Lines Matching defs:TCP_Server_Info
671 struct TCP_Server_Info { struct
672 struct list_head tcp_ses_list;
673 struct list_head smb_ses_list;
674 int srv_count; /* reference counter */
676 char server_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
677 struct smb_version_operations *ops;
678 struct smb_version_values *vals;
679 enum statusEnum tcpStatus; /* what we think the status is */
680 char *hostname; /* hostname portion of UNC string */
681 struct socket *ssocket;
682 struct sockaddr_storage dstaddr;
683 struct sockaddr_storage srcaddr; /* locally bind to this IP */
685 struct net *net;
687 wait_queue_head_t response_q;
688 wait_queue_head_t request_q; /* if more than maxmpx to srvr must block*/
689 struct list_head pending_mid_q;
690 bool noblocksnd; /* use blocking sendmsg */
691 bool noautotune; /* do not autotune send buf sizes */
692 bool tcp_nodelay;
693 unsigned int credits; /* send no more requests at once */
694 unsigned int max_credits; /* can override large 32000 default at mnt */
695 unsigned int in_flight; /* number of requests on the wire to server */
696 unsigned int max_in_flight; /* max number of requests that were on wire */
697 spinlock_t req_lock; /* protect the two values above */
698 struct mutex srv_mutex;
699 struct task_struct *tsk;
700 char server_GUID[16];
701 __u16 sec_mode;
702 bool sign; /* is signing enabled on this connection? */
703 bool ignore_signature:1; /* skip validation of signatures in SMB2/3 rsp */
704 bool session_estab; /* mark when very first sess is established */
705 int echo_credits; /* echo reserved slots */
706 int oplock_credits; /* oplock break reserved slots */
707 bool echoes:1; /* enable echoes */
708 __u8 client_guid[SMB2_CLIENT_GUID_SIZE]; /* Client GUID */
709 u16 dialect; /* dialect index that server chose */
710 bool oplocks:1; /* enable oplocks */
711 unsigned int maxReq; /* Clients should submit no more */
714 unsigned int maxBuf; /* maxBuf specifies the maximum */
718 unsigned int max_rw; /* maxRw specifies the maximum */
721 unsigned int capabilities; /* selective disabling of caps by smb sess */
722 int timeAdj; /* Adjust for difference in server time zone in sec */
723 __u64 CurrentMid; /* multiplex id - rotating counter */
724 char cryptkey[CIFS_CRYPTO_KEY_SIZE]; /* used by ntlm, ntlmv2 etc */
726 char workstation_RFC1001_name[RFC1001_NAME_LEN_WITH_NULL];
727 __u32 sequence_number; /* for signing, protected by srv_mutex */
728 __u32 reconnect_instance; /* incremented on each reconnect */
729 struct session_key session_key;
730 unsigned long lstrp; /* when we got last response from this server */
731 struct cifs_secmech secmech; /* crypto sec mech functs, descriptors */
735 char negflavor; /* NEGOTIATE response flavor */
737 bool sec_ntlmssp; /* supports NTLMSSP */
738 bool sec_kerberosu2u; /* supports U2U Kerberos */
739 bool sec_kerberos; /* supports plain Kerberos */
740 bool sec_mskerberos; /* supports legacy MS Kerberos */
741 bool large_buf; /* is current buffer large? */
743 bool rdma;
745 struct smbd_connection *smbd_conn;
746 struct delayed_work echo; /* echo ping workqueue job */
747 char *smallbuf; /* pointer to current "small" buffer */
748 char *bigbuf; /* pointer to current "big" buffer */
750 unsigned int pdu_size;
751 unsigned int total_read; /* total amount of data read in this pass */
752 atomic_t in_send; /* requests trying to send */
753 atomic_t num_waiters; /* blocked waiting to get in sendrecv */
755 struct fscache_cookie *fscache; /* client index cache cookie */
758 atomic_t num_cmds[NUMBER_OF_SMB2_COMMANDS]; /* total requests by cmd */
759 atomic_t smb2slowcmd[NUMBER_OF_SMB2_COMMANDS]; /* count resps > 1 sec */
760 __u64 time_per_cmd[NUMBER_OF_SMB2_COMMANDS]; /* total time per cmd */
761 __u32 slowest_cmd[NUMBER_OF_SMB2_COMMANDS];
762 __u32 fastest_cmd[NUMBER_OF_SMB2_COMMANDS];
764 unsigned int max_read;
765 unsigned int max_write;
766 unsigned int min_offload;
767 __le16 compress_algorithm;
768 __le16 cipher_type;
792 in_flight(struct TCP_Server_Info *server) in in_flight() argument