/Linux-v6.1/fs/cifs/ |
D | cifsencrypt.c | 51 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 58 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 75 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 86 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 112 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 119 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 414 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 424 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 430 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 453 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash() [all …]
|
D | smb2transport.c | 94 cifs_server_dbg(VFS, "%s: Could not find session 0x%llx\n", in smb2_get_sign_key() 127 cifs_dbg(VFS, in smb2_get_sign_key() 228 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature() 238 cifs_server_dbg(VFS, in smb2_calc_signature() 249 cifs_server_dbg(VFS, in smb2_calc_signature() 257 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 273 cifs_server_dbg(VFS, in smb2_calc_signature() 311 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key() 318 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key() 324 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key() [all …]
|
D | smb2misc.c | 39 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 43 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 46 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 49 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 170 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 186 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 191 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 200 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message() 207 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message() 215 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message() [all …]
|
D | sess.c | 85 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx", in cifs_ses_get_chan_index() 183 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels() 190 cifs_dbg(VFS, "server %s does not support multichannel\n", ses->server->hostname); in cifs_try_adding_channels() 237 cifs_dbg(VFS, "failed to open extra channel on iface:%pIS rc=%d\n", in cifs_try_adding_channels() 464 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel() 763 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 768 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 773 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 784 …cifs_dbg(VFS, "%s: requested signing/encryption but server did not return either 56-bit or 128-bit… in decode_ntlmssp_challenge() 789 cifs_dbg(VFS, "%s: server does not seem to support either NTLMv1 or NTLMv2\n", __func__); in decode_ntlmssp_challenge() [all …]
|
D | cifs_swn.c | 146 cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 154 cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 159 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); in cifs_swn_send_register_message() 264 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", in cifs_find_swn_reg() 274 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", in cifs_find_swn_reg() 341 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 348 cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 379 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); in cifs_swn_reg_release() 475 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); in cifs_swn_reconnect() 485 cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n", in cifs_swn_reconnect() [all …]
|
D | smbencrypt.c | 50 cifs_dbg(VFS, "%s: Could not init MD4\n", __func__); in mdfour() 55 cifs_dbg(VFS, "%s: Could not update MD4\n", __func__); in mdfour() 60 cifs_dbg(VFS, "%s: Could not finalize MD4\n", __func__); in mdfour()
|
D | cifs_debug.h | 26 #define VFS 1 macro 67 } else if ((type) & VFS) { \ 90 } else if ((type) & VFS) { \ 116 } else if ((type) & VFS) { \
|
D | misc.c | 296 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 309 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 347 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 349 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 360 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 377 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 390 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 531 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino() 533 …cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different… in cifs_autodisable_serverino() 534 …cifs_dbg(VFS, "Hardlinks will not be recognized on this mount. Consider mounting with the \"noserv… in cifs_autodisable_serverino() [all …]
|
D | connect.c | 627 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 640 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 674 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive() 829 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 921 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!\n"); in cifs_enable_signing() 930 cifs_dbg(VFS, "Server does not support signing!\n"); in cifs_enable_signing() 937 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled\n"); in cifs_enable_signing() 1049 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 1196 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 1275 cifs_server_dbg(VFS, "No task to wake, unknown frame received! NumMids %d\n", in cifs_demultiplex_thread() [all …]
|
D | transport.c | 47 cifs_dbg(VFS, "%s: null TCP session\n", __func__); in alloc_mid() 103 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in __release_mid() 226 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 240 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 433 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 457 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst() 564 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 617 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 929 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 970 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() [all …]
|
D | netlink.c | 70 cifs_dbg(VFS, "%s: failed to register netlink family\n", in cifs_genl_init() 87 cifs_dbg(VFS, "%s: failed to unregister netlink family\n", in cifs_genl_exit()
|
D | smb2pdu.c | 550 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts() 672 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx() 738 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context() 773 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context() 959 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate() 968 cifs_server_dbg(VFS, in SMB2_negotiate() 972 cifs_server_dbg(VFS, in SMB2_negotiate() 983 cifs_server_dbg(VFS, in SMB2_negotiate() 997 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate() 1015 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n", in SMB2_negotiate() [all …]
|
D | cifs_debug.c | 41 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail() 44 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail() 57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 60 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 67 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 73 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 946 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 955 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 963 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write() 968 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
|
D | smb2ops.c | 143 cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits() 146 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits() 280 cifs_server_dbg(VFS, "request has less credits (%d) than required (%d)", in smb2_adjust_credits() 296 cifs_server_dbg(VFS, "trying to return %d credits to old session\n", in smb2_adjust_credits() 346 cifs_server_dbg(VFS, "Encrypted frame parsing not supported yet\n"); in __smb2_find_mid() 386 cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail() 389 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail() 553 cifs_dbg(VFS, in parse_server_interfaces() 600 cifs_dbg(VFS, in parse_server_interfaces() 671 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces() [all …]
|
D | readdir.c | 504 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry() 512 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 519 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 541 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix() 803 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry() 824 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 978 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 1194 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
D | cifsacl.c | 592 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode() 728 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace() 733 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace() 777 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl() 1161 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid() 1266 cifs_dbg(VFS, "Server returned illegal ACL size\n"); in build_sec_desc() 1503 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl() 1549 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr() 1558 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr() 1602 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
|
/Linux-v6.1/tools/perf/util/c++/ |
D | clang.cpp | 75 StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) in getModuleFromSource() argument 81 Clang.setVirtualFileSystem(&*VFS); in getModuleFromSource() 83 Clang.createFileManager(&*VFS); in getModuleFromSource() 129 IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); in getModuleFromSource() local 130 return getModuleFromSource(std::move(CFlags), Path, VFS); in getModuleFromSource()
|
/Linux-v6.1/Documentation/filesystems/ |
D | vfs.rst | 21 VFS system calls open(2), stat(2), read(2), write(2), chmod(2) and so on 29 The VFS implements the open(2), stat(2), chmod(2), and similar system 30 calls. The pathname argument that is passed to them is used by the VFS 39 dentry, the VFS may have to resort to creating dentries along the way, 54 To look up an inode requires that the VFS calls the lookup() method of 56 filesystem implementation that the inode lives in. Once the VFS has the 59 stat(2) operation is fairly simple: once the VFS has the dentry, it 72 this is another switch performed by the VFS. The file structure is 75 Reading, writing and closing files (and other assorted VFS operations) 79 dentry in use, which in turn means that the VFS inode is still in use. [all …]
|
D | index.rst | 8 comprehensive information on how the Linux virtual filesystem (VFS) layer 12 Core VFS documentation 15 See these manuals for documentation about the VFS layer itself and how its
|
D | coda.rst | 122 VFS interface. Similar functionality is provided, and the format of 123 the parameters and returned data is very similar to the BSD VFS. This 148 filesystem (VFS) layer, which is named I/O Manager in NT and IFS 149 manager in Windows 95. The VFS is responsible for partial processing 153 pre-processing, the VFS starts invoking exported routines in the FS 159 First and foremost the VFS must be able to make all necessary calls to 160 the Coda FS layer, so the Coda FS driver must expose the VFS interface 164 such VFS requests by invoking one or more well defined services 166 come back to the FS driver, servicing of the VFS call continues and 167 finishes with a reply to the kernel's VFS. Finally the VFS layer [all …]
|
/Linux-v6.1/Documentation/admin-guide/namespaces/ |
D | compatibility-list.rst | 13 - UTS IPC VFS PID User Net 17 VFS X 34 should not be equal from the VFS point of view. In other
|
/Linux-v6.1/fs/ksmbd/ |
D | vfs.c | 213 ksmbd_debug(VFS, "path create failed for %s, err %d\n", in ksmbd_vfs_mkdir() 261 ksmbd_debug(VFS, "%s, len %zd\n", name, strlen(name)); in ksmbd_vfs_getcasexattr() 285 ksmbd_debug(VFS, "read stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_read() 416 ksmbd_debug(VFS, "write stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_write() 518 ksmbd_debug(VFS, "smb write failed, err = %d\n", err); in ksmbd_vfs_write() 596 ksmbd_debug(VFS, "can't get %s, err %d\n", name, err); in ksmbd_vfs_remove_file() 619 ksmbd_debug(VFS, "%s: rmdir failed, err %d\n", name, in ksmbd_vfs_remove_file() 624 ksmbd_debug(VFS, "%s: unlink failed, err %d\n", name, in ksmbd_vfs_remove_file() 679 ksmbd_debug(VFS, "vfs_link failed err %d\n", err); in ksmbd_vfs_link() 704 ksmbd_debug(VFS, "Forbid rename, sub file/dir is in use\n"); in ksmbd_validate_entry_in_use() [all …]
|
/Linux-v6.1/drivers/target/ |
D | Kconfig | 26 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS" 29 access to Linux/VFS struct file or struct block_device
|
/Linux-v6.1/Documentation/translations/zh_CN/filesystems/ |
D | index.rst | 15 文件系统(VFS)层以及基于其上的各种文件系统如何工作呈现给大家。当前\
|
/Linux-v6.1/Documentation/translations/zh_TW/filesystems/ |
D | index.rst | 16 文件系統(VFS)層以及基於其上的各種文件系統如何工作呈現給大家。當前\
|