip_connect(struct TCP_Server_Info *server)
> >  {
> >  	int rc = 0;
> > -	int val;
> > -	bool connected = false;
> > -	__be16 orig_port = 0;
> > +	bool using_ipv6 = false;
> > +	unsigned short int *sport;
> > +	int slen;
> >  	struct socket *socket = server->ssocket;
> > +	struct sockaddr *saddr;
> > +
> > +	if (server->addr.sockAddr6.sin6_family == AF_INET6) {
> > +		sport = &server->addr.sockAddr6.sin6_port;
> > +		using_ipv6 = true;
> > +		slen = sizeof(struct sockaddr_in6);
> > +		saddr = (struct sockaddr *) &server->addr.sockAddr6;
> > +	} else {
> > +		sport = &server->addr.sockAddr.sin_port;
> > +		slen = sizeof(struct sockaddr_in);
> > +		saddr = (struct sockaddr *) &server->addr.sockAddr;
> > +	}
> >  
> >  	if (socket == NULL) {
> >  		rc = sock_create_kern(PF_INET, SOCK_STREAM,
> >  				      IPPROTO_TCP, &socket);
> >  		if (rc < 0) {
> >  			cERROR(1, "Error %d creating socket", rc);
> > +			server->ssocket = NULL;
> >  			return rc;
> >  		}
> >  
> > @@ -2141,59 +2218,24 @@ ipv4_connect(struct TCP_Server_Info *server)
> >  		cFYI(1, "Socket created");
> >  		server->ssocket = socket;
> >  		socket->sk->sk_allocation = GFP_NOFS;
> > -		cifs_reclassify_socket4(socket);
> > +		if (using_ipv6)
> > +			cifs_reclassify_socket6(socket);
> > +		else
> > +			cifs_reclassify_socket4(socket);
> >  	}
> >  
> >  	rc = bind_socket(server);
> >  	if (rc < 0)
> >  		return rc;
> >  
> > -	/* user overrode default port */
> > -	if (server->addr.sockAddr.sin_port) {
> > -		rc = socket->ops->connect(socket, (struct sockaddr *)
> > -					  &server->addr.sockAddr,
> > -					  sizeof(struct sockaddr_in), 0);
> > -		if (rc >= 0)
> > -			connected = true;
> > -	}
> > -
> > -	if (!connected) {
> > -		/* save original port so we can retry user specified port
> > -			later if fall back ports fail this time  */
> > -		orig_port = server->addr.sockAddr.sin_port;
> > -
> > -		/* do not retry on the same port we just failed on */
> > -		if (server->addr.sockAddr.sin_port != htons(CIFS_PORT)) {
> > -			server->addr.sockAddr.sin_port = htons(CIFS_PORT);
> > -			rc = socket->ops->connect(socket,
> > -						(struct sockaddr *)
> > -						&server->addr.sockAddr,
> > -						sizeof(struct sockaddr_in), 0);
> > -			if (rc >= 0)
> > -				connected = true;
> > -		}
> > -	}
> > -	if (!connected) {
> > -		server->addr.sockAddr.sin_port = htons(RFC1001_PORT);
> > -		rc = socket->ops->connect(socket, (struct sockaddr *)
> > -					      &server->addr.sockAddr,
> > -					      sizeof(struct sockaddr_in), 0);
> > -		if (rc >= 0)
> > -			connected = true;
> > -	}
> > -
> > -	/* give up here - unless we want to retry on different
> > -		protocol families some day */
> > -	if (!connected) {
> > -		if (orig_port)
> > -			server->addr.sockAddr.sin_port = orig_port;
> > -		cFYI(1, "Error %d connecting to server via ipv4", rc);
> > +	rc = socket->ops->connect(socket, saddr, slen, 0);
> > +	if (rc < 0) {
> > +		cFYI(1, "Error %d connecting to server", rc);
> >  		sock_release(socket);
> >  		server->ssocket = NULL;
> >  		return rc;
> >  	}
> >  
> > -
> >  	/*
> >  	 * Eventually check for other socket options to change from
> >  	 *  the default. sock_setsockopt not used because it expects
> > @@ -2211,7 +2253,7 @@ ipv4_connect(struct TCP_Server_Info *server)
> >  	}
> >  
> >  	if (server->tcp_nodelay) {
> > -		val = 1;
> > +		int val = 1;
> >  		rc = kernel_setsockopt(socket, SOL_TCP, TCP_NODELAY,
> >  				(char *)&val, sizeof(val));
> >  		if (rc)
> > @@ -2222,161 +2264,37 @@ ipv4_connect(struct TCP_Server_Info *server)
> >  		 socket->sk->sk_sndbuf,
> >  		 socket->sk->sk_rcvbuf, socket->sk->sk_rcvtimeo);
> >  
> > -	/* send RFC1001 sessinit */
> > -	if (server->addr.sockAddr.sin_port == htons(RFC1001_PORT)) {
> > -		/* some servers require RFC1001 sessinit before sending
> > -		negprot - BB check reconnection in case where second
> > -		sessinit is sent but no second negprot */
> > -		struct rfc1002_session_packet *ses_init_buf;
> > -		struct smb_hdr *smb_buf;
> > -		ses_init_buf = kzalloc(sizeof(struct rfc1002_session_packet),
> > -				       GFP_KERNEL);
> > -		if (ses_init_buf) {
> > -			ses_init_buf->trailer.session_req.called_len = 32;
> > -			if (server->server_RFC1001_name &&
> > -			    server->server_RFC1001_name[0] != 0)
> > -				rfc1002mangle(ses_init_buf->trailer.
> > -						session_req.called_name,
> > -					      server->server_RFC1001_name,
> > -					      RFC1001_NAME_LEN_WITH_NULL);
> > -			else
> > -				rfc1002mangle(ses_init_buf->trailer.
> > -						session_req.called_name,
> > -					      DEFAULT_CIFS_CALLED_NAME,
> > -					      RFC1001_NAME_LEN_WITH_NULL);
> > -
> > -			ses_init_buf->trailer.session_req.calling_len = 32;
> > -
> > -			/* calling name ends in null (byte 16) from old smb
> > -			convention. */
> > -			if (server->workstation_RFC1001_name &&
> > -			    server->workstation_RFC1001_name[0] != 0)
> > -				rfc1002mangle(ses_init_buf->trailer.
> > -						session_req.calling_name,
> > -					      server->workstation_RFC1001_name,
> > -					      RFC1001_NAME_LEN_WITH_NULL);
> > -			else
> > -				rfc1002mangle(ses_init_buf->trailer.
> > -						session_req.calling_name,
> > -					      "LINUX_CIFS_CLNT",
> > -					      RFC1001_NAME_LEN_WITH_NULL);
> > -
> > -			ses_init_buf->trailer.session_req.scope1 = 0;
> > -			ses_init_buf->trailer.session_req.scope2 = 0;
> > -			smb_buf = (struct smb_hdr *)ses_init_buf;
> > -			/* sizeof RFC1002_SESSION_REQUEST with no scope */
> > -			smb_buf->smb_buf_length = 0x81000044;
> > -			rc = smb_send(server, smb_buf, 0x44);
> > -			kfree(ses_init_buf);
> > -			msleep(1); /* RFC1001 layer in at least one server
> > -				      requires very short break before negprot
> > -				      presumably because not expecting negprot
> > -				      to follow so fast.  This is a simple
> > -				      solution that works without
> > -				      complicating the code and causes no
> > -				      significant slowing down on mount
> > -				      for everyone else */
> > -		}
> > -		/* else the negprot may still work without this
> > -		even though malloc failed */
> > -
> > -	}
> > +	if (*sport == htons(RFC1001_PORT))
> > +		rc = ip_rfc1001_connect(server);
> >  
> >  	return rc;
> >  }
> >  
> >  static int
> > -ipv6_connect(struct TCP_Server_Info *server)
> > +ip_connect(struct TCP_Server_Info *server)
> >  {
> > -	int rc = 0;
> > -	int val;
> > -	bool connected = false;
> > -	__be16 orig_port = 0;
> > -	struct socket *socket = server->ssocket;
> > +	unsigned short int *sport;
> >  
> > -	if (socket == NULL) {
> > -		rc = sock_create_kern(PF_INET6, SOCK_STREAM,
> > -				      IPPROTO_TCP, &socket);
> > -		if (rc < 0) {
> > -			cERROR(1, "Error %d creating ipv6 socket", rc);
> > -			socket = NULL;
> > -			return rc;
> > -		}
> > +	if (server->addr.sockAddr6.sin6_family == AF_INET6)
> > +		sport = &server->addr.sockAddr6.sin6_port;
> > +	else
> > +		sport = &server->addr.sockAddr.sin_port;
> >  
> > -		/* BB other socket options to set KEEPALIVE, NODELAY? */
> > -		cFYI(1, "ipv6 Socket created");
> > -		server->ssocket = socket;
> > -		socket->sk->sk_allocation = GFP_NOFS;
> > -		cifs_reclassify_socket6(socket);
> > -	}
> > +	if (*sport == 0) {
> > +		int rc;
> >  
> > -	rc = bind_socket(server);
> > -	if (rc < 0)
> > -		return rc;
> > +		/* try with 445 port at first */
> > +		*sport = htons(CIFS_PORT);
> >  
> > -	/* user overrode default port */
> > -	if (server->addr.sockAddr6.sin6_port) {
> > -		rc = socket->ops->connect(socket,
> > -				(struct sockaddr *) &server->addr.sockAddr6,
> > -				sizeof(struct sockaddr_in6), 0);
> > +		rc = generic_ip_connect(server);
> >  		if (rc >= 0)
> > -			connected = true;
> > -	}
> > -
> > -	if (!connected) {
> > -		/* save original port so we can retry user specified port
> > -			later if fall back ports fail this time  */
> > -
> > -		orig_port = server->addr.sockAddr6.sin6_port;
> > -		/* do not retry on the same port we just failed on */
> > -		if (server->addr.sockAddr6.sin6_port != htons(CIFS_PORT)) {
> > -			server->addr.sockAddr6.sin6_port = htons(CIFS_PORT);
> > -			rc = socket->ops->connect(socket, (struct sockaddr *)
> > -					&server->addr.sockAddr6,
> > -					sizeof(struct sockaddr_in6), 0);
> > -			if (rc >= 0)
> > -				connected = true;
> > -		}
> > -	}
> > -	if (!connected) {
> > -		server->addr.sockAddr6.sin6_port = htons(RFC1001_PORT);
> > -		rc = socket->ops->connect(socket, (struct sockaddr *)
> > -				&server->addr.sockAddr6,
> > -				sizeof(struct sockaddr_in6), 0);
> > -		if (rc >= 0)
> > -			connected = true;
> > -	}
> > -
> > -	/* give up here - unless we want to retry on different
> > -		protocol families some day */
> > -	if (!connected) {
> > -		if (orig_port)
> > -			server->addr.sockAddr6.sin6_port = orig_port;
> > -		cFYI(1, "Error %d connecting to server via ipv6", rc);
> > -		sock_release(socket);
> > -		server->ssocket = NULL;
> > -		return rc;
> > -	}
> > -
> > -	/*
> > -	 * Eventually check for other socket options to change from
> > -	 * the default. sock_setsockopt not used because it expects
> > -	 * user space buffer
> > -	 */
> > -	socket->sk->sk_rcvtimeo = 7 * HZ;
> > -	socket->sk->sk_sndtimeo = 5 * HZ;
> > +			return rc;
> >  
> > -	if (server->tcp_nodelay) {
> > -		val = 1;
> > -		rc = kernel_setsockopt(socket, SOL_TCP, TCP_NODELAY,
> > -				(char *)&val, sizeof(val));
> > -		if (rc)
> > -			cFYI(1, "set TCP_NODELAY socket option error %d", rc);
> > +		/* if it failed, try with 139 port */
> > +		*sport = htons(RFC1001_PORT);
> >  	}
> >  
> > -	server->ssocket = socket;
> > -
> > -	return rc;
> > +	return generic_ip_connect(server);
> >  }
> >  
> >  void reset_cifs_unix_caps(int xid, struct cifsTconInfo *tcon,
> 
> Nice cleanup.
> 
> Reviewed-by: Jeff Layton <jlayton@xxxxxxxxxx>

Actually...my ACK on this still stands if you don't want to do it, but
there is a "nice to have" change that could go with this.

It would be nice if we didn't have this goofy "addr" union in the
TCP_Server_Info, and just had a standard sockaddr_storage embedded
inside it instead. It would mean quite a bit less conditional code, I
think...

You're already touching about half the code that would be affected by
such a change with this patch. Care to do the rest?

-- 
Jeff Layton <jlayton@xxxxxxxxxx>
--
To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux