• Home
  • Raw
  • Download

Lines Matching full:server

94 	    (tcon->ses->server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION))  in smb3_encryption_required()
102 struct TCP_Server_Info *server) in smb2_hdr_assemble() argument
107 if (server) { in smb2_hdr_assemble()
108 spin_lock(&server->req_lock); in smb2_hdr_assemble()
110 if (server->credits >= server->max_credits) in smb2_hdr_assemble()
114 min_t(int, server->max_credits - in smb2_hdr_assemble()
115 server->credits, 10)); in smb2_hdr_assemble()
116 spin_unlock(&server->req_lock); in smb2_hdr_assemble()
127 if (server && (server->capabilities & SMB2_GLOBAL_CAP_LARGE_MTU)) in smb2_hdr_assemble()
138 * to pass the path on the Open SMB prefixed by \\server\share. in smb2_hdr_assemble()
141 * illegal to send an empty path name (without \\server\share prefix) in smb2_hdr_assemble()
149 if (server && server->sign && !smb3_encryption_required(tcon)) in smb2_hdr_assemble()
157 struct TCP_Server_Info *server) in smb2_reconnect() argument
190 (!tcon->ses->server) || !server) in smb2_reconnect()
194 retries = server->nr_targets; in smb2_reconnect()
201 while (server->tcpStatus == CifsNeedReconnect) { in smb2_reconnect()
217 rc = wait_event_interruptible_timeout(server->response_q, in smb2_reconnect()
218 (server->tcpStatus != CifsNeedReconnect), in smb2_reconnect()
227 if (server->tcpStatus != CifsNeedReconnect) in smb2_reconnect()
235 * retrying until process is killed or server comes in smb2_reconnect()
242 retries = server->nr_targets; in smb2_reconnect()
258 * and the server never sends an answer the socket will be closed in smb2_reconnect()
261 if (server->tcpStatus == CifsNeedReconnect) { in smb2_reconnect()
270 if (server->is_channel) { in smb2_reconnect()
272 ses->binding_chan = cifs_ses_find_chan(ses, server); in smb2_reconnect()
315 mod_delayed_work(cifsiod_wq, &server->reconnect, 0); in smb2_reconnect()
324 * BB Is flush done by server on drop of tcp session? Should we special in smb2_reconnect()
346 struct TCP_Server_Info *server, in fill_small_buf() argument
360 smb2_hdr_assemble(&spdu->sync_hdr, smb2_command, tcon, server); in fill_small_buf()
372 struct TCP_Server_Info *server, in __smb2_plain_req_init() argument
385 fill_small_buf(smb2_command, tcon, server, in __smb2_plain_req_init()
399 struct TCP_Server_Info *server, in smb2_plain_req_init() argument
404 rc = smb2_reconnect(smb2_command, tcon, server); in smb2_plain_req_init()
408 return __smb2_plain_req_init(smb2_command, tcon, server, request_buf, in smb2_plain_req_init()
413 struct TCP_Server_Info *server, in smb2_ioctl_req_init() argument
418 return __smb2_plain_req_init(SMB2_IOCTL, tcon, server, in smb2_ioctl_req_init()
421 return smb2_plain_req_init(SMB2_IOCTL, tcon, server, in smb2_ioctl_req_init()
480 /* copy up to max of first 100 bytes of server name to NetName field */ in build_netname_ctxt()
513 struct TCP_Server_Info *server, unsigned int *total_len) in assemble_neg_contexts() argument
543 if (server->compress_algorithm) { in assemble_neg_contexts()
556 server->hostname); in assemble_neg_contexts()
570 pr_warn_once("server sent bad preauth context\n"); in decode_preauth_context()
573 pr_warn_once("server sent invalid SaltLength\n"); in decode_preauth_context()
582 static void decode_compress_ctx(struct TCP_Server_Info *server, in decode_compress_ctx() argument
589 pr_warn_once("server sent bad compression cntxt\n"); in decode_compress_ctx()
600 server->compress_algorithm = ctxt->CompressionAlgorithms[0]; in decode_compress_ctx()
603 static int decode_encrypt_ctx(struct TCP_Server_Info *server, in decode_encrypt_ctx() argument
610 pr_warn_once("server sent bad crypto ctxt len\n"); in decode_encrypt_ctx()
621 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx()
626 * e.g. if server only supported AES256_CCM (very unlikely) in decode_encrypt_ctx()
627 * or server supported no encryption types or had all disabled. in decode_encrypt_ctx()
631 * seal not requested by client, since server is allowed to in decode_encrypt_ctx()
634 server->cipher_type = 0; in decode_encrypt_ctx()
635 server->capabilities &= ~SMB2_GLOBAL_CAP_ENCRYPTION; in decode_encrypt_ctx()
636 pr_warn_once("Server does not support requested encryption types\n"); in decode_encrypt_ctx()
641 /* server returned a cipher we didn't ask for */ in decode_encrypt_ctx()
645 server->cipher_type = ctxt->Ciphers[0]; in decode_encrypt_ctx()
646 server->capabilities |= SMB2_GLOBAL_CAP_ENCRYPTION; in decode_encrypt_ctx()
651 struct TCP_Server_Info *server, in smb311_decode_neg_context() argument
686 rc = decode_encrypt_ctx(server, in smb311_decode_neg_context()
689 decode_compress_ctx(server, in smb311_decode_neg_context()
692 server->posix_ext_supported = true; in smb311_decode_neg_context()
793 struct TCP_Server_Info *server = cifs_ses_server(ses); in SMB2_negotiate() local
801 if (!server) { in SMB2_negotiate()
802 WARN(1, "%s: server is NULL!\n", __func__); in SMB2_negotiate()
806 rc = smb2_plain_req_init(SMB2_NEGOTIATE, NULL, server, in SMB2_negotiate()
813 memset(server->preauth_sha_hash, 0, SMB2_PREAUTH_HASH_SIZE); in SMB2_negotiate()
816 if (strcmp(server->vals->version_string, in SMB2_negotiate()
822 } else if (strcmp(server->vals->version_string, in SMB2_negotiate()
832 req->Dialects[0] = cpu_to_le16(server->vals->protocol_id); in SMB2_negotiate()
845 req->Capabilities = cpu_to_le32(server->vals->req_capabilities); in SMB2_negotiate()
850 if (server->vals->protocol_id == SMB20_PROT_ID) in SMB2_negotiate()
853 memcpy(req->ClientGUID, server->client_guid, in SMB2_negotiate()
855 if ((server->vals->protocol_id == SMB311_PROT_ID) || in SMB2_negotiate()
856 (strcmp(server->vals->version_string, in SMB2_negotiate()
858 assemble_neg_contexts(req, server, &total_len); in SMB2_negotiate()
867 rc = cifs_send_recv(xid, ses, server, in SMB2_negotiate()
876 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate()
881 if (strcmp(server->vals->version_string, in SMB2_negotiate()
892 } else if (strcmp(server->vals->version_string, in SMB2_negotiate()
900 server->ops = &smb21_operations; in SMB2_negotiate()
901 server->vals = &smb21_values; in SMB2_negotiate()
903 server->ops = &smb311_operations; in SMB2_negotiate()
904 server->vals = &smb311_values; in SMB2_negotiate()
907 server->vals->protocol_id) { in SMB2_negotiate()
927 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n", in SMB2_negotiate()
932 server->dialect = le16_to_cpu(rsp->DialectRevision); in SMB2_negotiate()
937 * server. in SMB2_negotiate()
939 memcpy(server->preauth_sha_hash, ses->preauth_sha_hash, in SMB2_negotiate()
943 server->negflavor = CIFS_NEGFLAVOR_EXTENDED; in SMB2_negotiate()
945 server->maxBuf = min_t(unsigned int, le32_to_cpu(rsp->MaxTransactSize), in SMB2_negotiate()
947 server->max_read = le32_to_cpu(rsp->MaxReadSize); in SMB2_negotiate()
948 server->max_write = le32_to_cpu(rsp->MaxWriteSize); in SMB2_negotiate()
949 server->sec_mode = le16_to_cpu(rsp->SecurityMode); in SMB2_negotiate()
950 if ((server->sec_mode & SMB2_SEC_MODE_FLAGS_ALL) != server->sec_mode) in SMB2_negotiate()
951 cifs_dbg(FYI, "Server returned unexpected security mode 0x%x\n", in SMB2_negotiate()
952 server->sec_mode); in SMB2_negotiate()
953 server->capabilities = le32_to_cpu(rsp->Capabilities); in SMB2_negotiate()
955 server->capabilities |= SMB2_NT_FIND | SMB2_LARGE_FILES; in SMB2_negotiate()
961 if (server->dialect == SMB30_PROT_ID && (server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION)) in SMB2_negotiate()
962 server->cipher_type = SMB2_ENCRYPTION_AES128_CCM; in SMB2_negotiate()
971 * We just found a server which sets blob length to zero expecting raw. in SMB2_negotiate()
975 server->sec_ntlmssp = true; in SMB2_negotiate()
978 rc = cifs_enable_signing(server, ses->sign); in SMB2_negotiate()
982 rc = decode_negTokenInit(security_blob, blob_length, server); in SMB2_negotiate()
991 rc = smb311_decode_neg_context(rsp, server, in SMB2_negotiate()
1008 struct TCP_Server_Info *server = tcon->ses->server; in smb3_validate_negotiate() local
1013 if (server->dialect == SMB311_PROT_ID) in smb3_validate_negotiate()
1032 cifs_tcon_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n"); in smb3_validate_negotiate()
1039 cpu_to_le32(server->vals->req_capabilities); in smb3_validate_negotiate()
1043 memcpy(pneg_inbuf->Guid, server->client_guid, in smb3_validate_negotiate()
1056 if (strcmp(server->vals->version_string, in smb3_validate_negotiate()
1064 } else if (strcmp(server->vals->version_string, in smb3_validate_negotiate()
1076 cpu_to_le16(server->vals->protocol_id); in smb3_validate_negotiate()
1089 * Old Windows versions or Netapp SMB server can return in smb3_validate_negotiate()
1092 cifs_tcon_dbg(VFS, "Server does not support validate negotiate\n"); in smb3_validate_negotiate()
1113 if (pneg_rsp->Dialect != cpu_to_le16(server->dialect)) in smb3_validate_negotiate()
1116 if (pneg_rsp->SecurityMode != cpu_to_le16(server->sec_mode)) in smb3_validate_negotiate()
1119 /* do not validate server guid because not saved at negprot time yet */ in smb3_validate_negotiate()
1122 SMB2_LARGE_FILES) != server->capabilities) in smb3_validate_negotiate()
1140 smb2_select_sectype(struct TCP_Server_Info *server, enum securityEnum requested) in smb2_select_sectype() argument
1149 if (server->sec_ntlmssp && in smb2_select_sectype()
1152 if ((server->sec_kerberos || server->sec_mskerberos) && in smb2_select_sectype()
1186 struct TCP_Server_Info *server = cifs_ses_server(ses); in SMB2_sess_alloc_buffer() local
1189 rc = smb2_plain_req_init(SMB2_SESSION_SETUP, NULL, server, in SMB2_sess_alloc_buffer()
1215 if (server->sign) in SMB2_sess_alloc_buffer()
1283 struct TCP_Server_Info *server = cifs_ses_server(ses); in SMB2_sess_establish_session() local
1285 mutex_lock(&server->srv_mutex); in SMB2_sess_establish_session()
1286 if (server->ops->generate_signingkey) { in SMB2_sess_establish_session()
1287 rc = server->ops->generate_signingkey(ses); in SMB2_sess_establish_session()
1291 mutex_unlock(&server->srv_mutex); in SMB2_sess_establish_session()
1295 if (!server->session_estab) { in SMB2_sess_establish_session()
1296 server->sequence_number = 0x2; in SMB2_sess_establish_session()
1297 server->session_estab = true; in SMB2_sess_establish_session()
1299 mutex_unlock(&server->srv_mutex); in SMB2_sess_establish_session()
1536 if (ses->server->dialect < SMB30_PROT_ID) { in SMB2_sess_auth_rawntlmssp_authenticate()
1591 struct TCP_Server_Info *server = cifs_ses_server(ses); in SMB2_sess_setup() local
1596 if (!server) { in SMB2_sess_setup()
1597 WARN(1, "%s: server is NULL!\n", __func__); in SMB2_sess_setup()
1615 * Initialize the session hash with the server one. in SMB2_sess_setup()
1617 memcpy(ses->preauth_sha_hash, server->preauth_sha_hash, in SMB2_sess_setup()
1637 struct TCP_Server_Info *server; in SMB2_logoff() local
1646 if (ses && (ses->server)) in SMB2_logoff()
1647 server = ses->server; in SMB2_logoff()
1655 rc = smb2_plain_req_init(SMB2_LOGOFF, NULL, ses->server, in SMB2_logoff()
1665 else if (server->sign) in SMB2_logoff()
1677 rc = cifs_send_recv(xid, ses, ses->server, in SMB2_logoff()
1694 #define MAX_SHARENAME_LENGTH (255 /* server */ + 80 /* share */ + 1 /* NULL */)
1719 struct TCP_Server_Info *server; in SMB2_tcon() local
1722 server = ses->server; in SMB2_tcon()
1726 if (!server || !tree) in SMB2_tcon()
1743 rc = smb2_plain_req_init(SMB2_TREE_CONNECT, tcon, server, in SMB2_tcon()
1769 if ((server->dialect == SMB311_PROT_ID) && in SMB2_tcon()
1783 rc = cifs_send_recv(xid, ses, server, in SMB2_tcon()
1827 !(server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION)) in SMB2_tcon()
1831 if (server->ops->validate_negotiate) in SMB2_tcon()
1832 rc = server->ops->validate_negotiate(xid, tcon); in SMB2_tcon()
1861 if (!ses || !(ses->server)) in SMB2_tdis()
1869 rc = smb2_plain_req_init(SMB2_TREE_DISCONNECT, tcon, ses->server, in SMB2_tdis()
1887 rc = cifs_send_recv(xid, ses, ses->server, in SMB2_tdis()
1991 smb2_parse_contexts(struct TCP_Server_Info *server, in smb2_parse_contexts() argument
2021 *oplock = server->ops->parse_lease_buf(cc, epoch, in smb2_parse_contexts()
2051 add_lease_context(struct TCP_Server_Info *server, struct kvec *iov, in add_lease_context() argument
2057 iov[num].iov_base = server->ops->create_lease_buf(lease_key, *oplock); in add_lease_context()
2060 iov[num].iov_len = server->vals->create_lease_size; in add_lease_context()
2067 server->vals->create_lease_size); in add_lease_context()
2090 * NB: Handle timeout defaults to 0, which allows server to choose in create_durable_v2_buf()
2508 struct TCP_Server_Info *server = cifs_pick_channel(ses); in smb311_posix_mkdir() local
2517 if (!ses || !server) { in smb311_posix_mkdir()
2523 rc = smb2_plain_req_init(SMB2_CREATE, tcon, server, in smb311_posix_mkdir()
2610 rc = cifs_send_recv(xid, ses, server, in smb311_posix_mkdir()
2640 SMB2_open_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server, in SMB2_open_init() argument
2654 rc = smb2_plain_req_init(SMB2_CREATE, tcon, server, in SMB2_open_init()
2717 if ((!server->oplocks) || (tcon->no_lease)) in SMB2_open_init()
2720 if (!(server->capabilities & SMB2_GLOBAL_CAP_LEASING) || in SMB2_open_init()
2723 else if (!(server->capabilities & SMB2_GLOBAL_CAP_DIRECTORY_LEASING) && in SMB2_open_init()
2727 rc = add_lease_context(server, iov, &n_iov, in SMB2_open_init()
2735 if (server->capabilities & SMB2_GLOBAL_CAP_LEASING) { in SMB2_open_init()
2739 cpu_to_le32(server->vals->create_lease_size); in SMB2_open_init()
2843 struct TCP_Server_Info *server = cifs_pick_channel(ses); in SMB2_open() local
2851 if (!ses || !server) in SMB2_open()
2862 rc = SMB2_open_init(tcon, server, in SMB2_open()
2870 rc = cifs_send_recv(xid, ses, server, in SMB2_open()
2886 pr_warn_once("server share %s deleted\n", in SMB2_open()
2914 smb2_parse_contexts(server, rsp, &oparms->fid->epoch, in SMB2_open()
2923 SMB2_ioctl_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server, in SMB2_ioctl_init() argument
2935 rc = smb2_ioctl_req_init(opcode, tcon, server, in SMB2_ioctl_init()
2986 * ioctls it may be useful to allow server to send more. No point in SMB2_ioctl_init()
2987 * limiting what the server can send as long as fits in one credit in SMB2_ioctl_init()
3036 struct TCP_Server_Info *server; in SMB2_ioctl() local
3059 server = cifs_pick_channel(ses); in SMB2_ioctl()
3060 if (!server) in SMB2_ioctl()
3071 rc = SMB2_ioctl_init(tcon, server, in SMB2_ioctl()
3077 rc = cifs_send_recv(xid, ses, server, in SMB2_ioctl()
3110 goto ioctl_exit; /* server returned no data */ in SMB2_ioctl()
3166 SMB2_close_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server, in SMB2_close_init() argument
3175 rc = smb2_plain_req_init(SMB2_CLOSE, tcon, server, in SMB2_close_init()
3207 struct TCP_Server_Info *server = cifs_pick_channel(ses); in __SMB2_close() local
3217 if (!ses || !server) in __SMB2_close()
3228 /* check if need to ask server to return timestamps in close response */ in __SMB2_close()
3233 rc = SMB2_close_init(tcon, server, in __SMB2_close()
3239 rc = cifs_send_recv(xid, ses, server, in __SMB2_close()
3308 cifs_dbg(VFS, "Invalid server response, bad offset to data\n"); in smb2_validate_iov()
3340 SMB2_query_info_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server, in SMB2_query_info_init() argument
3351 rc = smb2_plain_req_init(SMB2_QUERY_INFO, tcon, server, in SMB2_query_info_init()
3396 struct TCP_Server_Info *server; in query_info() local
3404 server = cifs_pick_channel(ses); in query_info()
3405 if (!server) in query_info()
3416 rc = SMB2_query_info_init(tcon, server, in query_info()
3426 rc = cifs_send_recv(xid, ses, server, in query_info()
3525 struct cifs_tcon *tcon, struct TCP_Server_Info *server, in SMB2_notify_init() argument
3534 rc = smb2_plain_req_init(SMB2_CHANGE_NOTIFY, tcon, server, in SMB2_notify_init()
3562 struct TCP_Server_Info *server = cifs_pick_channel(ses); in SMB2_change_notify() local
3571 if (!ses || !server) in SMB2_change_notify()
3582 rc = SMB2_notify_init(xid, &rqst, tcon, server, in SMB2_change_notify()
3590 rc = cifs_send_recv(xid, ses, server, in SMB2_change_notify()
3612 * rather in the fact that the server sent one and that server->lstrp
3620 struct TCP_Server_Info *server = mid->callback_data; in smb2_echo_callback() local
3627 credits.instance = server->reconnect_instance; in smb2_echo_callback()
3631 add_credits(server, &credits, CIFS_ECHO_OP); in smb2_echo_callback()
3636 struct TCP_Server_Info *server = container_of(work, in smb2_reconnect_server() local
3647 mutex_lock(&server->reconnect_mutex); in smb2_reconnect_server()
3653 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) { in smb2_reconnect_server()
3672 * Get the reference to server struct to be sure that the last call of in smb2_reconnect_server()
3673 * cifs_put_tcon() in the loop below won't release the server pointer. in smb2_reconnect_server()
3676 server->srv_count++; in smb2_reconnect_server()
3681 rc = smb2_reconnect(SMB2_INTERNAL_CMD, tcon, server); in smb2_reconnect_server()
3695 queue_delayed_work(cifsiod_wq, &server->reconnect, 2 * HZ); in smb2_reconnect_server()
3696 mutex_unlock(&server->reconnect_mutex); in smb2_reconnect_server()
3700 cifs_put_tcp_session(server, 1); in smb2_reconnect_server()
3704 SMB2_echo(struct TCP_Server_Info *server) in SMB2_echo() argument
3715 if (server->tcpStatus == CifsNeedNegotiate) { in SMB2_echo()
3717 mod_delayed_work(cifsiod_wq, &server->reconnect, 0); in SMB2_echo()
3721 rc = smb2_plain_req_init(SMB2_ECHO, NULL, server, in SMB2_echo()
3731 rc = cifs_call_async(server, &rqst, NULL, smb2_echo_callback, NULL, in SMB2_echo()
3732 server, CIFS_ECHO_OP, NULL); in SMB2_echo()
3749 struct cifs_tcon *tcon, struct TCP_Server_Info *server, in SMB2_flush_init() argument
3757 rc = smb2_plain_req_init(SMB2_FLUSH, tcon, server, in SMB2_flush_init()
3779 struct TCP_Server_Info *server = cifs_pick_channel(ses); in SMB2_flush() local
3785 if (!ses || !(ses->server)) in SMB2_flush()
3796 rc = SMB2_flush_init(xid, &rqst, tcon, server, in SMB2_flush()
3802 rc = cifs_send_recv(xid, ses, server, in SMB2_flush()
3831 struct TCP_Server_Info *server = io_parms->server; in smb2_new_read_req() local
3833 rc = smb2_plain_req_init(SMB2_READ, io_parms->tcon, server, in smb2_new_read_req()
3838 if (server == NULL) in smb2_new_read_req()
3862 if (server->rdma && rdata && !server->sign && in smb2_new_read_req()
3863 rdata->bytes >= server->smbd_conn->rdma_readwrite_threshold) { in smb2_new_read_req()
3866 bool need_invalidate = server->dialect == SMB30_PROT_ID; in smb2_new_read_req()
3869 server->smbd_conn, rdata->pages, in smb2_new_read_req()
3923 struct TCP_Server_Info *server = rdata->server; in smb2_readv_callback() local
3938 WARN_ONCE(rdata->server != mid->server, in smb2_readv_callback()
3939 "rdata server %p != mid server %p", in smb2_readv_callback()
3940 rdata->server, mid->server); in smb2_readv_callback()
3949 credits.instance = server->reconnect_instance; in smb2_readv_callback()
3951 if (server->sign && !mid->decrypted) { in smb2_readv_callback()
3954 rc = smb2_verify_signature(&rqst, server); in smb2_readv_callback()
3966 if (server->sign && rdata->got_bytes) in smb2_readv_callback()
3975 credits.instance = server->reconnect_instance; in smb2_readv_callback()
4005 add_credits(server, &credits, 0); in smb2_readv_callback()
4018 struct TCP_Server_Info *server; in smb2_async_readv() local
4025 if (!rdata->server) in smb2_async_readv()
4026 rdata->server = cifs_pick_channel(tcon->ses); in smb2_async_readv()
4029 io_parms.server = server = rdata->server; in smb2_async_readv()
4054 rc = adjust_credits(server, &rdata->credits, rdata->bytes); in smb2_async_readv()
4062 rc = cifs_call_async(server, &rqst, in smb2_async_readv()
4094 if (!io_parms->server) in SMB2_read()
4095 io_parms->server = cifs_pick_channel(io_parms->tcon->ses); in SMB2_read()
4112 rc = cifs_send_recv(xid, ses, io_parms->server, in SMB2_read()
4169 struct TCP_Server_Info *server = wdata->server; in smb2_writev_callback() local
4174 WARN_ONCE(wdata->server != mid->server, in smb2_writev_callback()
4175 "wdata server %p != mid server %p", in smb2_writev_callback()
4176 wdata->server, mid->server); in smb2_writev_callback()
4181 credits.instance = server->reconnect_instance; in smb2_writev_callback()
4182 wdata->result = smb2_check_receive(mid, server, 0); in smb2_writev_callback()
4189 * by the server is greater than bytes requested by the in smb2_writev_callback()
4207 credits.instance = server->reconnect_instance; in smb2_writev_callback()
4243 add_credits(server, &credits, 0); in smb2_writev_callback()
4255 struct TCP_Server_Info *server = wdata->server; in smb2_async_writev() local
4260 if (!wdata->server) in smb2_async_writev()
4261 server = wdata->server = cifs_pick_channel(tcon->ses); in smb2_async_writev()
4263 rc = smb2_plain_req_init(SMB2_WRITE, tcon, server, in smb2_async_writev()
4288 * If we want to do a server RDMA read, fill in and append in smb2_async_writev()
4291 if (server->rdma && !server->sign && wdata->bytes >= in smb2_async_writev()
4292 server->smbd_conn->rdma_readwrite_threshold) { in smb2_async_writev()
4295 bool need_invalidate = server->dialect == SMB30_PROT_ID; in smb2_async_writev()
4298 server->smbd_conn, wdata->pages, in smb2_async_writev()
4360 rc = adjust_credits(server, &wdata->credits, wdata->bytes); in smb2_async_writev()
4368 rc = cifs_call_async(server, &rqst, NULL, smb2_writev_callback, NULL, in smb2_async_writev()
4402 struct TCP_Server_Info *server; in SMB2_write() local
4409 if (!io_parms->server) in SMB2_write()
4410 io_parms->server = cifs_pick_channel(io_parms->tcon->ses); in SMB2_write()
4411 server = io_parms->server; in SMB2_write()
4412 if (server == NULL) in SMB2_write()
4415 rc = smb2_plain_req_init(SMB2_WRITE, io_parms->tcon, server, in SMB2_write()
4448 rc = cifs_send_recv(xid, io_parms->tcon->ses, server, in SMB2_write()
4624 struct TCP_Server_Info *server, in SMB2_query_directory_init() argument
4639 rc = smb2_plain_req_init(SMB2_QUERY_DIRECTORY, tcon, server, in SMB2_query_directory_init()
4675 output_size = min_t(unsigned int, output_size, server->maxBuf); in SMB2_query_directory_init()
4783 struct TCP_Server_Info *server = cifs_pick_channel(ses); in SMB2_query_directory() local
4786 if (!ses || !(ses->server)) in SMB2_query_directory()
4797 rc = SMB2_query_directory_init(xid, tcon, server, in SMB2_query_directory()
4804 rc = cifs_send_recv(xid, ses, server, in SMB2_query_directory()
4842 SMB2_set_info_init(struct cifs_tcon *tcon, struct TCP_Server_Info *server, in SMB2_set_info_init() argument
4853 rc = smb2_plain_req_init(SMB2_SET_INFO, tcon, server, in SMB2_set_info_init()
4905 struct TCP_Server_Info *server = cifs_pick_channel(ses); in send_set_info() local
4908 if (!ses || !server) in send_set_info()
4925 rc = SMB2_set_info_init(tcon, server, in send_set_info()
4935 rc = cifs_send_recv(xid, ses, server, in send_set_info()
4999 struct TCP_Server_Info *server = cifs_pick_channel(ses); in SMB2_oplock_break() local
5007 rc = smb2_plain_req_init(SMB2_OPLOCK_BREAK, tcon, server, in SMB2_oplock_break()
5029 rc = cifs_send_recv(xid, ses, server, in SMB2_oplock_break()
5074 struct TCP_Server_Info *server, in build_qfs_info_req() argument
5084 if ((tcon->ses == NULL) || server == NULL) in build_qfs_info_req()
5087 rc = smb2_plain_req_init(SMB2_QUERY_INFO, tcon, server, in build_qfs_info_req()
5118 struct TCP_Server_Info *server = cifs_pick_channel(ses); in SMB311_posix_qfs_info() local
5122 rc = build_qfs_info_req(&iov, tcon, server, in SMB311_posix_qfs_info()
5136 rc = cifs_send_recv(xid, ses, server, in SMB311_posix_qfs_info()
5169 struct TCP_Server_Info *server = cifs_pick_channel(ses); in SMB2_QFS_info() local
5173 rc = build_qfs_info_req(&iov, tcon, server, in SMB2_QFS_info()
5187 rc = cifs_send_recv(xid, ses, server, in SMB2_QFS_info()
5220 struct TCP_Server_Info *server = cifs_pick_channel(ses); in SMB2_QFS_attr() local
5241 rc = build_qfs_info_req(&iov, tcon, server, in SMB2_QFS_attr()
5254 rc = cifs_send_recv(xid, ses, server, in SMB2_QFS_attr()
5308 struct TCP_Server_Info *server = cifs_pick_channel(tcon->ses); in smb2_lockv() local
5312 rc = smb2_plain_req_init(SMB2_LOCK, tcon, server, in smb2_lockv()
5339 rc = cifs_send_recv(xid, tcon->ses, server, in smb2_lockv()
5385 struct TCP_Server_Info *server = cifs_pick_channel(tcon->ses); in SMB2_lease_break() local
5388 rc = smb2_plain_req_init(SMB2_OPLOCK_BREAK, tcon, server, in SMB2_lease_break()
5412 rc = cifs_send_recv(xid, ses, server, in SMB2_lease_break()