Lines Matching defs:TCP_Server_Info

602 struct TCP_Server_Info {  struct
603 struct list_head tcp_ses_list;
604 struct list_head smb_ses_list;
605 int srv_count; /* reference counter */
607 char server_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
608 struct smb_version_operations *ops;
609 struct smb_version_values *vals;
610 enum statusEnum tcpStatus; /* what we think the status is */
611 char *hostname; /* hostname portion of UNC string */
612 struct socket *ssocket;
613 struct sockaddr_storage dstaddr;
614 struct sockaddr_storage srcaddr; /* locally bind to this IP */
616 struct net *net;
618 wait_queue_head_t response_q;
619 wait_queue_head_t request_q; /* if more than maxmpx to srvr must block*/
620 struct list_head pending_mid_q;
621 bool noblocksnd; /* use blocking sendmsg */
622 bool noautotune; /* do not autotune send buf sizes */
623 bool tcp_nodelay;
624 unsigned int credits; /* send no more requests at once */
625 unsigned int max_credits; /* can override large 32000 default at mnt */
626 unsigned int in_flight; /* number of requests on the wire to server */
627 spinlock_t req_lock; /* protect the two values above */
628 struct mutex srv_mutex;
629 struct task_struct *tsk;
630 char server_GUID[16];
631 __u16 sec_mode;
632 bool sign; /* is signing enabled on this connection? */
633 bool session_estab; /* mark when very first sess is established */
634 int echo_credits; /* echo reserved slots */
635 int oplock_credits; /* oplock break reserved slots */
636 bool echoes:1; /* enable echoes */
637 __u8 client_guid[SMB2_CLIENT_GUID_SIZE]; /* Client GUID */
638 u16 dialect; /* dialect index that server chose */
639 bool oplocks:1; /* enable oplocks */
640 unsigned int maxReq; /* Clients should submit no more */
643 unsigned int maxBuf; /* maxBuf specifies the maximum */
647 unsigned int max_rw; /* maxRw specifies the maximum */
650 unsigned int capabilities; /* selective disabling of caps by smb sess */
651 int timeAdj; /* Adjust for difference in server time zone in sec */
652 __u64 CurrentMid; /* multiplex id - rotating counter */
653 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlm, ntlmv2 etc */
655 char workstation_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
656 __u32 sequence_number; /* for signing, protected by srv_mutex */
657 struct session_key session_key;
658 unsigned long lstrp; /* when we got last response from this server */
659 struct cifs_secmech secmech; /* crypto sec mech functs, descriptors */
663 char negflavor; /* NEGOTIATE response flavor */
665 bool sec_ntlmssp; /* supports NTLMSSP */
666 bool sec_kerberosu2u; /* supports U2U Kerberos */
667 bool sec_kerberos; /* supports plain Kerberos */
668 bool sec_mskerberos; /* supports legacy MS Kerberos */
669 bool large_buf; /* is current buffer large? */
671 bool rdma;
673 struct smbd_connection *smbd_conn;
674 struct delayed_work echo; /* echo ping workqueue job */
675 char *smallbuf; /* pointer to current "small" buffer */
676 char *bigbuf; /* pointer to current "big" buffer */
700 in_flight(struct TCP_Server_Info *server) in in_flight() argument