Lines Matching defs:server

59 /* Drop the connection to not overload the server */
62 static int ip_connect(struct TCP_Server_Info *server);
63 static int generic_ip_connect(struct TCP_Server_Info *server);
71 * This should be called with server->srv_mutex held.
73 static int reconn_set_ipaddr_from_hostname(struct TCP_Server_Info *server)
80 if (!server->hostname)
83 /* if server hostname isn't populated, there's nothing to do here */
84 if (server->hostname[0] == '\0')
87 len = strlen(server->hostname) + 3;
94 scnprintf(unc, len, "\\\\%s", server->hostname);
96 spin_lock(&server->srv_lock);
97 ss = server->dstaddr;
98 spin_unlock(&server->srv_lock);
104 cifs_dbg(FYI, "%s: failed to resolve server part of %s to IP: %d\n",
105 __func__, server->hostname, rc);
107 spin_lock(&server->srv_lock);
108 memcpy(&server->dstaddr, &ss, sizeof(server->dstaddr));
109 spin_unlock(&server->srv_lock);
123 struct TCP_Server_Info *server = tcon->ses->server;
126 * query server network interfaces, in case they change
128 if (!server->ops->query_server_interfaces)
132 rc = server->ops->query_server_interfaces(xid, tcon, false);
139 cifs_dbg(FYI, "%s: failed to query server interfaces: %d\n",
148 * Update the tcpStatus for the server.
153 * @server: the tcp ses for which reconnect is needed
157 cifs_signal_cifsd_for_reconnect(struct TCP_Server_Info *server,
164 /* If server is a channel, select the primary channel */
165 pserver = SERVER_IS_CHAN(server) ? server->primary_server : server;
169 spin_lock(&server->srv_lock);
170 if (server->tcpStatus != CifsExiting)
171 server->tcpStatus = CifsNeedReconnect;
172 spin_unlock(&server->srv_lock);
182 if (!ses->chans[i].server)
185 spin_lock(&ses->chans[i].server->srv_lock);
186 if (ses->chans[i].server->tcpStatus != CifsExiting)
187 ses->chans[i].server->tcpStatus = CifsNeedReconnect;
188 spin_unlock(&ses->chans[i].server->srv_lock);
201 * @server: the tcp ses for which reconnect is needed
202 * @server needs to be previously set to CifsNeedReconnect.
206 cifs_mark_tcp_ses_conns_for_reconnect(struct TCP_Server_Info *server,
219 /* If server is a channel, select the primary channel */
220 pserver = SERVER_IS_CHAN(server) ? server->primary_server : server;
223 * if the server has been marked for termination, there is a
230 if (server->terminate) {
232 server = pserver;
245 if (cifs_ses_get_chan_index(ses, server) ==
251 if (!cifs_chan_is_iface_active(ses, server)) {
253 cifs_chan_update_iface(ses, server);
257 if (!mark_smb_session && cifs_chan_needs_reconnect(ses, server)) {
265 cifs_chan_set_need_reconnect(ses, server);
300 cifs_abort_connection(struct TCP_Server_Info *server)
305 server->maxBuf = 0;
306 server->max_read = 0;
310 cifs_server_lock(server);
311 if (server->ssocket) {
312 cifs_dbg(FYI, "State: 0x%x Flags: 0x%lx\n", server->ssocket->state,
313 server->ssocket->flags);
314 kernel_sock_shutdown(server->ssocket, SHUT_WR);
315 cifs_dbg(FYI, "Post shutdown state: 0x%x Flags: 0x%lx\n", server->ssocket->state,
316 server->ssocket->flags);
317 sock_release(server->ssocket);
318 server->ssocket = NULL;
320 server->sequence_number = 0;
321 server->session_estab = false;
322 kfree_sensitive(server->session_key.response);
323 server->session_key.response = NULL;
324 server->session_key.len = 0;
325 server->lstrp = jiffies;
330 spin_lock(&server->mid_lock);
331 list_for_each_entry_safe(mid, nmid, &server->pending_mid_q, qhead) {
338 spin_unlock(&server->mid_lock);
339 cifs_server_unlock(server);
348 if (cifs_rdma_enabled(server)) {
349 cifs_server_lock(server);
350 smbd_destroy(server);
351 cifs_server_unlock(server);
355 static bool cifs_tcp_ses_needs_reconnect(struct TCP_Server_Info *server, int num_targets)
357 spin_lock(&server->srv_lock);
358 server->nr_targets = num_targets;
359 if (server->tcpStatus == CifsExiting) {
361 spin_unlock(&server->srv_lock);
362 wake_up(&server->response_q);
367 trace_smb3_reconnect(server->CurrentMid, server->conn_id,
368 server->hostname);
369 server->tcpStatus = CifsNeedReconnect;
371 spin_unlock(&server->srv_lock);
388 static int __cifs_reconnect(struct TCP_Server_Info *server,
393 if (!cifs_tcp_ses_needs_reconnect(server, 1))
396 cifs_mark_tcp_ses_conns_for_reconnect(server, mark_smb_session);
398 cifs_abort_connection(server);
402 cifs_server_lock(server);
404 if (!cifs_swn_set_server_dstaddr(server)) {
406 rc = reconn_set_ipaddr_from_hostname(server);
410 if (cifs_rdma_enabled(server))
411 rc = smbd_reconnect(server);
413 rc = generic_ip_connect(server);
415 cifs_server_unlock(server);
420 set_credits(server, 1);
421 spin_lock(&server->srv_lock);
422 if (server->tcpStatus != CifsExiting)
423 server->tcpStatus = CifsNeedNegotiate;
424 spin_unlock(&server->srv_lock);
425 cifs_swn_reset_server_dstaddr(server);
426 cifs_server_unlock(server);
427 mod_delayed_work(cifsiod_wq, &server->reconnect, 0);
429 } while (server->tcpStatus == CifsNeedReconnect);
431 spin_lock(&server->srv_lock);
432 if (server->tcpStatus == CifsNeedNegotiate)
433 mod_delayed_work(cifsiod_wq, &server->echo, 0);
434 spin_unlock(&server->srv_lock);
436 wake_up(&server->response_q);
441 static int __reconnect_target_unlocked(struct TCP_Server_Info *server, const char *target)
446 if (!cifs_swn_set_server_dstaddr(server)) {
447 if (server->hostname != target) {
450 spin_lock(&server->srv_lock);
451 kfree(server->hostname);
452 server->hostname = hostname;
453 spin_unlock(&server->srv_lock);
457 cifs_dbg(FYI, "%s: default to last target server: %s\n", __func__,
458 server->hostname);
462 rc = reconn_set_ipaddr_from_hostname(server);
466 if (cifs_rdma_enabled(server))
467 rc = smbd_reconnect(server);
469 rc = generic_ip_connect(server);
474 static int reconnect_target_unlocked(struct TCP_Server_Info *server, struct dfs_cache_tgt_list *tl,
482 /* If dfs target list is empty, then reconnect to last server */
485 return __reconnect_target_unlocked(server, server->hostname);
489 rc = __reconnect_target_unlocked(server, dfs_cache_get_tgt_name(tit));
498 static int reconnect_dfs_server(struct TCP_Server_Info *server)
510 * targets (server->nr_targets). It's also possible that the cached referral was cleared
511 * through /proc/fs/cifs/dfscache or the target list is empty due to server settings after
514 mutex_lock(&server->refpath_lock);
515 if (!dfs_cache_noreq_find(server->leaf_fullpath + 1, NULL, &tl))
517 mutex_unlock(&server->refpath_lock);
521 if (!cifs_tcp_ses_needs_reconnect(server, num_targets))
526 * different server or share during failover. It could be improved by adding some logic to
527 * only do that in case it connects to a different server or share, though.
529 cifs_mark_tcp_ses_conns_for_reconnect(server, true);
531 cifs_abort_connection(server);
535 cifs_server_lock(server);
537 rc = reconnect_target_unlocked(server, &tl, &target_hint);
540 cifs_server_unlock(server);
548 * through the reconnected target server.
551 set_credits(server, 1);
552 spin_lock(&server->srv_lock);
553 if (server->tcpStatus != CifsExiting)
554 server->tcpStatus = CifsNeedNegotiate;
555 spin_unlock(&server->srv_lock);
556 cifs_swn_reset_server_dstaddr(server);
557 cifs_server_unlock(server);
558 mod_delayed_work(cifsiod_wq, &server->reconnect, 0);
559 } while (server->tcpStatus == CifsNeedReconnect);
561 mutex_lock(&server->refpath_lock);
562 dfs_cache_noreq_update_tgthint(server->leaf_fullpath + 1, target_hint);
563 mutex_unlock(&server->refpath_lock);
567 spin_lock(&server->srv_lock);
568 if (server->tcpStatus == CifsNeedNegotiate)
569 mod_delayed_work(cifsiod_wq, &server->echo, 0);
570 spin_unlock(&server->srv_lock);
572 wake_up(&server->response_q);
576 int cifs_reconnect(struct TCP_Server_Info *server, bool mark_smb_session)
578 mutex_lock(&server->refpath_lock);
579 if (!server->leaf_fullpath) {
580 mutex_unlock(&server->refpath_lock);
581 return __cifs_reconnect(server, mark_smb_session);
583 mutex_unlock(&server->refpath_lock);
585 return reconnect_dfs_server(server);
588 int cifs_reconnect(struct TCP_Server_Info *server, bool mark_smb_session)
590 return __cifs_reconnect(server, mark_smb_session);
598 struct TCP_Server_Info *server = container_of(work,
606 if (server->tcpStatus == CifsNeedReconnect ||
607 server->tcpStatus == CifsExiting ||
608 server->tcpStatus == CifsNew ||
609 (server->ops->can_echo && !server->ops->can_echo(server)) ||
610 time_before(jiffies, server->lstrp + server->echo_interval - HZ))
613 rc = server->ops->echo ? server->ops->echo(server) : -ENOSYS;
620 queue_delayed_work(cifsiod_wq, &server->echo, server->echo_interval);
624 allocate_buffers(struct TCP_Server_Info *server)
626 if (!server->bigbuf) {
627 server->bigbuf = (char *)cifs_buf_get();
628 if (!server->bigbuf) {
634 } else if (server->large_buf) {
636 memset(server->bigbuf, 0, HEADER_SIZE(server));
639 if (!server->smallbuf) {
640 server->smallbuf = (char *)cifs_small_buf_get();
641 if (!server->smallbuf) {
650 memset(server->smallbuf, 0, HEADER_SIZE(server));
657 server_unresponsive(struct TCP_Server_Info *server)
661 * and the server abruptly shut down (e.g. socket wasn't closed, packet
665 spin_lock(&server->srv_lock);
666 if (server->tcpStatus == CifsInNegotiate &&
667 time_after(jiffies, server->lstrp + 20 * HZ)) {
668 spin_unlock(&server->srv_lock);
669 cifs_reconnect(server, false);
683 if ((server->tcpStatus == CifsGood ||
684 server->tcpStatus == CifsNeedNegotiate) &&
685 (!server->ops->can_echo || server->ops->can_echo(server)) &&
686 time_after(jiffies, server->lstrp + 3 * server->echo_interval)) {
687 spin_unlock(&server->srv_lock);
689 (3 * server->echo_interval) / HZ);
690 cifs_reconnect(server, false);
693 spin_unlock(&server->srv_lock);
699 zero_credits(struct TCP_Server_Info *server)
703 spin_lock(&server->req_lock);
704 val = server->credits + server->echo_credits + server->oplock_credits;
705 if (server->in_flight == 0 && val == 0) {
706 spin_unlock(&server->req_lock);
709 spin_unlock(&server->req_lock);
714 cifs_readv_from_socket(struct TCP_Server_Info *server, struct msghdr *smb_msg)
723 if (zero_credits(server)) {
724 cifs_reconnect(server, false);
728 if (server_unresponsive(server))
730 if (cifs_rdma_enabled(server) && server->smbd_conn)
731 length = smbd_recv(server->smbd_conn, smb_msg);
733 length = sock_recvmsg(server->ssocket, smb_msg, 0);
735 spin_lock(&server->srv_lock);
736 if (server->tcpStatus == CifsExiting) {
737 spin_unlock(&server->srv_lock);
741 if (server->tcpStatus == CifsNeedReconnect) {
742 spin_unlock(&server->srv_lock);
743 cifs_reconnect(server, false);
746 spin_unlock(&server->srv_lock);
754 * CifsNeedReconnect if server hung.
763 cifs_reconnect(server, false);
771 cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
779 return cifs_readv_from_socket(server, &smb_msg);
783 cifs_discard_from_socket(struct TCP_Server_Info *server, size_t to_read)
794 return cifs_readv_from_socket(server, &smb_msg);
798 cifs_read_page_from_socket(struct TCP_Server_Info *server, struct page *page,
806 return cifs_readv_from_socket(server, &smb_msg);
810 cifs_read_iter_from_socket(struct TCP_Server_Info *server, struct iov_iter *iter,
817 ret = cifs_readv_from_socket(server, &smb_msg);
824 is_smb_response(struct TCP_Server_Info *server, unsigned char type)
847 /* give server a second to clean up */
855 cifs_set_port((struct sockaddr *)&server->dstaddr, CIFS_PORT);
856 cifs_reconnect(server, true);
860 cifs_reconnect(server, true);
872 spin_lock(&mid->server->mid_lock);
882 spin_unlock(&mid->server->mid_lock);
887 spin_unlock(&mid->server->mid_lock);
892 smb2_get_credits_from_hdr(char *buffer, struct TCP_Server_Info *server)
899 if (is_smb1(server))
906 handle_mid(struct mid_q_entry *mid, struct TCP_Server_Info *server,
909 if (server->ops->check_trans2 &&
910 server->ops->check_trans2(mid, server, buf, malformed))
912 mid->credits_received = smb2_get_credits_from_hdr(buf, server);
914 mid->large_buf = server->large_buf;
918 if (server->large_buf)
919 server->bigbuf = NULL;
921 server->smallbuf = NULL;
927 cifs_enable_signing(struct TCP_Server_Info *server, bool mnt_sign_required)
929 bool srv_sign_required = server->sec_mode & server->vals->signing_required;
930 bool srv_sign_enabled = server->sec_mode & server->vals->signing_enabled;
948 /* If server requires signing, does client allow it? */
954 server->sign = true;
957 /* If client requires signing, does server allow it? */
963 server->sign = true;
966 if (cifs_rdma_enabled(server) && server->sign)
973 clean_demultiplex_info(struct TCP_Server_Info *server)
978 spin_lock(&server->srv_lock);
979 list_del_init(&server->tcp_ses_list);
980 spin_unlock(&server->srv_lock);
982 cancel_delayed_work_sync(&server->echo);
984 spin_lock(&server->srv_lock);
985 server->tcpStatus = CifsExiting;
986 spin_unlock(&server->srv_lock);
987 wake_up_all(&server->response_q);
990 spin_lock(&server->req_lock);
991 if (server->credits <= 0)
992 server->credits = 1;
993 spin_unlock(&server->req_lock);
998 * same server - they now will see the session is in exit state and get
1001 wake_up_all(&server->request_q);
1004 if (cifs_rdma_enabled(server))
1005 smbd_destroy(server);
1007 if (server->ssocket) {
1008 sock_release(server->ssocket);
1009 server->ssocket = NULL;
1012 put_net(cifs_net_ns(server));
1015 if (!list_empty(&server->pending_mid_q)) {
1021 spin_lock(&server->mid_lock);
1022 list_for_each_safe(tmp, tmp2, &server->pending_mid_q) {
1030 spin_unlock(&server->mid_lock);
1044 if (!list_empty(&server->pending_mid_q)) {
1061 /* Release netns reference for this server. */
1062 put_net(cifs_net_ns(server));
1063 kfree(server->leaf_fullpath);
1064 kfree(server->hostname);
1065 kfree(server);
1073 standard_receive3(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1076 char *buf = server->smallbuf;
1077 unsigned int pdu_length = server->pdu_size;
1080 if (pdu_length > CIFSMaxBufSize + MAX_HEADER_SIZE(server) -
1081 HEADER_PREAMBLE_SIZE(server)) {
1083 cifs_reconnect(server, true);
1089 server->large_buf = true;
1090 memcpy(server->bigbuf, buf, server->total_read);
1091 buf = server->bigbuf;
1095 length = cifs_read_from_socket(server, buf + HEADER_SIZE(server) - 1,
1096 pdu_length - MID_HEADER_SIZE(server));
1100 server->total_read += length;
1102 dump_smb(buf, server->total_read);
1104 return cifs_handle_standard(server, mid);
1108 cifs_handle_standard(struct TCP_Server_Info *server, struct mid_q_entry *mid)
1110 char *buf = server->large_buf ? server->bigbuf : server->smallbuf;
1121 rc = server->ops->check_message(buf, server->total_read, server);
1124 min_t(unsigned int, server->total_read, 48));
1126 if (server->ops->is_session_expired &&
1127 server->ops->is_session_expired(buf)) {
1128 cifs_reconnect(server, true);
1132 if (server->ops->is_status_pending &&
1133 server->ops->is_status_pending(buf, server))
1139 handle_mid(mid, server, buf, rc);
1144 smb2_add_credits_from_hdr(char *buffer, struct TCP_Server_Info *server)
1152 if (is_smb1(server))
1156 spin_lock(&server->req_lock);
1157 server->credits += le16_to_cpu(shdr->CreditRequest);
1158 scredits = server->credits;
1159 in_flight = server->in_flight;
1160 spin_unlock(&server->req_lock);
1161 wake_up(&server->request_q);
1163 trace_smb3_hdr_credits(server->CurrentMid,
1164 server->conn_id, server->hostname, scredits,
1177 struct TCP_Server_Info *server = p;
1196 while (server->tcpStatus != CifsExiting) {
1200 if (!allocate_buffers(server))
1203 server->large_buf = false;
1204 buf = server->smallbuf;
1207 length = cifs_read_from_socket(server, buf, pdu_length);
1211 if (is_smb1(server))
1212 server->total_read = length;
1214 server->total_read = 0;
1223 if (!is_smb_response(server, buf[0]))
1228 server->pdu_size = pdu_length;
1231 if (server->pdu_size < MID_HEADER_SIZE(server)) {
1233 server->pdu_size);
1234 cifs_reconnect(server, true);
1239 length = cifs_read_from_socket(server,
1240 buf + HEADER_PREAMBLE_SIZE(server),
1241 MID_HEADER_SIZE(server));
1244 server->total_read += length;
1246 if (server->ops->next_header) {
1247 if (server->ops->next_header(server, buf, &next_offset)) {
1250 cifs_reconnect(server, true);
1254 server->pdu_size = next_offset;
1261 if (server->ops->is_transform_hdr &&
1262 server->ops->receive_transform &&
1263 server->ops->is_transform_hdr(buf)) {
1264 length = server->ops->receive_transform(server,
1269 mids[0] = server->ops->find_mid(server, buf);
1274 length = standard_receive3(server, mids[0]);
1276 length = mids[0]->receive(server, mids[0]);
1286 if (server->ops->is_status_io_timeout &&
1287 server->ops->is_status_io_timeout(buf)) {
1299 server->lstrp = jiffies;
1303 mids[i]->resp_buf_size = server->pdu_size;
1306 if (server->ops->is_network_name_deleted &&
1307 server->ops->is_network_name_deleted(bufs[i],
1308 server)) {
1318 } else if (server->ops->is_oplock_break &&
1319 server->ops->is_oplock_break(bufs[i],
1320 server)) {
1321 smb2_add_credits_from_hdr(bufs[i], server);
1327 HEADER_SIZE(server));
1328 smb2_add_credits_from_hdr(bufs[i], server);
1330 if (server->ops->dump_detail)
1331 server->ops->dump_detail(bufs[i],
1332 server);
1333 cifs_dump_mids(server);
1338 if (pdu_length > server->pdu_size) {
1339 if (!allocate_buffers(server))
1341 pdu_length -= server->pdu_size;
1342 server->total_read = 0;
1343 server->large_buf = false;
1344 buf = server->smallbuf;
1350 cifs_reconnect(server, true);
1355 cifs_buf_release(server->bigbuf);
1356 if (server->smallbuf) /* no sense logging a debug message if NULL */
1357 cifs_small_buf_release(server->smallbuf);
1359 task_to_wake = xchg(&server->tsk, NULL);
1360 clean_demultiplex_info(server);
1362 /* if server->tsk was NULL then wait for a signal before exiting */
1458 * families of server and addr are equal.
1461 match_port(struct TCP_Server_Info *server, struct sockaddr *addr)
1466 if (server->rdma)
1471 sport = &((struct sockaddr_in *) &server->dstaddr)->sin_port;
1475 sport = &((struct sockaddr_in6 *) &server->dstaddr)->sin6_port;
1494 static bool match_server_address(struct TCP_Server_Info *server, struct sockaddr *addr)
1496 if (!cifs_match_ipaddr(addr, (struct sockaddr *)&server->dstaddr))
1503 match_security(struct TCP_Server_Info *server, struct smb3_fs_context *ctx)
1510 if (server->ops->select_sectype(server, ctx->sectype)
1517 * the server->sign had better be too.
1519 if (ctx->sign && !server->sign)
1526 static int match_server(struct TCP_Server_Info *server,
1532 lockdep_assert_held(&server->srv_lock);
1537 /* this server does not share socket */
1538 if (server->nosharesock)
1543 if (server->vals->protocol_id < SMB30_PROT_ID)
1547 if (server->vals->protocol_id < SMB21_PROT_ID)
1549 } else if ((server->vals != ctx->vals) || (server->ops != ctx->ops))
1552 if (!net_eq(cifs_net_ns(server), current->nsproxy->net_ns))
1556 (struct sockaddr *)&server->srcaddr))
1560 * really match either @server->leaf_fullpath or @server->dstaddr
1561 * directly since this @server might belong to a completely different
1562 * server -- in case of domain-based DFS referrals or DFS links -- as
1565 * Otherwise, match the DFS referral in @server->leaf_fullpath or the
1566 * destination address in @server->dstaddr.
1573 if (server->leaf_fullpath) {
1575 strcasecmp(server->leaf_fullpath,
1581 } else if (server->leaf_fullpath) {
1590 if (!server->leaf_fullpath &&
1591 (strcasecmp(server->hostname, ctx->server_hostname) ||
1592 !match_server_address(server, addr) ||
1593 !match_port(server, addr)))
1596 if (!match_security(server, ctx))
1599 if (server->echo_interval != ctx->echo_interval * HZ)
1602 if (server->rdma != ctx->rdma)
1605 if (server->ignore_signature != ctx->ignore_signature)
1608 if (server->min_offload != ctx->min_offload)
1611 if (server->retrans != ctx->retrans)
1620 struct TCP_Server_Info *server;
1623 list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) {
1624 spin_lock(&server->srv_lock);
1629 if (SERVER_IS_CHAN(server) ||
1630 !match_server(server, ctx, false)) {
1631 spin_unlock(&server->srv_lock);
1634 spin_unlock(&server->srv_lock);
1636 ++server->srv_count;
1638 cifs_dbg(FYI, "Existing tcp session with server found\n");
1639 return server;
1646 cifs_put_tcp_session(struct TCP_Server_Info *server, int from_reconnect)
1651 if (--server->srv_count > 0) {
1657 WARN_ON(server->srv_count < 0);
1659 list_del_init(&server->tcp_ses_list);
1662 cancel_delayed_work_sync(&server->echo);
1668 * that reconnect work does nothing with server pointer after
1671 cancel_delayed_work(&server->reconnect);
1673 cancel_delayed_work_sync(&server->reconnect);
1675 /* For secondary channels, we pick up ref-count on the primary server */
1676 if (SERVER_IS_CHAN(server))
1677 cifs_put_tcp_session(server->primary_server, from_reconnect);
1679 spin_lock(&server->srv_lock);
1680 server->tcpStatus = CifsExiting;
1681 spin_unlock(&server->srv_lock);
1683 cifs_crypto_secmech_release(server);
1685 kfree_sensitive(server->session_key.response);
1686 server->session_key.response = NULL;
1687 server->session_key.len = 0;
1689 task = xchg(&server->tsk, NULL);
1734 /* Grab netns reference for this server. */
1866 /* Release netns reference for this server. */
1887 struct TCP_Server_Info *server = ses->server;
1900 ctx_sec = server->ops->select_sectype(server, ctx->sectype);
1901 ses_sec = server->ops->select_sectype(server, ses->sectype);
1981 struct TCP_Server_Info *server = ses->server;
1988 if (server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION)
1992 "IPC: server doesn't support encryption\n");
2002 spin_lock(&server->srv_lock);
2003 scnprintf(unc, sizeof(unc), "\\\\%s\\IPC$", server->hostname);
2004 spin_unlock(&server->srv_lock);
2010 rc = server->ops->tree_connect(xid, ses, unc, tcon, ctx->local_nls);
2030 cifs_find_smb_ses(struct TCP_Server_Info *server, struct smb3_fs_context *ctx)
2035 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) {
2059 struct TCP_Server_Info *server = ses->server;
2080 cifs_chan_clear_need_reconnect(ses, server);
2083 do_logoff = ses->ses_status == SES_GOOD && server->ops->logoff;
2091 * On session close, the IPC is closed and the server must release all
2094 * Besides, it will make the server to not close durable and resilient
2101 rc = server->ops->logoff(xid, ses);
2118 cifs_put_tcp_session(ses->chans[i].server, 0);
2119 ses->chans[i].server = NULL;
2125 ses->chans[0].server = NULL;
2129 cifs_put_tcp_session(server, 0);
2147 struct TCP_Server_Info *server = ses->server;
2157 switch (server->dstaddr.ss_family) {
2159 sa = (struct sockaddr_in *)&server->dstaddr;
2163 sa6 = (struct sockaddr_in6 *)&server->dstaddr;
2168 server->dstaddr.ss_family);
2288 * cifs_get_smb_ses - get a session matching @ctx data from @server
2289 * @server: server to setup the session to
2293 * already got a server reference (server refcount +1). See
2297 cifs_get_smb_ses(struct TCP_Server_Info *server, struct smb3_fs_context *ctx)
2303 struct sockaddr_in *addr = (struct sockaddr_in *)&server->dstaddr;
2304 struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&server->dstaddr;
2308 ses = cifs_find_smb_ses(server, ctx);
2314 if (cifs_chan_needs_reconnect(ses, server)) {
2321 rc = cifs_negotiate_protocol(xid, ses, server);
2330 rc = cifs_setup_session(xid, ses, server,
2352 /* existing SMB ses has a server reference already */
2353 cifs_put_tcp_session(server, 0);
2365 /* new SMB session uses our server ref */
2366 ses->server = server;
2367 if (server->dstaddr.ss_family == AF_INET6)
2407 /* add server as first channel */
2409 ses->chans[0].server = server;
2417 rc = cifs_negotiate_protocol(xid, ses, server);
2419 rc = cifs_setup_session(xid, ses, server, ctx->local_nls);
2448 list_add(&ses->smb_ses_list, &server->smb_ses_list);
2466 struct TCP_Server_Info *server = tcon->ses->server;
2476 } else if (!server->leaf_fullpath &&
2565 if (ses->server->ops->tree_disconnect)
2566 ses->server->ops->tree_disconnect(xid, tcon);
2614 if (!ses->server->ops->tree_connect) {
2619 if (ses->server->dialect >= SMB20_PROT_ID &&
2620 (ses->server->capabilities & SMB2_GLOBAL_CAP_DIRECTORY_LEASING))
2632 if (ses->server->vals->protocol_id == 0) {
2642 if (ses->server->vals->protocol_id == 0) {
2661 if (ses->server->vals->protocol_id == 0) {
2666 } else if (tcon->ses->server->capabilities &
2677 if (ses->server->posix_ext_supported) {
2680 } else if ((ses->server->vals->protocol_id == SMB311_PROT_ID) ||
2681 (strcmp(ses->server->vals->version_string,
2683 (strcmp(ses->server->vals->version_string,
2688 } else if (ses->server->vals->protocol_id == SMB10_PROT_ID)
2692 cifs_dbg(VFS, "SMB1 Unix Extensions not supported by server\n");
2704 rc = ses->server->ops->tree_connect(xid, ses, ctx->UNC, tcon,
2714 if (ses->server->vals->protocol_id == 0) {
2719 } else if (ses->server->capabilities &
2729 && (ses->server->capabilities & SMB2_GLOBAL_CAP_PERSISTENT_HANDLES)
2734 if (ses->server->vals->protocol_id == 0) {
2745 if (ses->server->vals->protocol_id >= SMB30_PROT_ID) {
2780 if (ses->server->vals->protocol_id == 0) {
2791 * resources mounted more than once to the same server share the last
2805 if (ses->server->dialect >= SMB30_PROT_ID &&
2806 (ses->server->capabilities & SMB2_GLOBAL_CAP_MULTI_CHANNEL)) {
2946 tcp_srv = ses->server;
3024 bind_socket(struct TCP_Server_Info *server)
3028 if (server->srcaddr.ss_family != AF_UNSPEC) {
3030 struct socket *socket = server->ssocket;
3033 (struct sockaddr *) &server->srcaddr,
3034 sizeof(server->srcaddr));
3039 saddr4 = (struct sockaddr_in *)&server->srcaddr;
3040 saddr6 = (struct sockaddr_in6 *)&server->srcaddr;
3053 ip_rfc1001_connect(struct TCP_Server_Info *server)
3067 if (server->server_RFC1001_name[0] != 0)
3069 server->server_RFC1001_name,
3079 if (server->workstation_RFC1001_name[0] != 0)
3081 server->workstation_RFC1001_name,
3095 rc = smb_send(server, smb_buf, len);
3097 * RFC1001 layer in at least one server requires very short break before
3108 generic_ip_connect(struct TCP_Server_Info *server)
3116 saddr = (struct sockaddr *) &server->dstaddr;
3118 if (server->dstaddr.ss_family == AF_INET6) {
3119 struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)&server->dstaddr;
3127 struct sockaddr_in *ipv4 = (struct sockaddr_in *)&server->dstaddr;
3136 if (server->ssocket) {
3137 socket = server->ssocket;
3139 struct net *net = cifs_net_ns(server);
3141 rc = sock_create_kern(net, sfamily, SOCK_STREAM, IPPROTO_TCP, &server->ssocket);
3150 * It'll be released here, on error, or in clean_demultiplex_info() upon server
3157 socket = server->ssocket;
3166 rc = bind_socket(server);
3168 put_net(cifs_net_ns(server));
3181 if (server->noautotune) {
3188 if (server->tcp_nodelay)
3196 server->noblockcnt ? O_NONBLOCK : 0);
3202 if (server->noblockcnt && rc == -EINPROGRESS)
3205 cifs_dbg(FYI, "Error %d connecting to server\n", rc);
3206 trace_smb3_connect_err(server->hostname, server->conn_id, &server->dstaddr, rc);
3207 put_net(cifs_net_ns(server));
3209 server->ssocket = NULL;
3212 trace_smb3_connect_done(server->hostname, server->conn_id, &server->dstaddr);
3214 rc = ip_rfc1001_connect(server);
3217 put_net(cifs_net_ns(server));
3223 ip_connect(struct TCP_Server_Info *server)
3226 struct sockaddr_in6 *addr6 = (struct sockaddr_in6 *)&server->dstaddr;
3227 struct sockaddr_in *addr = (struct sockaddr_in *)&server->dstaddr;
3229 if (server->dstaddr.ss_family == AF_INET6)
3240 rc = generic_ip_connect(server);
3248 return generic_ip_connect(server);
3263 * What if we wanted to mount the server share twice once with
3284 cifs_dbg(FYI, "unix caps which server supports %lld\n", cap);
3302 cifs_dbg(VFS, "server disabled POSIX path support\n");
3353 cifs_dbg(VFS, "Negotiating Unix capabilities with the server failed. Consider mounting with the Unix Extensions disabled if problems are found by specifying the nounix mount option.\n");
3421 else if (mnt_ctx->server)
3422 cifs_put_tcp_session(mnt_ctx->server, 0);
3425 mnt_ctx->server = NULL;
3432 struct TCP_Server_Info *server = NULL;
3447 server = cifs_get_tcp_session(ctx, NULL);
3448 if (IS_ERR(server)) {
3449 rc = PTR_ERR(server);
3450 server = NULL;
3455 ses = cifs_get_smb_ses(server, ctx);
3462 if ((ctx->persistent == true) && (!(ses->server->capabilities &
3464 cifs_server_dbg(VFS, "persistent handles not supported by server\n");
3470 mnt_ctx->server = server;
3479 struct TCP_Server_Info *server;
3485 if (WARN_ON_ONCE(!mnt_ctx || !mnt_ctx->server || !mnt_ctx->ses || !mnt_ctx->fs_ctx ||
3490 server = mnt_ctx->server;
3494 /* search for existing tcon to this server share */
3507 /* tell server which Unix caps we support */
3514 spin_lock(&tcon->ses->server->srv_lock);
3515 if ((tcon->ses->server->tcpStatus == CifsNeedReconnect) &&
3518 spin_unlock(&tcon->ses->server->srv_lock);
3522 spin_unlock(&tcon->ses->server->srv_lock);
3525 tcon->unix_ext = 0; /* server does not support them */
3528 if (!tcon->pipe && server->ops->qfs_tcon) {
3529 server->ops->qfs_tcon(mnt_ctx->xid, tcon, cifs_sb);
3542 * Clamp the rsize/wsize mount arguments if they are too big for the server
3547 (cifs_sb->ctx->wsize > server->ops->negotiate_wsize(tcon, ctx))) {
3549 round_down(server->ops->negotiate_wsize(tcon, ctx), PAGE_SIZE);
3551 * in the very unlikely event that the server sent a max write size under PAGE_SIZE,
3560 (cifs_sb->ctx->rsize > server->ops->negotiate_rsize(tcon, ctx)))
3561 cifs_sb->ctx->rsize = server->ops->negotiate_rsize(tcon, ctx);
3603 cifs_are_all_path_components_accessible(struct TCP_Server_Info *server,
3618 rc = server->ops->is_path_accessible(xid, tcon, cifs_sb, "");
3642 rc = server->ops->is_path_accessible(xid, tcon, cifs_sb,
3658 struct TCP_Server_Info *server = mnt_ctx->server;
3664 if (!server->ops->is_path_accessible)
3677 rc = server->ops->is_path_accessible(xid, tcon, cifs_sb,
3683 rc = cifs_are_all_path_components_accessible(server, xid, tcon,
3711 * After reconnecting to a different server, unique ids won't match anymore, so we disable
3753 if (WARN_ON(!mnt_ctx.server))
3812 smb_buffer->Mid = get_next_mid(ses->server);
3826 if (ses->server->sign)
3840 (/* server len*/ + 256 /* share len */), nls_codepage);
3961 struct TCP_Server_Info *server)
3965 if (!server->ops->need_neg || !server->ops->negotiate)
3969 spin_lock(&server->srv_lock);
3970 if (server->tcpStatus != CifsGood &&
3971 server->tcpStatus != CifsNew &&
3972 server->tcpStatus != CifsNeedNegotiate) {
3973 spin_unlock(&server->srv_lock);
3977 if (!server->ops->need_neg(server) &&
3978 server->tcpStatus == CifsGood) {
3979 spin_unlock(&server->srv_lock);
3983 server->tcpStatus = CifsInNegotiate;
3984 spin_unlock(&server->srv_lock);
3986 rc = server->ops->negotiate(xid, ses, server);
3988 spin_lock(&server->srv_lock);
3989 if (server->tcpStatus == CifsInNegotiate)
3990 server->tcpStatus = CifsGood;
3993 spin_unlock(&server->srv_lock);
3995 spin_lock(&server->srv_lock);
3996 if (server->tcpStatus == CifsInNegotiate)
3997 server->tcpStatus = CifsNeedNegotiate;
3998 spin_unlock(&server->srv_lock);
4006 struct TCP_Server_Info *server,
4010 struct TCP_Server_Info *pserver = SERVER_IS_CHAN(server) ? server->primary_server : server;
4036 cifs_chan_set_in_reconnect(ses, server);
4049 if (server == pserver) {
4050 if (server->dstaddr.ss_family == AF_INET6)
4057 ses->capabilities = server->capabilities;
4059 ses->capabilities &= (~server->vals->cap_unix);
4071 server->sec_mode, server->capabilities, server->timeAdj);
4073 if (server->ops->sess_setup)
4074 rc = server->ops->sess_setup(xid, ses, server, nls_info);
4082 cifs_chan_clear_in_reconnect(ses, server);
4090 cifs_chan_clear_in_reconnect(ses, server);
4091 cifs_chan_clear_need_reconnect(ses, server);
4153 ++master_tcon->ses->server->srv_count;
4156 ses = cifs_get_smb_ses(master_tcon->ses->server, ctx);
4159 cifs_put_tcp_session(master_tcon->ses->server, 0);
4408 const struct smb_version_operations *ops = tcon->ses->server->ops;