Lines Matching defs:server
73 struct TCP_Server_Info *server;
85 server = ses->server;
103 rc = cifs_wait_for_server_reconnect(server, tcon->retry);
108 if (!cifs_chan_needs_reconnect(ses, server) && !tcon->need_reconnect) {
117 * and the server never sends an answer the socket will be closed
120 spin_lock(&server->srv_lock);
121 if (server->tcpStatus == CifsNeedReconnect) {
122 spin_unlock(&server->srv_lock);
130 spin_unlock(&server->srv_lock);
140 if (!cifs_chan_needs_reconnect(ses, server) &&
155 rc = cifs_negotiate_protocol(0, ses, server);
157 rc = cifs_setup_session(0, ses, server, nls_codepage);
178 /* tell server Unix caps we support */
246 buffer->Mid = get_next_mid(ses->server);
305 if (cifs_chan_needs_reconnect(tcon->ses, tcon->ses->server) ||
353 struct TCP_Server_Info *server = ses->server;
360 if (server->srv_count > 1) {
362 if (memcmp(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE) != 0) {
363 cifs_dbg(FYI, "server UID changed\n");
364 memcpy(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE);
368 memcpy(server->server_GUID, guid, SMB1_CLIENT_GUID_SIZE);
372 server->sec_ntlmssp = true;
376 pSMBr->u.extended_response.SecurityBlob, count, server);
404 struct TCP_Server_Info *server)
413 if (!server) {
414 WARN(1, "%s: server is NULL!\n", __func__);
423 pSMB->hdr.Mid = get_next_mid(server);
450 server->dialect = le16_to_cpu(pSMBr->DialectIndex);
451 cifs_dbg(FYI, "Dialect: %d\n", server->dialect);
453 if ((pSMBr->hdr.WordCount <= 13) || (server->dialect == BAD_PROT)) {
466 server->sec_mode = pSMBr->SecurityMode;
467 if ((server->sec_mode & SECMODE_USER) == 0)
472 server->maxReq = min_t(unsigned int, le16_to_cpu(pSMBr->MaxMpxCount),
474 set_credits(server, server->maxReq);
476 server->maxBuf = le32_to_cpu(pSMBr->MaxBufferSize);
478 server->max_read = server->maxBuf;
479 server->max_rw = le32_to_cpu(pSMBr->MaxRawSize);
480 cifs_dbg(NOISY, "Max buf = %d\n", ses->server->maxBuf);
481 server->capabilities = le32_to_cpu(pSMBr->Capabilities);
482 server->timeAdj = (int)(__s16)le16_to_cpu(pSMBr->ServerTimeZone);
483 server->timeAdj *= 60;
486 server->negflavor = CIFS_NEGFLAVOR_UNENCAP;
487 memcpy(ses->server->cryptkey, pSMBr->u.EncryptionKey,
490 server->capabilities & CAP_EXTENDED_SECURITY) {
491 server->negflavor = CIFS_NEGFLAVOR_EXTENDED;
493 } else if (server->sec_mode & SECMODE_PW_ENCRYPT) {
496 server->negflavor = CIFS_NEGFLAVOR_UNENCAP;
497 server->capabilities &= ~CAP_EXTENDED_SECURITY;
501 rc = cifs_enable_signing(server, ses->sign);
518 if ((tcon->ses == NULL) || (tcon->ses->server == NULL))
523 * closed on server already e.g. due to tcp session crashing. Also,
545 closed on server already e.g. due to tcp session crashing */
554 * rather in the fact that the server sent one and that server->lstrp
562 struct TCP_Server_Info *server = mid->callback_data;
566 add_credits(server, &credits, CIFS_ECHO_OP);
570 CIFSSMBEcho(struct TCP_Server_Info *server)
584 if (server->capabilities & CAP_UNICODE)
600 rc = cifs_call_async(server, &rqst, NULL, cifs_echo_callback, NULL,
601 server, CIFS_NON_BLOCKING | CIFS_ECHO_OP, NULL);
619 * BB: do we need to check validity of ses and server? They should
623 if (!ses || !ses->server)
641 pSMB->hdr.Mid = get_next_mid(ses->server);
643 if (ses->server->sign)
655 since server closed smb session, no sense reporting
1078 as fifo and server expecting SFU style and
1194 * Set file as system file if special file such as fifo and server
1267 struct TCP_Server_Info *server = tcon->ses->server;
1281 if (server->sign) {
1284 rc = cifs_verify_signature(&rqst, server,
1297 if (server->sign && rdata->got_bytes)
1310 add_credits(server, &credits, 0);
1368 rc = cifs_call_async(tcon->ses->server, &rqst, cifs_readv_receive,
1418 if (tcon->ses->server == NULL)
1531 if (tcon->ses->server == NULL)
1545 can send more if LARGE_WRITE_X capability returned by the server and if
1551 bytes_sent = (tcon->ses->server->maxBuf - MAX_CIFS_HDR_SIZE)
1596 * server is greater than bytes requested by the client. Some
1626 wdata->result = cifs_check_receive(mid, tcon->ses->server, 0);
1635 * by the server is greater than bytes requested by the
1658 add_credits(tcon->ses->server, &credits, 0);
1732 rc = cifs_call_async(tcon->ses->server, &rqst, NULL,
1782 if (tcon->ses->server == NULL)
1835 * server is greater than bytes requested by the client. OS/2
2123 /* Since session is dead, file will be closed on server already */
3375 /* Get Security Descriptor (by handle) from remote server for a file or dir */
4013 * unexpectedly by server.
4210 /* Since session is dead, search handle closed on server already */
4339 /* server pointer checked in called function,
4341 pSMB->hdr.Mid = get_next_mid(ses->server);
4361 if (ses->server->sign)
4487 * much prefer larger but if server doesn't report
4574 * much prefer larger but if server doesn't report
4944 * much prefer larger but if server doesn't report
5407 * Samba server ignores set of file size to zero due to bugs in some
5410 * accidentally as happened on one Samba server beta by putting
5688 cifs_dbg(FYI, "empty EA list returned from server\n");