Lines Matching full:server
30 change_conf(struct TCP_Server_Info *server) in change_conf() argument
32 server->credits += server->echo_credits + server->oplock_credits; in change_conf()
33 server->oplock_credits = server->echo_credits = 0; in change_conf()
34 switch (server->credits) { in change_conf()
38 server->echoes = false; in change_conf()
39 server->oplocks = false; in change_conf()
42 server->echoes = true; in change_conf()
43 server->oplocks = false; in change_conf()
44 server->echo_credits = 1; in change_conf()
47 server->echoes = true; in change_conf()
49 server->oplocks = true; in change_conf()
50 server->oplock_credits = 1; in change_conf()
52 server->oplocks = false; in change_conf()
54 server->echo_credits = 1; in change_conf()
56 server->credits -= server->echo_credits + server->oplock_credits; in change_conf()
57 return server->credits + server->echo_credits + server->oplock_credits; in change_conf()
61 smb2_add_credits(struct TCP_Server_Info *server, in smb2_add_credits() argument
69 spin_lock(&server->req_lock); in smb2_add_credits()
70 val = server->ops->get_credits_field(server, optype); in smb2_add_credits()
74 trace_smb3_reconnect_with_invalid_credits(server->CurrentMid, in smb2_add_credits()
75 server->hostname, *val, add); in smb2_add_credits()
76 if ((instance == 0) || (instance == server->reconnect_instance)) in smb2_add_credits()
83 pr_warn_once("server overflowed SMB3 credits\n"); in smb2_add_credits()
85 server->in_flight--; in smb2_add_credits()
86 if (server->in_flight == 0 && (optype & CIFS_OP_MASK) != CIFS_NEG_OP) in smb2_add_credits()
87 rc = change_conf(server); in smb2_add_credits()
89 * Sometimes server returns 0 credits on oplock break ack - we need to in smb2_add_credits()
92 else if (server->in_flight > 0 && server->oplock_credits == 0 && in smb2_add_credits()
93 server->oplocks) { in smb2_add_credits()
94 if (server->credits > 1) { in smb2_add_credits()
95 server->credits--; in smb2_add_credits()
96 server->oplock_credits++; in smb2_add_credits()
99 spin_unlock(&server->req_lock); in smb2_add_credits()
100 wake_up(&server->request_q); in smb2_add_credits()
103 cifs_dbg(FYI, "trying to put %d credits from the old server instance %d\n", in smb2_add_credits()
106 if (server->tcpStatus == CifsNeedReconnect in smb2_add_credits()
107 || server->tcpStatus == CifsExiting) in smb2_add_credits()
115 cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits()
124 trace_smb3_add_credits(server->CurrentMid, in smb2_add_credits()
125 server->hostname, rc, add); in smb2_add_credits()
131 smb2_set_credits(struct TCP_Server_Info *server, const int val) in smb2_set_credits() argument
133 spin_lock(&server->req_lock); in smb2_set_credits()
134 server->credits = val; in smb2_set_credits()
136 server->reconnect_instance++; in smb2_set_credits()
137 spin_unlock(&server->req_lock); in smb2_set_credits()
144 smb2_get_credits_field(struct TCP_Server_Info *server, const int optype) in smb2_get_credits_field() argument
148 return &server->echo_credits; in smb2_get_credits_field()
150 return &server->oplock_credits; in smb2_get_credits_field()
152 return &server->credits; in smb2_get_credits_field()
163 smb2_wait_mtu_credits(struct TCP_Server_Info *server, unsigned int size, in smb2_wait_mtu_credits() argument
169 spin_lock(&server->req_lock); in smb2_wait_mtu_credits()
171 if (server->credits <= 0) { in smb2_wait_mtu_credits()
172 spin_unlock(&server->req_lock); in smb2_wait_mtu_credits()
173 cifs_num_waiters_inc(server); in smb2_wait_mtu_credits()
174 rc = wait_event_killable(server->request_q, in smb2_wait_mtu_credits()
175 has_credits(server, &server->credits, 1)); in smb2_wait_mtu_credits()
176 cifs_num_waiters_dec(server); in smb2_wait_mtu_credits()
179 spin_lock(&server->req_lock); in smb2_wait_mtu_credits()
181 if (server->tcpStatus == CifsExiting) { in smb2_wait_mtu_credits()
182 spin_unlock(&server->req_lock); in smb2_wait_mtu_credits()
186 scredits = server->credits; in smb2_wait_mtu_credits()
202 credits->instance = server->reconnect_instance; in smb2_wait_mtu_credits()
203 server->credits -= credits->value; in smb2_wait_mtu_credits()
204 server->in_flight++; in smb2_wait_mtu_credits()
205 if (server->in_flight > server->max_in_flight) in smb2_wait_mtu_credits()
206 server->max_in_flight = server->in_flight; in smb2_wait_mtu_credits()
210 spin_unlock(&server->req_lock); in smb2_wait_mtu_credits()
215 smb2_adjust_credits(struct TCP_Server_Info *server, in smb2_adjust_credits() argument
230 spin_lock(&server->req_lock); in smb2_adjust_credits()
232 if (server->reconnect_instance != credits->instance) { in smb2_adjust_credits()
233 spin_unlock(&server->req_lock); in smb2_adjust_credits()
239 server->credits += credits->value - new_val; in smb2_adjust_credits()
240 spin_unlock(&server->req_lock); in smb2_adjust_credits()
241 wake_up(&server->request_q); in smb2_adjust_credits()
247 smb2_get_next_mid(struct TCP_Server_Info *server) in smb2_get_next_mid() argument
252 mid = server->CurrentMid++; in smb2_get_next_mid()
258 smb2_revert_current_mid(struct TCP_Server_Info *server, const unsigned int val) in smb2_revert_current_mid() argument
261 if (server->CurrentMid >= val) in smb2_revert_current_mid()
262 server->CurrentMid -= val; in smb2_revert_current_mid()
267 __smb2_find_mid(struct TCP_Server_Info *server, char *buf, bool dequeue) in __smb2_find_mid() argument
279 list_for_each_entry(mid, &server->pending_mid_q, qhead) { in __smb2_find_mid()
297 smb2_find_mid(struct TCP_Server_Info *server, char *buf) in smb2_find_mid() argument
299 return __smb2_find_mid(server, buf, false); in smb2_find_mid()
303 smb2_find_dequeue_mid(struct TCP_Server_Info *server, char *buf) in smb2_find_dequeue_mid() argument
305 return __smb2_find_mid(server, buf, true); in smb2_find_dequeue_mid()
309 smb2_dump_detail(void *buf, struct TCP_Server_Info *server) in smb2_dump_detail() argument
318 server->ops->calc_smb_size(buf, server)); in smb2_dump_detail()
323 smb2_need_neg(struct TCP_Server_Info *server) in smb2_need_neg() argument
325 return server->max_read == 0; in smb2_need_neg()
344 struct TCP_Server_Info *server = tcon->ses->server; in smb2_negotiate_wsize() local
349 wsize = min_t(unsigned int, wsize, server->max_write); in smb2_negotiate_wsize()
350 if (!(server->capabilities & SMB2_GLOBAL_CAP_LARGE_MTU)) in smb2_negotiate_wsize()
359 struct TCP_Server_Info *server = tcon->ses->server; in smb3_negotiate_wsize() local
364 wsize = min_t(unsigned int, wsize, server->max_write); in smb3_negotiate_wsize()
366 if (server->rdma) { in smb3_negotiate_wsize()
367 if (server->sign) in smb3_negotiate_wsize()
374 server->smbd_conn->max_fragmented_send_size - in smb3_negotiate_wsize()
379 wsize, server->smbd_conn->max_readwrite_size); in smb3_negotiate_wsize()
382 if (!(server->capabilities & SMB2_GLOBAL_CAP_LARGE_MTU)) in smb3_negotiate_wsize()
391 struct TCP_Server_Info *server = tcon->ses->server; in smb2_negotiate_rsize() local
396 rsize = min_t(unsigned int, rsize, server->max_read); in smb2_negotiate_rsize()
398 if (!(server->capabilities & SMB2_GLOBAL_CAP_LARGE_MTU)) in smb2_negotiate_rsize()
407 struct TCP_Server_Info *server = tcon->ses->server; in smb3_negotiate_rsize() local
412 rsize = min_t(unsigned int, rsize, server->max_read); in smb3_negotiate_rsize()
414 if (server->rdma) { in smb3_negotiate_rsize()
415 if (server->sign) in smb3_negotiate_rsize()
422 server->smbd_conn->max_fragmented_recv_size - in smb3_negotiate_rsize()
427 rsize, server->smbd_conn->max_readwrite_size); in smb3_negotiate_rsize()
431 if (!(server->capabilities & SMB2_GLOBAL_CAP_LARGE_MTU)) in smb3_negotiate_rsize()
594 "server does not support query network interfaces\n"); in SMB3_request_interfaces()
676 struct TCP_Server_Info *server = ses->server; in open_shroot() local
711 if (!server->ops->new_lease_key) in open_shroot()
715 server->ops->new_lease_key(pfid); in open_shroot()
733 rc = SMB2_open_init(tcon, server, in open_shroot()
743 rc = SMB2_query_info_init(tcon, server, in open_shroot()
754 rc = compound_send_recv(xid, ses, server, in open_shroot()
796 pr_warn_once("server share %s deleted\n", in open_shroot()
820 smb2_parse_contexts(server, o_rsp, in open_shroot()
1136 struct TCP_Server_Info *server = cifs_pick_channel(ses); in smb2_set_ea() local
1170 if (ses->server->ops->query_all_EAs) { in smb2_set_ea()
1172 rc = ses->server->ops->query_all_EAs(xid, tcon, path, in smb2_set_ea()
1225 rc = SMB2_open_init(tcon, server, in smb2_set_ea()
1252 rc = SMB2_set_info_init(tcon, server, in smb2_set_ea()
1265 rc = SMB2_close_init(tcon, server, in smb2_set_ea()
1269 rc = compound_send_recv(xid, ses, server, in smb2_set_ea()
1288 smb2_can_echo(struct TCP_Server_Info *server) in smb2_can_echo() argument
1290 return server->echoes; in smb2_can_echo()
1350 seq_printf(m, "\nOpen files: %d total (local), %d open on server", in smb2_print_stats()
1401 struct TCP_Server_Info *server = tlink_tcon(cfile->tlink)->ses->server; in smb2_set_fid() local
1409 server->ops->set_oplock_level(cinode, oplock, fid->epoch, in smb2_set_fid()
1512 struct TCP_Server_Info *server = cifs_pick_channel(ses); in smb2_ioctl_query_info() local
1545 if (!ses || !server) { in smb2_ioctl_query_info()
1592 rc = SMB2_open_init(tcon, server, in smb2_ioctl_query_info()
1600 /* Can eventually relax perm check since server enforces too */ in smb2_ioctl_query_info()
1607 rc = SMB2_ioctl_init(tcon, server, in smb2_ioctl_query_info()
1617 /* Can eventually relax perm check since server enforces too */ in smb2_ioctl_query_info()
1627 rc = SMB2_set_info_init(tcon, server, in smb2_ioctl_query_info()
1638 rc = SMB2_query_info_init(tcon, server, in smb2_ioctl_query_info()
1659 rc = SMB2_close_init(tcon, server, in smb2_ioctl_query_info()
1665 rc = compound_send_recv(xid, ses, server, in smb2_ioctl_query_info()
1747 /* Request a key from the server to identify the source of the copy */ in smb2_copychunk_range()
1769 /* Request server copy to target from src identified by key */ in smb2_copychunk_range()
1788 * Check if server claimed to write more than we asked in smb2_copychunk_range()
1825 * and check if the server gave us different sizes after in smb2_copychunk_range()
1827 * if not then why is the server returning an error now in smb2_copychunk_range()
1832 /* Check that server is not asking us to grow size */ in smb2_copychunk_range()
1838 goto cchunk_out; /* server gave us bogus size */ in smb2_copychunk_range()
1922 * since Samba server doesn't set the flag on the share, yet in smb2_set_sparse()
1925 * mark that server does not support sparse files for this share in smb2_set_sparse()
1926 * to avoid repeatedly sending the unsupported fsctl to server in smb2_set_sparse()
1985 /* server fileays advertise duplicate extent support with this flag */ in smb2_duplicate_extents()
2218 struct TCP_Server_Info *server = cifs_pick_channel(tcon->ses); in smb2_query_dir_first() local
2243 rc = SMB2_open_init(tcon, server, in smb2_query_dir_first()
2257 rc = SMB2_query_directory_init(xid, tcon, server, in smb2_query_dir_first()
2266 rc = compound_send_recv(xid, tcon->ses, server, in smb2_query_dir_first()
2341 smb2_is_status_pending(char *buf, struct TCP_Server_Info *server) in smb2_is_status_pending() argument
2349 spin_lock(&server->req_lock); in smb2_is_status_pending()
2350 server->credits += le16_to_cpu(shdr->CreditRequest); in smb2_is_status_pending()
2351 spin_unlock(&server->req_lock); in smb2_is_status_pending()
2352 wake_up(&server->request_q); in smb2_is_status_pending()
2390 if (tcon->ses->server->capabilities & SMB2_GLOBAL_CAP_LEASING) in smb2_oplock_response()
2419 struct TCP_Server_Info *server = ses->server; in smb2_set_next_command() local
2420 unsigned long len = smb_rqst_len(server, rqst); in smb2_set_next_command()
2483 struct TCP_Server_Info *server = cifs_pick_channel(ses); in smb2_query_info_compound() local
2514 rc = SMB2_open_init(tcon, server, in smb2_query_info_compound()
2524 rc = SMB2_query_info_init(tcon, server, in smb2_query_info_compound()
2538 rc = SMB2_close_init(tcon, server, in smb2_query_info_compound()
2544 rc = compound_send_recv(xid, ses, server, in smb2_query_info_compound()
2551 pr_warn_once("server share %s deleted\n", in smb2_query_info_compound()
2877 struct TCP_Server_Info *server = cifs_pick_channel(tcon->ses); in smb2_query_symlink() local
2923 rc = SMB2_open_init(tcon, server, in smb2_query_symlink()
2935 rc = SMB2_ioctl_init(tcon, server, in smb2_query_symlink()
2954 rc = SMB2_close_init(tcon, server, in smb2_query_symlink()
2961 rc = compound_send_recv(xid, tcon->ses, server, in smb2_query_symlink()
3063 struct TCP_Server_Info *server = cifs_pick_channel(tcon->ses); in smb2_query_reparse_tag() local
3104 rc = SMB2_open_init(tcon, server, in smb2_query_reparse_tag()
3116 rc = SMB2_ioctl_init(tcon, server, in smb2_query_reparse_tag()
3135 rc = SMB2_close_init(tcon, server, in smb2_query_reparse_tag()
3142 rc = compound_send_recv(xid, tcon->ses, server, in smb2_query_reparse_tag()
3321 /* Retrieve an ACL from the server */
3362 * first, otherwise the data may be inconsistent with the server. in smb3_zero_range()
3433 * caches first, otherwise the data may be inconsistent with the server. in smb3_punch_hole()
3562 * might fill holes on the server. in smb3_llseek()
3718 smb2_downgrade_oplock(struct TCP_Server_Info *server, in smb2_downgrade_oplock() argument
3722 server->ops->set_oplock_level(cinode, oplock, 0, NULL); in smb2_downgrade_oplock()
3730 smb3_downgrade_oplock(struct TCP_Server_Info *server, in smb3_downgrade_oplock() argument
3787 /* Check if the server granted an oplock rather than a lease */ in smb21_set_oplock_level()
4047 smb2_get_enc_key(struct TCP_Server_Info *server, __u64 ses_id, int enc, u8 *key) in smb2_get_enc_key() argument
4053 list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) { in smb2_get_enc_key()
4054 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) { in smb2_get_enc_key()
4076 crypt_message(struct TCP_Server_Info *server, int num_rqst, in crypt_message() argument
4093 rc = smb2_get_enc_key(server, tr_hdr->SessionId, enc, key); in crypt_message()
4100 rc = smb3_crypto_aead_allocate(server); in crypt_message()
4106 tfm = enc ? server->secmech.ccmaesencrypt : in crypt_message()
4107 server->secmech.ccmaesdecrypt; in crypt_message()
4109 if (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM) in crypt_message()
4151 if ((server->cipher_type == SMB2_ENCRYPTION_AES128_GCM) || in crypt_message()
4152 (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM)) in crypt_message()
4207 smb3_init_transform_rq(struct TCP_Server_Info *server, int num_rqst, in smb3_init_transform_rq() argument
4232 orig_len += smb_rqst_len(server, &old_rq[i - 1]); in smb3_init_transform_rq()
4257 fill_transform_hdr(tr_hdr, orig_len, old_rq, server->cipher_type); in smb3_init_transform_rq()
4259 rc = crypt_message(server, num_rqst, new_rq, 1); in smb3_init_transform_rq()
4280 decrypt_raw_data(struct TCP_Server_Info *server, char *buf, in decrypt_raw_data() argument
4301 rc = crypt_message(server, 1, &rqst, 0); in decrypt_raw_data()
4310 server->total_read = buf_data_size + page_data_size; in decrypt_raw_data()
4316 read_data_into_pages(struct TCP_Server_Info *server, struct page **pages, in read_data_into_pages() argument
4335 length = cifs_read_page_from_socket(server, page, 0, n); in read_data_into_pages()
4338 server->total_read += length; in read_data_into_pages()
4373 handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid, in handle_read_data() argument
4396 if (server->ops->is_session_expired && in handle_read_data()
4397 server->ops->is_session_expired(buf)) { in handle_read_data()
4399 cifs_reconnect(server); in handle_read_data()
4403 if (server->ops->is_status_pending && in handle_read_data()
4404 server->ops->is_status_pending(buf, server)) in handle_read_data()
4412 min_t(unsigned int, buf_len, server->vals->read_rsp_size); in handle_read_data()
4418 rdata->result = server->ops->map_error(buf, true); in handle_read_data()
4420 cifs_dbg(FYI, "%s: server returned error %d\n", in handle_read_data()
4430 data_offset = server->ops->read_data_offset(buf); in handle_read_data()
4434 data_len = server->ops->read_data_length(buf, use_rdma_mr); in handle_read_data()
4436 if (data_offset < server->vals->read_rsp_size) { in handle_read_data()
4444 data_offset = server->vals->read_rsp_size; in handle_read_data()
4457 pad_len = data_offset - server->vals->read_rsp_size; in handle_read_data()
4514 length = rdata->copy_into_pages(server, rdata, &iter); in handle_read_data()
4530 struct TCP_Server_Info *server; member
4545 rc = decrypt_raw_data(dw->server, dw->buf, dw->server->vals->read_rsp_size, in smb2_decrypt_offload()
4552 dw->server->lstrp = jiffies; in smb2_decrypt_offload()
4553 mid = smb2_find_dequeue_mid(dw->server, dw->buf); in smb2_decrypt_offload()
4558 rc = handle_read_data(dw->server, mid, dw->buf, in smb2_decrypt_offload()
4559 dw->server->vals->read_rsp_size, in smb2_decrypt_offload()
4569 if (dw->server->tcpStatus == CifsNeedReconnect) { in smb2_decrypt_offload()
4577 &dw->server->pending_mid_q); in smb2_decrypt_offload()
4595 receive_encrypted_read(struct TCP_Server_Info *server, struct mid_q_entry **mid, in receive_encrypted_read() argument
4598 char *buf = server->smallbuf; in receive_encrypted_read()
4603 unsigned int buflen = server->pdu_size; in receive_encrypted_read()
4609 len = min_t(unsigned int, buflen, server->vals->read_rsp_size + in receive_encrypted_read()
4610 sizeof(struct smb2_transform_hdr)) - HEADER_SIZE(server) + 1; in receive_encrypted_read()
4612 rc = cifs_read_from_socket(server, buf + HEADER_SIZE(server) - 1, len); in receive_encrypted_read()
4615 server->total_read += rc; in receive_encrypted_read()
4618 server->vals->read_rsp_size; in receive_encrypted_read()
4636 rc = read_data_into_pages(server, pages, npages, len); in receive_encrypted_read()
4640 rc = cifs_discard_remaining_data(server); in receive_encrypted_read()
4649 if ((server->min_offload) && (server->in_flight > 1) && in receive_encrypted_read()
4650 (server->pdu_size >= server->min_offload)) { in receive_encrypted_read()
4655 dw->buf = server->smallbuf; in receive_encrypted_read()
4656 server->smallbuf = (char *)cifs_small_buf_get(); in receive_encrypted_read()
4661 dw->server = server; in receive_encrypted_read()
4670 rc = decrypt_raw_data(server, buf, server->vals->read_rsp_size, in receive_encrypted_read()
4675 *mid = smb2_find_mid(server, buf); in receive_encrypted_read()
4681 rc = handle_read_data(server, *mid, buf, in receive_encrypted_read()
4682 server->vals->read_rsp_size, in receive_encrypted_read()
4692 cifs_discard_remaining_data(server); in receive_encrypted_read()
4697 receive_encrypted_standard(struct TCP_Server_Info *server, in receive_encrypted_standard() argument
4702 char *buf = server->smallbuf; in receive_encrypted_standard()
4704 unsigned int pdu_length = server->pdu_size; in receive_encrypted_standard()
4714 server->large_buf = true; in receive_encrypted_standard()
4715 memcpy(server->bigbuf, buf, server->total_read); in receive_encrypted_standard()
4716 buf = server->bigbuf; in receive_encrypted_standard()
4720 length = cifs_read_from_socket(server, buf + HEADER_SIZE(server) - 1, in receive_encrypted_standard()
4721 pdu_length - HEADER_SIZE(server) + 1); in receive_encrypted_standard()
4724 server->total_read += length; in receive_encrypted_standard()
4727 length = decrypt_raw_data(server, buf, buf_size, NULL, 0, 0, false); in receive_encrypted_standard()
4731 next_is_large = server->large_buf; in receive_encrypted_standard()
4744 mid_entry = smb2_find_mid(server, buf); in receive_encrypted_standard()
4750 mid_entry->resp_buf_size = server->pdu_size; in receive_encrypted_standard()
4761 ret = mid_entry->handle(server, mid_entry); in receive_encrypted_standard()
4763 ret = cifs_handle_standard(server, mid_entry); in receive_encrypted_standard()
4767 server->large_buf = next_is_large; in receive_encrypted_standard()
4769 server->bigbuf = buf = next_buffer; in receive_encrypted_standard()
4771 server->smallbuf = buf = next_buffer; in receive_encrypted_standard()
4776 * server->smallbuf and server->bigbuf are still valid. We need in receive_encrypted_standard()
4790 smb3_receive_transform(struct TCP_Server_Info *server, in smb3_receive_transform() argument
4793 char *buf = server->smallbuf; in smb3_receive_transform()
4794 unsigned int pdu_length = server->pdu_size; in smb3_receive_transform()
4802 cifs_reconnect(server); in smb3_receive_transform()
4808 cifs_reconnect(server); in smb3_receive_transform()
4813 if (pdu_length > CIFSMaxBufSize + MAX_HEADER_SIZE(server)) { in smb3_receive_transform()
4814 return receive_encrypted_read(server, &mids[0], num_mids); in smb3_receive_transform()
4817 return receive_encrypted_standard(server, mids, bufs, num_mids); in smb3_receive_transform()
4821 smb3_handle_read_data(struct TCP_Server_Info *server, struct mid_q_entry *mid) in smb3_handle_read_data() argument
4823 char *buf = server->large_buf ? server->bigbuf : server->smallbuf; in smb3_handle_read_data()
4825 return handle_read_data(server, mid, buf, server->pdu_size, in smb3_handle_read_data()
4869 * their current NFS server) uses this approach to expose special files in smb2_make_node()
4894 if (tcon->ses->server->oplocks) in smb2_make_node()
4898 rc = tcon->ses->server->ops->open(xid, &oparms, &oplock, buf); in smb2_make_node()
4918 rc = tcon->ses->server->ops->sync_write(xid, &fid, &io_parms, in smb2_make_node()
4924 rc = tcon->ses->server->ops->sync_write(xid, &fid, &io_parms, in smb2_make_node()
4927 tcon->ses->server->ops->close(xid, tcon, &fid); in smb2_make_node()