Lines Matching full:smb
31 in a similar way to the mid which is useful to track each sent smb,
312 check_smb_hdr(struct smb_hdr *smb) in check_smb_hdr() argument
314 /* does it have the right SMB "signature" ? */ in check_smb_hdr()
315 if (*(__le32 *) smb->Protocol != cpu_to_le32(0x424d53ff)) { in check_smb_hdr()
317 *(unsigned int *)smb->Protocol); in check_smb_hdr()
322 if (smb->Flags & SMBFLG_RESPONSE) in check_smb_hdr()
326 if (smb->Command == SMB_COM_LOCKING_ANDX) in check_smb_hdr()
330 get_mid(smb)); in check_smb_hdr()
337 struct smb_hdr *smb = (struct smb_hdr *)buf; in checkSMB() local
338 __u32 rfclen = be32_to_cpu(smb->smb_buf_length); in checkSMB()
346 && (smb->Status.CifsError != 0)) { in checkSMB()
348 smb->WordCount = 0; in checkSMB()
352 (smb->WordCount == 0)) { in checkSMB()
353 char *tmp = (char *)smb; in checkSMB()
369 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
372 } else if (total_read < sizeof(*smb) + 2 * smb->WordCount) { in checkSMB()
374 __func__, smb->WordCount); in checkSMB()
379 if (check_smb_hdr(smb)) in checkSMB()
381 clc_len = smbCalcSize(smb); in checkSMB()
390 __u16 mid = get_mid(smb); in checkSMB()
401 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
407 * data than the lengths in the SMB packet would in checkSMB()
414 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
1222 * Handle weird Windows SMB server behaviour. It responds with