Home
last modified time | relevance | path

Searched refs:VFS (Results 1 – 25 of 40) sorted by relevance

12

/linux-4.19.296/fs/cifs/
Dsmb2transport.c179 cifs_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature()
188 cifs_dbg(VFS, "%s: sha256 alloc failed\n", __func__); in smb2_calc_signature()
195 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in smb2_calc_signature()
202 cifs_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature()
218 cifs_dbg(VFS, "%s: Could not update with payload\n", in smb2_calc_signature()
248 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key()
255 cifs_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key()
261 cifs_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key()
268 cifs_dbg(VFS, "%s: Could not update with n\n", __func__); in generate_key()
275 cifs_dbg(VFS, "%s: Could not update with label\n", __func__); in generate_key()
[all …]
Dcifsencrypt.c64 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature()
71 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
88 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
99 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature()
126 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature()
133 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature()
501 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash()
511 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash()
517 cifs_dbg(VFS, "%s: could not init hmacmd5\n", __func__); in calc_ntlmv2_hash()
540 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash()
[all …]
Dsmb2misc.c51 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
55 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
58 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
61 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
162 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
178 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
183 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
192 cifs_dbg(VFS, "Illegal structure size %u\n", in smb2_check_message()
199 cifs_dbg(VFS, "Illegal SMB2 command %d\n", command); in smb2_check_message()
207 cifs_dbg(VFS, "Illegal response size %u for command %d\n", in smb2_check_message()
[all …]
Dconnect.c539 cifs_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers()
552 cifs_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers()
583 cifs_dbg(VFS, "Server %s has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive()
722 cifs_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response()
871 cifs_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3()
1012 cifs_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread()
1089 cifs_dbg(VFS, "No task to wake, unknown frame " in cifs_demultiplex_thread()
1229 cifs_dbg(VFS, "sec=krb5p is not supported!\n"); in cifs_parse_security_flavors()
1264 cifs_dbg(VFS, "bad security option: %s\n", value); in cifs_parse_security_flavors()
1290 cifs_dbg(VFS, "bad cache= option: %s\n", value); in cifs_parse_cache_flavor()
[all …]
Dmisc.c285 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr()
298 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr()
336 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB()
338 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
349 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB()
366 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
379 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
516 …cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s. This server doesn't seem to su… in cifs_autodisable_serverino()
671 cifs_dbg(VFS, "num_referrals: must be at least > 0, but we get num_referrals = %d\n", in parse_dfs_referrals()
679 cifs_dbg(VFS, "Referrals of V%d version are not supported, should be V3\n", in parse_dfs_referrals()
[all …]
Dsess.c289 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
294 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge()
299 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge()
313 cifs_dbg(VFS, "tioffset + tilen too high %u + %u", in decode_ntlmssp_challenge()
321 cifs_dbg(VFS, "Challenge target info alloc failure"); in decode_ntlmssp_challenge()
396 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob()
403 cifs_dbg(VFS, "Error %d during NTLMSSP allocation\n", rc); in build_ntlmssp_auth_blob()
753 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_lanman()
822 cifs_dbg(VFS, "Error %d during NTLM authentication\n", in sess_auth_ntlm()
863 cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); in sess_auth_ntlm()
[all …]
Dsmbencrypt.c79 cifs_dbg(VFS, "could not allocate des crypto API\n"); in smbhash()
133 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour()
138 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour()
143 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
Dcifs_debug.h34 #define VFS 1 macro
56 } else if ((type) & VFS) { \
Dtransport.c58 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry()
204 cifs_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec()
218 cifs_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec()
382 cifs_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst()
406 cifs_dbg(VFS, "Encryption requested but transform callback " in smb_send_rqst()
715 cifs_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result()
756 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive()
810 cifs_dbg(VFS, "Null session\n"); in compound_send_recv()
1050 cifs_dbg(VFS, "Null smb session\n"); in SendReceive()
1054 cifs_dbg(VFS, "Null tcp session\n"); in SendReceive()
[all …]
Dcifs_debug.c50 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail()
53 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail()
67 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids()
71 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids()
78 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids()
84 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids()
819 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
828 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
836 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write()
841 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
Dsmb2pdu.c515 cifs_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context()
544 cifs_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context()
717 cifs_dbg(VFS, "Dialect not supported by server. Consider " in SMB2_negotiate()
727 cifs_dbg(VFS, in SMB2_negotiate()
731 cifs_dbg(VFS, in SMB2_negotiate()
738 cifs_dbg(VFS, in SMB2_negotiate()
749 cifs_dbg(VFS, "Illegal 0x%x dialect returned: not requested\n", in SMB2_negotiate()
767 cifs_dbg(VFS, "Illegal dialect returned by server 0x%x\n", in SMB2_negotiate()
834 cifs_dbg(VFS, "Missing expected negotiate contexts\n"); in SMB2_negotiate()
871 cifs_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n"); in smb3_validate_negotiate()
[all …]
Dreaddir.c383 cifs_dbg(VFS, "invalid offset %u\n", next_offset); in nxt_dir_entry()
391 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry()
398 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry()
661 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry()
683 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry()
721 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir()
862 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
Dsmb2ops.c108 cifs_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits()
111 cifs_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits()
225 cifs_dbg(VFS, "encrypted frame parsing not supported yet"); in smb2_find_mid()
249 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail()
252 cifs_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail()
365 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces()
372 cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); in parse_server_interfaces()
431 cifs_dbg(VFS, in parse_server_interfaces()
481 cifs_dbg(VFS, "error %d on ioctl to get interface list\n", rc); in SMB3_request_interfaces()
893 cifs_dbg(VFS, "EA size is too large\n"); in smb2_query_eas()
[all …]
Dcifsacl.c586 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode()
676 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace()
681 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace()
726 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl()
826 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid()
1114 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl()
1158 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr()
1163 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr()
1202 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
Dfscache.c72 cifs_dbg(VFS, "Unknown network family '%d'\n", sa->sa_family); in cifs_fscache_get_client_cookie()
267 cifs_dbg(VFS, "unknown error ret = %d\n", ret); in __cifs_readpage_from_fscache()
Dcifsfs.c192 cifs_dbg(VFS, "%s: get root inode failed\n", __func__); in cifs_read_super()
735 cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", in cifs_smb3_do_mount()
994 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_clone_file_range()
1055 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_file_copychunk_range()
1066 cifs_dbg(VFS, "source and target of copy not on same server\n"); in cifs_file_copychunk_range()
1317 cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); in cifs_init_request_bufs()
Dlink.c62 cifs_dbg(VFS, "%s: Could not init md5 shash\n", __func__); in symlink_hash()
67 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in symlink_hash()
72 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in symlink_hash()
Dcifs_spnego.c151 cifs_dbg(VFS, "unknown or missing server auth type, use krb5\n"); in cifs_get_spnego_key()
Dioctl.c66 cifs_dbg(VFS, "src file seems to be from a different filesystem type\n"); in cifs_ioctl_copychunk()
Dcifssmb.c455 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!"); in cifs_enable_signing()
464 cifs_dbg(VFS, "Server does not support signing!"); in cifs_enable_signing()
471 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled"); in cifs_enable_signing()
552 cifs_dbg(VFS, "mount failed, cifs module not built with CIFS_WEAK_PW_HASH support\n"); in decode_lanman_negprot_rsp()
1139 cifs_dbg(VFS, "Open response data too small\n"); in CIFSPOSIXCreate()
1639 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_readv_callback()
1799 cifs_dbg(VFS, "Send error in read = %d\n", rc); in CIFSSMBRead()
2037 cifs_dbg(VFS, "No writable handle to retry writepages\n"); in cifs_writev_requeue()
2643 cifs_dbg(VFS, "Send error in Close = %d\n", rc); in CIFSSMBClose()
2671 cifs_dbg(VFS, "Send error in Flush = %d\n", rc); in CIFSSMBFlush()
[all …]
/linux-4.19.296/fs/ecryptfs/
DKconfig8 Encrypted filesystem that operates on the VFS layer. See
/linux-4.19.296/fs/nfs/
Ddir.c1328 dfprintk(VFS, "NFS: dentry_delete(%pd2, %x)\n", in nfs_dentry_delete()
1410 dfprintk(VFS, "NFS: lookup(%pd2)\n", dentry); in nfs_lookup()
1535 dfprintk(VFS, "NFS: atomic_open(%s/%lu), %pd\n", in nfs_atomic_open()
1774 dfprintk(VFS, "NFS: create(%s/%lu), %pd\n", in nfs_create()
1801 dfprintk(VFS, "NFS: mknod(%s/%lu), %pd\n", in nfs_mknod()
1827 dfprintk(VFS, "NFS: mkdir(%s/%lu), %pd\n", in nfs_mkdir()
1855 dfprintk(VFS, "NFS: rmdir(%s/%lu), %pd\n", in nfs_rmdir()
1892 dfprintk(VFS, "NFS: safe_remove(%pd2)\n", dentry); in nfs_safe_remove()
1924 dfprintk(VFS, "NFS: unlink(%s/%lu, %pd)\n", dir->i_sb->s_id, in nfs_unlink()
1975 dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s)\n", dir->i_sb->s_id, in nfs_symlink()
[all …]
Dunlink.c455 dfprintk(VFS, "NFS: silly-rename(%pd2, ct=%d)\n", in nfs_sillyrename()
477 dfprintk(VFS, "NFS: trying to rename %pd to %s\n", in nfs_sillyrename()
/linux-4.19.296/fs/affs/
DChanges206 - Handling of hard links rewritten. To the VFS
306 - Minor changes to adhere to the new VFS interface.
327 - Almost complete rewrite for the new VFS
/linux-4.19.296/fs/jffs2/
DREADME.Locking49 avoid deadlocks with garbage collection -- the VFS will lock the i_sem
53 VFS. If the garbage collection code were to attempt to lock the i_sem

12