Home
last modified time | relevance | path

Searched refs:VFS (Results 1 – 25 of 104) sorted by relevance

12345

/linux/fs/cifs/
A Dsmb2transport.c97 cifs_server_dbg(VFS, "%s: Could not find session 0x%llx\n", in smb2_get_sign_key()
125 cifs_dbg(VFS, in smb2_get_sign_key()
234 cifs_server_dbg(VFS, in smb2_calc_signature()
247 cifs_server_dbg(VFS, in smb2_calc_signature()
271 cifs_server_dbg(VFS, in smb2_calc_signature()
452 cifs_dbg(VFS, "Session Key %*ph\n", in generate_smb3signingkey()
454 cifs_dbg(VFS, "Signing Key %*ph\n", in generate_smb3signingkey()
458 cifs_dbg(VFS, "ServerIn Key %*ph\n", in generate_smb3signingkey()
460 cifs_dbg(VFS, "ServerOut Key %*ph\n", in generate_smb3signingkey()
463 cifs_dbg(VFS, "ServerIn Key %*ph\n", in generate_smb3signingkey()
[all …]
A Dcifsencrypt.c52 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature()
59 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
76 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
87 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature()
114 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature()
472 cifs_dbg(VFS, "%s: Could not update with domain\n", in calc_ntlmv2_hash()
492 cifs_dbg(VFS, "%s: Could not update with server\n", in calc_ntlmv2_hash()
580 cifs_dbg(VFS, "error %d finding domain name\n", in setup_ntlmv2_rsp()
637 cifs_dbg(VFS, "Could not get v2 hash rc %d\n", rc); in setup_ntlmv2_rsp()
644 cifs_dbg(VFS, "Could not calculate CR1 rc: %d\n", rc); in setup_ntlmv2_rsp()
[all …]
A Dsmb2misc.c38 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
42 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
45 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
48 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
163 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
179 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
193 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message()
200 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message()
742 cifs_tcon_dbg(VFS, "Close interrupted close\n"); in smb2_cancelled_close_fid()
907 cifs_dbg(VFS, "%s: Could not update sha512 shash\n", in smb311_update_preauth_hash()
[all …]
A Dsess.c114 cifs_dbg(VFS, "no iface list available to open channels\n"); in cifs_try_adding_channels()
283 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel()
602 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge()
607 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge()
646 cifs_dbg(VFS, "tioffset + tilen too high %u + %u\n", in decode_ntlmssp_challenge()
654 cifs_dbg(VFS, "Challenge target info alloc failure\n"); in decode_ntlmssp_challenge()
1241 cifs_dbg(VFS, "bad security blob length %d\n", in sess_auth_kerberos()
1295 cifs_dbg(VFS, "NTLMSSP requires Unicode support\n"); in _sess_auth_rawntlmssp_assemble_req()
1397 cifs_dbg(VFS, "bad security blob length %d\n", in sess_auth_rawntlmssp_negotiate()
1486 cifs_dbg(VFS, "bad security blob length %d\n", in sess_auth_rawntlmssp_authenticate()
[all …]
A Dcifs_swn.c146 cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); in cifs_swn_send_register_message()
154 cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); in cifs_swn_send_register_message()
159 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); in cifs_swn_send_register_message()
264 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", in cifs_find_swn_reg()
274 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", in cifs_find_swn_reg()
341 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); in cifs_get_swn_reg()
379 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); in cifs_swn_reg_release()
475 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); in cifs_swn_reconnect()
485 cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n", in cifs_swn_reconnect()
496 cifs_dbg(VFS, "%s: Failed to register for witness notifications: %d\n", in cifs_swn_reconnect()
[all …]
A Dmisc.c288 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr()
301 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr()
339 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB()
341 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
352 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB()
369 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
1026 cifs_dbg(VFS, "Couldn't get user pages (rc=%zd)\n", rc); in setup_aio_ctx_iter()
1031 cifs_dbg(VFS, "get pages rc=%zd more than %zu\n", rc, in setup_aio_ctx_iter()
1042 cifs_dbg(VFS, "out of vec array capacity (%u vs %u)\n", in setup_aio_ctx_iter()
1088 cifs_dbg(VFS, "Could not allocate crypto %s\n", name); in cifs_alloc_hash()
[all …]
A Dcifs_debug.h26 #define VFS 1 macro
67 } else if ((type) & VFS) { \
90 } else if ((type) & VFS) { \
116 } else if ((type) & VFS) { \
A Dsmbencrypt.c50 cifs_dbg(VFS, "%s: Could not init MD4\n", __func__); in mdfour()
55 cifs_dbg(VFS, "%s: Could not update MD4\n", __func__); in mdfour()
60 cifs_dbg(VFS, "%s: Could not finalize MD4\n", __func__); in mdfour()
A Dconnect.c1515 cifs_dbg(VFS, "RDMA transport established\n"); in cifs_get_tcp_session()
1669 cifs_server_dbg(VFS, in cifs_setup_ipc()
2239 cifs_dbg(VFS, in cifs_get_tcon()
2249 cifs_dbg(VFS, in cifs_get_tcon()
2268 cifs_dbg(VFS, in cifs_get_tcon()
2309 cifs_dbg(VFS, in cifs_get_tcon()
2317 cifs_dbg(VFS, in cifs_get_tcon()
2329 cifs_dbg(VFS, in cifs_get_tcon()
2375 cifs_dbg(VFS, in cifs_get_tcon()
2852 cifs_dbg(VFS, "possible reconnect error\n"); in reset_cifs_unix_caps()
[all …]
A Dtransport.c46 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry()
102 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in _cifs_mid_q_entry_release()
246 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec()
573 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
1083 cifs_dbg(VFS, "Null session\n"); in compound_send_recv()
1347 cifs_dbg(VFS, "Null smb session\n"); in SendReceive()
1352 cifs_dbg(VFS, "Null tcp session\n"); in SendReceive()
1431 cifs_server_dbg(VFS, "Bad MID state?\n"); in SendReceive()
1486 cifs_dbg(VFS, "Null smb session\n"); in SendReceiveBlockingLock()
1493 cifs_dbg(VFS, "Null tcp session\n"); in SendReceiveBlockingLock()
[all …]
A Dsmb2pdu.c939 cifs_server_dbg(VFS, in SMB2_negotiate()
943 cifs_server_dbg(VFS, in SMB2_negotiate()
954 cifs_server_dbg(VFS, in SMB2_negotiate()
1599 cifs_dbg(VFS, "Session Key %*ph\n", in SMB2_sess_auth_rawntlmssp_authenticate()
1601 cifs_dbg(VFS, "Signing Key %*ph\n", in SMB2_sess_auth_rawntlmssp_authenticate()
1634 cifs_dbg(VFS, "secType %d not supported!\n", type); in SMB2_select_sec()
1894 cifs_tcon_dbg(VFS, "BAD_NETWORK_NAME: %s\n", tree); in SMB2_tcon()
3527 cifs_tcon_dbg(VFS, in query_info()
4203 cifs_dbg(VFS, "Send error in read = %d\n", rc); in SMB2_read()
4548 cifs_dbg(VFS, "Send error in write = %d\n", rc); in SMB2_write()
[all …]
A Dnetlink.c69 cifs_dbg(VFS, "%s: failed to register netlink family\n", in cifs_genl_init()
86 cifs_dbg(VFS, "%s: failed to unregister netlink family\n", in cifs_genl_exit()
A Dcifs_debug.c41 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail()
44 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail()
57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids()
60 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids()
67 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids()
73 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids()
959 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
968 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
976 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write()
981 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
A Dreaddir.c503 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry()
511 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry()
518 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry()
540 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix()
802 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry()
824 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry()
862 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir()
1021 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
A Dsmb2ops.c136 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits()
375 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail()
601 cifs_dbg(VFS, in parse_server_interfaces()
1882 cifs_tcon_dbg(VFS, "Invalid cchunk response size\n"); in smb2_copychunk_range()
1896 cifs_tcon_dbg(VFS, "Invalid copy chunk response\n"); in smb2_copychunk_range()
1901 cifs_tcon_dbg(VFS, "Invalid num chunks written\n"); in smb2_copychunk_range()
2945 cifs_dbg(VFS, "%lld not a supported symlink type\n", in parse_reparse_posix()
4775 cifs_dbg(VFS, "%s: something went wrong\n", __func__); in init_read_bvec()
4960 cifs_dbg(VFS, "error decrypting rc=%d\n", rc); in smb2_decrypt_offload()
5176 cifs_server_dbg(VFS, "too many PDUs in compound\n"); in receive_encrypted_standard()
[all …]
A Dcifsacl.c592 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode()
728 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace()
733 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace()
777 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl()
1158 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid()
1263 cifs_dbg(VFS, "Server returned illegal ACL size\n"); in build_sec_desc()
1499 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl()
1544 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr()
1553 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr()
1597 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
/linux/tools/perf/util/c++/
A Dclang.cpp71 StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) in getModuleFromSource() argument
77 Clang.setVirtualFileSystem(&*VFS); in getModuleFromSource()
79 Clang.createFileManager(&*VFS); in getModuleFromSource()
125 IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); in getModuleFromSource() local
126 return getModuleFromSource(std::move(CFlags), Path, VFS); in getModuleFromSource()
/linux/Documentation/filesystems/
A Dvfs.rst149 for internal VFS use: you should initialize this to NULL
297 called when the VFS wants to delete an inode
300 called when the VFS wishes to free the superblock
318 called when the VFS needs to get filesystem statistics.
325 called then the VFS clears the inode. Optional
328 called when the VFS is unmounting a filesystem.
335 called by the VFS to read from filesystem quota file.
338 called by the VFS to write to filesystem quota file.
358 any scanning loop that is done. This allows the VFS to
1071 called by the VFS when an inode should be opened. When the VFS
[all …]
A Dindex.rst8 comprehensive information on how the Linux virtual filesystem (VFS) layer
12 Core VFS documentation
15 See these manuals for documentation about the VFS layer itself and how its
A Dcoda.rst122 VFS interface. Similar functionality is provided, and the format of
148 filesystem (VFS) layer, which is named I/O Manager in NT and IFS
149 manager in Windows 95. The VFS is responsible for partial processing
153 pre-processing, the VFS starts invoking exported routines in the FS
164 such VFS requests by invoking one or more well defined services
166 come back to the FS driver, servicing of the VFS call continues and
167 finishes with a reply to the kernel's VFS. Finally the VFS layer
196 Among these interfaces the VFS interface and the facility to place,
208 up processes. The Coda FS driver processes VFS- and pioctl-requests
283 processing. The VFS routine will now continue. (-- If a VFS request
[all …]
/linux/Documentation/admin-guide/namespaces/
A Dcompatibility-list.rst13 - UTS IPC VFS PID User Net
17 VFS X
34 should not be equal from the VFS point of view. In other
/linux/fs/ksmbd/
A Dvfs.c214 ksmbd_debug(VFS, "path create failed for %s, err %d\n", in ksmbd_vfs_mkdir()
262 ksmbd_debug(VFS, "%s, len %zd\n", name, strlen(name)); in ksmbd_vfs_getcasexattr()
523 ksmbd_debug(VFS, "smb write failed, err = %d\n", err); in ksmbd_vfs_write()
601 ksmbd_debug(VFS, "can't get %s, err %d\n", name, err); in ksmbd_vfs_remove_file()
624 ksmbd_debug(VFS, "%s: rmdir failed, err %d\n", name, in ksmbd_vfs_remove_file()
629 ksmbd_debug(VFS, "%s: unlink failed, err %d\n", name, in ksmbd_vfs_remove_file()
684 ksmbd_debug(VFS, "vfs_link failed err %d\n", err); in ksmbd_vfs_link()
908 ksmbd_debug(VFS, "listxattr failed\n"); in ksmbd_vfs_listxattr()
980 ksmbd_debug(VFS, "setxattr failed, err %d\n", err); in ksmbd_vfs_setxattr()
1105 ksmbd_debug(VFS, "failed to delete, err %d\n", err); in ksmbd_vfs_unlink()
[all …]
/linux/drivers/target/
A DKconfig26 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS"
29 access to Linux/VFS struct file or struct block_device
/linux/Documentation/vm/
A Dcleancache.rst10 Cleancache is a new optional feature provided by the VFS layer that
160 filesystems and VFS? (Andrew Morton and Christoph Hellwig)
162 The core hooks for cleancache in VFS are in most cases a single line
172 Some filesystems are built entirely on top of VFS and the hooks
173 in VFS are sufficient, so don't require an "init_fs" hook; the
175 But for some filesystems (such as btrfs), the VFS hooks are
242 file removal or truncation operations either go through VFS or
247 - The FS must call the VFS superblock alloc and deactivate routines
/linux/Documentation/admin-guide/cifs/
A Dintroduction.rst5 This is the client VFS module for the SMB3 NAS protocol as well
13 including the most recent, SMB3.1.1, are supported by the CIFS VFS

Completed in 835 milliseconds

12345