Home
last modified time | relevance | path

Searched refs:VFS (Results 1 – 25 of 82) sorted by relevance

1234

/Linux-v5.4/fs/cifs/
Dsmb2transport.c179 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature()
188 cifs_server_dbg(VFS, "%s: sha256 alloc failed\n", __func__); in smb2_calc_signature()
195 cifs_server_dbg(VFS, "%s: Could not update with response\n", __func__); in smb2_calc_signature()
202 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature()
218 cifs_server_dbg(VFS, "%s: Could not update with payload\n", in smb2_calc_signature()
249 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key()
256 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key()
262 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key()
269 cifs_server_dbg(VFS, "%s: Could not update with n\n", __func__); in generate_key()
276 cifs_server_dbg(VFS, "%s: Could not update with label\n", __func__); in generate_key()
[all …]
Dcifsencrypt.c65 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature()
72 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
89 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
100 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature()
127 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature()
134 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature()
507 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash()
517 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash()
523 cifs_dbg(VFS, "%s: could not init hmacmd5\n", __func__); in calc_ntlmv2_hash()
546 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash()
[all …]
Dsmb2misc.c51 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
55 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
58 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
61 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
162 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
178 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
183 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
192 cifs_dbg(VFS, "Illegal structure size %u\n", in smb2_check_message()
199 cifs_dbg(VFS, "Illegal SMB2 command %d\n", command); in smb2_check_message()
207 cifs_dbg(VFS, "Illegal response size %u for command %d\n", in smb2_check_message()
[all …]
Dconnect.c501 cifs_server_dbg(VFS, "%s: no target servers for DFS failover\n", in cifs_reconnect()
632 cifs_server_dbg(VFS, "%s: failed to update DFS target hint: rc = %d\n", in cifs_reconnect()
637 cifs_server_dbg(VFS, "%s: failed to update vol info in DFS cache: rc = %d\n", in cifs_reconnect()
693 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers()
706 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers()
737 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive()
876 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response()
1028 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3()
1169 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread()
1242 cifs_server_dbg(VFS, "No task to wake, unknown frame " in cifs_demultiplex_thread()
[all …]
Dmisc.c296 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr()
309 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr()
347 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB()
349 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
360 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB()
377 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
390 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
543 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s.\n", in cifs_autodisable_serverino()
545 …cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different… in cifs_autodisable_serverino()
546 …cifs_dbg(VFS, "Hardlinks will not be recognized on this mount. Consider mounting with the \"noserv… in cifs_autodisable_serverino()
[all …]
Dcifs_debug.h20 #define VFS 1 macro
65 } else if ((type) & VFS) { \
91 } else if ((type) & VFS) { \
118 } else if ((type) & VFS) { \
Dsess.c297 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
302 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge()
307 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge()
321 cifs_dbg(VFS, "tioffset + tilen too high %u + %u", in decode_ntlmssp_challenge()
329 cifs_dbg(VFS, "Challenge target info alloc failure"); in decode_ntlmssp_challenge()
404 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob()
411 cifs_dbg(VFS, "Error %d during NTLMSSP allocation\n", rc); in build_ntlmssp_auth_blob()
760 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_lanman()
829 cifs_dbg(VFS, "Error %d during NTLM authentication\n", in sess_auth_ntlm()
870 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_ntlm()
[all …]
Dtransport.c59 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry()
107 cifs_server_dbg(VFS, "invalid mid allocation time\n"); in _cifs_mid_q_entry_release()
236 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec()
250 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec()
444 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst()
477 cifs_server_dbg(VFS, "Encryption requested but transform " in smb_send_rqst()
554 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
595 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
880 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result()
921 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive()
[all …]
Dsmbencrypt.c67 cifs_dbg(VFS, "FIPS compliance enabled: DES not permitted\n"); in smbhash()
121 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour()
126 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour()
131 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
Dcifs_debug.c40 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail()
43 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail()
57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids()
61 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids()
68 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids()
74 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids()
902 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
911 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
919 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write()
924 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
Dsmb2pdu.c545 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts()
663 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context()
695 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context()
873 cifs_server_dbg(VFS, "Dialect not supported by server. Consider " in SMB2_negotiate()
883 cifs_server_dbg(VFS, in SMB2_negotiate()
887 cifs_server_dbg(VFS, in SMB2_negotiate()
894 cifs_server_dbg(VFS, in SMB2_negotiate()
908 cifs_server_dbg(VFS, "Illegal 0x%x dialect returned: not requested\n", in SMB2_negotiate()
926 cifs_server_dbg(VFS, "Illegal dialect returned by server 0x%x\n", in SMB2_negotiate()
986 cifs_server_dbg(VFS, "Missing expected negotiate contexts\n"); in SMB2_negotiate()
[all …]
Dreaddir.c383 cifs_dbg(VFS, "invalid offset %u\n", next_offset); in nxt_dir_entry()
391 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry()
398 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry()
661 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry()
683 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry()
721 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir()
862 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
Dsmb2ops.c112 cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits()
115 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits()
235 cifs_server_dbg(VFS, "trying to return %d credits to old session\n", in smb2_adjust_credits()
275 cifs_server_dbg(VFS, "Encrypted frame parsing not supported yet\n"); in smb2_find_mid()
299 cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail()
302 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail()
466 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces()
472 cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); in parse_server_interfaces()
531 cifs_dbg(VFS, in parse_server_interfaces()
581 cifs_tcon_dbg(VFS, "error %d on ioctl to get interface list\n", rc); in SMB3_request_interfaces()
[all …]
Dcifsacl.c586 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode()
676 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace()
681 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace()
725 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl()
864 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid()
1154 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl()
1198 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr()
1206 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr()
1246 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
/Linux-v5.4/Documentation/filesystems/
Dindex.rst6 comprehensive information on how the Linux virtual filesystem (VFS) layer
10 Core VFS documentation
13 See these manuals for documentation about the VFS layer itself and how its
Dvfs.rst21 VFS system calls open(2), stat(2), read(2), write(2), chmod(2) and so on
29 The VFS implements the open(2), stat(2), chmod(2), and similar system
30 calls. The pathname argument that is passed to them is used by the VFS
39 dentry, the VFS may have to resort to creating dentries along the way,
54 To look up an inode requires that the VFS calls the lookup() method of
56 filesystem implementation that the inode lives in. Once the VFS has the
59 stat(2) operation is fairly simple: once the VFS has the dentry, it
72 this is another switch performed by the VFS. The file structure is
75 Reading, writing and closing files (and other assorted VFS operations)
79 dentry in use, which in turn means that the VFS inode is still in use.
[all …]
Dcoda.txt177 VFS interface. Similar functionality is provided, and the format of
178 the parameters and returned data is very similar to the BSD VFS. This
204 filesystem (VFS) layer, which is named I/O Manager in NT and IFS
205 manager in Windows 95. The VFS is responsible for partial processing
209 pre-processing, the VFS starts invoking exported routines in the FS
215 First and foremost the VFS must be able to make all necessary calls to
216 the Coda FS layer, so the Coda FS driver must expose the VFS interface
220 such VFS requests by invoking one or more well defined services
222 come back to the FS driver, servicing of the VFS call continues and
223 finishes with a reply to the kernel's VFS. Finally the VFS layer
[all …]
/Linux-v5.4/tools/perf/util/c++/
Dclang.cpp69 StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) in getModuleFromSource() argument
74 Clang.setVirtualFileSystem(&*VFS); in getModuleFromSource()
119 IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); in getModuleFromSource() local
120 return getModuleFromSource(std::move(CFlags), Path, VFS); in getModuleFromSource()
/Linux-v5.4/Documentation/admin-guide/namespaces/
Dcompatibility-list.rst13 - UTS IPC VFS PID User Net
17 VFS X
34 should not be equal from the VFS point of view. In other
/Linux-v5.4/drivers/target/
DKconfig26 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS"
29 access to Linux/VFS struct file or struct block_device
/Linux-v5.4/Documentation/admin-guide/cifs/
Dintroduction.rst5 This is the client VFS module for the SMB3 NAS protocol as well
13 SMB3.1.1 are supported by the CIFS VFS module. The SMB3 protocol
/Linux-v5.4/Documentation/vm/
Dcleancache.rst10 Cleancache is a new optional feature provided by the VFS layer that
160 filesystems and VFS? (Andrew Morton and Christoph Hellwig)
162 The core hooks for cleancache in VFS are in most cases a single line
172 Some filesystems are built entirely on top of VFS and the hooks
173 in VFS are sufficient, so don't require an "init_fs" hook; the
175 But for some filesystems (such as btrfs), the VFS hooks are
242 file removal or truncation operations either go through VFS or
247 - The FS must call the VFS superblock alloc and deactivate routines
/Linux-v5.4/fs/nfs/
Ddir.c1305 dfprintk(VFS, "NFS: dentry_delete(%pd2, %x)\n", in nfs_dentry_delete()
1387 dfprintk(VFS, "NFS: lookup(%pd2)\n", dentry); in nfs_lookup()
1512 dfprintk(VFS, "NFS: atomic_open(%s/%lu), %pd\n", in nfs_atomic_open()
1742 dfprintk(VFS, "NFS: create(%s/%lu), %pd\n", in nfs_create()
1769 dfprintk(VFS, "NFS: mknod(%s/%lu), %pd\n", in nfs_mknod()
1795 dfprintk(VFS, "NFS: mkdir(%s/%lu), %pd\n", in nfs_mkdir()
1823 dfprintk(VFS, "NFS: rmdir(%s/%lu), %pd\n", in nfs_rmdir()
1860 dfprintk(VFS, "NFS: safe_remove(%pd2)\n", dentry); in nfs_safe_remove()
1892 dfprintk(VFS, "NFS: unlink(%s/%lu, %pd)\n", dir->i_sb->s_id, in nfs_unlink()
1943 dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s)\n", dir->i_sb->s_id, in nfs_symlink()
[all …]
/Linux-v5.4/fs/ecryptfs/
DKconfig9 Encrypted filesystem that operates on the VFS layer. See
/Linux-v5.4/Documentation/filesystems/nfs/
Dfault_injection.txt45 The NFS server keeps a list of what files are currently locked in the VFS.
47 unlocked through the VFS as they are cleared from this list).

1234