Lines Matching defs:server
96 * were closed when session to server was lost.
133 struct TCP_Server_Info *server;
146 server = ses->server;
162 retries = server->nr_targets;
169 while (server->tcpStatus == CifsNeedReconnect) {
170 rc = wait_event_interruptible_timeout(server->response_q,
171 (server->tcpStatus != CifsNeedReconnect),
180 if (server->tcpStatus != CifsNeedReconnect)
188 * retrying until process is killed or server comes
195 retries = server->nr_targets;
211 * and the server never sends an answer the socket will be closed
214 if (server->tcpStatus == CifsNeedReconnect) {
242 /* tell server Unix caps we support */
311 buffer->Mid = get_next_mid(ses->server);
413 struct TCP_Server_Info *server = ses->server;
420 if (server->srv_count > 1) {
422 if (memcmp(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE) != 0) {
423 cifs_dbg(FYI, "server UID changed\n");
424 memcpy(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE);
428 memcpy(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE);
432 server->sec_ntlmssp = true;
436 pSMBr->u.extended_response.SecurityBlob, count, server);
445 cifs_enable_signing(struct TCP_Server_Info *server, bool mnt_sign_required)
447 bool srv_sign_required = server->sec_mode & server->vals->signing_required;
448 bool srv_sign_enabled = server->sec_mode & server->vals->signing_enabled;
466 /* If server requires signing, does client allow it? */
472 server->sign = true;
475 /* If client requires signing, does server allow it? */
481 server->sign = true;
484 if (cifs_rdma_enabled(server) && server->sign)
492 decode_lanman_negprot_rsp(struct TCP_Server_Info *server, NEGOTIATE_RSP *pSMBr)
497 if (server->dialect != LANMAN_PROT && server->dialect != LANMAN2_PROT)
500 server->sec_mode = le16_to_cpu(rsp->SecurityMode);
501 server->maxReq = min_t(unsigned int,
504 set_credits(server, server->maxReq);
505 server->maxBuf = le16_to_cpu(rsp->MaxBufSize);
507 server->max_read = server->maxBuf;
511 server->max_rw = 0xFF00;
512 server->capabilities = CAP_MPX_MODE | CAP_RAW_MODE;
514 server->max_rw = 0;/* do not need to use raw anyway */
515 server->capabilities = CAP_MPX_MODE;
520 * we must use server time to calc time zone.
542 server->timeAdj = result;
544 server->timeAdj = (int)tmp;
545 server->timeAdj *= 60; /* also in seconds */
547 cifs_dbg(FYI, "server->timeAdj: %d seconds\n", server->timeAdj);
550 /* BB get server time for time conversions and add
555 memcpy(server->cryptkey, rsp->EncryptionKey,
557 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
566 decode_lanman_negprot_rsp(struct TCP_Server_Info *server, NEGOTIATE_RSP *pSMBr)
598 struct TCP_Server_Info *server = ses->server;
601 if (!server) {
602 WARN(1, "%s: server is NULL!\n", __func__);
611 pSMB->hdr.Mid = get_next_mid(server);
638 server->dialect = le16_to_cpu(pSMBr->DialectIndex);
639 cifs_dbg(FYI, "Dialect: %d\n", server->dialect);
641 if ((pSMBr->hdr.WordCount < 13) || (server->dialect == BAD_PROT)) {
648 server->negflavor = CIFS_NEGFLAVOR_LANMAN;
649 rc = decode_lanman_negprot_rsp(server, pSMBr);
658 server->sec_mode = pSMBr->SecurityMode;
659 if ((server->sec_mode & SECMODE_USER) == 0)
664 server->maxReq = min_t(unsigned int, le16_to_cpu(pSMBr->MaxMpxCount),
666 set_credits(server, server->maxReq);
668 server->maxBuf = le32_to_cpu(pSMBr->MaxBufferSize);
670 server->max_read = server->maxBuf;
671 server->max_rw = le32_to_cpu(pSMBr->MaxRawSize);
672 cifs_dbg(NOISY, "Max buf = %d\n", ses->server->maxBuf);
673 server->capabilities = le32_to_cpu(pSMBr->Capabilities);
674 server->timeAdj = (int)(__s16)le16_to_cpu(pSMBr->ServerTimeZone);
675 server->timeAdj *= 60;
678 server->negflavor = CIFS_NEGFLAVOR_UNENCAP;
679 memcpy(ses->server->cryptkey, pSMBr->u.EncryptionKey,
682 server->capabilities & CAP_EXTENDED_SECURITY) {
683 server->negflavor = CIFS_NEGFLAVOR_EXTENDED;
685 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
688 server->negflavor = CIFS_NEGFLAVOR_UNENCAP;
689 server->capabilities &= ~CAP_EXTENDED_SECURITY;
694 rc = cifs_enable_signing(server, ses->sign);
711 if ((tcon->ses == NULL) || (tcon->ses->server == NULL))
716 * closed on server already e.g. due to tcp session crashing. Also,
734 closed on server already e.g. due to tcp session crashing */
743 * rather in the fact that the server sent one and that server->lstrp
751 struct TCP_Server_Info *server = mid->callback_data;
755 add_credits(server, &credits, CIFS_ECHO_OP);
759 CIFSSMBEcho(struct TCP_Server_Info *server)
773 if (server->capabilities & CAP_UNICODE)
789 rc = cifs_call_async(server, &rqst, NULL, cifs_echo_callback, NULL,
790 server, CIFS_NON_BLOCKING | CIFS_ECHO_OP, NULL);
808 * BB: do we need to check validity of ses and server? They should
812 if (!ses || !ses->server)
825 pSMB->hdr.Mid = get_next_mid(ses->server);
827 if (ses->server->sign)
839 since server closed smb session, no sense reporting
1258 as fifo and server expecting SFU style and
1374 * Set file as system file if special file such as fifo and server
1445 cifs_discard_remaining_data(struct TCP_Server_Info *server)
1447 unsigned int rfclen = server->pdu_size;
1448 int remaining = rfclen + server->vals->header_preamble_size -
1449 server->total_read;
1454 length = cifs_discard_from_socket(server,
1456 CIFSMaxBufSize + MAX_HEADER_SIZE(server)));
1459 server->total_read += length;
1467 __cifs_readv_discard(struct TCP_Server_Info *server, struct mid_q_entry *mid,
1472 length = cifs_discard_remaining_data(server);
1474 mid->resp_buf = server->smallbuf;
1475 server->smallbuf = NULL;
1480 cifs_readv_discard(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1484 return __cifs_readv_discard(server, mid, rdata->result);
1488 cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1493 char *buf = server->smallbuf;
1494 unsigned int buflen = server->pdu_size +
1495 server->vals->header_preamble_size;
1506 len = min_t(unsigned int, buflen, server->vals->read_rsp_size) -
1507 HEADER_SIZE(server) + 1;
1509 length = cifs_read_from_socket(server,
1510 buf + HEADER_SIZE(server) - 1, len);
1513 server->total_read += length;
1515 if (server->ops->is_session_expired &&
1516 server->ops->is_session_expired(buf)) {
1517 cifs_reconnect(server);
1521 if (server->ops->is_status_pending &&
1522 server->ops->is_status_pending(buf, server)) {
1523 cifs_discard_remaining_data(server);
1529 rdata->iov[0].iov_len = server->vals->header_preamble_size;
1530 rdata->iov[1].iov_base = buf + server->vals->header_preamble_size;
1532 server->total_read - server->vals->header_preamble_size;
1539 rdata->result = server->ops->map_error(buf, false);
1541 cifs_dbg(FYI, "%s: server returned error %d\n",
1544 return __cifs_readv_discard(server, mid, false);
1548 if (server->total_read < server->vals->read_rsp_size) {
1549 cifs_dbg(FYI, "%s: server returned short header. got=%u expected=%zu\n",
1550 __func__, server->total_read,
1551 server->vals->read_rsp_size);
1553 return cifs_readv_discard(server, mid);
1556 data_offset = server->ops->read_data_offset(buf) +
1557 server->vals->header_preamble_size;
1558 if (data_offset < server->total_read) {
1566 data_offset = server->total_read;
1572 return cifs_readv_discard(server, mid);
1576 __func__, server->total_read, data_offset);
1578 len = data_offset - server->total_read;
1581 length = cifs_read_from_socket(server,
1582 buf + server->total_read, len);
1585 server->total_read += length;
1592 data_len = server->ops->read_data_length(buf, use_rdma_mr);
1596 return cifs_readv_discard(server, mid);
1599 length = rdata->read_into_pages(server, rdata, data_len);
1603 server->total_read += length;
1606 server->total_read, buflen, data_len);
1609 if (server->total_read < buflen)
1610 return cifs_readv_discard(server, mid);
1613 mid->resp_buf = server->smallbuf;
1614 server->smallbuf = NULL;
1623 struct TCP_Server_Info *server = tcon->ses->server;
1640 if (server->sign) {
1643 rc = cifs_verify_signature(&rqst, server,
1656 if (server->sign && rdata->got_bytes)
1669 add_credits(server, &credits, 0);
1727 rc = cifs_call_async(tcon->ses->server, &rqst, cifs_readv_receive,
1777 if (tcon->ses->server == NULL)
1890 if (tcon->ses->server == NULL)
1904 can send more if LARGE_WRITE_X capability returned by the server and if
1910 bytes_sent = (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE)
1955 * server is greater than bytes requested by the client. Some
1998 struct TCP_Server_Info *server;
2001 server = tlink_tcon(wdata->cfile->tlink)->ses->server;
2008 wsize = server->ops->wp_retry_size(inode);
2051 rc = server->ops->async_writev(wdata2,
2161 wdata->result = cifs_check_receive(mid, tcon->ses->server, 0);
2170 * by the server is greater than bytes requested by the
2193 add_credits(tcon->ses->server, &credits, 0);
2270 rc = cifs_call_async(tcon->ses->server, &rqst, NULL,
2320 if (tcon->ses->server == NULL)
2373 * server is greater than bytes requested by the client. OS/2
2659 /* Since session is dead, file will be closed on server already */
3889 /* Get Security Descriptor (by handle) from remote server for a file or dir */
4524 rejected unexpectedly by server */
4743 /* Since session is dead, search handle closed on server already */
4872 /* server pointer checked in called function,
4874 pSMB->hdr.Mid = get_next_mid(ses->server);
4894 if (ses->server->sign)
5020 * much prefer larger but if server doesn't report
5107 * much prefer larger but if server doesn't report
5477 * much prefer larger but if server doesn't report
5988 * Samba server ignores set of file size to zero due to bugs in some
5991 * accidentally as happened on one Samba server beta by putting
6270 cifs_dbg(FYI, "empty EA list returned from server\n");