/linux-5.19.10/fs/cifs/ |
D | cifsencrypt.c | 52 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 59 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 76 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 87 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 114 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 121 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 417 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 427 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 433 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 456 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash() [all …]
|
D | smb2transport.c | 97 cifs_server_dbg(VFS, "%s: Could not find session 0x%llx\n", in smb2_get_sign_key() 130 cifs_dbg(VFS, in smb2_get_sign_key() 229 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature() 239 cifs_server_dbg(VFS, in smb2_calc_signature() 252 cifs_server_dbg(VFS, in smb2_calc_signature() 260 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 276 cifs_server_dbg(VFS, in smb2_calc_signature() 314 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key() 321 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key() 327 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key() [all …]
|
D | smb2misc.c | 38 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 42 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 45 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 48 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 165 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 181 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 186 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 195 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message() 202 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message() 210 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message() [all …]
|
D | sess.c | 85 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx", in cifs_ses_get_chan_index() 183 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels() 190 cifs_dbg(VFS, "server %s does not support multichannel\n", ses->server->hostname); in cifs_try_adding_channels() 237 cifs_dbg(VFS, "failed to open extra channel on iface:%pIS rc=%d\n", in cifs_try_adding_channels() 464 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel() 766 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 771 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 776 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 787 …cifs_dbg(VFS, "%s: requested signing/encryption but server did not return either 56-bit or 128-bit… in decode_ntlmssp_challenge() 792 cifs_dbg(VFS, "%s: server does not seem to support either NTLMv1 or NTLMv2\n", __func__); in decode_ntlmssp_challenge() [all …]
|
D | cifs_swn.c | 146 cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 154 cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 159 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); in cifs_swn_send_register_message() 264 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", in cifs_find_swn_reg() 274 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", in cifs_find_swn_reg() 341 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 348 cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 379 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); in cifs_swn_reg_release() 475 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); in cifs_swn_reconnect() 485 cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n", in cifs_swn_reconnect() [all …]
|
D | smbencrypt.c | 50 cifs_dbg(VFS, "%s: Could not init MD4\n", __func__); in mdfour() 55 cifs_dbg(VFS, "%s: Could not update MD4\n", __func__); in mdfour() 60 cifs_dbg(VFS, "%s: Could not finalize MD4\n", __func__); in mdfour()
|
D | cifs_debug.h | 26 #define VFS 1 macro 67 } else if ((type) & VFS) { \ 90 } else if ((type) & VFS) { \ 116 } else if ((type) & VFS) { \
|
D | misc.c | 296 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 309 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 347 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 349 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 360 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 377 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 390 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 532 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino() 534 …cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different… in cifs_autodisable_serverino() 535 …cifs_dbg(VFS, "Hardlinks will not be recognized on this mount. Consider mounting with the \"noserv… in cifs_autodisable_serverino() [all …]
|
D | transport.c | 46 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry() 102 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in _cifs_mid_q_entry_release() 232 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 246 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 439 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 463 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst() 570 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 623 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 934 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 975 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() [all …]
|
D | connect.c | 632 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 645 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 679 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive() 839 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 1012 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 1162 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 1242 cifs_server_dbg(VFS, "No task to wake, unknown frame received! NumMids %d\n", in cifs_demultiplex_thread() 1648 cifs_dbg(VFS, "CONFIG_CIFS_SMB_DIRECT is not enabled\n"); in cifs_get_tcp_session() 1655 cifs_dbg(VFS, "RDMA transport established\n"); in cifs_get_tcp_session() 1665 cifs_dbg(VFS, "Error connecting to socket. Aborting operation.\n"); in cifs_get_tcp_session() [all …]
|
D | netlink.c | 69 cifs_dbg(VFS, "%s: failed to register netlink family\n", in cifs_genl_init() 86 cifs_dbg(VFS, "%s: failed to unregister netlink family\n", in cifs_genl_exit()
|
D | smb2pdu.c | 551 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts() 675 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx() 741 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context() 776 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context() 962 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate() 971 cifs_server_dbg(VFS, in SMB2_negotiate() 975 cifs_server_dbg(VFS, in SMB2_negotiate() 986 cifs_server_dbg(VFS, in SMB2_negotiate() 1000 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate() 1018 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n", in SMB2_negotiate() [all …]
|
D | cifs_debug.c | 41 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail() 44 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail() 57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 60 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 67 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 73 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 972 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 981 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 989 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write() 994 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
|
D | smb2ops.c | 142 cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits() 145 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits() 279 cifs_server_dbg(VFS, "request has less credits (%d) than required (%d)", in smb2_adjust_credits() 295 cifs_server_dbg(VFS, "trying to return %d credits to old session\n", in smb2_adjust_credits() 345 cifs_server_dbg(VFS, "Encrypted frame parsing not supported yet\n"); in __smb2_find_mid() 385 cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail() 388 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail() 584 cifs_dbg(VFS, in parse_server_interfaces() 655 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces() 662 cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); in parse_server_interfaces() [all …]
|
D | readdir.c | 503 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry() 511 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 518 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 540 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix() 802 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry() 824 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 961 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 1176 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
D | cifsacl.c | 592 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode() 728 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace() 733 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace() 777 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl() 1161 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid() 1266 cifs_dbg(VFS, "Server returned illegal ACL size\n"); in build_sec_desc() 1502 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl() 1547 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr() 1556 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr() 1600 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
|
/linux-5.19.10/tools/perf/util/c++/ |
D | clang.cpp | 75 StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) in getModuleFromSource() argument 81 Clang.setVirtualFileSystem(&*VFS); in getModuleFromSource() 83 Clang.createFileManager(&*VFS); in getModuleFromSource() 129 IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); in getModuleFromSource() local 130 return getModuleFromSource(std::move(CFlags), Path, VFS); in getModuleFromSource()
|
/linux-5.19.10/Documentation/filesystems/ |
D | vfs.rst | 21 VFS system calls open(2), stat(2), read(2), write(2), chmod(2) and so on 29 The VFS implements the open(2), stat(2), chmod(2), and similar system 30 calls. The pathname argument that is passed to them is used by the VFS 39 dentry, the VFS may have to resort to creating dentries along the way, 54 To look up an inode requires that the VFS calls the lookup() method of 56 filesystem implementation that the inode lives in. Once the VFS has the 59 stat(2) operation is fairly simple: once the VFS has the dentry, it 72 this is another switch performed by the VFS. The file structure is 75 Reading, writing and closing files (and other assorted VFS operations) 79 dentry in use, which in turn means that the VFS inode is still in use. [all …]
|
D | index.rst | 8 comprehensive information on how the Linux virtual filesystem (VFS) layer 12 Core VFS documentation 15 See these manuals for documentation about the VFS layer itself and how its
|
D | coda.rst | 122 VFS interface. Similar functionality is provided, and the format of 123 the parameters and returned data is very similar to the BSD VFS. This 148 filesystem (VFS) layer, which is named I/O Manager in NT and IFS 149 manager in Windows 95. The VFS is responsible for partial processing 153 pre-processing, the VFS starts invoking exported routines in the FS 159 First and foremost the VFS must be able to make all necessary calls to 160 the Coda FS layer, so the Coda FS driver must expose the VFS interface 164 such VFS requests by invoking one or more well defined services 166 come back to the FS driver, servicing of the VFS call continues and 167 finishes with a reply to the kernel's VFS. Finally the VFS layer [all …]
|
/linux-5.19.10/Documentation/admin-guide/namespaces/ |
D | compatibility-list.rst | 13 - UTS IPC VFS PID User Net 17 VFS X 34 should not be equal from the VFS point of view. In other
|
/linux-5.19.10/fs/ksmbd/ |
D | vfs.c | 213 ksmbd_debug(VFS, "path create failed for %s, err %d\n", in ksmbd_vfs_mkdir() 261 ksmbd_debug(VFS, "%s, len %zd\n", name, strlen(name)); in ksmbd_vfs_getcasexattr() 285 ksmbd_debug(VFS, "read stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_read() 417 ksmbd_debug(VFS, "write stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_write() 521 ksmbd_debug(VFS, "smb write failed, err = %d\n", err); in ksmbd_vfs_write() 599 ksmbd_debug(VFS, "can't get %s, err %d\n", name, err); in ksmbd_vfs_remove_file() 622 ksmbd_debug(VFS, "%s: rmdir failed, err %d\n", name, in ksmbd_vfs_remove_file() 627 ksmbd_debug(VFS, "%s: unlink failed, err %d\n", name, in ksmbd_vfs_remove_file() 682 ksmbd_debug(VFS, "vfs_link failed err %d\n", err); in ksmbd_vfs_link() 707 ksmbd_debug(VFS, "Forbid rename, sub file/dir is in use\n"); in ksmbd_validate_entry_in_use() [all …]
|
/linux-5.19.10/drivers/target/ |
D | Kconfig | 26 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS" 29 access to Linux/VFS struct file or struct block_device
|
/linux-5.19.10/Documentation/translations/zh_CN/filesystems/ |
D | index.rst | 15 文件系统(VFS)层以及基于其上的各种文件系统如何工作呈现给大家。当前\
|
/linux-5.19.10/Documentation/translations/zh_TW/filesystems/ |
D | index.rst | 16 文件系統(VFS)層以及基於其上的各種文件系統如何工作呈現給大家。當前\
|