Home
last modified time | relevance | path

Searched refs:VFS (Results 1 – 25 of 73) sorted by relevance

123

/Linux-v4.19/fs/cifs/
Dsmb2transport.c179 cifs_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature()
188 cifs_dbg(VFS, "%s: sha256 alloc failed\n", __func__); in smb2_calc_signature()
195 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in smb2_calc_signature()
202 cifs_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature()
218 cifs_dbg(VFS, "%s: Could not update with payload\n", in smb2_calc_signature()
248 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key()
255 cifs_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key()
261 cifs_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key()
268 cifs_dbg(VFS, "%s: Could not update with n\n", __func__); in generate_key()
275 cifs_dbg(VFS, "%s: Could not update with label\n", __func__); in generate_key()
[all …]
Dcifsencrypt.c64 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature()
71 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
88 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
99 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature()
126 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature()
133 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature()
501 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash()
511 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash()
517 cifs_dbg(VFS, "%s: could not init hmacmd5\n", __func__); in calc_ntlmv2_hash()
540 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash()
[all …]
Dsmb2misc.c51 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
55 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
58 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
61 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
162 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
178 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
183 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
192 cifs_dbg(VFS, "Illegal structure size %u\n", in smb2_check_message()
199 cifs_dbg(VFS, "Illegal SMB2 command %d\n", command); in smb2_check_message()
207 cifs_dbg(VFS, "Illegal response size %u for command %d\n", in smb2_check_message()
[all …]
Dconnect.c482 cifs_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers()
495 cifs_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers()
526 cifs_dbg(VFS, "Server %s has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive()
644 cifs_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response()
793 cifs_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3()
913 cifs_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread()
989 cifs_dbg(VFS, "No task to wake, unknown frame " in cifs_demultiplex_thread()
1128 cifs_dbg(VFS, "sec=krb5p is not supported!\n"); in cifs_parse_security_flavors()
1163 cifs_dbg(VFS, "bad security option: %s\n", value); in cifs_parse_security_flavors()
1189 cifs_dbg(VFS, "bad cache= option: %s\n", value); in cifs_parse_cache_flavor()
[all …]
Dmisc.c285 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr()
298 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr()
336 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB()
338 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
349 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB()
366 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
379 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
527 …cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s. This server doesn't seem to su… in cifs_autodisable_serverino()
660 cifs_dbg(VFS, "num_referrals: must be at least > 0, but we get num_referrals = %d\n", in parse_dfs_referrals()
668 cifs_dbg(VFS, "Referrals of V%d version are not supported, should be V3\n", in parse_dfs_referrals()
[all …]
Dsess.c289 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
294 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge()
299 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge()
313 cifs_dbg(VFS, "tioffset + tilen too high %u + %u", in decode_ntlmssp_challenge()
321 cifs_dbg(VFS, "Challenge target info alloc failure"); in decode_ntlmssp_challenge()
396 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob()
403 cifs_dbg(VFS, "Error %d during NTLMSSP allocation\n", rc); in build_ntlmssp_auth_blob()
753 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_lanman()
822 cifs_dbg(VFS, "Error %d during NTLM authentication\n", in sess_auth_ntlm()
863 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_ntlm()
[all …]
Dsmbencrypt.c79 cifs_dbg(VFS, "could not allocate des crypto API\n"); in smbhash()
133 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour()
138 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour()
143 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
Dtransport.c58 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry()
204 cifs_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec()
218 cifs_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec()
379 cifs_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst()
412 cifs_dbg(VFS, "Encryption requested but transform callback " in smb_send_rqst()
705 cifs_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result()
746 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive()
799 cifs_dbg(VFS, "Null session\n"); in compound_send_recv()
994 cifs_dbg(VFS, "Null smb session\n"); in SendReceive()
998 cifs_dbg(VFS, "Null tcp session\n"); in SendReceive()
[all …]
Dcifs_debug.h34 #define VFS 1 macro
56 } else if ((type) & VFS) { \
Dcifs_debug.c50 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail()
53 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail()
67 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids()
71 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids()
78 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids()
84 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids()
811 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
820 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
828 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write()
833 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
Dsmb2pdu.c486 cifs_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context()
515 cifs_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context()
688 cifs_dbg(VFS, "Dialect not supported by server. Consider " in SMB2_negotiate()
698 cifs_dbg(VFS, in SMB2_negotiate()
702 cifs_dbg(VFS, in SMB2_negotiate()
709 cifs_dbg(VFS, in SMB2_negotiate()
719 cifs_dbg(VFS, "Illegal 0x%x dialect returned: not requested\n", in SMB2_negotiate()
737 cifs_dbg(VFS, "Illegal dialect returned by server 0x%x\n", in SMB2_negotiate()
797 cifs_dbg(VFS, "Missing expected negotiate contexts\n"); in SMB2_negotiate()
834 cifs_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n"); in smb3_validate_negotiate()
[all …]
Dsmb2ops.c48 cifs_dbg(VFS, "disabling echoes and oplocks\n"); in change_conf()
197 cifs_dbg(VFS, "encrypted frame parsing not supported yet"); in smb2_find_mid()
221 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail()
224 cifs_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail()
337 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces()
343 cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); in parse_server_interfaces()
402 cifs_dbg(VFS, in parse_server_interfaces()
452 cifs_dbg(VFS, "error %d on ioctl to get interface list\n", rc); in SMB3_request_interfaces()
818 cifs_dbg(VFS, "EA size is too large\n"); in smb2_query_eas()
1045 cifs_dbg(VFS, "refcpy ioctl error %d getting resume key\n", rc); in SMB2_request_res_key()
[all …]
Dcifsacl.c586 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode()
676 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace()
681 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace()
726 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl()
826 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid()
1114 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl()
1158 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr()
1163 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr()
1202 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
Dreaddir.c383 cifs_dbg(VFS, "invalid offset %u\n", next_offset); in nxt_dir_entry()
391 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry()
398 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry()
676 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry()
714 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir()
855 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
Dfscache.c72 cifs_dbg(VFS, "Unknown network family '%d'\n", sa->sa_family); in cifs_fscache_get_client_cookie()
267 cifs_dbg(VFS, "unknown error ret = %d\n", ret); in __cifs_readpage_from_fscache()
/Linux-v4.19/Documentation/filesystems/
Dvfs.txt23 VFS system calls open(2), stat(2), read(2), write(2), chmod(2) and so
31 The VFS implements the open(2), stat(2), chmod(2), and similar system
32 calls. The pathname argument that is passed to them is used by the VFS
41 into a dentry, the VFS may have to resort to creating dentries along
57 To look up an inode requires that the VFS calls the lookup() method of
59 filesystem implementation that the inode lives in. Once the VFS has
62 data. The stat(2) operation is fairly simple: once the VFS has the
76 can see that this is another switch performed by the VFS. The file
79 Reading, writing and closing files (and other assorted VFS operations)
83 dentry in use, which in turn means that the VFS inode is still in use.
[all …]
Dcoda.txt177 VFS interface. Similar functionality is provided, and the format of
178 the parameters and returned data is very similar to the BSD VFS. This
204 filesystem (VFS) layer, which is named I/O Manager in NT and IFS
205 manager in Windows 95. The VFS is responsible for partial processing
209 pre-processing, the VFS starts invoking exported routines in the FS
215 First and foremost the VFS must be able to make all necessary calls to
216 the Coda FS layer, so the Coda FS driver must expose the VFS interface
220 such VFS requests by invoking one or more well defined services
222 come back to the FS driver, servicing of the VFS call continues and
223 finishes with a reply to the kernel's VFS. Finally the VFS layer
[all …]
/Linux-v4.19/tools/perf/util/c++/
Dclang.cpp69 StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) in getModuleFromSource() argument
74 Clang.setVirtualFileSystem(&*VFS); in getModuleFromSource()
119 IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); in getModuleFromSource() local
120 return getModuleFromSource(std::move(CFlags), Path, VFS); in getModuleFromSource()
/Linux-v4.19/Documentation/namespaces/
Dcompatibility-list.txt10 UTS IPC VFS PID User Net
13 VFS X
29 should not be equal from the VFS point of view. In other
/Linux-v4.19/drivers/target/
DKconfig25 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS"
28 access to Linux/VFS struct file or struct block_device
/Linux-v4.19/Documentation/filesystems/cifs/
Dcifs.txt1 This is the client VFS module for the SMB3 NAS protocol as well
7 CIFS VFS module. CIFS is fully supported by network
/Linux-v4.19/Documentation/vm/
Dcleancache.rst10 Cleancache is a new optional feature provided by the VFS layer that
160 filesystems and VFS? (Andrew Morton and Christoph Hellwig)
162 The core hooks for cleancache in VFS are in most cases a single line
172 Some filesystems are built entirely on top of VFS and the hooks
173 in VFS are sufficient, so don't require an "init_fs" hook; the
175 But for some filesystems (such as btrfs), the VFS hooks are
242 file removal or truncation operations either go through VFS or
247 - The FS must call the VFS superblock alloc and deactivate routines
/Linux-v4.19/fs/nfs/
Ddir.c1268 dfprintk(VFS, "NFS: dentry_delete(%pd2, %x)\n", in nfs_dentry_delete()
1350 dfprintk(VFS, "NFS: lookup(%pd2)\n", dentry); in nfs_lookup()
1475 dfprintk(VFS, "NFS: atomic_open(%s/%lu), %pd\n", in nfs_atomic_open()
1703 dfprintk(VFS, "NFS: create(%s/%lu), %pd\n", in nfs_create()
1730 dfprintk(VFS, "NFS: mknod(%s/%lu), %pd\n", in nfs_mknod()
1756 dfprintk(VFS, "NFS: mkdir(%s/%lu), %pd\n", in nfs_mkdir()
1784 dfprintk(VFS, "NFS: rmdir(%s/%lu), %pd\n", in nfs_rmdir()
1821 dfprintk(VFS, "NFS: safe_remove(%pd2)\n", dentry); in nfs_safe_remove()
1853 dfprintk(VFS, "NFS: unlink(%s/%lu, %pd)\n", dir->i_sb->s_id, in nfs_unlink()
1904 dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s)\n", dir->i_sb->s_id, in nfs_symlink()
[all …]
/Linux-v4.19/fs/ecryptfs/
DKconfig8 Encrypted filesystem that operates on the VFS layer. See
/Linux-v4.19/Documentation/filesystems/nfs/
Dfault_injection.txt45 The NFS server keeps a list of what files are currently locked in the VFS.
47 unlocked through the VFS as they are cleared from this list).

123