Lines Matching defs:TCP_Server_Info
658 struct TCP_Server_Info { struct
659 struct list_head tcp_ses_list;
660 struct list_head smb_ses_list;
661 int srv_count; /* reference counter */
663 char server_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
664 struct smb_version_operations *ops;
665 struct smb_version_values *vals;
666 enum statusEnum tcpStatus; /* what we think the status is */
667 char *hostname; /* hostname portion of UNC string */
668 struct socket *ssocket;
669 struct sockaddr_storage dstaddr;
670 struct sockaddr_storage srcaddr; /* locally bind to this IP */
672 struct net *net;
674 wait_queue_head_t response_q;
675 wait_queue_head_t request_q; /* if more than maxmpx to srvr must block*/
676 struct list_head pending_mid_q;
677 bool noblocksnd; /* use blocking sendmsg */
678 bool noautotune; /* do not autotune send buf sizes */
679 bool tcp_nodelay;
680 unsigned int credits; /* send no more requests at once */
681 unsigned int max_credits; /* can override large 32000 default at mnt */
682 unsigned int in_flight; /* number of requests on the wire to server */
683 unsigned int max_in_flight; /* max number of requests that were on wire */
684 spinlock_t req_lock; /* protect the two values above */
685 struct mutex srv_mutex;
686 struct task_struct *tsk;
687 char server_GUID[16];
688 __u16 sec_mode;
689 bool sign; /* is signing enabled on this connection? */
690 bool ignore_signature:1; /* skip validation of signatures in SMB2/3 rsp */
691 bool session_estab; /* mark when very first sess is established */
692 int echo_credits; /* echo reserved slots */
693 int oplock_credits; /* oplock break reserved slots */
694 bool echoes:1; /* enable echoes */
695 __u8 client_guid[SMB2_CLIENT_GUID_SIZE]; /* Client GUID */
696 u16 dialect; /* dialect index that server chose */
697 bool oplocks:1; /* enable oplocks */
698 unsigned int maxReq; /* Clients should submit no more */
701 unsigned int maxBuf; /* maxBuf specifies the maximum */
705 unsigned int max_rw; /* maxRw specifies the maximum */
708 unsigned int capabilities; /* selective disabling of caps by smb sess */
709 int timeAdj; /* Adjust for difference in server time zone in sec */
710 __u64 CurrentMid; /* multiplex id - rotating counter */
711 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlm, ntlmv2 etc */
713 char workstation_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
714 __u32 sequence_number; /* for signing, protected by srv_mutex */
715 __u32 reconnect_instance; /* incremented on each reconnect */
716 struct session_key session_key;
717 unsigned long lstrp; /* when we got last response from this server */
718 struct cifs_secmech secmech; /* crypto sec mech functs, descriptors */
722 char negflavor; /* NEGOTIATE response flavor */
724 bool sec_ntlmssp; /* supports NTLMSSP */
725 bool sec_kerberosu2u; /* supports U2U Kerberos */
726 bool sec_kerberos; /* supports plain Kerberos */
727 bool sec_mskerberos; /* supports legacy MS Kerberos */
728 bool large_buf; /* is current buffer large? */
730 bool rdma;
732 struct smbd_connection *smbd_conn;
733 struct delayed_work echo; /* echo ping workqueue job */
734 char *smallbuf; /* pointer to current "small" buffer */
735 char *bigbuf; /* pointer to current "big" buffer */
737 unsigned int pdu_size;
738 unsigned int total_read; /* total amount of data read in this pass */
740 struct fscache_cookie *fscache; /* client index cache cookie */
743 atomic_t in_send; /* requests trying to send */
744 atomic_t num_waiters; /* blocked waiting to get in sendrecv */
745 atomic_t num_cmds[NUMBER_OF_SMB2_COMMANDS]; /* total requests by cmd */
746 atomic_t smb2slowcmd[NUMBER_OF_SMB2_COMMANDS]; /* count resps > 1 sec */
747 __u64 time_per_cmd[NUMBER_OF_SMB2_COMMANDS]; /* total time per cmd */
748 __u32 slowest_cmd[NUMBER_OF_SMB2_COMMANDS];
749 __u32 fastest_cmd[NUMBER_OF_SMB2_COMMANDS];
751 unsigned int max_read;
752 unsigned int max_write;
753 unsigned int min_offload;
754 __le16 compress_algorithm;
778 in_flight(struct TCP_Server_Info *server) in in_flight() argument