Lines Matching defs:callback

141     uint32_t callback, int op, const char *optag, struct nfsdsession **sepp);
215 * If establishing a callback connection is attempted
216 * when a firewall is blocking the callback path, the
437 * Must wait until any outstanding callback on the old clp
461 * and get rid of any existing callback authentication
504 * Must wait until any outstanding callback on the old clp
2645 * threads do this Null callback RPC should be
4137 * "there is no valid callback address".
4325 * Do a server callback.
4337 u_int32_t callback;
4349 * Fill the callback program# and version into the request
4371 callback = clp->lc_callback;
4384 * and build the callback request.
4388 error = nfsrv_cbcallargs(nd, clp, callback, NFSV4OP_CBGETATTR,
4398 error = nfsrv_cbcallargs(nd, clp, callback, NFSV4OP_CBRECALL,
4457 * SequenceID Op that causes a callback just
4478 * but the callback failed on the client.)
4482 * Mark the callback pathway down, which disabled issuing
4490 * Callback worked. If the callback path was down, disable
4492 * is done on the assumption that the callback pathway is
4520 * Set up the compound RPC for the callback.
4524 uint32_t callback, int op, const char *optag, struct nfsdsession **sepp)
4534 *tl++ = txdr_unsigned(callback);
4544 *tl++ = txdr_unsigned(callback);
5129 * - do a recall callback, since not yet done
5136 * until after the callback, then set it correctly, once
5137 * the callback is done. (The delegation will now time
5577 * host IP address is the same as the callback address. (Not
5595 * Now, we must do the CB Getattr callback, to see if Change or Size
5614 error = 0; /* Ignore callback errors for now. */
6451 * Get a session for the callback.