/fs/cifs/ |
D | cifsencrypt.c | 53 cifs_dbg(VFS, "%s: Can't generate signature\n", __func__); in cifs_calc_signature() 59 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 66 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 74 cifs_dbg(VFS, "null iovec entry\n"); in cifs_calc_signature() 91 cifs_dbg(VFS, "%s: Could not update with payload\n", in cifs_calc_signature() 109 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in cifs_calc_signature() 422 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 432 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 438 cifs_dbg(VFS, "%s: could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 461 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash() [all …]
|
D | smb2misc.c | 48 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 52 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 55 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 58 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", hdr->MessageId); in check_smb2_hdr() 121 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 126 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 135 cifs_dbg(VFS, "Illegal structure size %u\n", in smb2_check_message() 142 cifs_dbg(VFS, "Illegal SMB2 command %d\n", command); in smb2_check_message() 150 cifs_dbg(VFS, "Illegal response size %u for command %d\n", in smb2_check_message() 157 cifs_dbg(VFS, "Illegal response size %d for oplock break\n", in smb2_check_message() [all …]
|
D | sess.c | 376 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 381 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 386 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 400 cifs_dbg(VFS, "tioffset + tilen too high %u + %u", in decode_ntlmssp_challenge() 408 cifs_dbg(VFS, "Challenge target info alloc failure"); in decode_ntlmssp_challenge() 492 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob() 694 cifs_dbg(VFS, "Error %d during NTLM authentication\n", in CIFS_SessSetup() 725 cifs_dbg(VFS, "Error %d during NTLMv2 authentication\n", in CIFS_SessSetup() 762 cifs_dbg(VFS, "incorrect version of cifs.upcall " in CIFS_SessSetup() 772 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory", in CIFS_SessSetup() [all …]
|
D | smbencrypt.c | 81 cifs_dbg(VFS, "could not allocate des crypto API\n"); in smbhash() 94 cifs_dbg(VFS, "could not encrypt crypt key rc: %d\n", rc); in smbhash() 142 cifs_dbg(VFS, "%s: Crypto md4 allocation error %d\n", in mdfour() 157 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour() 162 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour() 167 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
|
D | smb2transport.c | 58 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in smb2_calc_signature() 64 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in smb2_calc_signature() 72 cifs_dbg(VFS, "null iovec entry\n"); in smb2_calc_signature() 93 cifs_dbg(VFS, "%s: Could not update with payload\n", in smb2_calc_signature() 112 cifs_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__); in smb2_calc_signature() 208 cifs_dbg(VFS, "Null TCP session in smb2_mid_entry_alloc\n"); in smb2_mid_entry_alloc() 284 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in smb2_check_receive()
|
D | transport.c | 52 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry() 185 cifs_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 206 cifs_dbg(VFS, "sent %d requested %d\n", rc, remaining); in smb_send_kvec() 213 cifs_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 332 cifs_dbg(VFS, "Error %d sending data on socket to server\n", in smb_send_rqst() 589 cifs_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 627 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() 673 cifs_dbg(VFS, "Null session\n"); in SendReceive2() 791 cifs_dbg(VFS, "Null smb session\n"); in SendReceive() 795 cifs_dbg(VFS, "Null tcp session\n"); in SendReceive() [all …]
|
D | misc.c | 285 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 292 cifs_dbg(VFS, "Mids do not match. received=%u expected=%u\n", in check_smb_hdr() 305 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", smb->Mid); in check_smb_hdr() 343 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 345 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 356 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 372 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 385 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 539 …cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s. This server doesn't seem to su… in cifs_autodisable_serverino()
|
D | connect.c | 429 cifs_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 442 cifs_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 472 cifs_dbg(VFS, "Server %s has not responded in %d seconds. Reconnecting...\n", in server_unresponsive() 643 cifs_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 782 cifs_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 876 cifs_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 909 cifs_dbg(VFS, "No task to wake, unknown frame received! NumMids %d\n", in cifs_demultiplex_thread() 1036 cifs_dbg(VFS, "Krb5 cifs privacy not supported\n"); in cifs_parse_security_flavors() 1067 cifs_dbg(VFS, "bad security option: %s\n", value); in cifs_parse_security_flavors() 1093 cifs_dbg(VFS, "bad cache= option: %s\n", value); in cifs_parse_cache_flavor() [all …]
|
D | cifs_debug.c | 82 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail() 85 cifs_dbg(VFS, "smb buf %p len %u\n", smb, smbCalcSize(smb)); in cifs_dump_detail() 98 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 102 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 109 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 115 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 623 cifs_dbg(VFS, "invalid flag %c\n", c); in cifs_security_flags_proc_write() 634 cifs_dbg(VFS, "invalid security flags %s\n", flags_string); in cifs_security_flags_proc_write() 639 cifs_dbg(VFS, "attempt to set unsupported security flags 0x%x\n", in cifs_security_flags_proc_write()
|
D | smb2pdu.c | 403 cifs_dbg(VFS, "Illegal dialect returned by server %d\n", in SMB2_negotiate() 422 cifs_dbg(VFS, "missing security blob on negprot\n"); in SMB2_negotiate() 432 cifs_dbg(VFS, "signing required but server lacks support\n"); in SMB2_negotiate() 449 cifs_dbg(VFS, "Server requires packet signing to be enabled in /proc/fs/cifs/SecurityFlags\n"); in SMB2_negotiate() 560 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_setup() 589 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_setup() 597 cifs_dbg(VFS, "illegal ntlmssp phase\n"); in SMB2_sess_setup() 622 cifs_dbg(VFS, "Unexpected more processing error\n"); in SMB2_sess_setup() 627 cifs_dbg(VFS, "Invalid security buffer offset %d\n", in SMB2_sess_setup() 785 cifs_dbg(VFS, "unknown share type %d\n", rsp->ShareType); in SMB2_tcon() [all …]
|
D | cifs_debug.h | 34 #define VFS 1 macro 59 } else if (type == VFS) { \
|
D | cifsacl.c | 465 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode() 555 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace() 560 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace() 605 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl() 705 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid() 976 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl() 1009 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr() 1014 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr() 1037 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
|
D | readdir.c | 359 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 366 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 643 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 680 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 779 cifs_dbg(VFS, "Filldir for current dir failed\n"); in cifs_readdir() 787 cifs_dbg(VFS, "Filldir for parent dir failed\n"); in cifs_readdir() 842 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
D | link.c | 59 cifs_dbg(VFS, "%s: Crypto md5 allocation error %d\n", in symlink_hash() 74 cifs_dbg(VFS, "%s: Could not init md5 shash\n", __func__); in symlink_hash() 79 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in symlink_hash() 84 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in symlink_hash()
|
D | smb2ops.c | 41 cifs_dbg(VFS, "disabling echoes and oplocks\n"); in change_conf() 150 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail() 153 cifs_dbg(VFS, "smb buf %p len %u\n", smb, smb2_calc_size(smb)); in smb2_dump_detail() 439 cifs_dbg(VFS, "open dir failed\n"); in smb2_query_dir_first() 451 cifs_dbg(VFS, "query directory failed\n"); in smb2_query_dir_first()
|
D | cifssmb.c | 450 cifs_dbg(VFS, "mount failed weak security disabled in /proc/fs/cifs/SecurityFlags\n"); in CIFSSMBNegotiate() 521 cifs_dbg(VFS, "mount failed, cifs module not built with CIFS_WEAK_PW_HASH support\n"); in CIFSSMBNegotiate() 539 cifs_dbg(VFS, "Server requests plain text password but client support disabled\n"); in CIFSSMBNegotiate() 555 cifs_dbg(VFS, "Invalid security type\n"); in CIFSSMBNegotiate() 635 cifs_dbg(VFS, "Server requires packet signing to be enabled in /proc/fs/cifs/SecurityFlags\n"); in CIFSSMBNegotiate() 645 cifs_dbg(VFS, "signing required but server lacks support\n"); in CIFSSMBNegotiate() 1111 cifs_dbg(VFS, "Open response data too small\n"); in CIFSPOSIXCreate() 1550 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_readv_callback() 1700 cifs_dbg(VFS, "Send error in read = %d\n", rc); in CIFSSMBRead() 1958 cifs_dbg(VFS, "%s: called with nr_pages == 0!\n", __func__); in cifs_writedata_alloc() [all …]
|
D | dir.c | 105 cifs_dbg(VFS, "corrupt dentry\n"); in build_path_from_dentry() 132 cifs_dbg(VFS, "corrupt dentry\n"); in build_path_from_dentry() 749 cifs_dbg(VFS, "Unexpected lookup error %d\n", rc); in cifs_lookup()
|
D | fscache.c | 176 cifs_dbg(VFS, "unknown error ret = %d\n", ret); in __cifs_readpage_from_fscache()
|
D | cifs_unicode.c | 230 cifs_dbg(VFS, "strtoUTF16: char2uni of 0x%x returned %d\n", in cifs_strtoUTF16()
|
D | cifsfs.c | 172 cifs_dbg(VFS, "%s: get root inode failed\n", __func__); in cifs_read_super() 656 cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", in cifs_do_mount() 1047 cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); in cifs_init_request_bufs()
|
/fs/nfs/ |
D | dir.c | 1182 dfprintk(VFS, "NFS: dentry_delete(%s/%s, %x)\n", in nfs_dentry_delete() 1261 dfprintk(VFS, "NFS: lookup(%s/%s)\n", in nfs_lookup() 1395 dfprintk(VFS, "NFS: atomic_open(%s/%ld), %s\n", in nfs_atomic_open() 1583 dfprintk(VFS, "NFS: create(%s/%ld), %s\n", in nfs_create() 1608 dfprintk(VFS, "NFS: mknod(%s/%ld), %s\n", in nfs_mknod() 1635 dfprintk(VFS, "NFS: mkdir(%s/%ld), %s\n", in nfs_mkdir() 1661 dfprintk(VFS, "NFS: rmdir(%s/%ld), %s\n", in nfs_rmdir() 1688 dfprintk(VFS, "NFS: safe_remove(%s/%s)\n", in nfs_safe_remove() 1720 dfprintk(VFS, "NFS: unlink(%s/%ld, %s)\n", dir->i_sb->s_id, in nfs_unlink() 1769 dfprintk(VFS, "NFS: symlink(%s/%ld, %s, %s)\n", dir->i_sb->s_id, in nfs_symlink() [all …]
|
D | unlink.c | 480 dfprintk(VFS, "NFS: silly-rename(%s/%s, ct=%d)\n", in nfs_sillyrename() 507 dfprintk(VFS, "NFS: trying to rename %s to %s\n", in nfs_sillyrename()
|
/fs/ecryptfs/ |
D | Kconfig | 8 Encrypted filesystem that operates on the VFS layer. See
|
/fs/jffs2/ |
D | README.Locking | 6 (BKL), which was always helpfully obtained for it by Linux 2.4 VFS 53 avoid deadlocks with garbage collection -- the VFS will lock the i_sem 57 VFS. If the garbage collection code were to attempt to lock the i_sem
|
/fs/affs/ |
D | Changes | 206 - Handling of hard links rewritten. To the VFS 306 - Minor changes to adhere to the new VFS interface. 327 - Almost complete rewrite for the new VFS
|