diff mbox

CIFS: Simplify cifs_demultiplex_thread

Message ID 1307609933-5632-1-git-send-email-piastryyy@gmail.com (mailing list archive)
State New, archived
Headers show

Commit Message

Pavel Shilovsky June 9, 2011, 8:58 a.m. UTC
Move several code blocks to separate functions:
1) buffer allocations,
2) rfc1002 header check,
3) read whole smb message from socket,
4) find mid owner.

Signed-off-by: Pavel Shilovsky <piastry@gmail.com>
---
 fs/cifs/cifs_debug.c |    1 -
 fs/cifs/connect.c    |  440 ++++++++++++++++++++++++++++----------------------
 2 files changed, 247 insertions(+), 194 deletions(-)

Comments

Jeff Layton June 9, 2011, 11:54 a.m. UTC | #1
On Thu,  9 Jun 2011 12:58:52 +0400
Pavel Shilovsky <piastryyy@gmail.com> wrote:

> Move several code blocks to separate functions:
> 1) buffer allocations,
> 2) rfc1002 header check,
> 3) read whole smb message from socket,
> 4) find mid owner.
> 
> Signed-off-by: Pavel Shilovsky <piastry@gmail.com>
> ---
>  fs/cifs/cifs_debug.c |    1 -
>  fs/cifs/connect.c    |  440 ++++++++++++++++++++++++++++----------------------
>  2 files changed, 247 insertions(+), 194 deletions(-)
> 

Nice. This is long overdue.

That said, speaking from the experience of having to chase down subtle
bugs in this code before, I think this would be best done as a set of
patches so that we can potentially bisect in case this breaks
something. Maybe break out each function in a separate patch?

The main reason that I've not done this before is that the code doesn't
lend itself well to separate functions. You've "solved" that here with a
lot of pointer passing. That breaks up the code into separate functions
but doesn't really clean up the code. So let's consider this a good
starting point, but more work is really needed here.

> diff --git a/fs/cifs/cifs_debug.c b/fs/cifs/cifs_debug.c
> index 2fe3cf1..c4fc68a 100644
> --- a/fs/cifs/cifs_debug.c
> +++ b/fs/cifs/cifs_debug.c
> @@ -66,7 +66,6 @@ void cifs_dump_detail(struct smb_hdr *smb)
>  	cERROR(1, "smb buf %p len %d", smb, smbCalcSize(smb));
>  }
>  
> -
>  void cifs_dump_mids(struct TCP_Server_Info *server)
>  {
>  	struct list_head *tmp;
> diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
> index fb31c2c..23addcb 100644
> --- a/fs/cifs/connect.c
> +++ b/fs/cifs/connect.c
> @@ -317,24 +317,234 @@ requeue_echo:
>  	queue_delayed_work(system_nrt_wq, &server->echo, SMB_ECHO_INTERVAL);
>  }
>  
> +static struct mid_q_entry *
> +find_cifs_owner(struct TCP_Server_Info *server, struct smb_hdr *buf,
> +		int *length, bool isLargeBuf, bool *isMultiRsp, char **pbigbuf)

This function name seems a little odd. Would find_cifs_mid be better?

Usually when I see a lot of pointer argument passing like this in a
function, that's a red flag to me of a poor design. In this case,
that's not really your fault as this code was already a mess. So, I'm
ok with this in principle as it might make it easier to clean up this
code later.

While we're considering overhauling this code -- perhaps, long-term we
should move this to be a state machine?

> +{
> +	struct list_head *tmp, *tmp2;
> +	struct mid_q_entry *mid_entry = NULL;
> +
> +	spin_lock(&GlobalMid_Lock);
> +	list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
> +		mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
> +
> +		if (mid_entry->mid != buf->Mid ||
> +		    mid_entry->midState != MID_REQUEST_SUBMITTED ||
> +		    mid_entry->command != buf->Command) {
> +			mid_entry = NULL;
> +			continue;
> +		}
> +
> +		if (*length == 0 && check2ndT2(buf, server->maxBuf) > 0) {
> +			/* We have a multipart transact2 resp */
> +			*isMultiRsp = true;
> +			if (mid_entry->resp_buf) {
> +				/* merge response - fix up 1st*/
> +				*length = coalesce_t2(buf, mid_entry->resp_buf);
> +				if (*length > 0) {
> +					*length = 0;
> +					mid_entry->multiRsp = true;
> +					break;
> +				} else {
> +					/* all parts received or
> +					 * packet is malformed
> +					 */
> +					mid_entry->multiEnd = true;
> +					goto multi_t2_fnd;
> +				}
> +			} else {
> +				if (!isLargeBuf) {
> +					/*
> +					 * FIXME: switch to already
> +					 *        allocated largebuf?
> +					 */
> +					cERROR(1, "1st trans2 resp "
> +						  "needs bigbuf");
> +				} else {
> +					/* Have first buffer */
> +					mid_entry->resp_buf = buf;
> +					mid_entry->largeBuf = true;
> +					*pbigbuf = NULL;
> +				}
> +			}
> +			break;
> +		}
> +		mid_entry->resp_buf = buf;
> +		mid_entry->largeBuf = isLargeBuf;
> +multi_t2_fnd:
> +		if (*length == 0)
> +			mid_entry->midState = MID_RESPONSE_RECEIVED;
> +		else
> +			mid_entry->midState = MID_RESPONSE_MALFORMED;
> +#ifdef CONFIG_CIFS_STATS2
> +		mid_entry->when_received = jiffies;
> +#endif
> +		list_del_init(&mid_entry->qhead);
> +		break;
> +	}
> +	spin_unlock(&GlobalMid_Lock);
> +
> +	return mid_entry;
> +}
> +
> +static int
> +check_rfc1002_header(struct TCP_Server_Info *server, char *buf, int length,
> +		     unsigned int pdu_length, struct socket **psocket)

I don't think you really need psocket here. That should just be
server->ssocket. For that matter, pdu_length should be readable from
buf, and "length" is always going to be 4 anyway, right?

> +{
> +	char temp = *buf;
> +
> +	/*
> +	 * The first byte big endian of the length field,
> +	 * is actually not part of the length but the type
> +	 * with the most common, zero, as regular data.
> +	 */
> +	if (temp == (char) RFC1002_SESSION_KEEP_ALIVE) {
> +		return 1;
> +	} else if (temp == (char)RFC1002_POSITIVE_SESSION_RESPONSE) {
> +		cFYI(1, "Good RFC 1002 session rsp");
> +		return 1;
> +	} else if (temp == (char)RFC1002_NEGATIVE_SESSION_RESPONSE) {
> +		/* we get this from Windows 98 instead of
> +		   an error on SMB negprot response */
> +		cFYI(1, "Negative RFC1002 Session Response Error 0x%x)",
> +			pdu_length);
> +		/* give server a second to clean up  */
> +		msleep(1000);
> +		/* always try 445 first on reconnect since we get NACK
> +		 * on some if we ever connected to port 139 (the NACK
> +		 * is since we do not begin with RFC1001 session
> +		 * initialize frame)
> +		 */
> +		cifs_set_port((struct sockaddr *)
> +				&server->dstaddr, CIFS_PORT);
> +		cifs_reconnect(server);
> +		*psocket = server->ssocket;
> +		wake_up(&server->response_q);
> +		return 1;
> +	} else if (temp != (char) 0) {
> +		cERROR(1, "Unknown RFC 1002 frame");
> +		cifs_dump_mem(" Received Data: ", buf, length);
> +		cifs_reconnect(server);
> +		*psocket = server->ssocket;
> +		return 1;
> +	}
> +
> +	/* else we have an SMB response */
> +	if ((pdu_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) ||
> +	    (pdu_length < sizeof(struct smb_hdr) - 1 - 4)) {
> +		cERROR(1, "Invalid size SMB length %d pdu_length %d",
> +		       length, pdu_length+4);
> +		cifs_reconnect(server);
> +		*psocket = server->ssocket;
> +		wake_up(&server->response_q);
> +		return 1;
> +	}
> +
> +	return 0;
> +}
> +
> +static int
> +allocate_bufs(char **pbigbuf, char **psmallbuf, unsigned int size,
> +	      bool isLargeBuf)
   ^^^
nit: This can probably be a bool return.

> +{
> +	char *bigbuf = *pbigbuf, *smallbuf = *psmallbuf;
> +
> +	if (bigbuf == NULL) {
> +		bigbuf = (char *)cifs_buf_get();
> +		if (!bigbuf) {
> +			cERROR(1, "No memory for large SMB response");
> +			msleep(3000);
> +			/* retry will check if exiting */
> +			return 1;
> +		}
> +	} else if (isLargeBuf) {
> +		/* we are reusing a dirty large buf, clear its start */
> +		memset(bigbuf, 0, size);
> +	}
> +
> +	if (smallbuf == NULL) {
> +		smallbuf = (char *)cifs_small_buf_get();
> +		if (!smallbuf) {
> +			cERROR(1, "No memory for SMB response");
> +			msleep(1000);
> +			/* retry will check if exiting */
> +			return 1;
> +		}
> +		/* beginning of smb buffer is cleared in our buf_get */
> +	} else /* if existing small buf clear beginning */
> +		memset(smallbuf, 0, size);
> +
> +	*pbigbuf = bigbuf;
> +	*psmallbuf = smallbuf;
> +
> +	return 0;
> +}
> +
	^^^
The buffer handling could really stand to be redesigned, but splitting
it out into a separate function is a decent start.

> +static int
> +read_from_socket(struct TCP_Server_Info *server, unsigned int pdu_length,
> +		 struct socket **psocket, struct msghdr *smb_msg,
> +		 struct kvec *iov, unsigned int *ptotal_read)
> +{
> +	int length, rc = 0;
> +	unsigned int total_read;
> +
> +	for (total_read = 0; total_read < pdu_length;
> +	     total_read += length) {
> +		length = kernel_recvmsg(*psocket, smb_msg, iov, 1,
> +					pdu_length - total_read, 0);
> +		if (server->tcpStatus == CifsExiting) {
> +			/* then will exit */
> +			rc = 2;
> +			break;
> +		} else if (server->tcpStatus == CifsNeedReconnect) {
> +			cifs_reconnect(server);
> +			*psocket = server->ssocket;
> +			/* Reconnect wakes up rspns q */
> +			/* Now we will reread sock */
> +			rc = 1;
> +			break;
> +		} else if (length == -ERESTARTSYS ||
> +			   length == -EAGAIN ||
> +			   length == -EINTR) {
> +			/*
> +			 * Minimum sleep to prevent looping,
> +			 * allowing socket to clear and app
> +			 * threads to set tcpStatus
> +			 * CifsNeedReconnect if server hung.
> +			 */
> +			usleep_range(1000, 2000);
> +			length = 0;
> +			continue;
> +		} else if (length <= 0) {
> +			cERROR(1, "Received no data, expecting %d",
> +				      pdu_length - total_read);
> +			cifs_reconnect(server);
> +			*psocket = server->ssocket;
> +			rc = 1;
> +			break;
> +		}
> +	}
> +
> +	*ptotal_read = total_read;
> +	return 0;
> +}
> +
>  static int
>  cifs_demultiplex_thread(struct TCP_Server_Info *server)
>  {
>  	int length;
>  	unsigned int pdu_length, total_read;
> +	char *buf = NULL, *smallbuf = NULL, *bigbuf = NULL;
>  	struct smb_hdr *smb_buffer = NULL;
> -	struct smb_hdr *bigbuf = NULL;
> -	struct smb_hdr *smallbuf = NULL;
>  	struct msghdr smb_msg;
>  	struct kvec iov;
>  	struct socket *csocket = server->ssocket;
>  	struct list_head *tmp, *tmp2;
>  	struct task_struct *task_to_wake = NULL;
>  	struct mid_q_entry *mid_entry;
> -	char temp;
>  	bool isLargeBuf = false;
>  	bool isMultiRsp;
> -	int reconnect;
> +	int rc;
>  
>  	current->flags |= PF_MEMALLOC;
>  	cFYI(1, "Demultiplex PID: %d", task_pid_nr(current));
> @@ -348,35 +558,17 @@ cifs_demultiplex_thread(struct TCP_Server_Info *server)
>  	while (server->tcpStatus != CifsExiting) {
>  		if (try_to_freeze())
>  			continue;
> -		if (bigbuf == NULL) {
> -			bigbuf = cifs_buf_get();
> -			if (!bigbuf) {
> -				cERROR(1, "No memory for large SMB response");
> -				msleep(3000);
> -				/* retry will check if exiting */
> -				continue;
> -			}
> -		} else if (isLargeBuf) {
> -			/* we are reusing a dirty large buf, clear its start */
> -			memset(bigbuf, 0, sizeof(struct smb_hdr));
> -		}
>  
> -		if (smallbuf == NULL) {
> -			smallbuf = cifs_small_buf_get();
> -			if (!smallbuf) {
> -				cERROR(1, "No memory for SMB response");
> -				msleep(1000);
> -				/* retry will check if exiting */
> -				continue;
> -			}
> -			/* beginning of smb buffer is cleared in our buf_get */
> -		} else /* if existing small buf clear beginning */
> -			memset(smallbuf, 0, sizeof(struct smb_hdr));
> +		rc = allocate_bufs(&bigbuf, &smallbuf, sizeof(struct smb_hdr),
> +				   isLargeBuf);
> +		if (rc)
> +			continue;
>  
>  		isLargeBuf = false;
>  		isMultiRsp = false;
> -		smb_buffer = smallbuf;
> -		iov.iov_base = smb_buffer;
> +		smb_buffer = (struct smb_hdr *)smallbuf;
> +		buf = smallbuf;
> +		iov.iov_base = smallbuf;
>  		iov.iov_len = 4;
>  		smb_msg.msg_control = NULL;
>  		smb_msg.msg_controllen = 0;
> @@ -414,8 +606,7 @@ incomplete_rcv:
>  				allowing socket to clear and app threads to set
>  				tcpStatus CifsNeedReconnect if server hung */
>  			if (pdu_length < 4) {
> -				iov.iov_base = (4 - pdu_length) +
> -							(char *)smb_buffer;
> +				iov.iov_base = (4 - pdu_length) + buf;
>  				iov.iov_len = pdu_length;
>  				smb_msg.msg_control = NULL;
>  				smb_msg.msg_controllen = 0;

		Should the above code be using read_from_socket() as
		well? It would be nice if we had a single function that
		we always called to do reads off the socket and simply
		check the return value from that. That may be reasonable
		for a later patch.

> @@ -440,114 +631,42 @@ incomplete_rcv:
>  		/* The right amount was read from socket - 4 bytes */
>  		/* so we can now interpret the length field */
>  
> -		/* the first byte big endian of the length field,
> -		is actually not part of the length but the type
> -		with the most common, zero, as regular data */
> -		temp = *((char *) smb_buffer);
> -
> -		/* Note that FC 1001 length is big endian on the wire,
> -		but we convert it here so it is always manipulated
> -		as host byte order */
> +		/*
> +		 * Note that FC 1001 length is big endian on the wire,
			    ^^^
			nit: might as well add the missing "R" here
> +		 * but we convert it here so it is always manipulated
> +		 * as host byte order
> +		 */
>  		pdu_length = be32_to_cpu(smb_buffer->smb_buf_length);
> -
> -		cFYI(1, "rfc1002 length 0x%x", pdu_length+4);
> -
> -		if (temp == (char) RFC1002_SESSION_KEEP_ALIVE) {
> -			continue;
> -		} else if (temp == (char)RFC1002_POSITIVE_SESSION_RESPONSE) {
> -			cFYI(1, "Good RFC 1002 session rsp");
> -			continue;
> -		} else if (temp == (char)RFC1002_NEGATIVE_SESSION_RESPONSE) {
> -			/* we get this from Windows 98 instead of
> -			   an error on SMB negprot response */
> -			cFYI(1, "Negative RFC1002 Session Response Error 0x%x)",
> -				pdu_length);
> -			/* give server a second to clean up  */
> -			msleep(1000);
> -			/* always try 445 first on reconnect since we get NACK
> -			 * on some if we ever connected to port 139 (the NACK
> -			 * is since we do not begin with RFC1001 session
> -			 * initialize frame)
> -			 */
> -			cifs_set_port((struct sockaddr *)
> -					&server->dstaddr, CIFS_PORT);
> -			cifs_reconnect(server);
> -			csocket = server->ssocket;
> -			wake_up(&server->response_q);
> -			continue;
> -		} else if (temp != (char) 0) {
> -			cERROR(1, "Unknown RFC 1002 frame");
> -			cifs_dump_mem(" Received Data: ", (char *)smb_buffer,
> -				      length);
> -			cifs_reconnect(server);
> -			csocket = server->ssocket;
> -			continue;
> -		}
> -
> -		/* else we have an SMB response */
> -		if ((pdu_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) ||
> -			    (pdu_length < sizeof(struct smb_hdr) - 1 - 4)) {
> -			cERROR(1, "Invalid size SMB length %d pdu_length %d",
> -					length, pdu_length+4);
> -			cifs_reconnect(server);
> -			csocket = server->ssocket;
> -			wake_up(&server->response_q);
> +		rc = check_rfc1002_header(server, buf, length, pdu_length,
> +					  &csocket);
> +		if (rc)
>  			continue;
> -		}
>  
> -		/* else length ok */
> -		reconnect = 0;
> +		cFYI(1, "rfc1002 length 0x%x", pdu_length+4);
>  
>  		if (pdu_length > MAX_CIFS_SMALL_BUFFER_SIZE - 4) {
>  			isLargeBuf = true;
>  			memcpy(bigbuf, smallbuf, 4);
> -			smb_buffer = bigbuf;
> +			smb_buffer = (struct smb_hdr *)bigbuf;
> +			buf = bigbuf;
>  		}
> -		length = 0;
> -		iov.iov_base = 4 + (char *)smb_buffer;
> +
> +		iov.iov_base = 4 + buf;
>  		iov.iov_len = pdu_length;
> -		for (total_read = 0; total_read < pdu_length;
> -		     total_read += length) {
> -			length = kernel_recvmsg(csocket, &smb_msg, &iov, 1,
> -						pdu_length - total_read, 0);
> -			if (server->tcpStatus == CifsExiting) {
> -				/* then will exit */
> -				reconnect = 2;
> -				break;
> -			} else if (server->tcpStatus == CifsNeedReconnect) {
> -				cifs_reconnect(server);
> -				csocket = server->ssocket;
> -				/* Reconnect wakes up rspns q */
> -				/* Now we will reread sock */
> -				reconnect = 1;
> -				break;
> -			} else if (length == -ERESTARTSYS ||
> -				   length == -EAGAIN ||
> -				   length == -EINTR) {
> -				msleep(1); /* minimum sleep to prevent looping,
> -					      allowing socket to clear and app
> -					      threads to set tcpStatus
> -					      CifsNeedReconnect if server hung*/
> -				length = 0;
> -				continue;
> -			} else if (length <= 0) {
> -				cERROR(1, "Received no data, expecting %d",
> -					      pdu_length - total_read);
> -				cifs_reconnect(server);
> -				csocket = server->ssocket;
> -				reconnect = 1;
> -				break;
> -			}
> -		}
> -		if (reconnect == 2)
> +		rc = read_from_socket(server, pdu_length, &csocket, &smb_msg,
> +				      &iov, &total_read);
> +		if (rc == 2)
>  			break;
> -		else if (reconnect == 1)
> +		else if (rc == 1)
>  			continue;
>  
>  		total_read += 4; /* account for rfc1002 hdr */
>  
>  		dump_smb(smb_buffer, total_read);
>  
> +		server->lstrp = jiffies;
> +		length = 0;
> +
>  		/*
>  		 * We know that we received enough to get to the MID as we
>  		 * checked the pdu_length earlier. Now check to see
> @@ -559,75 +678,11 @@ incomplete_rcv:
>  		 */
>  		length = checkSMB(smb_buffer, smb_buffer->Mid, total_read);
>  		if (length != 0)
> -			cifs_dump_mem("Bad SMB: ", smb_buffer,
> -					min_t(unsigned int, total_read, 48));
> -
> -		mid_entry = NULL;
> -		server->lstrp = jiffies;
> -
> -		spin_lock(&GlobalMid_Lock);
> -		list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
> -			mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
> -
> -			if (mid_entry->mid != smb_buffer->Mid ||
> -			    mid_entry->midState != MID_REQUEST_SUBMITTED ||
> -			    mid_entry->command != smb_buffer->Command) {
> -				mid_entry = NULL;
> -				continue;
> -			}
> -
> -			if (length == 0 &&
> -			    check2ndT2(smb_buffer, server->maxBuf) > 0) {
> -				/* We have a multipart transact2 resp */
> -				isMultiRsp = true;
> -				if (mid_entry->resp_buf) {
> -					/* merge response - fix up 1st*/
> -					length = coalesce_t2(smb_buffer,
> -							mid_entry->resp_buf);
> -					if (length > 0) {
> -						length = 0;
> -						mid_entry->multiRsp = true;
> -						break;
> -					} else {
> -						/* all parts received or
> -						 * packet is malformed
> -						 */
> -						mid_entry->multiEnd = true;
> -						goto multi_t2_fnd;
> -					}
> -				} else {
> -					if (!isLargeBuf) {
> -						/*
> -						 * FIXME: switch to already
> -						 *        allocated largebuf?
> -						 */
> -						cERROR(1, "1st trans2 resp "
> -							  "needs bigbuf");
> -					} else {
> -						/* Have first buffer */
> -						mid_entry->resp_buf =
> -							 smb_buffer;
> -						mid_entry->largeBuf = true;
> -						bigbuf = NULL;
> -					}
> -				}
> -				break;
> -			}
> -			mid_entry->resp_buf = smb_buffer;
> -			mid_entry->largeBuf = isLargeBuf;
> -multi_t2_fnd:
> -			if (length == 0)
> -				mid_entry->midState = MID_RESPONSE_RECEIVED;
> -			else
> -				mid_entry->midState = MID_RESPONSE_MALFORMED;
> -#ifdef CONFIG_CIFS_STATS2
> -			mid_entry->when_received = jiffies;
> -#endif
> -			list_del_init(&mid_entry->qhead);
> -			break;
> -		}
> -		spin_unlock(&GlobalMid_Lock);
> +			cifs_dump_mem("Bad SMB: ", buf,
> +				      min_t(unsigned int, total_read, 48));
>  
> +		mid_entry = find_cifs_owner(server, smb_buffer, &length,
> +					    isLargeBuf, &isMultiRsp, &bigbuf);
>  		if (mid_entry != NULL) {
>  			mid_entry->callback(mid_entry);
>  			/* Was previous buf put in mpx struct for multi-rsp? */
> @@ -645,13 +700,12 @@ multi_t2_fnd:
>  			   !isMultiRsp) {
>  			cERROR(1, "No task to wake, unknown frame received! "
>  				   "NumMids %d", atomic_read(&midCount));
> -			cifs_dump_mem("Received Data is: ", (char *)smb_buffer,
> +			cifs_dump_mem("Received Data is: ", buf,
>  				      sizeof(struct smb_hdr));
>  #ifdef CONFIG_CIFS_DEBUG2
>  			cifs_dump_detail(smb_buffer);
>  			cifs_dump_mids(server);
>  #endif /* CIFS_DEBUG2 */
> -
>  		}
>  	} /* end while !EXITING */
>
Pavel Shilovsky June 9, 2011, 12:10 p.m. UTC | #2
2011/6/9 Jeff Layton <jlayton@redhat.com>:
> On Thu,  9 Jun 2011 12:58:52 +0400
> Pavel Shilovsky <piastryyy@gmail.com> wrote:
>
>> Move several code blocks to separate functions:
>> 1) buffer allocations,
>> 2) rfc1002 header check,
>> 3) read whole smb message from socket,
>> 4) find mid owner.
>>
>> Signed-off-by: Pavel Shilovsky <piastry@gmail.com>
>> ---
>>  fs/cifs/cifs_debug.c |    1 -
>>  fs/cifs/connect.c    |  440 ++++++++++++++++++++++++++++----------------------
>>  2 files changed, 247 insertions(+), 194 deletions(-)
>>
>
> Nice. This is long overdue.
>
> That said, speaking from the experience of having to chase down subtle
> bugs in this code before, I think this would be best done as a set of
> patches so that we can potentially bisect in case this breaks
> something. Maybe break out each function in a separate patch?
>
> The main reason that I've not done this before is that the code doesn't
> lend itself well to separate functions. You've "solved" that here with a
> lot of pointer passing. That breaks up the code into separate functions
> but doesn't really clean up the code. So let's consider this a good
> starting point, but more work is really needed here.
>
>> diff --git a/fs/cifs/cifs_debug.c b/fs/cifs/cifs_debug.c
>> index 2fe3cf1..c4fc68a 100644
>> --- a/fs/cifs/cifs_debug.c
>> +++ b/fs/cifs/cifs_debug.c
>> @@ -66,7 +66,6 @@ void cifs_dump_detail(struct smb_hdr *smb)
>>       cERROR(1, "smb buf %p len %d", smb, smbCalcSize(smb));
>>  }
>>
>> -
>>  void cifs_dump_mids(struct TCP_Server_Info *server)
>>  {
>>       struct list_head *tmp;
>> diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
>> index fb31c2c..23addcb 100644
>> --- a/fs/cifs/connect.c
>> +++ b/fs/cifs/connect.c
>> @@ -317,24 +317,234 @@ requeue_echo:
>>       queue_delayed_work(system_nrt_wq, &server->echo, SMB_ECHO_INTERVAL);
>>  }
>>
>> +static struct mid_q_entry *
>> +find_cifs_owner(struct TCP_Server_Info *server, struct smb_hdr *buf,
>> +             int *length, bool isLargeBuf, bool *isMultiRsp, char **pbigbuf)
>
> This function name seems a little odd. Would find_cifs_mid be better?
>
> Usually when I see a lot of pointer argument passing like this in a
> function, that's a red flag to me of a poor design. In this case,
> that's not really your fault as this code was already a mess. So, I'm
> ok with this in principle as it might make it easier to clean up this
> code later.
>
> While we're considering overhauling this code -- perhaps, long-term we
> should move this to be a state machine?
>
>> +{
>> +     struct list_head *tmp, *tmp2;
>> +     struct mid_q_entry *mid_entry = NULL;
>> +
>> +     spin_lock(&GlobalMid_Lock);
>> +     list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
>> +             mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
>> +
>> +             if (mid_entry->mid != buf->Mid ||
>> +                 mid_entry->midState != MID_REQUEST_SUBMITTED ||
>> +                 mid_entry->command != buf->Command) {
>> +                     mid_entry = NULL;
>> +                     continue;
>> +             }
>> +
>> +             if (*length == 0 && check2ndT2(buf, server->maxBuf) > 0) {
>> +                     /* We have a multipart transact2 resp */
>> +                     *isMultiRsp = true;
>> +                     if (mid_entry->resp_buf) {
>> +                             /* merge response - fix up 1st*/
>> +                             *length = coalesce_t2(buf, mid_entry->resp_buf);
>> +                             if (*length > 0) {
>> +                                     *length = 0;
>> +                                     mid_entry->multiRsp = true;
>> +                                     break;
>> +                             } else {
>> +                                     /* all parts received or
>> +                                      * packet is malformed
>> +                                      */
>> +                                     mid_entry->multiEnd = true;
>> +                                     goto multi_t2_fnd;
>> +                             }
>> +                     } else {
>> +                             if (!isLargeBuf) {
>> +                                     /*
>> +                                      * FIXME: switch to already
>> +                                      *        allocated largebuf?
>> +                                      */
>> +                                     cERROR(1, "1st trans2 resp "
>> +                                               "needs bigbuf");
>> +                             } else {
>> +                                     /* Have first buffer */
>> +                                     mid_entry->resp_buf = buf;
>> +                                     mid_entry->largeBuf = true;
>> +                                     *pbigbuf = NULL;
>> +                             }
>> +                     }
>> +                     break;
>> +             }
>> +             mid_entry->resp_buf = buf;
>> +             mid_entry->largeBuf = isLargeBuf;
>> +multi_t2_fnd:
>> +             if (*length == 0)
>> +                     mid_entry->midState = MID_RESPONSE_RECEIVED;
>> +             else
>> +                     mid_entry->midState = MID_RESPONSE_MALFORMED;
>> +#ifdef CONFIG_CIFS_STATS2
>> +             mid_entry->when_received = jiffies;
>> +#endif
>> +             list_del_init(&mid_entry->qhead);
>> +             break;
>> +     }
>> +     spin_unlock(&GlobalMid_Lock);
>> +
>> +     return mid_entry;
>> +}
>> +
>> +static int
>> +check_rfc1002_header(struct TCP_Server_Info *server, char *buf, int length,
>> +                  unsigned int pdu_length, struct socket **psocket)
>
> I don't think you really need psocket here. That should just be
> server->ssocket. For that matter, pdu_length should be readable from
> buf, and "length" is always going to be 4 anyway, right?
>
>> +{
>> +     char temp = *buf;
>> +
>> +     /*
>> +      * The first byte big endian of the length field,
>> +      * is actually not part of the length but the type
>> +      * with the most common, zero, as regular data.
>> +      */
>> +     if (temp == (char) RFC1002_SESSION_KEEP_ALIVE) {
>> +             return 1;
>> +     } else if (temp == (char)RFC1002_POSITIVE_SESSION_RESPONSE) {
>> +             cFYI(1, "Good RFC 1002 session rsp");
>> +             return 1;
>> +     } else if (temp == (char)RFC1002_NEGATIVE_SESSION_RESPONSE) {
>> +             /* we get this from Windows 98 instead of
>> +                an error on SMB negprot response */
>> +             cFYI(1, "Negative RFC1002 Session Response Error 0x%x)",
>> +                     pdu_length);
>> +             /* give server a second to clean up  */
>> +             msleep(1000);
>> +             /* always try 445 first on reconnect since we get NACK
>> +              * on some if we ever connected to port 139 (the NACK
>> +              * is since we do not begin with RFC1001 session
>> +              * initialize frame)
>> +              */
>> +             cifs_set_port((struct sockaddr *)
>> +                             &server->dstaddr, CIFS_PORT);
>> +             cifs_reconnect(server);
>> +             *psocket = server->ssocket;
>> +             wake_up(&server->response_q);
>> +             return 1;
>> +     } else if (temp != (char) 0) {
>> +             cERROR(1, "Unknown RFC 1002 frame");
>> +             cifs_dump_mem(" Received Data: ", buf, length);
>> +             cifs_reconnect(server);
>> +             *psocket = server->ssocket;
>> +             return 1;
>> +     }
>> +
>> +     /* else we have an SMB response */
>> +     if ((pdu_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) ||
>> +         (pdu_length < sizeof(struct smb_hdr) - 1 - 4)) {
>> +             cERROR(1, "Invalid size SMB length %d pdu_length %d",
>> +                    length, pdu_length+4);
>> +             cifs_reconnect(server);
>> +             *psocket = server->ssocket;
>> +             wake_up(&server->response_q);
>> +             return 1;
>> +     }
>> +
>> +     return 0;
>> +}
>> +
>> +static int
>> +allocate_bufs(char **pbigbuf, char **psmallbuf, unsigned int size,
>> +           bool isLargeBuf)
>   ^^^
> nit: This can probably be a bool return.
>
>> +{
>> +     char *bigbuf = *pbigbuf, *smallbuf = *psmallbuf;
>> +
>> +     if (bigbuf == NULL) {
>> +             bigbuf = (char *)cifs_buf_get();
>> +             if (!bigbuf) {
>> +                     cERROR(1, "No memory for large SMB response");
>> +                     msleep(3000);
>> +                     /* retry will check if exiting */
>> +                     return 1;
>> +             }
>> +     } else if (isLargeBuf) {
>> +             /* we are reusing a dirty large buf, clear its start */
>> +             memset(bigbuf, 0, size);
>> +     }
>> +
>> +     if (smallbuf == NULL) {
>> +             smallbuf = (char *)cifs_small_buf_get();
>> +             if (!smallbuf) {
>> +                     cERROR(1, "No memory for SMB response");
>> +                     msleep(1000);
>> +                     /* retry will check if exiting */
>> +                     return 1;
>> +             }
>> +             /* beginning of smb buffer is cleared in our buf_get */
>> +     } else /* if existing small buf clear beginning */
>> +             memset(smallbuf, 0, size);
>> +
>> +     *pbigbuf = bigbuf;
>> +     *psmallbuf = smallbuf;
>> +
>> +     return 0;
>> +}
>> +
>        ^^^
> The buffer handling could really stand to be redesigned, but splitting
> it out into a separate function is a decent start.
>
>> +static int
>> +read_from_socket(struct TCP_Server_Info *server, unsigned int pdu_length,
>> +              struct socket **psocket, struct msghdr *smb_msg,
>> +              struct kvec *iov, unsigned int *ptotal_read)
>> +{
>> +     int length, rc = 0;
>> +     unsigned int total_read;
>> +
>> +     for (total_read = 0; total_read < pdu_length;
>> +          total_read += length) {
>> +             length = kernel_recvmsg(*psocket, smb_msg, iov, 1,
>> +                                     pdu_length - total_read, 0);
>> +             if (server->tcpStatus == CifsExiting) {
>> +                     /* then will exit */
>> +                     rc = 2;
>> +                     break;
>> +             } else if (server->tcpStatus == CifsNeedReconnect) {
>> +                     cifs_reconnect(server);
>> +                     *psocket = server->ssocket;
>> +                     /* Reconnect wakes up rspns q */
>> +                     /* Now we will reread sock */
>> +                     rc = 1;
>> +                     break;
>> +             } else if (length == -ERESTARTSYS ||
>> +                        length == -EAGAIN ||
>> +                        length == -EINTR) {
>> +                     /*
>> +                      * Minimum sleep to prevent looping,
>> +                      * allowing socket to clear and app
>> +                      * threads to set tcpStatus
>> +                      * CifsNeedReconnect if server hung.
>> +                      */
>> +                     usleep_range(1000, 2000);
>> +                     length = 0;
>> +                     continue;
>> +             } else if (length <= 0) {
>> +                     cERROR(1, "Received no data, expecting %d",
>> +                                   pdu_length - total_read);
>> +                     cifs_reconnect(server);
>> +                     *psocket = server->ssocket;
>> +                     rc = 1;
>> +                     break;
>> +             }
>> +     }
>> +
>> +     *ptotal_read = total_read;
>> +     return 0;
>> +}
>> +
>>  static int
>>  cifs_demultiplex_thread(struct TCP_Server_Info *server)
>>  {
>>       int length;
>>       unsigned int pdu_length, total_read;
>> +     char *buf = NULL, *smallbuf = NULL, *bigbuf = NULL;
>>       struct smb_hdr *smb_buffer = NULL;
>> -     struct smb_hdr *bigbuf = NULL;
>> -     struct smb_hdr *smallbuf = NULL;
>>       struct msghdr smb_msg;
>>       struct kvec iov;
>>       struct socket *csocket = server->ssocket;
>>       struct list_head *tmp, *tmp2;
>>       struct task_struct *task_to_wake = NULL;
>>       struct mid_q_entry *mid_entry;
>> -     char temp;
>>       bool isLargeBuf = false;
>>       bool isMultiRsp;
>> -     int reconnect;
>> +     int rc;
>>
>>       current->flags |= PF_MEMALLOC;
>>       cFYI(1, "Demultiplex PID: %d", task_pid_nr(current));
>> @@ -348,35 +558,17 @@ cifs_demultiplex_thread(struct TCP_Server_Info *server)
>>       while (server->tcpStatus != CifsExiting) {
>>               if (try_to_freeze())
>>                       continue;
>> -             if (bigbuf == NULL) {
>> -                     bigbuf = cifs_buf_get();
>> -                     if (!bigbuf) {
>> -                             cERROR(1, "No memory for large SMB response");
>> -                             msleep(3000);
>> -                             /* retry will check if exiting */
>> -                             continue;
>> -                     }
>> -             } else if (isLargeBuf) {
>> -                     /* we are reusing a dirty large buf, clear its start */
>> -                     memset(bigbuf, 0, sizeof(struct smb_hdr));
>> -             }
>>
>> -             if (smallbuf == NULL) {
>> -                     smallbuf = cifs_small_buf_get();
>> -                     if (!smallbuf) {
>> -                             cERROR(1, "No memory for SMB response");
>> -                             msleep(1000);
>> -                             /* retry will check if exiting */
>> -                             continue;
>> -                     }
>> -                     /* beginning of smb buffer is cleared in our buf_get */
>> -             } else /* if existing small buf clear beginning */
>> -                     memset(smallbuf, 0, sizeof(struct smb_hdr));
>> +             rc = allocate_bufs(&bigbuf, &smallbuf, sizeof(struct smb_hdr),
>> +                                isLargeBuf);
>> +             if (rc)
>> +                     continue;
>>
>>               isLargeBuf = false;
>>               isMultiRsp = false;
>> -             smb_buffer = smallbuf;
>> -             iov.iov_base = smb_buffer;
>> +             smb_buffer = (struct smb_hdr *)smallbuf;
>> +             buf = smallbuf;
>> +             iov.iov_base = smallbuf;
>>               iov.iov_len = 4;
>>               smb_msg.msg_control = NULL;
>>               smb_msg.msg_controllen = 0;
>> @@ -414,8 +606,7 @@ incomplete_rcv:
>>                               allowing socket to clear and app threads to set
>>                               tcpStatus CifsNeedReconnect if server hung */
>>                       if (pdu_length < 4) {
>> -                             iov.iov_base = (4 - pdu_length) +
>> -                                                     (char *)smb_buffer;
>> +                             iov.iov_base = (4 - pdu_length) + buf;
>>                               iov.iov_len = pdu_length;
>>                               smb_msg.msg_control = NULL;
>>                               smb_msg.msg_controllen = 0;
>
>                Should the above code be using read_from_socket() as
>                well? It would be nice if we had a single function that
>                we always called to do reads off the socket and simply
>                check the return value from that. That may be reasonable
>                for a later patch.
>
>> @@ -440,114 +631,42 @@ incomplete_rcv:
>>               /* The right amount was read from socket - 4 bytes */
>>               /* so we can now interpret the length field */
>>
>> -             /* the first byte big endian of the length field,
>> -             is actually not part of the length but the type
>> -             with the most common, zero, as regular data */
>> -             temp = *((char *) smb_buffer);
>> -
>> -             /* Note that FC 1001 length is big endian on the wire,
>> -             but we convert it here so it is always manipulated
>> -             as host byte order */
>> +             /*
>> +              * Note that FC 1001 length is big endian on the wire,
>                            ^^^
>                        nit: might as well add the missing "R" here
>> +              * but we convert it here so it is always manipulated
>> +              * as host byte order
>> +              */
>>               pdu_length = be32_to_cpu(smb_buffer->smb_buf_length);
>> -
>> -             cFYI(1, "rfc1002 length 0x%x", pdu_length+4);
>> -
>> -             if (temp == (char) RFC1002_SESSION_KEEP_ALIVE) {
>> -                     continue;
>> -             } else if (temp == (char)RFC1002_POSITIVE_SESSION_RESPONSE) {
>> -                     cFYI(1, "Good RFC 1002 session rsp");
>> -                     continue;
>> -             } else if (temp == (char)RFC1002_NEGATIVE_SESSION_RESPONSE) {
>> -                     /* we get this from Windows 98 instead of
>> -                        an error on SMB negprot response */
>> -                     cFYI(1, "Negative RFC1002 Session Response Error 0x%x)",
>> -                             pdu_length);
>> -                     /* give server a second to clean up  */
>> -                     msleep(1000);
>> -                     /* always try 445 first on reconnect since we get NACK
>> -                      * on some if we ever connected to port 139 (the NACK
>> -                      * is since we do not begin with RFC1001 session
>> -                      * initialize frame)
>> -                      */
>> -                     cifs_set_port((struct sockaddr *)
>> -                                     &server->dstaddr, CIFS_PORT);
>> -                     cifs_reconnect(server);
>> -                     csocket = server->ssocket;
>> -                     wake_up(&server->response_q);
>> -                     continue;
>> -             } else if (temp != (char) 0) {
>> -                     cERROR(1, "Unknown RFC 1002 frame");
>> -                     cifs_dump_mem(" Received Data: ", (char *)smb_buffer,
>> -                                   length);
>> -                     cifs_reconnect(server);
>> -                     csocket = server->ssocket;
>> -                     continue;
>> -             }
>> -
>> -             /* else we have an SMB response */
>> -             if ((pdu_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) ||
>> -                         (pdu_length < sizeof(struct smb_hdr) - 1 - 4)) {
>> -                     cERROR(1, "Invalid size SMB length %d pdu_length %d",
>> -                                     length, pdu_length+4);
>> -                     cifs_reconnect(server);
>> -                     csocket = server->ssocket;
>> -                     wake_up(&server->response_q);
>> +             rc = check_rfc1002_header(server, buf, length, pdu_length,
>> +                                       &csocket);
>> +             if (rc)
>>                       continue;
>> -             }
>>
>> -             /* else length ok */
>> -             reconnect = 0;
>> +             cFYI(1, "rfc1002 length 0x%x", pdu_length+4);
>>
>>               if (pdu_length > MAX_CIFS_SMALL_BUFFER_SIZE - 4) {
>>                       isLargeBuf = true;
>>                       memcpy(bigbuf, smallbuf, 4);
>> -                     smb_buffer = bigbuf;
>> +                     smb_buffer = (struct smb_hdr *)bigbuf;
>> +                     buf = bigbuf;
>>               }
>> -             length = 0;
>> -             iov.iov_base = 4 + (char *)smb_buffer;
>> +
>> +             iov.iov_base = 4 + buf;
>>               iov.iov_len = pdu_length;
>> -             for (total_read = 0; total_read < pdu_length;
>> -                  total_read += length) {
>> -                     length = kernel_recvmsg(csocket, &smb_msg, &iov, 1,
>> -                                             pdu_length - total_read, 0);
>> -                     if (server->tcpStatus == CifsExiting) {
>> -                             /* then will exit */
>> -                             reconnect = 2;
>> -                             break;
>> -                     } else if (server->tcpStatus == CifsNeedReconnect) {
>> -                             cifs_reconnect(server);
>> -                             csocket = server->ssocket;
>> -                             /* Reconnect wakes up rspns q */
>> -                             /* Now we will reread sock */
>> -                             reconnect = 1;
>> -                             break;
>> -                     } else if (length == -ERESTARTSYS ||
>> -                                length == -EAGAIN ||
>> -                                length == -EINTR) {
>> -                             msleep(1); /* minimum sleep to prevent looping,
>> -                                           allowing socket to clear and app
>> -                                           threads to set tcpStatus
>> -                                           CifsNeedReconnect if server hung*/
>> -                             length = 0;
>> -                             continue;
>> -                     } else if (length <= 0) {
>> -                             cERROR(1, "Received no data, expecting %d",
>> -                                           pdu_length - total_read);
>> -                             cifs_reconnect(server);
>> -                             csocket = server->ssocket;
>> -                             reconnect = 1;
>> -                             break;
>> -                     }
>> -             }
>> -             if (reconnect == 2)
>> +             rc = read_from_socket(server, pdu_length, &csocket, &smb_msg,
>> +                                   &iov, &total_read);
>> +             if (rc == 2)
>>                       break;
>> -             else if (reconnect == 1)
>> +             else if (rc == 1)
>>                       continue;
>>
>>               total_read += 4; /* account for rfc1002 hdr */
>>
>>               dump_smb(smb_buffer, total_read);
>>
>> +             server->lstrp = jiffies;
>> +             length = 0;
>> +
>>               /*
>>                * We know that we received enough to get to the MID as we
>>                * checked the pdu_length earlier. Now check to see
>> @@ -559,75 +678,11 @@ incomplete_rcv:
>>                */
>>               length = checkSMB(smb_buffer, smb_buffer->Mid, total_read);
>>               if (length != 0)
>> -                     cifs_dump_mem("Bad SMB: ", smb_buffer,
>> -                                     min_t(unsigned int, total_read, 48));
>> -
>> -             mid_entry = NULL;
>> -             server->lstrp = jiffies;
>> -
>> -             spin_lock(&GlobalMid_Lock);
>> -             list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
>> -                     mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
>> -
>> -                     if (mid_entry->mid != smb_buffer->Mid ||
>> -                         mid_entry->midState != MID_REQUEST_SUBMITTED ||
>> -                         mid_entry->command != smb_buffer->Command) {
>> -                             mid_entry = NULL;
>> -                             continue;
>> -                     }
>> -
>> -                     if (length == 0 &&
>> -                         check2ndT2(smb_buffer, server->maxBuf) > 0) {
>> -                             /* We have a multipart transact2 resp */
>> -                             isMultiRsp = true;
>> -                             if (mid_entry->resp_buf) {
>> -                                     /* merge response - fix up 1st*/
>> -                                     length = coalesce_t2(smb_buffer,
>> -                                                     mid_entry->resp_buf);
>> -                                     if (length > 0) {
>> -                                             length = 0;
>> -                                             mid_entry->multiRsp = true;
>> -                                             break;
>> -                                     } else {
>> -                                             /* all parts received or
>> -                                              * packet is malformed
>> -                                              */
>> -                                             mid_entry->multiEnd = true;
>> -                                             goto multi_t2_fnd;
>> -                                     }
>> -                             } else {
>> -                                     if (!isLargeBuf) {
>> -                                             /*
>> -                                              * FIXME: switch to already
>> -                                              *        allocated largebuf?
>> -                                              */
>> -                                             cERROR(1, "1st trans2 resp "
>> -                                                       "needs bigbuf");
>> -                                     } else {
>> -                                             /* Have first buffer */
>> -                                             mid_entry->resp_buf =
>> -                                                      smb_buffer;
>> -                                             mid_entry->largeBuf = true;
>> -                                             bigbuf = NULL;
>> -                                     }
>> -                             }
>> -                             break;
>> -                     }
>> -                     mid_entry->resp_buf = smb_buffer;
>> -                     mid_entry->largeBuf = isLargeBuf;
>> -multi_t2_fnd:
>> -                     if (length == 0)
>> -                             mid_entry->midState = MID_RESPONSE_RECEIVED;
>> -                     else
>> -                             mid_entry->midState = MID_RESPONSE_MALFORMED;
>> -#ifdef CONFIG_CIFS_STATS2
>> -                     mid_entry->when_received = jiffies;
>> -#endif
>> -                     list_del_init(&mid_entry->qhead);
>> -                     break;
>> -             }
>> -             spin_unlock(&GlobalMid_Lock);
>> +                     cifs_dump_mem("Bad SMB: ", buf,
>> +                                   min_t(unsigned int, total_read, 48));
>>
>> +             mid_entry = find_cifs_owner(server, smb_buffer, &length,
>> +                                         isLargeBuf, &isMultiRsp, &bigbuf);
>>               if (mid_entry != NULL) {
>>                       mid_entry->callback(mid_entry);
>>                       /* Was previous buf put in mpx struct for multi-rsp? */
>> @@ -645,13 +700,12 @@ multi_t2_fnd:
>>                          !isMultiRsp) {
>>                       cERROR(1, "No task to wake, unknown frame received! "
>>                                  "NumMids %d", atomic_read(&midCount));
>> -                     cifs_dump_mem("Received Data is: ", (char *)smb_buffer,
>> +                     cifs_dump_mem("Received Data is: ", buf,
>>                                     sizeof(struct smb_hdr));
>>  #ifdef CONFIG_CIFS_DEBUG2
>>                       cifs_dump_detail(smb_buffer);
>>                       cifs_dump_mids(server);
>>  #endif /* CIFS_DEBUG2 */
>> -
>>               }
>>       } /* end while !EXITING */
>>
>
> --
> Jeff Layton <jlayton@redhat.com>
>

Thanks for the review!

I agree with your points - so, I am going to split it into several
patches, rework places you mentioned and post whole series soon.
diff mbox

Patch

diff --git a/fs/cifs/cifs_debug.c b/fs/cifs/cifs_debug.c
index 2fe3cf1..c4fc68a 100644
--- a/fs/cifs/cifs_debug.c
+++ b/fs/cifs/cifs_debug.c
@@ -66,7 +66,6 @@  void cifs_dump_detail(struct smb_hdr *smb)
 	cERROR(1, "smb buf %p len %d", smb, smbCalcSize(smb));
 }
 
-
 void cifs_dump_mids(struct TCP_Server_Info *server)
 {
 	struct list_head *tmp;
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
index fb31c2c..23addcb 100644
--- a/fs/cifs/connect.c
+++ b/fs/cifs/connect.c
@@ -317,24 +317,234 @@  requeue_echo:
 	queue_delayed_work(system_nrt_wq, &server->echo, SMB_ECHO_INTERVAL);
 }
 
+static struct mid_q_entry *
+find_cifs_owner(struct TCP_Server_Info *server, struct smb_hdr *buf,
+		int *length, bool isLargeBuf, bool *isMultiRsp, char **pbigbuf)
+{
+	struct list_head *tmp, *tmp2;
+	struct mid_q_entry *mid_entry = NULL;
+
+	spin_lock(&GlobalMid_Lock);
+	list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
+		mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
+
+		if (mid_entry->mid != buf->Mid ||
+		    mid_entry->midState != MID_REQUEST_SUBMITTED ||
+		    mid_entry->command != buf->Command) {
+			mid_entry = NULL;
+			continue;
+		}
+
+		if (*length == 0 && check2ndT2(buf, server->maxBuf) > 0) {
+			/* We have a multipart transact2 resp */
+			*isMultiRsp = true;
+			if (mid_entry->resp_buf) {
+				/* merge response - fix up 1st*/
+				*length = coalesce_t2(buf, mid_entry->resp_buf);
+				if (*length > 0) {
+					*length = 0;
+					mid_entry->multiRsp = true;
+					break;
+				} else {
+					/* all parts received or
+					 * packet is malformed
+					 */
+					mid_entry->multiEnd = true;
+					goto multi_t2_fnd;
+				}
+			} else {
+				if (!isLargeBuf) {
+					/*
+					 * FIXME: switch to already
+					 *        allocated largebuf?
+					 */
+					cERROR(1, "1st trans2 resp "
+						  "needs bigbuf");
+				} else {
+					/* Have first buffer */
+					mid_entry->resp_buf = buf;
+					mid_entry->largeBuf = true;
+					*pbigbuf = NULL;
+				}
+			}
+			break;
+		}
+		mid_entry->resp_buf = buf;
+		mid_entry->largeBuf = isLargeBuf;
+multi_t2_fnd:
+		if (*length == 0)
+			mid_entry->midState = MID_RESPONSE_RECEIVED;
+		else
+			mid_entry->midState = MID_RESPONSE_MALFORMED;
+#ifdef CONFIG_CIFS_STATS2
+		mid_entry->when_received = jiffies;
+#endif
+		list_del_init(&mid_entry->qhead);
+		break;
+	}
+	spin_unlock(&GlobalMid_Lock);
+
+	return mid_entry;
+}
+
+static int
+check_rfc1002_header(struct TCP_Server_Info *server, char *buf, int length,
+		     unsigned int pdu_length, struct socket **psocket)
+{
+	char temp = *buf;
+
+	/*
+	 * The first byte big endian of the length field,
+	 * is actually not part of the length but the type
+	 * with the most common, zero, as regular data.
+	 */
+	if (temp == (char) RFC1002_SESSION_KEEP_ALIVE) {
+		return 1;
+	} else if (temp == (char)RFC1002_POSITIVE_SESSION_RESPONSE) {
+		cFYI(1, "Good RFC 1002 session rsp");
+		return 1;
+	} else if (temp == (char)RFC1002_NEGATIVE_SESSION_RESPONSE) {
+		/* we get this from Windows 98 instead of
+		   an error on SMB negprot response */
+		cFYI(1, "Negative RFC1002 Session Response Error 0x%x)",
+			pdu_length);
+		/* give server a second to clean up  */
+		msleep(1000);
+		/* always try 445 first on reconnect since we get NACK
+		 * on some if we ever connected to port 139 (the NACK
+		 * is since we do not begin with RFC1001 session
+		 * initialize frame)
+		 */
+		cifs_set_port((struct sockaddr *)
+				&server->dstaddr, CIFS_PORT);
+		cifs_reconnect(server);
+		*psocket = server->ssocket;
+		wake_up(&server->response_q);
+		return 1;
+	} else if (temp != (char) 0) {
+		cERROR(1, "Unknown RFC 1002 frame");
+		cifs_dump_mem(" Received Data: ", buf, length);
+		cifs_reconnect(server);
+		*psocket = server->ssocket;
+		return 1;
+	}
+
+	/* else we have an SMB response */
+	if ((pdu_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) ||
+	    (pdu_length < sizeof(struct smb_hdr) - 1 - 4)) {
+		cERROR(1, "Invalid size SMB length %d pdu_length %d",
+		       length, pdu_length+4);
+		cifs_reconnect(server);
+		*psocket = server->ssocket;
+		wake_up(&server->response_q);
+		return 1;
+	}
+
+	return 0;
+}
+
+static int
+allocate_bufs(char **pbigbuf, char **psmallbuf, unsigned int size,
+	      bool isLargeBuf)
+{
+	char *bigbuf = *pbigbuf, *smallbuf = *psmallbuf;
+
+	if (bigbuf == NULL) {
+		bigbuf = (char *)cifs_buf_get();
+		if (!bigbuf) {
+			cERROR(1, "No memory for large SMB response");
+			msleep(3000);
+			/* retry will check if exiting */
+			return 1;
+		}
+	} else if (isLargeBuf) {
+		/* we are reusing a dirty large buf, clear its start */
+		memset(bigbuf, 0, size);
+	}
+
+	if (smallbuf == NULL) {
+		smallbuf = (char *)cifs_small_buf_get();
+		if (!smallbuf) {
+			cERROR(1, "No memory for SMB response");
+			msleep(1000);
+			/* retry will check if exiting */
+			return 1;
+		}
+		/* beginning of smb buffer is cleared in our buf_get */
+	} else /* if existing small buf clear beginning */
+		memset(smallbuf, 0, size);
+
+	*pbigbuf = bigbuf;
+	*psmallbuf = smallbuf;
+
+	return 0;
+}
+
+static int
+read_from_socket(struct TCP_Server_Info *server, unsigned int pdu_length,
+		 struct socket **psocket, struct msghdr *smb_msg,
+		 struct kvec *iov, unsigned int *ptotal_read)
+{
+	int length, rc = 0;
+	unsigned int total_read;
+
+	for (total_read = 0; total_read < pdu_length;
+	     total_read += length) {
+		length = kernel_recvmsg(*psocket, smb_msg, iov, 1,
+					pdu_length - total_read, 0);
+		if (server->tcpStatus == CifsExiting) {
+			/* then will exit */
+			rc = 2;
+			break;
+		} else if (server->tcpStatus == CifsNeedReconnect) {
+			cifs_reconnect(server);
+			*psocket = server->ssocket;
+			/* Reconnect wakes up rspns q */
+			/* Now we will reread sock */
+			rc = 1;
+			break;
+		} else if (length == -ERESTARTSYS ||
+			   length == -EAGAIN ||
+			   length == -EINTR) {
+			/*
+			 * Minimum sleep to prevent looping,
+			 * allowing socket to clear and app
+			 * threads to set tcpStatus
+			 * CifsNeedReconnect if server hung.
+			 */
+			usleep_range(1000, 2000);
+			length = 0;
+			continue;
+		} else if (length <= 0) {
+			cERROR(1, "Received no data, expecting %d",
+				      pdu_length - total_read);
+			cifs_reconnect(server);
+			*psocket = server->ssocket;
+			rc = 1;
+			break;
+		}
+	}
+
+	*ptotal_read = total_read;
+	return 0;
+}
+
 static int
 cifs_demultiplex_thread(struct TCP_Server_Info *server)
 {
 	int length;
 	unsigned int pdu_length, total_read;
+	char *buf = NULL, *smallbuf = NULL, *bigbuf = NULL;
 	struct smb_hdr *smb_buffer = NULL;
-	struct smb_hdr *bigbuf = NULL;
-	struct smb_hdr *smallbuf = NULL;
 	struct msghdr smb_msg;
 	struct kvec iov;
 	struct socket *csocket = server->ssocket;
 	struct list_head *tmp, *tmp2;
 	struct task_struct *task_to_wake = NULL;
 	struct mid_q_entry *mid_entry;
-	char temp;
 	bool isLargeBuf = false;
 	bool isMultiRsp;
-	int reconnect;
+	int rc;
 
 	current->flags |= PF_MEMALLOC;
 	cFYI(1, "Demultiplex PID: %d", task_pid_nr(current));
@@ -348,35 +558,17 @@  cifs_demultiplex_thread(struct TCP_Server_Info *server)
 	while (server->tcpStatus != CifsExiting) {
 		if (try_to_freeze())
 			continue;
-		if (bigbuf == NULL) {
-			bigbuf = cifs_buf_get();
-			if (!bigbuf) {
-				cERROR(1, "No memory for large SMB response");
-				msleep(3000);
-				/* retry will check if exiting */
-				continue;
-			}
-		} else if (isLargeBuf) {
-			/* we are reusing a dirty large buf, clear its start */
-			memset(bigbuf, 0, sizeof(struct smb_hdr));
-		}
 
-		if (smallbuf == NULL) {
-			smallbuf = cifs_small_buf_get();
-			if (!smallbuf) {
-				cERROR(1, "No memory for SMB response");
-				msleep(1000);
-				/* retry will check if exiting */
-				continue;
-			}
-			/* beginning of smb buffer is cleared in our buf_get */
-		} else /* if existing small buf clear beginning */
-			memset(smallbuf, 0, sizeof(struct smb_hdr));
+		rc = allocate_bufs(&bigbuf, &smallbuf, sizeof(struct smb_hdr),
+				   isLargeBuf);
+		if (rc)
+			continue;
 
 		isLargeBuf = false;
 		isMultiRsp = false;
-		smb_buffer = smallbuf;
-		iov.iov_base = smb_buffer;
+		smb_buffer = (struct smb_hdr *)smallbuf;
+		buf = smallbuf;
+		iov.iov_base = smallbuf;
 		iov.iov_len = 4;
 		smb_msg.msg_control = NULL;
 		smb_msg.msg_controllen = 0;
@@ -414,8 +606,7 @@  incomplete_rcv:
 				allowing socket to clear and app threads to set
 				tcpStatus CifsNeedReconnect if server hung */
 			if (pdu_length < 4) {
-				iov.iov_base = (4 - pdu_length) +
-							(char *)smb_buffer;
+				iov.iov_base = (4 - pdu_length) + buf;
 				iov.iov_len = pdu_length;
 				smb_msg.msg_control = NULL;
 				smb_msg.msg_controllen = 0;
@@ -440,114 +631,42 @@  incomplete_rcv:
 		/* The right amount was read from socket - 4 bytes */
 		/* so we can now interpret the length field */
 
-		/* the first byte big endian of the length field,
-		is actually not part of the length but the type
-		with the most common, zero, as regular data */
-		temp = *((char *) smb_buffer);
-
-		/* Note that FC 1001 length is big endian on the wire,
-		but we convert it here so it is always manipulated
-		as host byte order */
+		/*
+		 * Note that FC 1001 length is big endian on the wire,
+		 * but we convert it here so it is always manipulated
+		 * as host byte order
+		 */
 		pdu_length = be32_to_cpu(smb_buffer->smb_buf_length);
-
-		cFYI(1, "rfc1002 length 0x%x", pdu_length+4);
-
-		if (temp == (char) RFC1002_SESSION_KEEP_ALIVE) {
-			continue;
-		} else if (temp == (char)RFC1002_POSITIVE_SESSION_RESPONSE) {
-			cFYI(1, "Good RFC 1002 session rsp");
-			continue;
-		} else if (temp == (char)RFC1002_NEGATIVE_SESSION_RESPONSE) {
-			/* we get this from Windows 98 instead of
-			   an error on SMB negprot response */
-			cFYI(1, "Negative RFC1002 Session Response Error 0x%x)",
-				pdu_length);
-			/* give server a second to clean up  */
-			msleep(1000);
-			/* always try 445 first on reconnect since we get NACK
-			 * on some if we ever connected to port 139 (the NACK
-			 * is since we do not begin with RFC1001 session
-			 * initialize frame)
-			 */
-			cifs_set_port((struct sockaddr *)
-					&server->dstaddr, CIFS_PORT);
-			cifs_reconnect(server);
-			csocket = server->ssocket;
-			wake_up(&server->response_q);
-			continue;
-		} else if (temp != (char) 0) {
-			cERROR(1, "Unknown RFC 1002 frame");
-			cifs_dump_mem(" Received Data: ", (char *)smb_buffer,
-				      length);
-			cifs_reconnect(server);
-			csocket = server->ssocket;
-			continue;
-		}
-
-		/* else we have an SMB response */
-		if ((pdu_length > CIFSMaxBufSize + MAX_CIFS_HDR_SIZE - 4) ||
-			    (pdu_length < sizeof(struct smb_hdr) - 1 - 4)) {
-			cERROR(1, "Invalid size SMB length %d pdu_length %d",
-					length, pdu_length+4);
-			cifs_reconnect(server);
-			csocket = server->ssocket;
-			wake_up(&server->response_q);
+		rc = check_rfc1002_header(server, buf, length, pdu_length,
+					  &csocket);
+		if (rc)
 			continue;
-		}
 
-		/* else length ok */
-		reconnect = 0;
+		cFYI(1, "rfc1002 length 0x%x", pdu_length+4);
 
 		if (pdu_length > MAX_CIFS_SMALL_BUFFER_SIZE - 4) {
 			isLargeBuf = true;
 			memcpy(bigbuf, smallbuf, 4);
-			smb_buffer = bigbuf;
+			smb_buffer = (struct smb_hdr *)bigbuf;
+			buf = bigbuf;
 		}
-		length = 0;
-		iov.iov_base = 4 + (char *)smb_buffer;
+
+		iov.iov_base = 4 + buf;
 		iov.iov_len = pdu_length;
-		for (total_read = 0; total_read < pdu_length;
-		     total_read += length) {
-			length = kernel_recvmsg(csocket, &smb_msg, &iov, 1,
-						pdu_length - total_read, 0);
-			if (server->tcpStatus == CifsExiting) {
-				/* then will exit */
-				reconnect = 2;
-				break;
-			} else if (server->tcpStatus == CifsNeedReconnect) {
-				cifs_reconnect(server);
-				csocket = server->ssocket;
-				/* Reconnect wakes up rspns q */
-				/* Now we will reread sock */
-				reconnect = 1;
-				break;
-			} else if (length == -ERESTARTSYS ||
-				   length == -EAGAIN ||
-				   length == -EINTR) {
-				msleep(1); /* minimum sleep to prevent looping,
-					      allowing socket to clear and app
-					      threads to set tcpStatus
-					      CifsNeedReconnect if server hung*/
-				length = 0;
-				continue;
-			} else if (length <= 0) {
-				cERROR(1, "Received no data, expecting %d",
-					      pdu_length - total_read);
-				cifs_reconnect(server);
-				csocket = server->ssocket;
-				reconnect = 1;
-				break;
-			}
-		}
-		if (reconnect == 2)
+		rc = read_from_socket(server, pdu_length, &csocket, &smb_msg,
+				      &iov, &total_read);
+		if (rc == 2)
 			break;
-		else if (reconnect == 1)
+		else if (rc == 1)
 			continue;
 
 		total_read += 4; /* account for rfc1002 hdr */
 
 		dump_smb(smb_buffer, total_read);
 
+		server->lstrp = jiffies;
+		length = 0;
+
 		/*
 		 * We know that we received enough to get to the MID as we
 		 * checked the pdu_length earlier. Now check to see
@@ -559,75 +678,11 @@  incomplete_rcv:
 		 */
 		length = checkSMB(smb_buffer, smb_buffer->Mid, total_read);
 		if (length != 0)
-			cifs_dump_mem("Bad SMB: ", smb_buffer,
-					min_t(unsigned int, total_read, 48));
-
-		mid_entry = NULL;
-		server->lstrp = jiffies;
-
-		spin_lock(&GlobalMid_Lock);
-		list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
-			mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
-
-			if (mid_entry->mid != smb_buffer->Mid ||
-			    mid_entry->midState != MID_REQUEST_SUBMITTED ||
-			    mid_entry->command != smb_buffer->Command) {
-				mid_entry = NULL;
-				continue;
-			}
-
-			if (length == 0 &&
-			    check2ndT2(smb_buffer, server->maxBuf) > 0) {
-				/* We have a multipart transact2 resp */
-				isMultiRsp = true;
-				if (mid_entry->resp_buf) {
-					/* merge response - fix up 1st*/
-					length = coalesce_t2(smb_buffer,
-							mid_entry->resp_buf);
-					if (length > 0) {
-						length = 0;
-						mid_entry->multiRsp = true;
-						break;
-					} else {
-						/* all parts received or
-						 * packet is malformed
-						 */
-						mid_entry->multiEnd = true;
-						goto multi_t2_fnd;
-					}
-				} else {
-					if (!isLargeBuf) {
-						/*
-						 * FIXME: switch to already
-						 *        allocated largebuf?
-						 */
-						cERROR(1, "1st trans2 resp "
-							  "needs bigbuf");
-					} else {
-						/* Have first buffer */
-						mid_entry->resp_buf =
-							 smb_buffer;
-						mid_entry->largeBuf = true;
-						bigbuf = NULL;
-					}
-				}
-				break;
-			}
-			mid_entry->resp_buf = smb_buffer;
-			mid_entry->largeBuf = isLargeBuf;
-multi_t2_fnd:
-			if (length == 0)
-				mid_entry->midState = MID_RESPONSE_RECEIVED;
-			else
-				mid_entry->midState = MID_RESPONSE_MALFORMED;
-#ifdef CONFIG_CIFS_STATS2
-			mid_entry->when_received = jiffies;
-#endif
-			list_del_init(&mid_entry->qhead);
-			break;
-		}
-		spin_unlock(&GlobalMid_Lock);
+			cifs_dump_mem("Bad SMB: ", buf,
+				      min_t(unsigned int, total_read, 48));
 
+		mid_entry = find_cifs_owner(server, smb_buffer, &length,
+					    isLargeBuf, &isMultiRsp, &bigbuf);
 		if (mid_entry != NULL) {
 			mid_entry->callback(mid_entry);
 			/* Was previous buf put in mpx struct for multi-rsp? */
@@ -645,13 +700,12 @@  multi_t2_fnd:
 			   !isMultiRsp) {
 			cERROR(1, "No task to wake, unknown frame received! "
 				   "NumMids %d", atomic_read(&midCount));
-			cifs_dump_mem("Received Data is: ", (char *)smb_buffer,
+			cifs_dump_mem("Received Data is: ", buf,
 				      sizeof(struct smb_hdr));
 #ifdef CONFIG_CIFS_DEBUG2
 			cifs_dump_detail(smb_buffer);
 			cifs_dump_mids(server);
 #endif /* CIFS_DEBUG2 */
-
 		}
 	} /* end while !EXITING */