Lines Matching defs:TCP_Server_Info

668 struct TCP_Server_Info {  struct
669 struct list_head tcp_ses_list;
670 struct list_head smb_ses_list;
671 int srv_count; /* reference counter */
673 char server_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
674 struct smb_version_operations *ops;
675 struct smb_version_values *vals;
676 enum statusEnum tcpStatus; /* what we think the status is */
677 char *hostname; /* hostname portion of UNC string */
678 struct socket *ssocket;
679 struct sockaddr_storage dstaddr;
680 struct sockaddr_storage srcaddr; /* locally bind to this IP */
682 struct net *net;
684 wait_queue_head_t response_q;
685 wait_queue_head_t request_q; /* if more than maxmpx to srvr must block*/
686 struct list_head pending_mid_q;
687 bool noblocksnd; /* use blocking sendmsg */
688 bool noautotune; /* do not autotune send buf sizes */
689 bool tcp_nodelay;
690 unsigned int credits; /* send no more requests at once */
691 unsigned int max_credits; /* can override large 32000 default at mnt */
692 unsigned int in_flight; /* number of requests on the wire to server */
693 unsigned int max_in_flight; /* max number of requests that were on wire */
694 spinlock_t req_lock; /* protect the two values above */
695 struct mutex srv_mutex;
696 struct task_struct *tsk;
697 char server_GUID[16];
698 __u16 sec_mode;
699 bool sign; /* is signing enabled on this connection? */
700 bool ignore_signature:1; /* skip validation of signatures in SMB2/3 rsp */
701 bool session_estab; /* mark when very first sess is established */
702 int echo_credits; /* echo reserved slots */
703 int oplock_credits; /* oplock break reserved slots */
704 bool echoes:1; /* enable echoes */
705 __u8 client_guid[SMB2_CLIENT_GUID_SIZE]; /* Client GUID */
706 u16 dialect; /* dialect index that server chose */
707 bool oplocks:1; /* enable oplocks */
708 unsigned int maxReq; /* Clients should submit no more */
711 unsigned int maxBuf; /* maxBuf specifies the maximum */
715 unsigned int max_rw; /* maxRw specifies the maximum */
718 unsigned int capabilities; /* selective disabling of caps by smb sess */
719 int timeAdj; /* Adjust for difference in server time zone in sec */
720 __u64 CurrentMid; /* multiplex id - rotating counter */
721 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlm, ntlmv2 etc */
723 char workstation_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
724 __u32 sequence_number; /* for signing, protected by srv_mutex */
725 __u32 reconnect_instance; /* incremented on each reconnect */
726 struct session_key session_key;
727 unsigned long lstrp; /* when we got last response from this server */
728 struct cifs_secmech secmech; /* crypto sec mech functs, descriptors */
732 char negflavor; /* NEGOTIATE response flavor */
734 bool sec_ntlmssp; /* supports NTLMSSP */
735 bool sec_kerberosu2u; /* supports U2U Kerberos */
736 bool sec_kerberos; /* supports plain Kerberos */
737 bool sec_mskerberos; /* supports legacy MS Kerberos */
738 bool large_buf; /* is current buffer large? */
740 bool rdma;
742 struct smbd_connection *smbd_conn;
743 struct delayed_work echo; /* echo ping workqueue job */
744 char *smallbuf; /* pointer to current "small" buffer */
745 char *bigbuf; /* pointer to current "big" buffer */
747 unsigned int pdu_size;
748 unsigned int total_read; /* total amount of data read in this pass */
749 atomic_t in_send; /* requests trying to send */
750 atomic_t num_waiters; /* blocked waiting to get in sendrecv */
752 struct fscache_cookie *fscache; /* client index cache cookie */
755 atomic_t num_cmds[NUMBER_OF_SMB2_COMMANDS]; /* total requests by cmd */
756 atomic_t smb2slowcmd[NUMBER_OF_SMB2_COMMANDS]; /* count resps > 1 sec */
757 __u64 time_per_cmd[NUMBER_OF_SMB2_COMMANDS]; /* total time per cmd */
758 __u32 slowest_cmd[NUMBER_OF_SMB2_COMMANDS];
759 __u32 fastest_cmd[NUMBER_OF_SMB2_COMMANDS];
761 unsigned int max_read;
762 unsigned int max_write;
763 unsigned int min_offload;
764 __le16 compress_algorithm;
765 __le16 cipher_type;
789 in_flight(struct TCP_Server_Info *server) in in_flight() argument