Home
last modified time | relevance | path

Searched refs:VFS (Results 1 – 25 of 92) sorted by relevance

1234

/Linux-v5.10/fs/cifs/
Dfs_context.c36 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version()
40 cifs_dbg(VFS, "vers=1.0 (cifs) not permitted when mounting with smb3\n"); in cifs_parse_smb_version()
43 …cifs_dbg(VFS, "Use of the less secure dialect vers=1.0 is not recommended unless required for acce… in cifs_parse_smb_version()
49 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version()
53 cifs_dbg(VFS, "vers=2.0 not permitted when mounting with smb3\n"); in cifs_parse_smb_version()
61 cifs_dbg(VFS, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version()
64 cifs_dbg(VFS, "vers=2.0 mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version()
92 cifs_dbg(VFS, "Unknown vers= option specified: %s\n", value); in cifs_parse_smb_version()
129 cifs_dbg(VFS, "sec=krb5p is not supported!\n"); in cifs_parse_security_flavors()
164 cifs_dbg(VFS, "bad security option: %s\n", value); in cifs_parse_security_flavors()
[all …]
Dsmb2transport.c111 cifs_server_dbg(VFS, "%s: Could not find session 0x%llx\n", in smb2_get_sign_key()
139 cifs_dbg(VFS, in smb2_get_sign_key()
230 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature()
240 cifs_server_dbg(VFS, in smb2_calc_signature()
253 cifs_server_dbg(VFS, in smb2_calc_signature()
261 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature()
277 cifs_server_dbg(VFS, in smb2_calc_signature()
312 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key()
319 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key()
325 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key()
[all …]
Dcifsencrypt.c65 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature()
72 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
89 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
100 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature()
127 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature()
134 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature()
507 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash()
517 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash()
523 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash()
546 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash()
[all …]
Dsmb2misc.c52 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
56 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
59 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
62 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
163 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
179 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
184 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
193 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message()
200 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message()
208 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message()
[all …]
Dconnect.c421 cifs_server_dbg(VFS, "%s: no target servers for DFS failover\n", in cifs_reconnect()
558 cifs_server_dbg(VFS, "%s: failed to update DFS target hint: rc = %d\n", in cifs_reconnect()
563 cifs_server_dbg(VFS, "%s: failed to update vol info in DFS cache: rc = %d\n", in cifs_reconnect()
623 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers()
636 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers()
667 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive()
804 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response()
972 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3()
1112 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread()
1188 cifs_server_dbg(VFS, "No task to wake, unknown frame received! NumMids %d\n", in cifs_demultiplex_thread()
[all …]
Dmisc.c300 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr()
313 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr()
351 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB()
353 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
364 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB()
381 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
394 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
536 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino()
538 …cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different… in cifs_autodisable_serverino()
539 …cifs_dbg(VFS, "Hardlinks will not be recognized on this mount. Consider mounting with the \"noserv… in cifs_autodisable_serverino()
[all …]
Dcifs_debug.h26 #define VFS 1 macro
67 } else if ((type) & VFS) { \
90 } else if ((type) & VFS) { \
116 } else if ((type) & VFS) { \
Dsess.c91 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels()
104 cifs_dbg(VFS, "no iface list available to open channels\n"); in cifs_try_adding_channels()
268 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel()
567 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
572 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge()
577 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge()
591 cifs_dbg(VFS, "tioffset + tilen too high %u + %u\n", in decode_ntlmssp_challenge()
599 cifs_dbg(VFS, "Challenge target info alloc failure\n"); in decode_ntlmssp_challenge()
675 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob()
682 cifs_dbg(VFS, "Error %d during NTLMSSP allocation\n", rc); in build_ntlmssp_auth_blob()
[all …]
Dtransport.c59 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry()
115 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in _cifs_mid_q_entry_release()
245 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec()
259 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec()
452 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst()
476 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst()
567 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
609 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
894 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result()
935 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive()
[all …]
Dsmbencrypt.c67 cifs_dbg(VFS, "FIPS compliance enabled: DES not permitted\n"); in smbhash()
121 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour()
126 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour()
131 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
Dsmb2pdu.c517 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts()
615 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx()
656 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context()
688 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context()
868 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate()
876 cifs_server_dbg(VFS, in SMB2_negotiate()
880 cifs_server_dbg(VFS, in SMB2_negotiate()
887 cifs_server_dbg(VFS, in SMB2_negotiate()
901 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate()
919 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n", in SMB2_negotiate()
[all …]
Dcifs_debug.c40 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail()
43 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail()
57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids()
61 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids()
68 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids()
74 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids()
945 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
954 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
962 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write()
967 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
Dreaddir.c496 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry()
504 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry()
511 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry()
533 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix()
795 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry()
817 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry()
855 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir()
1013 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
Dsmb2ops.c115 cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits()
118 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits()
234 cifs_server_dbg(VFS, "trying to return %d credits to old session\n", in smb2_adjust_credits()
274 cifs_server_dbg(VFS, "Encrypted frame parsing not supported yet\n"); in __smb2_find_mid()
314 cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail()
317 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail()
475 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces()
481 cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); in parse_server_interfaces()
540 cifs_dbg(VFS, in parse_server_interfaces()
597 cifs_tcon_dbg(VFS, "error %d on ioctl to get interface list\n", rc); in SMB3_request_interfaces()
[all …]
Dcifsacl.c586 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode()
676 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace()
681 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace()
725 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl()
916 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid()
1222 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl()
1266 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr()
1275 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr()
1315 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
/Linux-v5.10/tools/perf/util/c++/
Dclang.cpp69 StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) in getModuleFromSource() argument
75 Clang.setVirtualFileSystem(&*VFS); in getModuleFromSource()
77 Clang.createFileManager(&*VFS); in getModuleFromSource()
123 IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); in getModuleFromSource() local
124 return getModuleFromSource(std::move(CFlags), Path, VFS); in getModuleFromSource()
/Linux-v5.10/Documentation/filesystems/
Dvfs.rst21 VFS system calls open(2), stat(2), read(2), write(2), chmod(2) and so on
29 The VFS implements the open(2), stat(2), chmod(2), and similar system
30 calls. The pathname argument that is passed to them is used by the VFS
39 dentry, the VFS may have to resort to creating dentries along the way,
54 To look up an inode requires that the VFS calls the lookup() method of
56 filesystem implementation that the inode lives in. Once the VFS has the
59 stat(2) operation is fairly simple: once the VFS has the dentry, it
72 this is another switch performed by the VFS. The file structure is
75 Reading, writing and closing files (and other assorted VFS operations)
79 dentry in use, which in turn means that the VFS inode is still in use.
[all …]
Dindex.rst8 comprehensive information on how the Linux virtual filesystem (VFS) layer
12 Core VFS documentation
15 See these manuals for documentation about the VFS layer itself and how its
Dcoda.rst122 VFS interface. Similar functionality is provided, and the format of
123 the parameters and returned data is very similar to the BSD VFS. This
148 filesystem (VFS) layer, which is named I/O Manager in NT and IFS
149 manager in Windows 95. The VFS is responsible for partial processing
153 pre-processing, the VFS starts invoking exported routines in the FS
159 First and foremost the VFS must be able to make all necessary calls to
160 the Coda FS layer, so the Coda FS driver must expose the VFS interface
164 such VFS requests by invoking one or more well defined services
166 come back to the FS driver, servicing of the VFS call continues and
167 finishes with a reply to the kernel's VFS. Finally the VFS layer
[all …]
/Linux-v5.10/Documentation/admin-guide/namespaces/
Dcompatibility-list.rst13 - UTS IPC VFS PID User Net
17 VFS X
34 should not be equal from the VFS point of view. In other
/Linux-v5.10/drivers/target/
DKconfig26 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS"
29 access to Linux/VFS struct file or struct block_device
/Linux-v5.10/Documentation/translations/zh_CN/filesystems/
Dindex.rst15 文件系统(VFS)层以及基于其上的各种文件系统如何工作呈现给大家。当前\
/Linux-v5.10/Documentation/admin-guide/cifs/
Dintroduction.rst5 This is the client VFS module for the SMB3 NAS protocol as well
13 SMB3.1.1 are supported by the CIFS VFS module. The SMB3 protocol
/Linux-v5.10/Documentation/vm/
Dcleancache.rst10 Cleancache is a new optional feature provided by the VFS layer that
160 filesystems and VFS? (Andrew Morton and Christoph Hellwig)
162 The core hooks for cleancache in VFS are in most cases a single line
172 Some filesystems are built entirely on top of VFS and the hooks
173 in VFS are sufficient, so don't require an "init_fs" hook; the
175 But for some filesystems (such as btrfs), the VFS hooks are
242 file removal or truncation operations either go through VFS or
247 - The FS must call the VFS superblock alloc and deactivate routines
/Linux-v5.10/tools/testing/kunit/test_data/
Dtest_kernel_panic_interrupt.log21 [ 0.060000] Kernel panic - not syncing: VFS: Unable to mount root fs on unknown-block(98,0)

1234