Lines Matching full:smb
31 in a similar way to the mid which is useful to track each sent smb,
315 check_smb_hdr(struct smb_hdr *smb) in check_smb_hdr() argument
317 /* does it have the right SMB "signature" ? */ in check_smb_hdr()
318 if (*(__le32 *) smb->Protocol != cpu_to_le32(0x424d53ff)) { in check_smb_hdr()
320 *(unsigned int *)smb->Protocol); in check_smb_hdr()
325 if (smb->Flags & SMBFLG_RESPONSE) in check_smb_hdr()
329 if (smb->Command == SMB_COM_LOCKING_ANDX) in check_smb_hdr()
337 if (smb->Command == SMB_COM_TRANSACTION2 && smb->Status.CifsError != 0) in check_smb_hdr()
341 get_mid(smb)); in check_smb_hdr()
348 struct smb_hdr *smb = (struct smb_hdr *)buf; in checkSMB() local
349 __u32 rfclen = be32_to_cpu(smb->smb_buf_length); in checkSMB()
357 && (smb->Status.CifsError != 0)) { in checkSMB()
359 smb->WordCount = 0; in checkSMB()
363 (smb->WordCount == 0)) { in checkSMB()
364 char *tmp = (char *)smb; in checkSMB()
380 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
383 } else if (total_read < sizeof(*smb) + 2 * smb->WordCount) { in checkSMB()
385 __func__, smb->WordCount); in checkSMB()
390 if (check_smb_hdr(smb)) in checkSMB()
392 clc_len = smbCalcSize(smb); in checkSMB()
401 __u16 mid = get_mid(smb); in checkSMB()
412 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
418 * data than the lengths in the SMB packet would in checkSMB()
425 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
1297 * Handle weird Windows SMB server behaviour. It responds with