Home
last modified time | relevance | path

Searched refs:VFS (Results 1 – 25 of 38) sorted by relevance

12

/fs/cifs/
Dcifsencrypt.c53 cifs_dbg(VFS, "%s: Can't generate signature\n", __func__); in cifs_calc_signature()
59 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature()
66 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature()
74 cifs_dbg(VFS, "null iovec entry\n"); in cifs_calc_signature()
91 cifs_dbg(VFS, "%s: Could not update with payload\n", in cifs_calc_signature()
109 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in cifs_calc_signature()
422 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash()
432 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash()
438 cifs_dbg(VFS, "%s: could not init hmacmd5\n", __func__); in calc_ntlmv2_hash()
461 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash()
[all …]
Dsmb2misc.c48 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
52 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
55 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
58 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", hdr->MessageId); in check_smb2_hdr()
121 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
126 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
135 cifs_dbg(VFS, "Illegal structure size %u\n", in smb2_check_message()
142 cifs_dbg(VFS, "Illegal SMB2 command %d\n", command); in smb2_check_message()
150 cifs_dbg(VFS, "Illegal response size %u for command %d\n", in smb2_check_message()
157 cifs_dbg(VFS, "Illegal response size %d for oplock break\n", in smb2_check_message()
[all …]
Dsess.c376 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
381 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge()
386 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge()
400 cifs_dbg(VFS, "tioffset + tilen too high %u + %u", in decode_ntlmssp_challenge()
408 cifs_dbg(VFS, "Challenge target info alloc failure"); in decode_ntlmssp_challenge()
492 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob()
694 cifs_dbg(VFS, "Error %d during NTLM authentication\n", in CIFS_SessSetup()
725 cifs_dbg(VFS, "Error %d during NTLMv2 authentication\n", in CIFS_SessSetup()
762 cifs_dbg(VFS, "incorrect version of cifs.upcall " in CIFS_SessSetup()
772 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory", in CIFS_SessSetup()
[all …]
Dsmbencrypt.c81 cifs_dbg(VFS, "could not allocate des crypto API\n"); in smbhash()
94 cifs_dbg(VFS, "could not encrypt crypt key rc: %d\n", rc); in smbhash()
142 cifs_dbg(VFS, "%s: Crypto md4 allocation error %d\n", in mdfour()
157 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour()
162 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour()
167 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
Dsmb2transport.c58 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in smb2_calc_signature()
64 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in smb2_calc_signature()
72 cifs_dbg(VFS, "null iovec entry\n"); in smb2_calc_signature()
93 cifs_dbg(VFS, "%s: Could not update with payload\n", in smb2_calc_signature()
112 cifs_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__); in smb2_calc_signature()
208 cifs_dbg(VFS, "Null TCP session in smb2_mid_entry_alloc\n"); in smb2_mid_entry_alloc()
284 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in smb2_check_receive()
Dtransport.c52 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry()
185 cifs_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec()
206 cifs_dbg(VFS, "sent %d requested %d\n", rc, remaining); in smb_send_kvec()
213 cifs_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec()
332 cifs_dbg(VFS, "Error %d sending data on socket to server\n", in smb_send_rqst()
589 cifs_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result()
627 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive()
673 cifs_dbg(VFS, "Null session\n"); in SendReceive2()
791 cifs_dbg(VFS, "Null smb session\n"); in SendReceive()
795 cifs_dbg(VFS, "Null tcp session\n"); in SendReceive()
[all …]
Dmisc.c285 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr()
292 cifs_dbg(VFS, "Mids do not match. received=%u expected=%u\n", in check_smb_hdr()
305 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", smb->Mid); in check_smb_hdr()
343 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB()
345 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
356 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB()
372 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
385 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
539 …cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s. This server doesn't seem to su… in cifs_autodisable_serverino()
Dconnect.c429 cifs_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers()
442 cifs_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers()
472 cifs_dbg(VFS, "Server %s has not responded in %d seconds. Reconnecting...\n", in server_unresponsive()
643 cifs_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response()
782 cifs_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3()
876 cifs_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread()
909 cifs_dbg(VFS, "No task to wake, unknown frame received! NumMids %d\n", in cifs_demultiplex_thread()
1036 cifs_dbg(VFS, "Krb5 cifs privacy not supported\n"); in cifs_parse_security_flavors()
1067 cifs_dbg(VFS, "bad security option: %s\n", value); in cifs_parse_security_flavors()
1093 cifs_dbg(VFS, "bad cache= option: %s\n", value); in cifs_parse_cache_flavor()
[all …]
Dcifs_debug.c82 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail()
85 cifs_dbg(VFS, "smb buf %p len %u\n", smb, smbCalcSize(smb)); in cifs_dump_detail()
98 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids()
102 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids()
109 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids()
115 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids()
623 cifs_dbg(VFS, "invalid flag %c\n", c); in cifs_security_flags_proc_write()
634 cifs_dbg(VFS, "invalid security flags %s\n", flags_string); in cifs_security_flags_proc_write()
639 cifs_dbg(VFS, "attempt to set unsupported security flags 0x%x\n", in cifs_security_flags_proc_write()
Dsmb2pdu.c403 cifs_dbg(VFS, "Illegal dialect returned by server %d\n", in SMB2_negotiate()
422 cifs_dbg(VFS, "missing security blob on negprot\n"); in SMB2_negotiate()
432 cifs_dbg(VFS, "signing required but server lacks support\n"); in SMB2_negotiate()
449 cifs_dbg(VFS, "Server requires packet signing to be enabled in /proc/fs/cifs/SecurityFlags\n"); in SMB2_negotiate()
560 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_setup()
589 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_setup()
597 cifs_dbg(VFS, "illegal ntlmssp phase\n"); in SMB2_sess_setup()
622 cifs_dbg(VFS, "Unexpected more processing error\n"); in SMB2_sess_setup()
627 cifs_dbg(VFS, "Invalid security buffer offset %d\n", in SMB2_sess_setup()
785 cifs_dbg(VFS, "unknown share type %d\n", rsp->ShareType); in SMB2_tcon()
[all …]
Dcifs_debug.h34 #define VFS 1 macro
59 } else if (type == VFS) { \
Dcifsacl.c465 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode()
555 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace()
560 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace()
605 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl()
705 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid()
976 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl()
1009 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr()
1014 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr()
1037 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
Dreaddir.c359 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry()
366 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry()
643 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry()
680 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir()
779 cifs_dbg(VFS, "Filldir for current dir failed\n"); in cifs_readdir()
787 cifs_dbg(VFS, "Filldir for parent dir failed\n"); in cifs_readdir()
842 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
Dlink.c59 cifs_dbg(VFS, "%s: Crypto md5 allocation error %d\n", in symlink_hash()
74 cifs_dbg(VFS, "%s: Could not init md5 shash\n", __func__); in symlink_hash()
79 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in symlink_hash()
84 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in symlink_hash()
Dsmb2ops.c41 cifs_dbg(VFS, "disabling echoes and oplocks\n"); in change_conf()
150 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail()
153 cifs_dbg(VFS, "smb buf %p len %u\n", smb, smb2_calc_size(smb)); in smb2_dump_detail()
439 cifs_dbg(VFS, "open dir failed\n"); in smb2_query_dir_first()
451 cifs_dbg(VFS, "query directory failed\n"); in smb2_query_dir_first()
Dcifssmb.c450 cifs_dbg(VFS, "mount failed weak security disabled in /proc/fs/cifs/SecurityFlags\n"); in CIFSSMBNegotiate()
521 cifs_dbg(VFS, "mount failed, cifs module not built with CIFS_WEAK_PW_HASH support\n"); in CIFSSMBNegotiate()
539 cifs_dbg(VFS, "Server requests plain text password but client support disabled\n"); in CIFSSMBNegotiate()
555 cifs_dbg(VFS, "Invalid security type\n"); in CIFSSMBNegotiate()
635 cifs_dbg(VFS, "Server requires packet signing to be enabled in /proc/fs/cifs/SecurityFlags\n"); in CIFSSMBNegotiate()
645 cifs_dbg(VFS, "signing required but server lacks support\n"); in CIFSSMBNegotiate()
1111 cifs_dbg(VFS, "Open response data too small\n"); in CIFSPOSIXCreate()
1550 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_readv_callback()
1700 cifs_dbg(VFS, "Send error in read = %d\n", rc); in CIFSSMBRead()
1958 cifs_dbg(VFS, "%s: called with nr_pages == 0!\n", __func__); in cifs_writedata_alloc()
[all …]
Ddir.c105 cifs_dbg(VFS, "corrupt dentry\n"); in build_path_from_dentry()
132 cifs_dbg(VFS, "corrupt dentry\n"); in build_path_from_dentry()
749 cifs_dbg(VFS, "Unexpected lookup error %d\n", rc); in cifs_lookup()
Dfscache.c176 cifs_dbg(VFS, "unknown error ret = %d\n", ret); in __cifs_readpage_from_fscache()
Dcifs_unicode.c230 cifs_dbg(VFS, "strtoUTF16: char2uni of 0x%x returned %d\n", in cifs_strtoUTF16()
Dcifsfs.c172 cifs_dbg(VFS, "%s: get root inode failed\n", __func__); in cifs_read_super()
656 cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", in cifs_do_mount()
1047 cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); in cifs_init_request_bufs()
/fs/nfs/
Ddir.c1182 dfprintk(VFS, "NFS: dentry_delete(%s/%s, %x)\n", in nfs_dentry_delete()
1261 dfprintk(VFS, "NFS: lookup(%s/%s)\n", in nfs_lookup()
1395 dfprintk(VFS, "NFS: atomic_open(%s/%ld), %s\n", in nfs_atomic_open()
1583 dfprintk(VFS, "NFS: create(%s/%ld), %s\n", in nfs_create()
1608 dfprintk(VFS, "NFS: mknod(%s/%ld), %s\n", in nfs_mknod()
1635 dfprintk(VFS, "NFS: mkdir(%s/%ld), %s\n", in nfs_mkdir()
1661 dfprintk(VFS, "NFS: rmdir(%s/%ld), %s\n", in nfs_rmdir()
1688 dfprintk(VFS, "NFS: safe_remove(%s/%s)\n", in nfs_safe_remove()
1720 dfprintk(VFS, "NFS: unlink(%s/%ld, %s)\n", dir->i_sb->s_id, in nfs_unlink()
1769 dfprintk(VFS, "NFS: symlink(%s/%ld, %s, %s)\n", dir->i_sb->s_id, in nfs_symlink()
[all …]
Dunlink.c480 dfprintk(VFS, "NFS: silly-rename(%s/%s, ct=%d)\n", in nfs_sillyrename()
507 dfprintk(VFS, "NFS: trying to rename %s to %s\n", in nfs_sillyrename()
/fs/ecryptfs/
DKconfig8 Encrypted filesystem that operates on the VFS layer. See
/fs/jffs2/
DREADME.Locking6 (BKL), which was always helpfully obtained for it by Linux 2.4 VFS
53 avoid deadlocks with garbage collection -- the VFS will lock the i_sem
57 VFS. If the garbage collection code were to attempt to lock the i_sem
/fs/affs/
DChanges206 - Handling of hard links rewritten. To the VFS
306 - Minor changes to adhere to the new VFS interface.
327 - Almost complete rewrite for the new VFS

12