| /Linux-v5.15/fs/cifs/ |
| D | smb2transport.c | 98 cifs_server_dbg(VFS, "%s: Could not find session 0x%llx\n", in smb2_get_sign_key() 126 cifs_dbg(VFS, in smb2_get_sign_key() 225 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature() 235 cifs_server_dbg(VFS, in smb2_calc_signature() 248 cifs_server_dbg(VFS, in smb2_calc_signature() 256 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 272 cifs_server_dbg(VFS, in smb2_calc_signature() 310 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key() 317 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key() 323 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key() [all …]
|
| D | cifsencrypt.c | 52 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 59 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 76 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 87 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 114 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 121 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 413 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 423 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 429 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 452 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash() [all …]
|
| D | smb2misc.c | 39 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 43 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 46 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 49 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 164 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 180 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 185 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 194 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message() 201 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message() 209 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message() [all …]
|
| D | sess.c | 83 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels() 88 cifs_dbg(VFS, "server %s does not support multichannel\n", ses->server->hostname); in cifs_try_adding_channels() 102 cifs_dbg(VFS, "no iface list available to open channels\n"); in cifs_try_adding_channels() 263 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel() 561 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 566 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 571 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 585 cifs_dbg(VFS, "tioffset + tilen too high %u + %u\n", in decode_ntlmssp_challenge() 593 cifs_dbg(VFS, "Challenge target info alloc failure\n"); in decode_ntlmssp_challenge() 669 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob() [all …]
|
| D | smbencrypt.c | 50 cifs_dbg(VFS, "%s: Could not init MD4\n", __func__); in mdfour() 55 cifs_dbg(VFS, "%s: Could not update MD4\n", __func__); in mdfour() 60 cifs_dbg(VFS, "%s: Could not finalize MD4\n", __func__); in mdfour()
|
| D | cifs_debug.h | 26 #define VFS 1 macro 67 } else if ((type) & VFS) { \ 90 } else if ((type) & VFS) { \ 116 } else if ((type) & VFS) { \
|
| D | cifs_swn.c | 146 cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 154 cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 159 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); in cifs_swn_send_register_message() 264 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", in cifs_find_swn_reg() 274 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", in cifs_find_swn_reg() 341 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 348 cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 379 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); in cifs_swn_reg_release() 487 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); in cifs_swn_reconnect() 497 cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n", in cifs_swn_reconnect() [all …]
|
| D | connect.c | 242 cifs_server_dbg(VFS, "%s: no target servers for DFS failover\n", in cifs_reconnect() 395 cifs_server_dbg(VFS, "%s: failed to update DFS target hint: rc = %d\n", in cifs_reconnect() 447 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 460 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 492 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive() 646 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 815 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 965 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 1045 cifs_server_dbg(VFS, "No task to wake, unknown frame received! NumMids %d\n", in cifs_demultiplex_thread() 1426 cifs_dbg(VFS, "CONFIG_CIFS_SMB_DIRECT is not enabled\n"); in cifs_get_tcp_session() [all …]
|
| D | misc.c | 289 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 302 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 340 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 342 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 353 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 370 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 383 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 525 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino() 527 …cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different… in cifs_autodisable_serverino() 528 …cifs_dbg(VFS, "Hardlinks will not be recognized on this mount. Consider mounting with the \"noserv… in cifs_autodisable_serverino() [all …]
|
| D | transport.c | 46 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry() 102 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in _cifs_mid_q_entry_release() 232 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 246 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 441 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 465 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst() 573 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 621 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 935 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 976 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() [all …]
|
| D | netlink.c | 69 cifs_dbg(VFS, "%s: failed to register netlink family\n", in cifs_genl_init() 86 cifs_dbg(VFS, "%s: failed to unregister netlink family\n", in cifs_genl_exit()
|
| D | smb2pdu.c | 527 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts() 642 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx() 708 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context() 743 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context() 928 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate() 936 cifs_server_dbg(VFS, in SMB2_negotiate() 940 cifs_server_dbg(VFS, in SMB2_negotiate() 951 cifs_server_dbg(VFS, in SMB2_negotiate() 965 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate() 983 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n", in SMB2_negotiate() [all …]
|
| D | cifs_debug.c | 41 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail() 44 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail() 57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 60 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 67 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 73 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 954 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 963 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 971 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write() 976 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
|
| D | readdir.c | 503 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry() 511 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 518 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 540 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix() 802 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry() 824 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 862 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 1021 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
| D | smb2ops.c | 133 cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits() 136 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits() 266 cifs_server_dbg(VFS, "request has less credits (%d) than required (%d)", in smb2_adjust_credits() 282 cifs_server_dbg(VFS, "trying to return %d credits to old session\n", in smb2_adjust_credits() 332 cifs_server_dbg(VFS, "Encrypted frame parsing not supported yet\n"); in __smb2_find_mid() 372 cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail() 375 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail() 535 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces() 542 cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); in parse_server_interfaces() 601 cifs_dbg(VFS, in parse_server_interfaces() [all …]
|
| D | cifsacl.c | 592 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode() 728 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace() 733 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace() 777 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl() 1158 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid() 1263 cifs_dbg(VFS, "Server returned illegal ACL size\n"); in build_sec_desc() 1499 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl() 1544 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr() 1553 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr() 1597 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
|
| /Linux-v5.15/tools/perf/util/c++/ |
| D | clang.cpp | 69 StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) in getModuleFromSource() argument 75 Clang.setVirtualFileSystem(&*VFS); in getModuleFromSource() 77 Clang.createFileManager(&*VFS); in getModuleFromSource() 123 IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); in getModuleFromSource() local 124 return getModuleFromSource(std::move(CFlags), Path, VFS); in getModuleFromSource()
|
| /Linux-v5.15/Documentation/filesystems/ |
| D | vfs.rst | 21 VFS system calls open(2), stat(2), read(2), write(2), chmod(2) and so on 29 The VFS implements the open(2), stat(2), chmod(2), and similar system 30 calls. The pathname argument that is passed to them is used by the VFS 39 dentry, the VFS may have to resort to creating dentries along the way, 54 To look up an inode requires that the VFS calls the lookup() method of 56 filesystem implementation that the inode lives in. Once the VFS has the 59 stat(2) operation is fairly simple: once the VFS has the dentry, it 72 this is another switch performed by the VFS. The file structure is 75 Reading, writing and closing files (and other assorted VFS operations) 79 dentry in use, which in turn means that the VFS inode is still in use. [all …]
|
| D | index.rst | 8 comprehensive information on how the Linux virtual filesystem (VFS) layer 12 Core VFS documentation 15 See these manuals for documentation about the VFS layer itself and how its
|
| D | coda.rst | 122 VFS interface. Similar functionality is provided, and the format of 123 the parameters and returned data is very similar to the BSD VFS. This 148 filesystem (VFS) layer, which is named I/O Manager in NT and IFS 149 manager in Windows 95. The VFS is responsible for partial processing 153 pre-processing, the VFS starts invoking exported routines in the FS 159 First and foremost the VFS must be able to make all necessary calls to 160 the Coda FS layer, so the Coda FS driver must expose the VFS interface 164 such VFS requests by invoking one or more well defined services 166 come back to the FS driver, servicing of the VFS call continues and 167 finishes with a reply to the kernel's VFS. Finally the VFS layer [all …]
|
| /Linux-v5.15/Documentation/admin-guide/namespaces/ |
| D | compatibility-list.rst | 13 - UTS IPC VFS PID User Net 17 VFS X 34 should not be equal from the VFS point of view. In other
|
| /Linux-v5.15/fs/ksmbd/ |
| D | vfs.c | 214 ksmbd_debug(VFS, "path create failed for %s, err %d\n", in ksmbd_vfs_mkdir() 262 ksmbd_debug(VFS, "%s, len %zd\n", name, strlen(name)); in ksmbd_vfs_getcasexattr() 286 ksmbd_debug(VFS, "read stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_read() 419 ksmbd_debug(VFS, "write stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_write() 523 ksmbd_debug(VFS, "smb write failed, err = %d\n", err); in ksmbd_vfs_write() 601 ksmbd_debug(VFS, "can't get %s, err %d\n", name, err); in ksmbd_vfs_remove_file() 624 ksmbd_debug(VFS, "%s: rmdir failed, err %d\n", name, in ksmbd_vfs_remove_file() 629 ksmbd_debug(VFS, "%s: unlink failed, err %d\n", name, in ksmbd_vfs_remove_file() 684 ksmbd_debug(VFS, "vfs_link failed err %d\n", err); in ksmbd_vfs_link() 709 ksmbd_debug(VFS, "Forbid rename, sub file/dir is in use\n"); in ksmbd_validate_entry_in_use() [all …]
|
| /Linux-v5.15/drivers/target/ |
| D | Kconfig | 26 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS" 29 access to Linux/VFS struct file or struct block_device
|
| /Linux-v5.15/Documentation/translations/zh_CN/filesystems/ |
| D | index.rst | 15 文件系统(VFS)层以及基于其上的各种文件系统如何工作呈现给大家。当前\
|
| /Linux-v5.15/Documentation/translations/zh_TW/filesystems/ |
| D | index.rst | 16 文件系統(VFS)層以及基於其上的各種文件系統如何工作呈現給大家。當前\
|