/linux-4.1.27/fs/cifs/ |
D | smb2transport.c | 53 cifs_dbg(VFS, "could not allocate crypto hmacsha256\n"); in smb2_crypto_shash_allocate() 88 cifs_dbg(VFS, "could not allocate crypto cmac-aes"); in smb3_crypto_shash_allocate() 102 cifs_dbg(VFS, "%s: Can't alloc cmacaes\n", __func__); in smb3_crypto_shash_allocate() 148 cifs_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature() 157 cifs_dbg(VFS, "%s: shah256 alloc failed\n", __func__); in smb2_calc_signature() 164 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in smb2_calc_signature() 170 cifs_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 178 cifs_dbg(VFS, "null iovec entry\n"); in smb2_calc_signature() 199 cifs_dbg(VFS, "%s: Could not update with payload\n", in smb2_calc_signature() 218 cifs_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__); in smb2_calc_signature() [all …]
|
D | cifsencrypt.c | 48 cifs_dbg(VFS, "could not allocate crypto md5\n"); in cifs_crypto_shash_md5_allocate() 89 cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__); in cifs_calc_signature() 96 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 103 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 111 cifs_dbg(VFS, "null iovec entry\n"); in cifs_calc_signature() 128 cifs_dbg(VFS, "%s: Could not update with payload\n", in cifs_calc_signature() 146 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in cifs_calc_signature() 500 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 510 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 516 cifs_dbg(VFS, "%s: could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() [all …]
|
D | smb2misc.c | 50 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 54 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 57 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 60 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 123 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 128 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 137 cifs_dbg(VFS, "Illegal structure size %u\n", in smb2_check_message() 144 cifs_dbg(VFS, "Illegal SMB2 command %d\n", command); in smb2_check_message() 152 cifs_dbg(VFS, "Illegal response size %u for command %d\n", in smb2_check_message() 159 cifs_dbg(VFS, "Illegal response size %d for oplock break\n", in smb2_check_message() [all …]
|
D | smbencrypt.c | 82 cifs_dbg(VFS, "could not allocate des crypto API\n"); in smbhash() 95 cifs_dbg(VFS, "could not encrypt crypt key rc: %d\n", rc); in smbhash() 143 cifs_dbg(VFS, "%s: Crypto md4 allocation error %d\n", in mdfour() 158 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour() 163 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour() 168 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
|
D | sess.c | 289 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 294 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 299 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 313 cifs_dbg(VFS, "tioffset + tilen too high %u + %u", in decode_ntlmssp_challenge() 321 cifs_dbg(VFS, "Challenge target info alloc failure"); in decode_ntlmssp_challenge() 406 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob() 724 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_lanman() 793 cifs_dbg(VFS, "Error %d during NTLM authentication\n", in sess_auth_ntlm() 834 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_ntlm() 902 cifs_dbg(VFS, "Error %d during NTLMv2 authentication\n", rc); in sess_auth_ntlmv2() [all …]
|
D | transport.c | 52 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry() 185 cifs_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 206 cifs_dbg(VFS, "sent %d requested %d\n", rc, remaining); in smb_send_kvec() 213 cifs_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 361 cifs_dbg(VFS, "Error %d sending data on socket to server\n", in smb_send_rqst() 643 cifs_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 681 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() 727 cifs_dbg(VFS, "Null session\n"); in SendReceive2() 845 cifs_dbg(VFS, "Null smb session\n"); in SendReceive() 849 cifs_dbg(VFS, "Null tcp session\n"); in SendReceive() [all …]
|
D | cifs_debug.c | 64 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail() 67 cifs_dbg(VFS, "smb buf %p len %u\n", smb, smbCalcSize(smb)); in cifs_dump_detail() 80 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 84 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 91 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 97 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 643 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 652 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 660 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write() 665 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
|
D | misc.c | 294 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 307 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 345 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 347 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 358 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 375 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 388 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 528 …cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s. This server doesn't seem to su… in cifs_autodisable_serverino()
|
D | connect.c | 437 cifs_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 450 cifs_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 480 cifs_dbg(VFS, "Server %s has not responded in %d seconds. Reconnecting...\n", in server_unresponsive() 651 cifs_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 789 cifs_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 882 cifs_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 915 cifs_dbg(VFS, "No task to wake, unknown frame received! NumMids %d\n", in cifs_demultiplex_thread() 1042 cifs_dbg(VFS, "sec=krb5p is not supported!\n"); in cifs_parse_security_flavors() 1077 cifs_dbg(VFS, "bad security option: %s\n", value); in cifs_parse_security_flavors() 1103 cifs_dbg(VFS, "bad cache= option: %s\n", value); in cifs_parse_cache_flavor() [all …]
|
D | cifs_debug.h | 34 #define VFS 1 macro 57 } else if (type == VFS) { \
|
D | ioctl.c | 72 cifs_dbg(VFS, "src file seems to be from a different filesystem type\n"); in cifs_ioctl_clone() 78 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_ioctl_clone() 90 cifs_dbg(VFS, "file copy src and target on different volume\n"); in cifs_ioctl_clone()
|
D | smb2pdu.c | 398 cifs_dbg(VFS, "Illegal dialect returned by server %d\n", in SMB2_negotiate() 489 cifs_dbg(VFS, "validate protocol negotiate failed: %d\n", rc); in smb3_validate_negotiate() 494 cifs_dbg(VFS, "invalid size of protocol negotiate response\n"); in smb3_validate_negotiate() 517 cifs_dbg(VFS, "protocol revalidation - security settings mismatch\n"); in smb3_validate_negotiate() 610 cifs_dbg(VFS, in SMB2_sess_setup() 619 cifs_dbg(VFS, in SMB2_sess_setup() 647 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_setup() 678 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_setup() 688 cifs_dbg(VFS, "illegal ntlmssp phase\n"); in SMB2_sess_setup() 712 cifs_dbg(VFS, "Unexpected more processing error\n"); in SMB2_sess_setup() [all …]
|
D | cifsacl.c | 464 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode() 554 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace() 559 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace() 604 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl() 704 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid() 992 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl() 1037 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr() 1042 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr() 1081 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
|
D | smb2ops.c | 43 cifs_dbg(VFS, "disabling echoes and oplocks\n"); in change_conf() 204 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail() 207 cifs_dbg(VFS, "smb buf %p len %u\n", smb, smb2_calc_size(smb)); in smb2_dump_detail() 274 cifs_dbg(VFS, "error %d on ioctl to get interface list\n", rc); in SMB3_request_interfaces() 276 cifs_dbg(VFS, "server returned bad net interface info buf\n"); in SMB3_request_interfaces() 563 cifs_dbg(VFS, "refcpy ioctl error %d getting resume key\n", rc); in SMB2_request_res_key() 567 cifs_dbg(VFS, "Invalid refcopy resume key length\n"); in SMB2_request_res_key() 629 cifs_dbg(VFS, "invalid cchunk response size\n"); in smb2_clone_range() 643 cifs_dbg(VFS, "invalid copy chunk response\n"); in smb2_clone_range() 648 cifs_dbg(VFS, "invalid num chunks written\n"); in smb2_clone_range() [all …]
|
D | readdir.c | 380 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 387 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 664 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 702 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 842 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
D | link.c | 67 cifs_dbg(VFS, "%s: Crypto md5 allocation error %d\n", in symlink_hash() 82 cifs_dbg(VFS, "%s: Could not init md5 shash\n", __func__); in symlink_hash() 87 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in symlink_hash() 92 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in symlink_hash()
|
D | cifssmb.c | 428 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!"); in cifs_enable_signing() 437 cifs_dbg(VFS, "Server does not support signing!"); in cifs_enable_signing() 522 cifs_dbg(VFS, "mount failed, cifs module not built with CIFS_WEAK_PW_HASH support\n"); in decode_lanman_negprot_rsp() 1097 cifs_dbg(VFS, "Open response data too small\n"); in CIFSPOSIXCreate() 1569 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_readv_callback() 1725 cifs_dbg(VFS, "Send error in read = %d\n", rc); in CIFSSMBRead() 1963 cifs_dbg(VFS, "No writable handles for inode\n"); in cifs_writev_requeue() 2547 cifs_dbg(VFS, "Send error in Close = %d\n", rc); in CIFSSMBClose() 2574 cifs_dbg(VFS, "Send error in Flush = %d\n", rc); in CIFSSMBFlush() 3879 cifs_dbg(VFS, "acl length %d does not match %d\n", in CIFSSMBGetCIFSACL() [all …]
|
D | fscache.c | 176 cifs_dbg(VFS, "unknown error ret = %d\n", ret); in __cifs_readpage_from_fscache()
|
D | cache.c | 95 cifs_dbg(VFS, "Unknown network family '%d'\n", sa->sa_family); in cifs_server_get_key()
|
D | cifsfs.c | 169 cifs_dbg(VFS, "%s: get root inode failed\n", __func__); in cifs_read_super() 687 cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", in cifs_do_mount() 1093 cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); in cifs_init_request_bufs()
|
D | cifs_dfs_ref.c | 328 cifs_dbg(VFS, "%s: Net Address path too short: %s\n", in cifs_dfs_do_automount()
|
D | smb2inode.c | 106 cifs_dbg(VFS, "Invalid command\n"); in smb2_open_op_close()
|
D | netmisc.c | 976 cifs_dbg(VFS, "illegal time min %d sec %d\n", min, sec); in cnvrtDosUnixTm() 980 cifs_dbg(VFS, "illegal hours %d\n", st->Hours); in cnvrtDosUnixTm() 984 cifs_dbg(VFS, "illegal date, month %d day: %d\n", month, days); in cnvrtDosUnixTm()
|
D | cifs_unicode.c | 284 cifs_dbg(VFS, "strtoUTF16: char2uni of 0x%x returned %d\n", in cifs_strtoUTF16()
|
D | dir.c | 106 cifs_dbg(VFS, "corrupt dentry\n"); in build_path_from_dentry() 133 cifs_dbg(VFS, "corrupt dentry\n"); in build_path_from_dentry()
|
D | xattr.c | 330 cifs_dbg(VFS, "%s: error %zd getting sec desc\n", in cifs_getxattr()
|
D | file.c | 498 …cifs_dbg(VFS, "server %s of type %s returned unexpected error on SMB posix open, disabling posix o… in cifs_open() 1172 cifs_dbg(VFS, "Can't push all brlocks!\n"); in cifs_push_posix_locks() 1326 cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n", in cifs_getlk() 1346 cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n", in cifs_getlk() 1766 cifs_dbg(VFS, "Null inode passed to cifs_writeable_file\n"); in find_writable_file() 2022 cifs_dbg(VFS, "No writable handles for inode\n"); in wdata_send_pages() 3831 cifs_dbg(VFS, "Push locks rc = %d\n", rc); in cifs_oplock_break()
|
D | smb1ops.c | 278 cifs_dbg(VFS, "TotalDataSize %d is over maximum buffer %d\n", in check2ndT2() 407 cifs_dbg(VFS, "1st trans2 resp needs bigbuf\n"); in cifs_check_trans2()
|
D | Kconfig | 15 This is the client VFS module for the Common Internet File System
|
D | inode.c | 992 cifs_dbg(VFS, "server does not support POSIX extensions"); 1821 cifs_dbg(VFS, "%s: could not invalidate inode %p\n",
|
/linux-4.1.27/Documentation/filesystems/ |
D | vfs.txt | 23 VFS system calls open(2), stat(2), read(2), write(2), chmod(2) and so 31 The VFS implements the open(2), stat(2), chmod(2), and similar system 32 calls. The pathname argument that is passed to them is used by the VFS 41 into a dentry, the VFS may have to resort to creating dentries along 57 To look up an inode requires that the VFS calls the lookup() method of 59 filesystem implementation that the inode lives in. Once the VFS has 62 data. The stat(2) operation is fairly simple: once the VFS has the 76 can see that this is another switch performed by the VFS. The file 79 Reading, writing and closing files (and other assorted VFS operations) 83 dentry in use, which in turn means that the VFS inode is still in use. [all …]
|
D | coda.txt | 177 VFS interface. Similar functionality is provided, and the format of 178 the parameters and returned data is very similar to the BSD VFS. This 204 filesystem (VFS) layer, which is named I/O Manager in NT and IFS 205 manager in Windows 95. The VFS is responsible for partial processing 209 pre-processing, the VFS starts invoking exported routines in the FS 215 First and foremost the VFS must be able to make all necessary calls to 216 the Coda FS layer, so the Coda FS driver must expose the VFS interface 220 such VFS requests by invoking one or more well defined services 222 come back to the FS driver, servicing of the VFS call continues and 223 finishes with a reply to the kernel's VFS. Finally the VFS layer [all …]
|
D | 00-INDEX | 4 - info on locking rules as they pertain to Linux VFS.
|
D | 9p.txt | 85 0x08 = display VFS trace
|
D | exofs.txt | 174 - Handled by VFS locks:
|
D | fiemap.txt | 174 VFS -> File System Implementation
|
D | Locking | 1 The text below describes the locking rules for VFS-related methods. 480 mapped to zero in the VFS layer.
|
D | porting | 408 has been taken to VFS and filesystems need to provide a non-NULL ->i_op->get_acl
|
D | f2fs.txt | 562 triggered when there are not enough free segments to serve VFS calls. Background
|
D | relay.txt | 302 as when doing early tracing in the kernel, before the VFS is up. In these
|
/linux-4.1.27/Documentation/namespaces/ |
D | compatibility-list.txt | 10 UTS IPC VFS PID User Net 13 VFS X 29 should not be equal from the VFS point of view. In other
|
/linux-4.1.27/drivers/target/ |
D | Kconfig | 23 tristate "TCM/FILEIO Subsystem Plugin for Linux/VFS" 26 access to Linux/VFS struct file or struct block_device
|
/linux-4.1.27/Documentation/filesystems/cifs/ |
D | cifs.txt | 1 This is the client VFS module for the Common Internet File System 6 CIFS VFS module. CIFS is fully supported by network
|
D | AUTHORS | 6 Andrew Tridgell (Samba team) for his early suggestions about smb/cifs VFS
|
D | README | 1 The CIFS VFS support for Linux supports many advanced network filesystem 39 6) make modules (or "make" if CIFS VFS not to be built as a module) 62 the CIFS VFS web site) copy it to the same directory in which mount.smbfs and 130 To get the maximum benefit from the CIFS VFS, we recommend using a server that 173 Note that Samba 2.2.7 or later includes a fix that allows the CIFS VFS to delete 191 Once the CIFS VFS support is built into the kernel or installed as a module 252 CIFS VFS Mount Options
|
/linux-4.1.27/Documentation/locking/ |
D | lglock.txt | 4 Origin: Nick Piggin's VFS scalability series introduced during 8 Users: currently only the VFS and stop_machine related code 142 lglocks were designed for very specific problems in the VFS and probably 153 later were introduced by the VFS scalability patch set in 2.6 series
|
/linux-4.1.27/Documentation/vm/ |
D | cleancache.txt | 3 Cleancache is a new optional feature provided by the VFS layer that 141 filesystems and VFS? (Andrew Morton and Christoph Hellwig) 143 The core hooks for cleancache in VFS are in most cases a single line 153 Some filesystems are built entirely on top of VFS and the hooks 154 in VFS are sufficient, so don't require an "init_fs" hook; the 156 But for some filesystems (such as btrfs), the VFS hooks are 223 file removal or truncation operations either go through VFS or 228 - The FS must call the VFS superblock alloc and deactivate routines
|
/linux-4.1.27/fs/nfs/ |
D | dir.c | 1289 dfprintk(VFS, "NFS: dentry_delete(%pd2, %x)\n", in nfs_dentry_delete() 1368 dfprintk(VFS, "NFS: lookup(%pd2)\n", dentry); in nfs_lookup() 1499 dfprintk(VFS, "NFS: atomic_open(%s/%lu), %pd\n", in nfs_atomic_open() 1698 dfprintk(VFS, "NFS: create(%s/%lu), %pd\n", in nfs_create() 1725 dfprintk(VFS, "NFS: mknod(%s/%lu), %pd\n", in nfs_mknod() 1754 dfprintk(VFS, "NFS: mkdir(%s/%lu), %pd\n", in nfs_mkdir() 1782 dfprintk(VFS, "NFS: rmdir(%s/%lu), %pd\n", in nfs_rmdir() 1818 dfprintk(VFS, "NFS: safe_remove(%pd2)\n", dentry); in nfs_safe_remove() 1851 dfprintk(VFS, "NFS: unlink(%s/%lu, %pd)\n", dir->i_sb->s_id, in nfs_unlink() 1902 dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s)\n", dir->i_sb->s_id, in nfs_symlink() [all …]
|
D | unlink.c | 522 dfprintk(VFS, "NFS: silly-rename(%pd2, ct=%d)\n", in nfs_sillyrename() 547 dfprintk(VFS, "NFS: trying to rename %pd to %s\n", in nfs_sillyrename()
|
D | inode.c | 1632 dfprintk(VFS, "NFS: %s(%s/%lu fh_crc=0x%08x ct=%d info=0x%x)\n", in nfs_update_inode()
|
/linux-4.1.27/fs/ecryptfs/ |
D | Kconfig | 8 Encrypted filesystem that operates on the VFS layer. See
|
/linux-4.1.27/Documentation/filesystems/nfs/ |
D | fault_injection.txt | 45 The NFS server keeps a list of what files are currently locked in the VFS. 47 unlocked through the VFS as they are cleared from this list).
|
/linux-4.1.27/Documentation/ja_JP/ |
D | SubmitChecklist | 110 VM, VFS およびその他のサブシステムに関する様々な変更と、現時点でも共存
|
D | SubmittingPatches | 193 リングリストです。USB やフレームバッファデバイスや VFS や SCSI サブシステ
|
/linux-4.1.27/fs/affs/ |
D | Changes | 206 - Handling of hard links rewritten. To the VFS 306 - Minor changes to adhere to the new VFS interface. 327 - Almost complete rewrite for the new VFS
|
/linux-4.1.27/Documentation/ |
D | kernel-docs.txt | 108 Keywords: VFS, File System, mounting filesystems, opening files, 200 Keywords: files, VFS, file operations, kernel interface, character 242 VFS, physical structure, performance, benchmarks, ext2fs library, 450 Keywords: Linux, kernel, booting, SMB boot, VFS, page cache. 453 process management, VFS and more. 674 Keywords: slides, VFS, inode, superblock, dentry, dcache. 676 Linux VFS layer. Covers version 2.1.x, with dentries and the
|
D | SubmitChecklist | 93 changes in the VM, VFS, and other subsystems.
|
D | cachetlb.txt | 288 space of a user process. So for example, VFS layer code
|
/linux-4.1.27/fs/jffs2/ |
D | README.Locking | 49 avoid deadlocks with garbage collection -- the VFS will lock the i_sem 53 VFS. If the garbage collection code were to attempt to lock the i_sem
|
/linux-4.1.27/drivers/usb/gadget/ |
D | Kconfig | 121 for a bursty VFS behaviour. For instance there may be CPU wake up 122 latencies that makes the VFS to appear bursty in a system with 125 save often and spin up occasionally to move data within VFS.
|
/linux-4.1.27/Documentation/cris/ |
D | README | 130 VFS: Mounted root (cramfs filesystem) readonly.
|
/linux-4.1.27/Documentation/security/ |
D | credentials.txt | 25 (*) Overriding the VFS's use of credentials. 570 OVERRIDING THE VFS'S USE OF CREDENTIALS 574 the VFS, and that can be done by calling into such as vfs_mkdir() with a
|
/linux-4.1.27/fs/befs/ |
D | ChangeLog | 106 linux VFS doesn't allow us to keep any state between calls. Updated 396 * Removed superblock locking calls in befs_read_super(). In 2.4, the VFS
|
/linux-4.1.27/Documentation/cdrom/ |
D | cdrom-standard.tex | 195 (VFS) any more. The interface implemented in \cdromc\ is carried out 394 queues for the VFS and a new $ioctl()$ function that can report device 525 supported, it should be done through the VFS and not via $ioctl$s. A 643 in a number of i/o errors reported by the VFS to the kernel when an 791 listed in the standard $cdrom_fops$. If the VFS opens a file, this 882 the last call. Note that calls to $cdrom_media_changed$ by the VFS
|
/linux-4.1.27/Documentation/sysctl/ |
D | fs.txt | 108 reported with printk, look for "VFS: file-max limit <number>
|
/linux-4.1.27/tools/perf/ |
D | design.txt | 29 VFS system calls: read() can be used to read the counter, fcntl()
|
/linux-4.1.27/Documentation/filesystems/caching/ |
D | fscache.txt | 56 | VFS | ^ ^
|
D | cachefiles.txt | 414 bypassing security and calling inode ops directly. Therefore the VFS and LSM
|
/linux-4.1.27/Documentation/networking/ |
D | rxrpc.txt | 683 key at the appropriate point. AFS, for instance, would do this during VFS
|
/linux-4.1.27/ |
D | CREDITS | 139 D: VFS fixes (new notify_change in particular) 140 D: Moving all VFS access checks into the file systems
|
D | MAINTAINERS | 4017 FILESYSTEMS (VFS and infrastructure)
|