| /OK3568_Linux_fs/kernel/fs/cifs/ |
| H A D | sess.c | 61 bool is_ses_using_iface(struct cifs_ses *ses, struct cifs_server_iface *iface) in is_ses_using_iface() argument 65 for (i = 0; i < ses->chan_count; i++) { in is_ses_using_iface() 66 if (is_server_using_iface(ses->chans[i].server, iface)) in is_ses_using_iface() 73 int cifs_try_adding_channels(struct cifs_ses *ses) in cifs_try_adding_channels() argument 75 int old_chan_count = ses->chan_count; in cifs_try_adding_channels() 76 int left = ses->chan_max - ses->chan_count; in cifs_try_adding_channels() 86 ses->chan_max); in cifs_try_adding_channels() 90 if (ses->server->dialect < SMB30_PROT_ID) { in cifs_try_adding_channels() 95 if (!(ses->server->capabilities & SMB2_GLOBAL_CAP_MULTI_CHANNEL)) { in cifs_try_adding_channels() 96 cifs_dbg(VFS, "server %s does not support multichannel\n", ses->server->hostname); in cifs_try_adding_channels() [all …]
|
| H A D | cifsencrypt.c | 266 int setup_ntlm_response(struct cifs_ses *ses, const struct nls_table *nls_cp) in setup_ntlm_response() argument 272 if (!ses) in setup_ntlm_response() 275 ses->auth_key.response = kmalloc(temp_len, GFP_KERNEL); in setup_ntlm_response() 276 if (!ses->auth_key.response) in setup_ntlm_response() 279 ses->auth_key.len = temp_len; in setup_ntlm_response() 281 rc = SMBNTencrypt(ses->password, ses->server->cryptkey, in setup_ntlm_response() 282 ses->auth_key.response + CIFS_SESS_KEY_SIZE, nls_cp); in setup_ntlm_response() 289 rc = E_md4hash(ses->password, temp_key, nls_cp); in setup_ntlm_response() 296 rc = mdfour(ses->auth_key.response, temp_key, CIFS_SESS_KEY_SIZE); in setup_ntlm_response() 352 build_avpair_blob(struct cifs_ses *ses, const struct nls_table *nls_cp) in build_avpair_blob() argument [all …]
|
| H A D | smb2transport.c | 98 struct cifs_ses *ses = NULL; in smb2_get_sign_key() local 106 list_for_each_entry(ses, &it->smb_ses_list, smb_ses_list) { in smb2_get_sign_key() 107 if (ses->Suid == ses_id) in smb2_get_sign_key() 117 if (ses->binding) { in smb2_get_sign_key() 123 memcpy(key, ses->smb3signingkey, SMB3_SIGN_KEY_SIZE); in smb2_get_sign_key() 131 for (i = 0; i < ses->chan_count; i++) { in smb2_get_sign_key() 132 chan = ses->chans + i; in smb2_get_sign_key() 152 struct cifs_ses *ses; in smb2_find_smb_ses_unlocked() local 154 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) { in smb2_find_smb_ses_unlocked() 155 if (ses->Suid != ses_id) in smb2_find_smb_ses_unlocked() [all …]
|
| H A D | connect.c | 394 struct cifs_ses *ses; in cifs_reconnect() local 457 ses = list_entry(tmp, struct cifs_ses, smb_ses_list); in cifs_reconnect() 458 ses->need_reconnect = true; in cifs_reconnect() 459 list_for_each(tmp2, &ses->tcon_list) { in cifs_reconnect() 463 if (ses->tcon_ipc) in cifs_reconnect() 464 ses->tcon_ipc->need_reconnect = true; in cifs_reconnect() 2680 static int match_session(struct cifs_ses *ses, struct smb_vol *vol) in match_session() argument 2683 vol->sectype != ses->sectype) in match_session() 2690 if (ses->chan_max < vol->max_channels) in match_session() 2693 switch (ses->sectype) { in match_session() [all …]
|
| H A D | smb2pdu.c | 88 if (!tcon || !tcon->ses) in smb3_encryption_required() 90 if ((tcon->ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA) || in smb3_encryption_required() 94 (tcon->ses->server->capabilities & SMB2_GLOBAL_CAP_ENCRYPTION)) in smb3_encryption_required() 133 if (tcon->ses) in smb2_hdr_assemble() 134 shdr->SessionId = tcon->ses->Suid; in smb2_hdr_assemble() 161 struct cifs_ses *ses; in smb2_reconnect() local 189 if ((!tcon->ses) || (tcon->ses->status == CifsExiting) || in smb2_reconnect() 190 (!tcon->ses->server) || !server) in smb2_reconnect() 193 ses = tcon->ses; in smb2_reconnect() 245 if (!tcon->ses->need_reconnect && !tcon->need_reconnect) in smb2_reconnect() [all …]
|
| H A D | cifs_debug.c | 109 (tcon->ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA) || in cifs_debug_tcon() 116 if (tcon->ses->server->ops->dump_share_caps) in cifs_debug_tcon() 117 tcon->ses->server->ops->dump_share_caps(m, tcon); in cifs_debug_tcon() 168 struct cifs_ses *ses; in cifs_debug_files_proc_show() local 185 ses = list_entry(tmp, struct cifs_ses, smb_ses_list); in cifs_debug_files_proc_show() 186 list_for_each(tmp1, &ses->tcon_list) { in cifs_debug_files_proc_show() 221 struct cifs_ses *ses; in cifs_debug_data_proc_show() local 357 ses = list_entry(tmp2, struct cifs_ses, in cifs_debug_data_proc_show() 359 if ((ses->serverDomain == NULL) || in cifs_debug_data_proc_show() 360 (ses->serverOS == NULL) || in cifs_debug_data_proc_show() [all …]
|
| H A D | smb2inode.c | 76 struct cifs_ses *ses = tcon->ses; in smb2_compound_op() local 93 server = cifs_pick_channel(ses); in smb2_compound_op() 167 trace_smb3_query_info_compound_enter(xid, ses->Suid, tcon->tid, in smb2_compound_op() 202 trace_smb3_posix_query_info_compound_enter(xid, ses->Suid, tcon->tid, full_path); in smb2_compound_op() 205 trace_smb3_delete_enter(xid, ses->Suid, tcon->tid, full_path); in smb2_compound_op() 212 trace_smb3_mkdir_enter(xid, ses->Suid, tcon->tid, full_path); in smb2_compound_op() 230 trace_smb3_rmdir_enter(xid, ses->Suid, tcon->tid, full_path); in smb2_compound_op() 248 trace_smb3_set_eof_enter(xid, ses->Suid, tcon->tid, full_path); in smb2_compound_op() 281 trace_smb3_set_info_compound_enter(xid, ses->Suid, tcon->tid, in smb2_compound_op() 321 trace_smb3_rename_enter(xid, ses->Suid, tcon->tid, full_path); in smb2_compound_op() [all …]
|
| H A D | transport.c | 690 static int allocate_mid(struct cifs_ses *ses, struct smb_hdr *in_buf, in allocate_mid() argument 693 if (ses->server->tcpStatus == CifsExiting) { in allocate_mid() 697 if (ses->server->tcpStatus == CifsNeedReconnect) { in allocate_mid() 702 if (ses->status == CifsNew) { in allocate_mid() 709 if (ses->status == CifsExiting) { in allocate_mid() 716 *ppmidQ = AllocMidQEntry(in_buf, ses->server); in allocate_mid() 720 list_add_tail(&(*ppmidQ)->qhead, &ses->server->pending_mid_q); in allocate_mid() 858 SendReceiveNoRsp(const unsigned int xid, struct cifs_ses *ses, in SendReceiveNoRsp() argument 869 rc = SendReceive2(xid, ses, iov, 1, &resp_buf_type, flags, &rsp_iov); in SendReceiveNoRsp() 952 cifs_setup_request(struct cifs_ses *ses, struct TCP_Server_Info *ignored, in cifs_setup_request() argument [all …]
|
| H A D | ioctl.c | 66 if (tcon->ses->server->ops->ioctl_query_info) in cifs_ioctl_query_info() 67 rc = tcon->ses->server->ops->ioctl_query_info( in cifs_ioctl_query_info() 140 fsinf->protocol_id = tcon->ses->server->vals->protocol_id; in smb_mnt_get_fsinfo() 234 if (tcon->ses->server->ops->set_compression) { in cifs_ioctl() 235 rc = tcon->ses->server->ops->set_compression( in cifs_ioctl() 250 if (tcon->ses->server->ops->set_integrity) in cifs_ioctl() 251 rc = tcon->ses->server->ops->set_integrity(xid, in cifs_ioctl() 270 if (tcon->ses->server->ops->enum_snapshots) in cifs_ioctl() 271 rc = tcon->ses->server->ops->enum_snapshots(xid, tcon, in cifs_ioctl() 290 le16_to_cpu(tcon->ses->server->cipher_type); in cifs_ioctl() [all …]
|
| H A D | cifsfs.c | 176 if (tcon->ses->capabilities & tcon->ses->server->vals->cap_large_files) in cifs_read_super() 188 if ((tcon->ses->server->vals->protocol_id == SMB10_PROT_ID) && in cifs_read_super() 189 ((tcon->ses->capabilities & in cifs_read_super() 190 tcon->ses->server->vals->cap_nt_find) == 0) && in cifs_read_super() 266 struct TCP_Server_Info *server = tcon->ses->server; in cifs_statfs() 296 struct TCP_Server_Info *server = tcon->ses->server; in cifs_fallocate() 404 cifs_show_security(struct seq_file *s, struct cifs_ses *ses) in cifs_show_security() argument 406 if (ses->sectype == Unspecified) { in cifs_show_security() 407 if (ses->user_name == NULL) in cifs_show_security() 414 switch (ses->sectype) { in cifs_show_security() [all …]
|
| H A D | xattr.c | 68 if (pTcon->ses->server->ops->set_file_info) in cifs_attrib_set() 69 rc = pTcon->ses->server->ops->set_file_info(inode, full_path, in cifs_attrib_set() 92 if (pTcon->ses->server->ops->set_file_info) in cifs_creation_time_set() 93 rc = pTcon->ses->server->ops->set_file_info(inode, full_path, in cifs_creation_time_set() 160 if (pTcon->ses->server->ops->set_EA) in cifs_xattr_set() 161 rc = pTcon->ses->server->ops->set_EA(xid, pTcon, in cifs_xattr_set() 178 pTcon->ses->server->ops->set_acl) { in cifs_xattr_set() 182 rc = pTcon->ses->server->ops->set_acl( in cifs_xattr_set() 189 rc = pTcon->ses->server->ops->set_acl( in cifs_xattr_set() 324 if (pTcon->ses->server->ops->query_all_EAs) in cifs_xattr_get() [all …]
|
| H A D | dfs_cache.c | 658 static int get_dfs_referral(const unsigned int xid, struct cifs_ses *ses, in get_dfs_referral() argument 665 if (!ses || !ses->server || !ses->server->ops->get_dfs_refer) in get_dfs_referral() 673 return ses->server->ops->get_dfs_refer(xid, ses, path, refs, numrefs, in get_dfs_referral() 701 static int __dfs_cache_find(const unsigned int xid, struct cifs_ses *ses, in __dfs_cache_find() argument 745 rc = get_dfs_referral(xid, ses, nls_codepage, remap, path, in __dfs_cache_find() 877 int dfs_cache_find(const unsigned int xid, struct cifs_ses *ses, in dfs_cache_find() argument 890 rc = __dfs_cache_find(xid, ses, nls_codepage, remap, npath, false); in dfs_cache_find() 986 int dfs_cache_update_tgthint(const unsigned int xid, struct cifs_ses *ses, in dfs_cache_update_tgthint() argument 1002 rc = __dfs_cache_find(xid, ses, nls_codepage, remap, npath, false); in dfs_cache_update_tgthint() 1393 struct cifs_ses *ses; in get_tcons() local [all …]
|
| H A D | cifssmb.c | 132 struct cifs_ses *ses; in cifs_reconnect_tcon() local 145 ses = tcon->ses; in cifs_reconnect_tcon() 146 server = ses->server; in cifs_reconnect_tcon() 198 if (!ses->need_reconnect && !tcon->need_reconnect) in cifs_reconnect_tcon() 207 mutex_lock(&ses->session_mutex); in cifs_reconnect_tcon() 216 mutex_unlock(&ses->session_mutex); in cifs_reconnect_tcon() 220 rc = cifs_negotiate_protocol(0, ses); in cifs_reconnect_tcon() 221 if (rc == 0 && ses->need_reconnect) in cifs_reconnect_tcon() 222 rc = cifs_setup_session(0, ses, nls_codepage); in cifs_reconnect_tcon() 226 mutex_unlock(&ses->session_mutex); in cifs_reconnect_tcon() [all …]
|
| H A D | smb2misc.c | 157 struct cifs_ses *ses = NULL; in smb2_check_message() local 163 ses = list_entry(tmp, struct cifs_ses, smb_ses_list); in smb2_check_message() 164 if (ses->Suid == thdr->SessionId) in smb2_check_message() 167 ses = NULL; in smb2_check_message() 170 if (ses == NULL) { in smb2_check_message() 614 struct cifs_ses *ses; in smb2_is_valid_lease_break() local 626 ses = list_entry(tmp1, struct cifs_ses, smb_ses_list); in smb2_is_valid_lease_break() 628 list_for_each(tmp2, &ses->tcon_list) { in smb2_is_valid_lease_break() 681 struct cifs_ses *ses; in smb2_is_valid_oplock_break() local 704 ses = list_entry(tmp, struct cifs_ses, smb_ses_list); in smb2_is_valid_oplock_break() [all …]
|
| H A D | cifsproto.h | 99 extern struct TCP_Server_Info *cifs_pick_channel(struct cifs_ses *ses); 100 extern int cifs_send_recv(const unsigned int xid, struct cifs_ses *ses, 104 extern int compound_send_recv(const unsigned int xid, struct cifs_ses *ses, 113 extern int SendReceiveNoRsp(const unsigned int xid, struct cifs_ses *ses, 162 struct cifs_ses *ses, 166 extern int CIFS_SessSetup(const unsigned int xid, struct cifs_ses *ses, 283 struct cifs_ses *ses); 284 extern int cifs_setup_session(const unsigned int xid, struct cifs_ses *ses, 287 extern int CIFSSMBNegotiate(const unsigned int xid, struct cifs_ses *ses); 289 extern int CIFSTCon(const unsigned int xid, struct cifs_ses *ses, [all …]
|
| H A D | smb2ops.c | 329 smb2_negotiate(const unsigned int xid, struct cifs_ses *ses) in smb2_negotiate() argument 333 cifs_ses_server(ses)->CurrentMid = 0; in smb2_negotiate() 334 rc = SMB2_negotiate(xid, ses); in smb2_negotiate() 344 struct TCP_Server_Info *server = tcon->ses->server; in smb2_negotiate_wsize() 359 struct TCP_Server_Info *server = tcon->ses->server; in smb3_negotiate_wsize() 391 struct TCP_Server_Info *server = tcon->ses->server; in smb2_negotiate_rsize() 407 struct TCP_Server_Info *server = tcon->ses->server; in smb3_negotiate_rsize() 587 struct cifs_ses *ses = tcon->ses; in SMB3_request_interfaces() local 610 spin_lock(&ses->iface_lock); in SMB3_request_interfaces() 611 kfree(ses->iface_list); in SMB3_request_interfaces() [all …]
|
| /OK3568_Linux_fs/kernel/drivers/crypto/rockchip/cryptodev_linux/ |
| H A D | zc.c | 111 int cryptodev_adjust_sg_array(struct csession *ses, int pagecount) in cryptodev_adjust_sg_array() argument 117 for (array_size = ses->array_size; array_size < pagecount; in cryptodev_adjust_sg_array() 121 ses->array_size, array_size); in cryptodev_adjust_sg_array() 122 pages = krealloc(ses->pages, array_size * sizeof(struct page *), in cryptodev_adjust_sg_array() 126 ses->pages = pages; in cryptodev_adjust_sg_array() 127 sg = krealloc(ses->sg, array_size * sizeof(struct scatterlist), in cryptodev_adjust_sg_array() 131 ses->sg = sg; in cryptodev_adjust_sg_array() 132 ses->array_size = array_size; in cryptodev_adjust_sg_array() 137 void cryptodev_release_user_pages(struct csession *ses) in cryptodev_release_user_pages() argument 141 for (i = 0; i < ses->used_pages; i++) { in cryptodev_release_user_pages() [all …]
|
| H A D | authenc.c | 53 static int get_userbuf_tls(struct csession *ses, struct kernel_crypt_auth_op *kcaop, in get_userbuf_tls() argument 63 if (ses->alignmask) { in get_userbuf_tls() 64 if (!IS_ALIGNED((unsigned long)caop->dst, ses->alignmask + 1)) in get_userbuf_tls() 66 caop->dst, ses->alignmask + 1); in get_userbuf_tls() 76 ses->used_pages = pagecount; in get_userbuf_tls() 77 ses->readonly_pages = 0; in get_userbuf_tls() 79 rc = cryptodev_adjust_sg_array(ses, pagecount); in get_userbuf_tls() 84 ses->pages, ses->sg, kcaop->task, kcaop->mm); in get_userbuf_tls() 90 (*dst_sg) = ses->sg; in get_userbuf_tls() 104 static int get_userbuf_srtp(struct csession *ses, struct kernel_crypt_auth_op *kcaop, in get_userbuf_srtp() argument [all …]
|
| H A D | ioctl.c | 355 sop->ses = ses_new->sid; in crypto_create_session() 772 ses_ptr = crypto_get_session_by_sid(fcr, cop->ses); in fill_kcop_from_cop() 774 derr(1, "invalid session ID=0x%08X", cop->ses); in fill_kcop_from_cop() 885 ses_ptr = crypto_get_session_by_sid(fcr, siop->ses); in get_session_info() 887 derr(1, "invalid session ID=0x%08X", siop->ses); in get_session_info() 939 uint32_t ses; in cryptodev_ioctl() local 974 crypto_finish_session(fcr, sop.ses); in cryptodev_ioctl() 979 ret = get_user(ses, (uint32_t __user *)arg); in cryptodev_ioctl() 982 ret = crypto_finish_session(fcr, ses); in cryptodev_ioctl() 1054 sop->ses = compat->ses; in compat_to_session_op() [all …]
|
| H A D | cryptodev.h | 64 uint32_t ses; /* session identifier */ member 69 uint32_t ses; /* session identifier */ member 81 uint32_t ses; /* session identifier */ member 186 int cryptodev_adjust_sg_array(struct csession *ses, int pagecount);
|
| /OK3568_Linux_fs/u-boot/arch/arm/mach-keystone/ |
| H A D | msmc.c | 55 struct mpax ses[16][8]; member 66 msmc->ses[priv_id][j].mpaxh &= 0xffffff7ful; in msmc_share_all_segments() 75 msmc->ses[priv_id][ses_pair].mpaxh = src_pfn << 12 | in msmc_map_ses_segment() 77 msmc->ses[priv_id][ses_pair].mpaxl = dst_pfn << 8 | 0x3f; in msmc_map_ses_segment() 84 *mpax++ = msmc->ses[priv_id][ses_pair].mpaxl; in msmc_get_ses_mpax() 85 *mpax = msmc->ses[priv_id][ses_pair].mpaxh; in msmc_get_ses_mpax() 92 msmc->ses[priv_id][ses_pair].mpaxl = *mpax++; in msmc_set_ses_mpax() 93 msmc->ses[priv_id][ses_pair].mpaxh = *mpax; in msmc_set_ses_mpax()
|
| /OK3568_Linux_fs/kernel/drivers/scsi/ |
| H A D | scsi_error.c | 961 void scsi_eh_prep_cmnd(struct scsi_cmnd *scmd, struct scsi_eh_save *ses, in scsi_eh_prep_cmnd() argument 973 ses->cmd_len = scmd->cmd_len; in scsi_eh_prep_cmnd() 974 ses->cmnd = scmd->cmnd; in scsi_eh_prep_cmnd() 975 ses->data_direction = scmd->sc_data_direction; in scsi_eh_prep_cmnd() 976 ses->sdb = scmd->sdb; in scsi_eh_prep_cmnd() 977 ses->result = scmd->result; in scsi_eh_prep_cmnd() 978 ses->resid_len = scmd->req.resid_len; in scsi_eh_prep_cmnd() 979 ses->underflow = scmd->underflow; in scsi_eh_prep_cmnd() 980 ses->prot_op = scmd->prot_op; in scsi_eh_prep_cmnd() 981 ses->eh_eflags = scmd->eh_eflags; in scsi_eh_prep_cmnd() [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/dropbear/dropbear/ |
| H A D | CVE-2021-36369.patch | 41 ses.authstate.authdone = 1; 52 prompt = buf_getstring(ses.payload, NULL); 72 buf_putbytes(sigbuf, ses.writepayload->data, ses.writepayload->len); 73 cli_buf_put_sign(ses.writepayload, key, sigtype, sigbuf); 121 ses.remoteclosed = cli_remoteclosed;
|
| /OK3568_Linux_fs/kernel/fs/nfs/ |
| H A D | nfs4session.c | 532 int nfs4_setup_session_slot_tables(struct nfs4_session *ses) in nfs4_setup_session_slot_tables() argument 539 tbl = &ses->fc_slot_table; in nfs4_setup_session_slot_tables() 540 tbl->session = ses; in nfs4_setup_session_slot_tables() 541 status = nfs4_realloc_slot_table(tbl, ses->fc_attrs.max_reqs, 1); in nfs4_setup_session_slot_tables() 542 if (status || !(ses->flags & SESSION4_BACK_CHAN)) /* -ENOMEM */ in nfs4_setup_session_slot_tables() 545 tbl = &ses->bc_slot_table; in nfs4_setup_session_slot_tables() 546 tbl->session = ses; in nfs4_setup_session_slot_tables() 547 status = nfs4_realloc_slot_table(tbl, ses->bc_attrs.max_reqs, 0); in nfs4_setup_session_slot_tables() 551 nfs4_release_session_slot_tables(ses); in nfs4_setup_session_slot_tables()
|
| /OK3568_Linux_fs/kernel/include/uapi/linux/ |
| H A D | cryptodev.h | 142 __u32 ses; /* session identifier */ member 146 __u32 ses; /* session identifier */ member 172 __u32 ses; /* session identifier */ member 186 __u32 ses; /* session identifier */ member
|