/linux-4.19.296/fs/cifs/ |
D | smb2transport.c | 179 cifs_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature() 188 cifs_dbg(VFS, "%s: sha256 alloc failed\n", __func__); in smb2_calc_signature() 195 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in smb2_calc_signature() 202 cifs_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 218 cifs_dbg(VFS, "%s: Could not update with payload\n", in smb2_calc_signature() 248 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key() 255 cifs_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key() 261 cifs_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key() 268 cifs_dbg(VFS, "%s: Could not update with n\n", __func__); in generate_key() 275 cifs_dbg(VFS, "%s: Could not update with label\n", __func__); in generate_key() [all …]
|
D | cifsencrypt.c | 64 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 71 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 88 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 99 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 126 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 133 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 501 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 511 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 517 cifs_dbg(VFS, "%s: could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 540 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash() [all …]
|
D | smb2misc.c | 51 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 55 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 58 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 61 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 162 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 178 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 183 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 192 cifs_dbg(VFS, "Illegal structure size %u\n", in smb2_check_message() 199 cifs_dbg(VFS, "Illegal SMB2 command %d\n", command); in smb2_check_message() 207 cifs_dbg(VFS, "Illegal response size %u for command %d\n", in smb2_check_message() [all …]
|
D | connect.c | 539 cifs_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 552 cifs_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 583 cifs_dbg(VFS, "Server %s has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive() 722 cifs_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 871 cifs_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 1012 cifs_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 1089 cifs_dbg(VFS, "No task to wake, unknown frame " in cifs_demultiplex_thread() 1229 cifs_dbg(VFS, "sec=krb5p is not supported!\n"); in cifs_parse_security_flavors() 1264 cifs_dbg(VFS, "bad security option: %s\n", value); in cifs_parse_security_flavors() 1290 cifs_dbg(VFS, "bad cache= option: %s\n", value); in cifs_parse_cache_flavor() [all …]
|
D | misc.c | 285 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 298 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 336 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 338 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 349 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 366 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 379 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 516 …cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s. This server doesn't seem to su… in cifs_autodisable_serverino() 671 cifs_dbg(VFS, "num_referrals: must be at least > 0, but we get num_referrals = %d\n", in parse_dfs_referrals() 679 cifs_dbg(VFS, "Referrals of V%d version are not supported, should be V3\n", in parse_dfs_referrals() [all …]
|
D | sess.c | 289 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 294 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 299 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 313 cifs_dbg(VFS, "tioffset + tilen too high %u + %u", in decode_ntlmssp_challenge() 321 cifs_dbg(VFS, "Challenge target info alloc failure"); in decode_ntlmssp_challenge() 396 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob() 403 cifs_dbg(VFS, "Error %d during NTLMSSP allocation\n", rc); in build_ntlmssp_auth_blob() 753 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_lanman() 822 cifs_dbg(VFS, "Error %d during NTLM authentication\n", in sess_auth_ntlm() 863 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_ntlm() [all …]
|
D | smbencrypt.c | 79 cifs_dbg(VFS, "could not allocate des crypto API\n"); in smbhash() 133 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour() 138 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour() 143 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
|
D | cifs_debug.h | 34 #define VFS 1 macro 56 } else if ((type) & VFS) { \
|
D | transport.c | 58 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry() 204 cifs_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 218 cifs_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 382 cifs_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 406 cifs_dbg(VFS, "Encryption requested but transform callback " in smb_send_rqst() 715 cifs_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 756 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() 810 cifs_dbg(VFS, "Null session\n"); in compound_send_recv() 1050 cifs_dbg(VFS, "Null smb session\n"); in SendReceive() 1054 cifs_dbg(VFS, "Null tcp session\n"); in SendReceive() [all …]
|
D | cifs_debug.c | 50 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail() 53 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail() 67 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 71 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 78 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 84 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 819 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 828 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 836 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write() 841 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
|
D | smb2pdu.c | 515 cifs_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context() 544 cifs_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context() 717 cifs_dbg(VFS, "Dialect not supported by server. Consider " in SMB2_negotiate() 727 cifs_dbg(VFS, in SMB2_negotiate() 731 cifs_dbg(VFS, in SMB2_negotiate() 738 cifs_dbg(VFS, in SMB2_negotiate() 749 cifs_dbg(VFS, "Illegal 0x%x dialect returned: not requested\n", in SMB2_negotiate() 767 cifs_dbg(VFS, "Illegal dialect returned by server 0x%x\n", in SMB2_negotiate() 834 cifs_dbg(VFS, "Missing expected negotiate contexts\n"); in SMB2_negotiate() 871 cifs_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n"); in smb3_validate_negotiate() [all …]
|
D | readdir.c | 383 cifs_dbg(VFS, "invalid offset %u\n", next_offset); in nxt_dir_entry() 391 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 398 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 661 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry() 683 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 721 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 862 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
D | smb2ops.c | 108 cifs_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits() 111 cifs_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits() 225 cifs_dbg(VFS, "encrypted frame parsing not supported yet"); in smb2_find_mid() 249 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail() 252 cifs_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail() 365 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces() 372 cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); in parse_server_interfaces() 431 cifs_dbg(VFS, in parse_server_interfaces() 481 cifs_dbg(VFS, "error %d on ioctl to get interface list\n", rc); in SMB3_request_interfaces() 893 cifs_dbg(VFS, "EA size is too large\n"); in smb2_query_eas() [all …]
|
D | cifsacl.c | 586 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode() 676 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace() 681 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace() 726 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl() 826 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid() 1114 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl() 1158 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr() 1163 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr() 1202 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
|
D | fscache.c | 72 cifs_dbg(VFS, "Unknown network family '%d'\n", sa->sa_family); in cifs_fscache_get_client_cookie() 267 cifs_dbg(VFS, "unknown error ret = %d\n", ret); in __cifs_readpage_from_fscache()
|
D | cifsfs.c | 192 cifs_dbg(VFS, "%s: get root inode failed\n", __func__); in cifs_read_super() 735 cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", in cifs_smb3_do_mount() 994 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_clone_file_range() 1055 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_file_copychunk_range() 1066 cifs_dbg(VFS, "source and target of copy not on same server\n"); in cifs_file_copychunk_range() 1317 cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); in cifs_init_request_bufs()
|
D | link.c | 62 cifs_dbg(VFS, "%s: Could not init md5 shash\n", __func__); in symlink_hash() 67 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in symlink_hash() 72 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in symlink_hash()
|
D | cifs_spnego.c | 151 cifs_dbg(VFS, "unknown or missing server auth type, use krb5\n"); in cifs_get_spnego_key()
|
D | ioctl.c | 66 cifs_dbg(VFS, "src file seems to be from a different filesystem type\n"); in cifs_ioctl_copychunk()
|
D | cifssmb.c | 455 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!"); in cifs_enable_signing() 464 cifs_dbg(VFS, "Server does not support signing!"); in cifs_enable_signing() 471 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled"); in cifs_enable_signing() 552 cifs_dbg(VFS, "mount failed, cifs module not built with CIFS_WEAK_PW_HASH support\n"); in decode_lanman_negprot_rsp() 1139 cifs_dbg(VFS, "Open response data too small\n"); in CIFSPOSIXCreate() 1639 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_readv_callback() 1799 cifs_dbg(VFS, "Send error in read = %d\n", rc); in CIFSSMBRead() 2037 cifs_dbg(VFS, "No writable handle to retry writepages\n"); in cifs_writev_requeue() 2643 cifs_dbg(VFS, "Send error in Close = %d\n", rc); in CIFSSMBClose() 2671 cifs_dbg(VFS, "Send error in Flush = %d\n", rc); in CIFSSMBFlush() [all …]
|
/linux-4.19.296/fs/ecryptfs/ |
D | Kconfig | 8 Encrypted filesystem that operates on the VFS layer. See
|
/linux-4.19.296/fs/nfs/ |
D | dir.c | 1328 dfprintk(VFS, "NFS: dentry_delete(%pd2, %x)\n", in nfs_dentry_delete() 1410 dfprintk(VFS, "NFS: lookup(%pd2)\n", dentry); in nfs_lookup() 1535 dfprintk(VFS, "NFS: atomic_open(%s/%lu), %pd\n", in nfs_atomic_open() 1774 dfprintk(VFS, "NFS: create(%s/%lu), %pd\n", in nfs_create() 1801 dfprintk(VFS, "NFS: mknod(%s/%lu), %pd\n", in nfs_mknod() 1827 dfprintk(VFS, "NFS: mkdir(%s/%lu), %pd\n", in nfs_mkdir() 1855 dfprintk(VFS, "NFS: rmdir(%s/%lu), %pd\n", in nfs_rmdir() 1892 dfprintk(VFS, "NFS: safe_remove(%pd2)\n", dentry); in nfs_safe_remove() 1924 dfprintk(VFS, "NFS: unlink(%s/%lu, %pd)\n", dir->i_sb->s_id, in nfs_unlink() 1975 dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s)\n", dir->i_sb->s_id, in nfs_symlink() [all …]
|
D | unlink.c | 455 dfprintk(VFS, "NFS: silly-rename(%pd2, ct=%d)\n", in nfs_sillyrename() 477 dfprintk(VFS, "NFS: trying to rename %pd to %s\n", in nfs_sillyrename()
|
/linux-4.19.296/fs/affs/ |
D | Changes | 206 - Handling of hard links rewritten. To the VFS 306 - Minor changes to adhere to the new VFS interface. 327 - Almost complete rewrite for the new VFS
|
/linux-4.19.296/fs/jffs2/ |
D | README.Locking | 49 avoid deadlocks with garbage collection -- the VFS will lock the i_sem 53 VFS. If the garbage collection code were to attempt to lock the i_sem
|