/openbmc/linux/fs/smb/client/ |
H A D | smb2transport.c | 135 cifs_dbg(VFS, in smb3_get_sign_key() 282 cifs_server_dbg(VFS, in smb2_calc_signature() 292 cifs_server_dbg(VFS, in smb2_calc_signature() 300 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 316 cifs_server_dbg(VFS, in smb2_calc_signature() 352 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key() 359 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key() 365 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key() 371 cifs_server_dbg(VFS, "%s: Could not update with n\n", __func__); in generate_key() 377 cifs_server_dbg(VFS, "%s: Could not update with label\n", __func__); in generate_key() [all …]
|
H A D | cifsencrypt.c | 195 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 202 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 214 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 240 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 247 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 543 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 553 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 559 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 582 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash() 602 cifs_dbg(VFS, "%s: Could not update with domain\n", in calc_ntlmv2_hash() [all …]
|
H A D | smb2misc.c | 39 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 43 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 46 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 49 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 170 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 180 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message() 187 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message() 201 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 206 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 215 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message() [all …]
|
H A D | sess.c | 89 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx", in cifs_ses_get_chan_index() 210 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels() 216 cifs_server_dbg(VFS, "no multichannel support\n"); in cifs_try_adding_channels() 225 cifs_dbg(VFS, "too many channel open attempts (%d channels left to open)\n", in cifs_try_adding_channels() 271 cifs_dbg(VFS, "failed to open extra channel on iface:%pIS rc=%d\n", in cifs_try_adding_channels() 282 cifs_dbg(VFS, "successfully opened new channel on iface:%pIS\n", in cifs_try_adding_channels() 629 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel() 927 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 932 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 937 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() [all …]
|
H A D | cifs_swn.c | 146 cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 154 cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 159 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); in cifs_swn_send_register_message() 264 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", in cifs_find_swn_reg() 274 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", in cifs_find_swn_reg() 341 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 348 cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 379 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); in cifs_swn_reg_release() 475 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); in cifs_swn_reconnect() 485 cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n", in cifs_swn_reconnect() [all …]
|
H A D | smbencrypt.c | 43 cifs_dbg(VFS, "%s: Could not init MD4\n", __func__); in mdfour() 48 cifs_dbg(VFS, "%s: Could not update MD4\n", __func__); in mdfour() 53 cifs_dbg(VFS, "%s: Could not finalize MD4\n", __func__); in mdfour()
|
H A D | cifs_debug.h | 26 #define VFS 1 macro 67 } else if ((type) & VFS) { \ 89 } else if ((type) & VFS) { \ 116 } else if ((type) & VFS) { \
|
H A D | connect.c | 629 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 642 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 688 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive() 859 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 951 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!\n"); in cifs_enable_signing() 960 cifs_dbg(VFS, "Server does not support signing!\n"); in cifs_enable_signing() 967 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled\n"); in cifs_enable_signing() 1082 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 1232 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 1248 cifs_dbg(VFS, "%s: malformed response (next_offset=%u)\n", in cifs_demultiplex_thread() [all …]
|
H A D | misc.c | 310 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 323 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 361 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 363 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 367 cifs_dbg(VFS, "%s: can't read BCC due to invalid WordCount(%u)\n", in checkSMB() 378 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 395 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 408 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 551 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino() 553 …cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different… in cifs_autodisable_serverino() [all …]
|
H A D | transport.c | 49 cifs_dbg(VFS, "%s: null TCP session\n", __func__); in alloc_mid() 106 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in __release_mid() 220 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 234 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 409 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 442 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst() 558 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 601 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 913 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 956 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() [all …]
|
H A D | netlink.c | 70 cifs_dbg(VFS, "%s: failed to register netlink family\n", in cifs_genl_init() 87 cifs_dbg(VFS, "%s: failed to unregister netlink family\n", in cifs_genl_exit()
|
H A D | smb2pdu.c | 172 cifs_dbg(VFS, in cifs_chan_skip_or_disable() 204 cifs_server_dbg(VFS, in cifs_chan_skip_or_disable() 412 cifs_dbg(VFS, "reconnect tcon failed rc = %d\n", rc); in smb2_reconnect() 456 cifs_server_dbg(VFS, "supports multichannel now\n"); in smb2_reconnect() 704 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts() 851 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx() 922 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context() 962 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context() 1140 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate() 1149 cifs_server_dbg(VFS, in SMB2_negotiate() [all …]
|
H A D | reparse.c | 486 cifs_dbg(VFS, "srv returned malformed nfs buffer\n"); in parse_reparse_posix() 495 cifs_dbg(VFS, "srv returned malformed nfs symlink buffer\n"); in parse_reparse_posix() 503 cifs_dbg(VFS, "srv returned null byte in nfs symlink target location\n"); in parse_reparse_posix() 518 cifs_dbg(VFS, "srv returned malformed nfs buffer for type: 0x%llx\n", type); in parse_reparse_posix() 526 cifs_dbg(VFS, "srv returned malformed nfs buffer for type: 0x%llx\n", type); in parse_reparse_posix() 531 cifs_dbg(VFS, "%s: unhandled inode type: 0x%llx\n", in parse_reparse_posix() 618 cifs_dbg(VFS, "srv returned malformed symlink buffer\n"); in parse_reparse_symlink() 656 cifs_tcon_dbg(VFS | ONCE, "unhandled reparse tag: 0x%08x\n", in parse_reparse_point()
|
H A D | cifs_debug.c | 43 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d Wct: %d\n", in cifs_dump_detail() 47 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail() 61 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 64 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 71 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 77 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 1109 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 1118 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 1126 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write() 1131 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
|
H A D | readdir.c | 474 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry() 482 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 489 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 511 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix() 773 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry() 794 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 948 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 1163 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
/openbmc/linux/Documentation/filesystems/ |
H A D | vfs.rst | 21 VFS system calls open(2), stat(2), read(2), write(2), chmod(2) and so on 29 The VFS implements the open(2), stat(2), chmod(2), and similar system 30 calls. The pathname argument that is passed to them is used by the VFS 39 dentry, the VFS may have to resort to creating dentries along the way, 54 To look up an inode requires that the VFS calls the lookup() method of 56 filesystem implementation that the inode lives in. Once the VFS has the 59 stat(2) operation is fairly simple: once the VFS has the dentry, it 72 this is another switch performed by the VFS. The file structure is 75 Reading, writing and closing files (and other assorted VFS operations) 79 dentry in use, which in turn means that the VFS inode is still in use. [all …]
|
H A D | index.rst | 8 comprehensive information on how the Linux virtual filesystem (VFS) layer 12 Core VFS documentation 15 See these manuals for documentation about the VFS layer itself and how its
|
H A D | idmappings.rst | 343 VFS has already completed path lookup right before it calls into the filesystem 642 filesystem ownership and mount ownership of a VFS object such as an inode. The 654 All VFS helpers that generate or take uids and gids as arguments use the 656 to catch errors that originate from conflating filesystem and VFS uids and gids. 666 e.g., during ``stat()``, or store ownership information in a shared VFS object 678 Note, whenever a shared VFS object, e.g., a cached ``struct inode`` or a cached 695 kernel ids with ``k`` we will prefix all VFS ids with ``v``. So a mount 707 VFS ids in the mount's idmapping:: 712 /* Map the filesystem's userspace id down ito a VFS id in the mount's idmapping. */ 719 remapping the caller's VFS ids using the mount's idmapping:: [all …]
|
H A D | coda.rst | 122 VFS interface. Similar functionality is provided, and the format of 123 the parameters and returned data is very similar to the BSD VFS. This 148 filesystem (VFS) layer, which is named I/O Manager in NT and IFS 149 manager in Windows 95. The VFS is responsible for partial processing 153 pre-processing, the VFS starts invoking exported routines in the FS 159 First and foremost the VFS must be able to make all necessary calls to 160 the Coda FS layer, so the Coda FS driver must expose the VFS interface 164 such VFS requests by invoking one or more well defined services 166 come back to the FS driver, servicing of the VFS call continues and 167 finishes with a reply to the kernel's VFS. Finally the VFS layer [all …]
|
/openbmc/linux/Documentation/admin-guide/namespaces/ |
H A D | compatibility-list.rst | 13 - UTS IPC VFS PID User Net 17 VFS X 34 should not be equal from the VFS point of view. In other
|
/openbmc/linux/drivers/target/ |
H A D | Kconfig | 26 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS" 29 access to Linux/VFS struct file or struct block_device
|
/openbmc/linux/fs/smb/server/ |
H A D | vfs.c | 223 ksmbd_debug(VFS, "path create failed for %s, err %d\n", in ksmbd_vfs_mkdir() 270 ksmbd_debug(VFS, "%s, len %zd\n", name, strlen(name)); in ksmbd_vfs_getcasexattr() 294 ksmbd_debug(VFS, "read stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_read() 426 ksmbd_debug(VFS, "write stream data pos : %llu, count : %zd\n", in ksmbd_vfs_stream_write() 532 ksmbd_debug(VFS, "smb write failed, err = %d\n", err); in ksmbd_vfs_write() 616 ksmbd_debug(VFS, "rmdir failed, err %d\n", err); in ksmbd_vfs_remove_file() 620 ksmbd_debug(VFS, "unlink failed, err %d\n", err); in ksmbd_vfs_remove_file() 672 ksmbd_debug(VFS, "vfs_link failed err %d\n", err); in ksmbd_vfs_link() 783 ksmbd_debug(VFS, "vfs_rename failed err %d\n", err); in ksmbd_vfs_rename() 870 ksmbd_debug(VFS, "listxattr failed\n"); in ksmbd_vfs_listxattr() [all …]
|
H A D | ndr.c | 245 ksmbd_debug(VFS, "v%d version is not supported\n", da->version); in ndr_decode_dos_attr() 254 ksmbd_debug(VFS, "ndr version mismatched(version: %d, version2: %d)\n", in ndr_decode_dos_attr() 460 ksmbd_debug(VFS, "v%d version is not supported\n", acl->version); in ndr_decode_v4_ntacl() 468 ksmbd_debug(VFS, "ndr version mismatched(version: %d, version2: %d)\n", in ndr_decode_v4_ntacl()
|
/openbmc/linux/Documentation/translations/zh_CN/filesystems/ |
H A D | index.rst | 15 文件系统(VFS)层以及基于其上的各种文件系统如何工作呈现给大家。当前\
|
/openbmc/linux/Documentation/translations/zh_TW/filesystems/ |
H A D | index.rst | 16 文件系統(VFS)層以及基於其上的各種文件系統如何工作呈現給大家。當前\
|