| /Linux-v6.6/fs/smb/client/ |
| D | smb2transport.c | 135 cifs_dbg(VFS, in smb2_get_sign_key() 243 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature() 253 cifs_server_dbg(VFS, in smb2_calc_signature() 264 cifs_server_dbg(VFS, in smb2_calc_signature() 272 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 288 cifs_server_dbg(VFS, in smb2_calc_signature() 326 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key() 333 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key() 339 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key() 345 cifs_server_dbg(VFS, "%s: Could not update with n\n", __func__); in generate_key() [all …]
|
| D | cifsencrypt.c | 195 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 202 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 214 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 240 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 247 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 543 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 553 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 559 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 582 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash() 602 cifs_dbg(VFS, "%s: Could not update with domain\n", in calc_ntlmv2_hash() [all …]
|
| D | smb2misc.c | 39 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 43 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 46 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 49 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 170 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 186 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 191 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 200 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message() 207 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message() 215 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message() [all …]
|
| D | sess.c | 85 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx", in cifs_ses_get_chan_index() 184 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels() 191 cifs_server_dbg(VFS, "no multichannel support\n"); in cifs_try_adding_channels() 238 cifs_dbg(VFS, "failed to open extra channel on iface:%pIS rc=%d\n", in cifs_try_adding_channels() 476 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel() 778 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 783 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 788 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 799 …cifs_dbg(VFS, "%s: requested signing/encryption but server did not return either 56-bit or 128-bit… in decode_ntlmssp_challenge() 804 cifs_dbg(VFS, "%s: server does not seem to support either NTLMv1 or NTLMv2\n", __func__); in decode_ntlmssp_challenge() [all …]
|
| D | cifs_swn.c | 146 cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 154 cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 159 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); in cifs_swn_send_register_message() 264 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", in cifs_find_swn_reg() 274 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", in cifs_find_swn_reg() 341 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 348 cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 379 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); in cifs_swn_reg_release() 475 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); in cifs_swn_reconnect() 485 cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n", in cifs_swn_reconnect() [all …]
|
| D | smbencrypt.c | 50 cifs_dbg(VFS, "%s: Could not init MD4\n", __func__); in mdfour() 55 cifs_dbg(VFS, "%s: Could not update MD4\n", __func__); in mdfour() 60 cifs_dbg(VFS, "%s: Could not finalize MD4\n", __func__); in mdfour()
|
| D | cifs_debug.h | 26 #define VFS 1 macro 67 } else if ((type) & VFS) { \ 89 } else if ((type) & VFS) { \ 116 } else if ((type) & VFS) { \
|
| D | connect.c | 584 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 597 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 631 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive() 801 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 893 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!\n"); in cifs_enable_signing() 902 cifs_dbg(VFS, "Server does not support signing!\n"); in cifs_enable_signing() 909 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled\n"); in cifs_enable_signing() 1017 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 1167 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 1220 cifs_server_dbg(VFS, in cifs_demultiplex_thread() [all …]
|
| D | misc.c | 310 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 323 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 361 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 363 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 374 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 391 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 404 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 545 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino() 547 …cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different… in cifs_autodisable_serverino() 548 …cifs_dbg(VFS, "Hardlinks will not be recognized on this mount. Consider mounting with the \"noserv… in cifs_autodisable_serverino() [all …]
|
| D | transport.c | 49 cifs_dbg(VFS, "%s: null TCP session\n", __func__); in alloc_mid() 106 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in __release_mid() 229 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 243 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 413 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 444 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst() 560 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 603 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 914 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 955 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() [all …]
|
| D | netlink.c | 70 cifs_dbg(VFS, "%s: failed to register netlink family\n", in cifs_genl_init() 87 cifs_dbg(VFS, "%s: failed to unregister netlink family\n", in cifs_genl_exit()
|
| D | smb2pdu.c | 315 cifs_dbg(VFS, "reconnect tcon failed rc = %d\n", rc); in smb2_reconnect() 546 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts() 683 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx() 754 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context() 794 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context() 972 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate() 981 cifs_server_dbg(VFS, in SMB2_negotiate() 985 cifs_server_dbg(VFS, in SMB2_negotiate() 996 cifs_server_dbg(VFS, in SMB2_negotiate() 1010 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate() [all …]
|
| D | cifs_debug.c | 43 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail() 46 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail() 59 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 62 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 69 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 75 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 1048 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 1057 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 1065 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write() 1070 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
|
| D | readdir.c | 495 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry() 503 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 510 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 532 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix() 794 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry() 815 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 969 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 1185 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
| D | smb2ops.c | 150 cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits() 153 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits() 297 cifs_server_dbg(VFS, "request has less credits (%d) than required (%d)", in smb2_adjust_credits() 313 cifs_server_dbg(VFS, "trying to return %d credits to old session\n", in smb2_adjust_credits() 363 cifs_server_dbg(VFS, "Encrypted frame parsing not supported yet\n"); in __smb2_find_mid() 403 cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail() 406 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail() 615 cifs_dbg(VFS, in parse_server_interfaces() 662 cifs_dbg(VFS, in parse_server_interfaces() 733 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces() [all …]
|
| /Linux-v6.6/Documentation/filesystems/ |
| D | vfs.rst | 21 VFS system calls open(2), stat(2), read(2), write(2), chmod(2) and so on 29 The VFS implements the open(2), stat(2), chmod(2), and similar system 30 calls. The pathname argument that is passed to them is used by the VFS 39 dentry, the VFS may have to resort to creating dentries along the way, 54 To look up an inode requires that the VFS calls the lookup() method of 56 filesystem implementation that the inode lives in. Once the VFS has the 59 stat(2) operation is fairly simple: once the VFS has the dentry, it 72 this is another switch performed by the VFS. The file structure is 75 Reading, writing and closing files (and other assorted VFS operations) 79 dentry in use, which in turn means that the VFS inode is still in use. [all …]
|
| D | index.rst | 8 comprehensive information on how the Linux virtual filesystem (VFS) layer 12 Core VFS documentation 15 See these manuals for documentation about the VFS layer itself and how its
|
| D | idmappings.rst | 343 VFS has already completed path lookup right before it calls into the filesystem 642 filesystem ownership and mount ownership of a VFS object such as an inode. The 654 All VFS helpers that generate or take uids and gids as arguments use the 656 to catch errors that originate from conflating filesystem and VFS uids and gids. 666 e.g., during ``stat()``, or store ownership information in a shared VFS object 678 Note, whenever a shared VFS object, e.g., a cached ``struct inode`` or a cached 695 kernel ids with ``k`` we will prefix all VFS ids with ``v``. So a mount 707 VFS ids in the mount's idmapping:: 712 /* Map the filesystem's userspace id down ito a VFS id in the mount's idmapping. */ 719 remapping the caller's VFS ids using the mount's idmapping:: [all …]
|
| D | coda.rst | 122 VFS interface. Similar functionality is provided, and the format of 123 the parameters and returned data is very similar to the BSD VFS. This 148 filesystem (VFS) layer, which is named I/O Manager in NT and IFS 149 manager in Windows 95. The VFS is responsible for partial processing 153 pre-processing, the VFS starts invoking exported routines in the FS 159 First and foremost the VFS must be able to make all necessary calls to 160 the Coda FS layer, so the Coda FS driver must expose the VFS interface 164 such VFS requests by invoking one or more well defined services 166 come back to the FS driver, servicing of the VFS call continues and 167 finishes with a reply to the kernel's VFS. Finally the VFS layer [all …]
|
| /Linux-v6.6/Documentation/admin-guide/namespaces/ |
| D | compatibility-list.rst | 13 - UTS IPC VFS PID User Net 17 VFS X 34 should not be equal from the VFS point of view. In other
|
| /Linux-v6.6/drivers/target/ |
| D | Kconfig | 26 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS" 29 access to Linux/VFS struct file or struct block_device
|
| /Linux-v6.6/fs/smb/server/ |
| D | vfs.c | 217 ksmbd_debug(VFS, "path create failed for %s, err %d\n", in ksmbd_vfs_mkdir() 270 ksmbd_debug(VFS, "%s, len %zd\n", name, strlen(name)); in ksmbd_vfs_getcasexattr() 294 ksmbd_debug(VFS, "read stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_read() 426 ksmbd_debug(VFS, "write stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_write() 528 ksmbd_debug(VFS, "smb write failed, err = %d\n", err); in ksmbd_vfs_write() 616 ksmbd_debug(VFS, "rmdir failed, err %d\n", err); in ksmbd_vfs_remove_file() 620 ksmbd_debug(VFS, "unlink failed, err %d\n", err); in ksmbd_vfs_remove_file() 676 ksmbd_debug(VFS, "vfs_link failed err %d\n", err); in ksmbd_vfs_link() 783 ksmbd_debug(VFS, "vfs_rename failed err %d\n", err); in ksmbd_vfs_rename() 871 ksmbd_debug(VFS, "listxattr failed\n"); in ksmbd_vfs_listxattr() [all …]
|
| D | ndr.c | 245 ksmbd_debug(VFS, "v%d version is not supported\n", da->version); in ndr_decode_dos_attr() 254 ksmbd_debug(VFS, "ndr version mismatched(version: %d, version2: %d)\n", in ndr_decode_dos_attr() 460 ksmbd_debug(VFS, "v%d version is not supported\n", acl->version); in ndr_decode_v4_ntacl() 468 ksmbd_debug(VFS, "ndr version mismatched(version: %d, version2: %d)\n", in ndr_decode_v4_ntacl()
|
| /Linux-v6.6/Documentation/translations/zh_CN/filesystems/ |
| D | index.rst | 15 文件系统(VFS)层以及基于其上的各种文件系统如何工作呈现给大家。当前\
|
| /Linux-v6.6/Documentation/translations/zh_TW/filesystems/ |
| D | index.rst | 16 文件系統(VFS)層以及基於其上的各種文件系統如何工作呈現給大家。當前\
|