Commit a9f1b85e authored by Pavel Shilovsky's avatar Pavel Shilovsky Committed by Steve French

CIFS: Simplify ipv*_connect functions into one (try #4)

Make connect logic more ip-protocol independent and move RFC1001 stuff into
a separate function. Also replace union addr in TCP_Server_Info structure
with sockaddr_storage.
Signed-off-by: default avatarPavel Shilovsky <piastryyy@gmail.com>
Reviewed-and-Tested-by: default avatarJeff Layton <jlayton@samba.org>
Signed-off-by: default avatarSteve French <sfrench@us.ibm.com>
parent df8fbc24
...@@ -64,7 +64,9 @@ static uint16_t cifs_server_get_key(const void *cookie_netfs_data, ...@@ -64,7 +64,9 @@ static uint16_t cifs_server_get_key(const void *cookie_netfs_data,
void *buffer, uint16_t maxbuf) void *buffer, uint16_t maxbuf)
{ {
const struct TCP_Server_Info *server = cookie_netfs_data; const struct TCP_Server_Info *server = cookie_netfs_data;
const struct sockaddr *sa = (struct sockaddr *) &server->addr.sockAddr; const struct sockaddr *sa = (struct sockaddr *) &server->dstaddr;
const struct sockaddr_in *addr = (struct sockaddr_in *) sa;
const struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *) sa;
struct cifs_server_key *key = buffer; struct cifs_server_key *key = buffer;
uint16_t key_len = sizeof(struct cifs_server_key); uint16_t key_len = sizeof(struct cifs_server_key);
...@@ -76,16 +78,16 @@ static uint16_t cifs_server_get_key(const void *cookie_netfs_data, ...@@ -76,16 +78,16 @@ static uint16_t cifs_server_get_key(const void *cookie_netfs_data,
*/ */
switch (sa->sa_family) { switch (sa->sa_family) {
case AF_INET: case AF_INET:
key->family = server->addr.sockAddr.sin_family; key->family = sa->sa_family;
key->port = server->addr.sockAddr.sin_port; key->port = addr->sin_port;
key->addr[0].ipv4_addr = server->addr.sockAddr.sin_addr; key->addr[0].ipv4_addr = addr->sin_addr;
key_len += sizeof(key->addr[0].ipv4_addr); key_len += sizeof(key->addr[0].ipv4_addr);
break; break;
case AF_INET6: case AF_INET6:
key->family = server->addr.sockAddr6.sin6_family; key->family = sa->sa_family;
key->port = server->addr.sockAddr6.sin6_port; key->port = addr6->sin6_port;
key->addr[0].ipv6_addr = server->addr.sockAddr6.sin6_addr; key->addr[0].ipv6_addr = addr6->sin6_addr;
key_len += sizeof(key->addr[0].ipv6_addr); key_len += sizeof(key->addr[0].ipv6_addr);
break; break;
......
...@@ -98,6 +98,8 @@ struct key * ...@@ -98,6 +98,8 @@ struct key *
cifs_get_spnego_key(struct cifsSesInfo *sesInfo) cifs_get_spnego_key(struct cifsSesInfo *sesInfo)
{ {
struct TCP_Server_Info *server = sesInfo->server; struct TCP_Server_Info *server = sesInfo->server;
struct sockaddr_in *sa = (struct sockaddr_in *) &server->dstaddr;
struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *) &server->dstaddr;
char *description, *dp; char *description, *dp;
size_t desc_len; size_t desc_len;
struct key *spnego_key; struct key *spnego_key;
...@@ -127,10 +129,10 @@ cifs_get_spnego_key(struct cifsSesInfo *sesInfo) ...@@ -127,10 +129,10 @@ cifs_get_spnego_key(struct cifsSesInfo *sesInfo)
dp = description + strlen(description); dp = description + strlen(description);
/* add the server address */ /* add the server address */
if (server->addr.sockAddr.sin_family == AF_INET) if (server->dstaddr.ss_family == AF_INET)
sprintf(dp, "ip4=%pI4", &server->addr.sockAddr.sin_addr); sprintf(dp, "ip4=%pI4", &sa->sin_addr);
else if (server->addr.sockAddr.sin_family == AF_INET6) else if (server->dstaddr.ss_family == AF_INET6)
sprintf(dp, "ip6=%pI6", &server->addr.sockAddr6.sin6_addr); sprintf(dp, "ip6=%pI6", &sa6->sin6_addr);
else else
goto out; goto out;
......
...@@ -351,18 +351,19 @@ cifs_evict_inode(struct inode *inode) ...@@ -351,18 +351,19 @@ cifs_evict_inode(struct inode *inode)
static void static void
cifs_show_address(struct seq_file *s, struct TCP_Server_Info *server) cifs_show_address(struct seq_file *s, struct TCP_Server_Info *server)
{ {
struct sockaddr_in *sa = (struct sockaddr_in *) &server->dstaddr;
struct sockaddr_in6 *sa6 = (struct sockaddr_in6 *) &server->dstaddr;
seq_printf(s, ",addr="); seq_printf(s, ",addr=");
switch (server->addr.sockAddr.sin_family) { switch (server->dstaddr.ss_family) {
case AF_INET: case AF_INET:
seq_printf(s, "%pI4", &server->addr.sockAddr.sin_addr.s_addr); seq_printf(s, "%pI4", &sa->sin_addr.s_addr);
break; break;
case AF_INET6: case AF_INET6:
seq_printf(s, "%pI6", seq_printf(s, "%pI6", &sa6->sin6_addr.s6_addr);
&server->addr.sockAddr6.sin6_addr.s6_addr); if (sa6->sin6_scope_id)
if (server->addr.sockAddr6.sin6_scope_id) seq_printf(s, "%%%u", sa6->sin6_scope_id);
seq_printf(s, "%%%u",
server->addr.sockAddr6.sin6_scope_id);
break; break;
default: default:
seq_printf(s, "(unknown)"); seq_printf(s, "(unknown)");
......
...@@ -163,10 +163,7 @@ struct TCP_Server_Info { ...@@ -163,10 +163,7 @@ struct TCP_Server_Info {
char server_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL]; char server_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
char *hostname; /* hostname portion of UNC string */ char *hostname; /* hostname portion of UNC string */
struct socket *ssocket; struct socket *ssocket;
union { struct sockaddr_storage dstaddr;
struct sockaddr_in sockAddr;
struct sockaddr_in6 sockAddr6;
} addr;
struct sockaddr_storage srcaddr; /* locally bind to this IP */ struct sockaddr_storage srcaddr; /* locally bind to this IP */
wait_queue_head_t response_q; wait_queue_head_t response_q;
wait_queue_head_t request_q; /* if more than maxmpx to srvr must block*/ wait_queue_head_t request_q; /* if more than maxmpx to srvr must block*/
......
...@@ -115,8 +115,8 @@ struct smb_vol { ...@@ -115,8 +115,8 @@ struct smb_vol {
#define TLINK_ERROR_EXPIRE (1 * HZ) #define TLINK_ERROR_EXPIRE (1 * HZ)
#define TLINK_IDLE_EXPIRE (600 * HZ) #define TLINK_IDLE_EXPIRE (600 * HZ)
static int ipv4_connect(struct TCP_Server_Info *server); static int ip_connect(struct TCP_Server_Info *server);
static int ipv6_connect(struct TCP_Server_Info *server); static int generic_ip_connect(struct TCP_Server_Info *server);
static void tlink_rb_insert(struct rb_root *root, struct tcon_link *new_tlink); static void tlink_rb_insert(struct rb_root *root, struct tcon_link *new_tlink);
static void cifs_prune_tlinks(struct work_struct *work); static void cifs_prune_tlinks(struct work_struct *work);
...@@ -200,10 +200,9 @@ cifs_reconnect(struct TCP_Server_Info *server) ...@@ -200,10 +200,9 @@ cifs_reconnect(struct TCP_Server_Info *server)
while ((server->tcpStatus != CifsExiting) && while ((server->tcpStatus != CifsExiting) &&
(server->tcpStatus != CifsGood)) { (server->tcpStatus != CifsGood)) {
try_to_freeze(); try_to_freeze();
if (server->addr.sockAddr6.sin6_family == AF_INET6)
rc = ipv6_connect(server); /* we should try only the port we connected to before */
else rc = generic_ip_connect(server);
rc = ipv4_connect(server);
if (rc) { if (rc) {
cFYI(1, "reconnect error %d", rc); cFYI(1, "reconnect error %d", rc);
msleep(3000); msleep(3000);
...@@ -477,7 +476,7 @@ cifs_demultiplex_thread(struct TCP_Server_Info *server) ...@@ -477,7 +476,7 @@ cifs_demultiplex_thread(struct TCP_Server_Info *server)
* initialize frame) * initialize frame)
*/ */
cifs_set_port((struct sockaddr *) cifs_set_port((struct sockaddr *)
&server->addr.sockAddr, CIFS_PORT); &server->dstaddr, CIFS_PORT);
cifs_reconnect(server); cifs_reconnect(server);
csocket = server->ssocket; csocket = server->ssocket;
wake_up(&server->response_q); wake_up(&server->response_q);
...@@ -1459,30 +1458,37 @@ static bool ...@@ -1459,30 +1458,37 @@ static bool
match_address(struct TCP_Server_Info *server, struct sockaddr *addr, match_address(struct TCP_Server_Info *server, struct sockaddr *addr,
struct sockaddr *srcaddr) struct sockaddr *srcaddr)
{ {
switch (addr->sa_family) {
case AF_INET: {
struct sockaddr_in *addr4 = (struct sockaddr_in *)addr; struct sockaddr_in *addr4 = (struct sockaddr_in *)addr;
struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)addr; struct sockaddr_in *srv_addr4 =
(struct sockaddr_in *)&server->dstaddr;
switch (addr->sa_family) { if (addr4->sin_addr.s_addr != srv_addr4->sin_addr.s_addr)
case AF_INET:
if (addr4->sin_addr.s_addr !=
server->addr.sockAddr.sin_addr.s_addr)
return false; return false;
if (addr4->sin_port && if (addr4->sin_port && addr4->sin_port != srv_addr4->sin_port)
addr4->sin_port != server->addr.sockAddr.sin_port)
return false; return false;
break; break;
case AF_INET6: }
case AF_INET6: {
struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)addr;
struct sockaddr_in6 *srv_addr6 =
(struct sockaddr_in6 *)&server->dstaddr;
if (!ipv6_addr_equal(&addr6->sin6_addr, if (!ipv6_addr_equal(&addr6->sin6_addr,
&server->addr.sockAddr6.sin6_addr)) &srv_addr6->sin6_addr))
return false; return false;
if (addr6->sin6_scope_id != if (addr6->sin6_scope_id != srv_addr6->sin6_scope_id)
server->addr.sockAddr6.sin6_scope_id)
return false; return false;
if (addr6->sin6_port && if (addr6->sin6_port &&
addr6->sin6_port != server->addr.sockAddr6.sin6_port) addr6->sin6_port != srv_addr6->sin6_port)
return false; return false;
break; break;
} }
default:
WARN_ON(1);
return false; /* don't expect to be here */
}
if (!srcip_matches(srcaddr, (struct sockaddr *)&server->srcaddr)) if (!srcip_matches(srcaddr, (struct sockaddr *)&server->srcaddr))
return false; return false;
...@@ -1681,14 +1687,13 @@ cifs_get_tcp_session(struct smb_vol *volume_info) ...@@ -1681,14 +1687,13 @@ cifs_get_tcp_session(struct smb_vol *volume_info)
cFYI(1, "attempting ipv6 connect"); cFYI(1, "attempting ipv6 connect");
/* BB should we allow ipv6 on port 139? */ /* BB should we allow ipv6 on port 139? */
/* other OS never observed in Wild doing 139 with v6 */ /* other OS never observed in Wild doing 139 with v6 */
memcpy(&tcp_ses->addr.sockAddr6, sin_server6, memcpy(&tcp_ses->dstaddr, sin_server6,
sizeof(struct sockaddr_in6)); sizeof(struct sockaddr_in6));
rc = ipv6_connect(tcp_ses); } else
} else { memcpy(&tcp_ses->dstaddr, sin_server,
memcpy(&tcp_ses->addr.sockAddr, sin_server,
sizeof(struct sockaddr_in)); sizeof(struct sockaddr_in));
rc = ipv4_connect(tcp_ses);
} rc = ip_connect(tcp_ses);
if (rc < 0) { if (rc < 0) {
cERROR(1, "Error connecting to socket. Aborting operation"); cERROR(1, "Error connecting to socket. Aborting operation");
goto out_err_crypto_release; goto out_err_crypto_release;
...@@ -1793,6 +1798,8 @@ cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb_vol *volume_info) ...@@ -1793,6 +1798,8 @@ cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb_vol *volume_info)
{ {
int rc = -ENOMEM, xid; int rc = -ENOMEM, xid;
struct cifsSesInfo *ses; struct cifsSesInfo *ses;
struct sockaddr_in *addr = (struct sockaddr_in *)&server->dstaddr;
struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&server->dstaddr;
xid = GetXid(); xid = GetXid();
...@@ -1836,12 +1843,10 @@ cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb_vol *volume_info) ...@@ -1836,12 +1843,10 @@ cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb_vol *volume_info)
/* new SMB session uses our server ref */ /* new SMB session uses our server ref */
ses->server = server; ses->server = server;
if (server->addr.sockAddr6.sin6_family == AF_INET6) if (server->dstaddr.ss_family == AF_INET6)
sprintf(ses->serverName, "%pI6", sprintf(ses->serverName, "%pI6", &addr6->sin6_addr);
&server->addr.sockAddr6.sin6_addr);
else else
sprintf(ses->serverName, "%pI4", sprintf(ses->serverName, "%pI4", &addr->sin_addr);
&server->addr.sockAddr.sin_addr.s_addr);
if (volume_info->username) if (volume_info->username)
strncpy(ses->userName, volume_info->username, strncpy(ses->userName, volume_info->username,
...@@ -2136,118 +2141,21 @@ bind_socket(struct TCP_Server_Info *server) ...@@ -2136,118 +2141,21 @@ bind_socket(struct TCP_Server_Info *server)
} }
static int static int
ipv4_connect(struct TCP_Server_Info *server) ip_rfc1001_connect(struct TCP_Server_Info *server)
{ {
int rc = 0; int rc = 0;
int val;
bool connected = false;
__be16 orig_port = 0;
struct socket *socket = server->ssocket;
if (socket == NULL) {
rc = sock_create_kern(PF_INET, SOCK_STREAM,
IPPROTO_TCP, &socket);
if (rc < 0) {
cERROR(1, "Error %d creating socket", rc);
return rc;
}
/* BB other socket options to set KEEPALIVE, NODELAY? */
cFYI(1, "Socket created");
server->ssocket = socket;
socket->sk->sk_allocation = GFP_NOFS;
cifs_reclassify_socket4(socket);
}
rc = bind_socket(server);
if (rc < 0)
return rc;
/* user overrode default port */
if (server->addr.sockAddr.sin_port) {
rc = socket->ops->connect(socket, (struct sockaddr *)
&server->addr.sockAddr,
sizeof(struct sockaddr_in), 0);
if (rc >= 0)
connected = true;
}
if (!connected) {
/* save original port so we can retry user specified port
later if fall back ports fail this time */
orig_port = server->addr.sockAddr.sin_port;
/* do not retry on the same port we just failed on */
if (server->addr.sockAddr.sin_port != htons(CIFS_PORT)) {
server->addr.sockAddr.sin_port = htons(CIFS_PORT);
rc = socket->ops->connect(socket,
(struct sockaddr *)
&server->addr.sockAddr,
sizeof(struct sockaddr_in), 0);
if (rc >= 0)
connected = true;
}
}
if (!connected) {
server->addr.sockAddr.sin_port = htons(RFC1001_PORT);
rc = socket->ops->connect(socket, (struct sockaddr *)
&server->addr.sockAddr,
sizeof(struct sockaddr_in), 0);
if (rc >= 0)
connected = true;
}
/* give up here - unless we want to retry on different
protocol families some day */
if (!connected) {
if (orig_port)
server->addr.sockAddr.sin_port = orig_port;
cFYI(1, "Error %d connecting to server via ipv4", rc);
sock_release(socket);
server->ssocket = NULL;
return rc;
}
/* /*
* Eventually check for other socket options to change from * some servers require RFC1001 sessinit before sending
* the default. sock_setsockopt not used because it expects * negprot - BB check reconnection in case where second
* user space buffer * sessinit is sent but no second negprot
*/ */
socket->sk->sk_rcvtimeo = 7 * HZ;
socket->sk->sk_sndtimeo = 5 * HZ;
/* make the bufsizes depend on wsize/rsize and max requests */
if (server->noautotune) {
if (socket->sk->sk_sndbuf < (200 * 1024))
socket->sk->sk_sndbuf = 200 * 1024;
if (socket->sk->sk_rcvbuf < (140 * 1024))
socket->sk->sk_rcvbuf = 140 * 1024;
}
if (server->tcp_nodelay) {
val = 1;
rc = kernel_setsockopt(socket, SOL_TCP, TCP_NODELAY,
(char *)&val, sizeof(val));
if (rc)
cFYI(1, "set TCP_NODELAY socket option error %d", rc);
}
cFYI(1, "sndbuf %d rcvbuf %d rcvtimeo 0x%lx",
socket->sk->sk_sndbuf,
socket->sk->sk_rcvbuf, socket->sk->sk_rcvtimeo);
/* send RFC1001 sessinit */
if (server->addr.sockAddr.sin_port == htons(RFC1001_PORT)) {
/* some servers require RFC1001 sessinit before sending
negprot - BB check reconnection in case where second
sessinit is sent but no second negprot */
struct rfc1002_session_packet *ses_init_buf; struct rfc1002_session_packet *ses_init_buf;
struct smb_hdr *smb_buf; struct smb_hdr *smb_buf;
ses_init_buf = kzalloc(sizeof(struct rfc1002_session_packet), ses_init_buf = kzalloc(sizeof(struct rfc1002_session_packet),
GFP_KERNEL); GFP_KERNEL);
if (ses_init_buf) { if (ses_init_buf) {
ses_init_buf->trailer.session_req.called_len = 32; ses_init_buf->trailer.session_req.called_len = 32;
if (server->server_RFC1001_name && if (server->server_RFC1001_name &&
server->server_RFC1001_name[0] != 0) server->server_RFC1001_name[0] != 0)
rfc1002mangle(ses_init_buf->trailer. rfc1002mangle(ses_init_buf->trailer.
...@@ -2262,8 +2170,10 @@ ipv4_connect(struct TCP_Server_Info *server) ...@@ -2262,8 +2170,10 @@ ipv4_connect(struct TCP_Server_Info *server)
ses_init_buf->trailer.session_req.calling_len = 32; ses_init_buf->trailer.session_req.calling_len = 32;
/* calling name ends in null (byte 16) from old smb /*
convention. */ * calling name ends in null (byte 16) from old smb
* convention.
*/
if (server->workstation_RFC1001_name && if (server->workstation_RFC1001_name &&
server->workstation_RFC1001_name[0] != 0) server->workstation_RFC1001_name[0] != 0)
rfc1002mangle(ses_init_buf->trailer. rfc1002mangle(ses_init_buf->trailer.
...@@ -2279,95 +2189,78 @@ ipv4_connect(struct TCP_Server_Info *server) ...@@ -2279,95 +2189,78 @@ ipv4_connect(struct TCP_Server_Info *server)
ses_init_buf->trailer.session_req.scope1 = 0; ses_init_buf->trailer.session_req.scope1 = 0;
ses_init_buf->trailer.session_req.scope2 = 0; ses_init_buf->trailer.session_req.scope2 = 0;
smb_buf = (struct smb_hdr *)ses_init_buf; smb_buf = (struct smb_hdr *)ses_init_buf;
/* sizeof RFC1002_SESSION_REQUEST with no scope */ /* sizeof RFC1002_SESSION_REQUEST with no scope */
smb_buf->smb_buf_length = 0x81000044; smb_buf->smb_buf_length = 0x81000044;
rc = smb_send(server, smb_buf, 0x44); rc = smb_send(server, smb_buf, 0x44);
kfree(ses_init_buf); kfree(ses_init_buf);
msleep(1); /* RFC1001 layer in at least one server /*
requires very short break before negprot * RFC1001 layer in at least one server
presumably because not expecting negprot * requires very short break before negprot
to follow so fast. This is a simple * presumably because not expecting negprot
solution that works without * to follow so fast. This is a simple
complicating the code and causes no * solution that works without
significant slowing down on mount * complicating the code and causes no
for everyone else */ * significant slowing down on mount
} * for everyone else
/* else the negprot may still work without this */
even though malloc failed */ usleep_range(1000, 2000);
} }
/*
* else the negprot may still work without this
* even though malloc failed
*/
return rc; return rc;
} }
static int static int
ipv6_connect(struct TCP_Server_Info *server) generic_ip_connect(struct TCP_Server_Info *server)
{ {
int rc = 0; int rc = 0;
int val; unsigned short int sport;
bool connected = false; int slen, sfamily;
__be16 orig_port = 0;
struct socket *socket = server->ssocket; struct socket *socket = server->ssocket;
struct sockaddr *saddr;
saddr = (struct sockaddr *) &server->dstaddr;
if (server->dstaddr.ss_family == AF_INET6) {
sport = ((struct sockaddr_in6 *) saddr)->sin6_port;
slen = sizeof(struct sockaddr_in6);
sfamily = AF_INET6;
} else {
sport = ((struct sockaddr_in *) saddr)->sin_port;
slen = sizeof(struct sockaddr_in);
sfamily = AF_INET;
}
if (socket == NULL) { if (socket == NULL) {
rc = sock_create_kern(PF_INET6, SOCK_STREAM, rc = sock_create_kern(sfamily, SOCK_STREAM,
IPPROTO_TCP, &socket); IPPROTO_TCP, &socket);
if (rc < 0) { if (rc < 0) {
cERROR(1, "Error %d creating ipv6 socket", rc); cERROR(1, "Error %d creating socket", rc);
socket = NULL; server->ssocket = NULL;
return rc; return rc;
} }
/* BB other socket options to set KEEPALIVE, NODELAY? */ /* BB other socket options to set KEEPALIVE, NODELAY? */
cFYI(1, "ipv6 Socket created"); cFYI(1, "Socket created");
server->ssocket = socket; server->ssocket = socket;
socket->sk->sk_allocation = GFP_NOFS; socket->sk->sk_allocation = GFP_NOFS;
if (sfamily == AF_INET6)
cifs_reclassify_socket6(socket); cifs_reclassify_socket6(socket);
else
cifs_reclassify_socket4(socket);
} }
rc = bind_socket(server); rc = bind_socket(server);
if (rc < 0) if (rc < 0)
return rc; return rc;
/* user overrode default port */ rc = socket->ops->connect(socket, saddr, slen, 0);
if (server->addr.sockAddr6.sin6_port) { if (rc < 0) {
rc = socket->ops->connect(socket, cFYI(1, "Error %d connecting to server", rc);
(struct sockaddr *) &server->addr.sockAddr6,
sizeof(struct sockaddr_in6), 0);
if (rc >= 0)
connected = true;
}
if (!connected) {
/* save original port so we can retry user specified port
later if fall back ports fail this time */
orig_port = server->addr.sockAddr6.sin6_port;
/* do not retry on the same port we just failed on */
if (server->addr.sockAddr6.sin6_port != htons(CIFS_PORT)) {
server->addr.sockAddr6.sin6_port = htons(CIFS_PORT);
rc = socket->ops->connect(socket, (struct sockaddr *)
&server->addr.sockAddr6,
sizeof(struct sockaddr_in6), 0);
if (rc >= 0)
connected = true;
}
}
if (!connected) {
server->addr.sockAddr6.sin6_port = htons(RFC1001_PORT);
rc = socket->ops->connect(socket, (struct sockaddr *)
&server->addr.sockAddr6,
sizeof(struct sockaddr_in6), 0);
if (rc >= 0)
connected = true;
}
/* give up here - unless we want to retry on different
protocol families some day */
if (!connected) {
if (orig_port)
server->addr.sockAddr6.sin6_port = orig_port;
cFYI(1, "Error %d connecting to server via ipv6", rc);
sock_release(socket); sock_release(socket);
server->ssocket = NULL; server->ssocket = NULL;
return rc; return rc;
...@@ -2381,19 +2274,61 @@ ipv6_connect(struct TCP_Server_Info *server) ...@@ -2381,19 +2274,61 @@ ipv6_connect(struct TCP_Server_Info *server)
socket->sk->sk_rcvtimeo = 7 * HZ; socket->sk->sk_rcvtimeo = 7 * HZ;
socket->sk->sk_sndtimeo = 5 * HZ; socket->sk->sk_sndtimeo = 5 * HZ;
/* make the bufsizes depend on wsize/rsize and max requests */
if (server->noautotune) {
if (socket->sk->sk_sndbuf < (200 * 1024))
socket->sk->sk_sndbuf = 200 * 1024;
if (socket->sk->sk_rcvbuf < (140 * 1024))
socket->sk->sk_rcvbuf = 140 * 1024;
}
if (server->tcp_nodelay) { if (server->tcp_nodelay) {
val = 1; int val = 1;
rc = kernel_setsockopt(socket, SOL_TCP, TCP_NODELAY, rc = kernel_setsockopt(socket, SOL_TCP, TCP_NODELAY,
(char *)&val, sizeof(val)); (char *)&val, sizeof(val));
if (rc) if (rc)
cFYI(1, "set TCP_NODELAY socket option error %d", rc); cFYI(1, "set TCP_NODELAY socket option error %d", rc);
} }
server->ssocket = socket; cFYI(1, "sndbuf %d rcvbuf %d rcvtimeo 0x%lx",
socket->sk->sk_sndbuf,
socket->sk->sk_rcvbuf, socket->sk->sk_rcvtimeo);
if (sport == htons(RFC1001_PORT))
rc = ip_rfc1001_connect(server);
return rc; return rc;
} }
static int
ip_connect(struct TCP_Server_Info *server)
{
unsigned short int *sport;
struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&server->dstaddr;
struct sockaddr_in *addr = (struct sockaddr_in *)&server->dstaddr;
if (server->dstaddr.ss_family == AF_INET6)
sport = &addr6->sin6_port;
else
sport = &addr->sin_port;
if (*sport == 0) {
int rc;
/* try with 445 port at first */
*sport = htons(CIFS_PORT);
rc = generic_ip_connect(server);
if (rc >= 0)
return rc;
/* if it failed, try with 139 port */
*sport = htons(RFC1001_PORT);
}
return generic_ip_connect(server);
}
void reset_cifs_unix_caps(int xid, struct cifsTconInfo *tcon, void reset_cifs_unix_caps(int xid, struct cifsTconInfo *tcon,
struct super_block *sb, struct smb_vol *vol_info) struct super_block *sb, struct smb_vol *vol_info)
{ {
......
...@@ -119,7 +119,7 @@ smb_sendv(struct TCP_Server_Info *server, struct kvec *iov, int n_vec) ...@@ -119,7 +119,7 @@ smb_sendv(struct TCP_Server_Info *server, struct kvec *iov, int n_vec)
if (ssocket == NULL) if (ssocket == NULL)
return -ENOTSOCK; /* BB eventually add reconnect code here */ return -ENOTSOCK; /* BB eventually add reconnect code here */
smb_msg.msg_name = (struct sockaddr *) &server->addr.sockAddr; smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
smb_msg.msg_namelen = sizeof(struct sockaddr); smb_msg.msg_namelen = sizeof(struct sockaddr);
smb_msg.msg_control = NULL; smb_msg.msg_control = NULL;
smb_msg.msg_controllen = 0; smb_msg.msg_controllen = 0;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment