Home
last modified time | relevance | path

Searched refs:VFS (Results 1 – 25 of 39) sorted by relevance

12

/fs/cifs/
Dsmb2transport.c111 cifs_server_dbg(VFS, "%s: Could not find session 0x%llx\n", in smb2_get_sign_key()
139 cifs_dbg(VFS, in smb2_get_sign_key()
230 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature()
240 cifs_server_dbg(VFS, in smb2_calc_signature()
253 cifs_server_dbg(VFS, in smb2_calc_signature()
261 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature()
277 cifs_server_dbg(VFS, in smb2_calc_signature()
313 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key()
320 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key()
326 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key()
[all …]
Dfs_context.c36 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version()
40 cifs_dbg(VFS, "vers=1.0 (cifs) not permitted when mounting with smb3\n"); in cifs_parse_smb_version()
43 …cifs_dbg(VFS, "Use of the less secure dialect vers=1.0 is not recommended unless required for acce… in cifs_parse_smb_version()
49 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version()
53 cifs_dbg(VFS, "vers=2.0 not permitted when mounting with smb3\n"); in cifs_parse_smb_version()
61 cifs_dbg(VFS, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version()
64 cifs_dbg(VFS, "vers=2.0 mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version()
92 cifs_dbg(VFS, "Unknown vers= option specified: %s\n", value); in cifs_parse_smb_version()
129 cifs_dbg(VFS, "sec=krb5p is not supported!\n"); in cifs_parse_security_flavors()
164 cifs_dbg(VFS, "bad security option: %s\n", value); in cifs_parse_security_flavors()
[all …]
Dcifsencrypt.c65 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature()
72 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
89 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
100 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature()
127 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature()
134 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature()
507 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash()
517 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash()
523 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash()
546 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash()
[all …]
Dsmb2misc.c52 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
56 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
59 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
62 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
171 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
187 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
192 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
201 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message()
208 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message()
216 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message()
[all …]
Dconnect.c421 cifs_server_dbg(VFS, "%s: no target servers for DFS failover\n", in cifs_reconnect()
558 cifs_server_dbg(VFS, "%s: failed to update DFS target hint: rc = %d\n", in cifs_reconnect()
563 cifs_server_dbg(VFS, "%s: failed to update vol info in DFS cache: rc = %d\n", in cifs_reconnect()
623 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers()
636 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers()
668 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive()
817 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response()
985 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3()
1125 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread()
1201 cifs_server_dbg(VFS, "No task to wake, unknown frame received! NumMids %d\n", in cifs_demultiplex_thread()
[all …]
Dmisc.c300 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr()
313 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr()
351 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB()
353 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
357 cifs_dbg(VFS, "%s: can't read BCC due to invalid WordCount(%u)\n", in checkSMB()
368 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB()
385 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
398 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
540 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino()
542 …cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different… in cifs_autodisable_serverino()
[all …]
Dsess.c91 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels()
96 cifs_dbg(VFS, "server %s does not support multichannel\n", ses->server->hostname); in cifs_try_adding_channels()
110 cifs_dbg(VFS, "no iface list available to open channels\n"); in cifs_try_adding_channels()
275 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel()
575 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
580 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge()
585 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge()
599 cifs_dbg(VFS, "tioffset + tilen too high %u + %u\n", in decode_ntlmssp_challenge()
607 cifs_dbg(VFS, "Challenge target info alloc failure\n"); in decode_ntlmssp_challenge()
683 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob()
[all …]
Dtransport.c59 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry()
115 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in _cifs_mid_q_entry_release()
241 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec()
255 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec()
452 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst()
477 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst()
568 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
610 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
905 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result()
946 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive()
[all …]
Dcifs_debug.h26 #define VFS 1 macro
67 } else if ((type) & VFS) { \
90 } else if ((type) & VFS) { \
116 } else if ((type) & VFS) { \
Dsmbencrypt.c67 cifs_dbg(VFS, "FIPS compliance enabled: DES not permitted\n"); in smbhash()
121 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour()
126 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour()
131 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
Dsmb2pdu.c525 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts()
626 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx()
667 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context()
699 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context()
881 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate()
889 cifs_server_dbg(VFS, in SMB2_negotiate()
893 cifs_server_dbg(VFS, in SMB2_negotiate()
900 cifs_server_dbg(VFS, in SMB2_negotiate()
914 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate()
932 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n", in SMB2_negotiate()
[all …]
Dcifs_debug.c40 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail()
43 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail()
57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids()
61 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids()
68 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids()
74 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids()
945 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
954 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
962 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write()
967 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
Dreaddir.c496 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry()
504 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry()
511 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry()
533 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix()
795 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry()
817 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry()
855 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir()
1013 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
Dsmb2ops.c116 cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits()
119 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits()
235 cifs_server_dbg(VFS, "trying to return %d credits to old session\n", in smb2_adjust_credits()
275 cifs_server_dbg(VFS, "Encrypted frame parsing not supported yet\n"); in __smb2_find_mid()
315 cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail()
318 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail()
476 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces()
483 cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); in parse_server_interfaces()
542 cifs_dbg(VFS, in parse_server_interfaces()
599 cifs_tcon_dbg(VFS, "error %d on ioctl to get interface list\n", rc); in SMB3_request_interfaces()
[all …]
Dcifsacl.c586 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode()
676 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace()
681 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace()
725 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl()
916 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid()
1222 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl()
1266 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr()
1275 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr()
1315 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
Dcifsfs.c249 cifs_dbg(VFS, "%s: get root inode failed\n", __func__); in cifs_read_super()
831 cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", in cifs_smb3_do_mount()
1107 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_remap_file_range()
1163 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_file_copychunk_range()
1174 cifs_dbg(VFS, "source and target of copy not on same server\n"); in cifs_file_copychunk_range()
1442 cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); in cifs_init_request_bufs()
1551 cifs_dbg(VFS, in init_cifs()
Dlink.c62 cifs_dbg(VFS, "%s: Could not init md5 shash\n", __func__); in symlink_hash()
67 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in symlink_hash()
72 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in symlink_hash()
Dfscache.c72 cifs_dbg(VFS, "Unknown network family '%d'\n", sa->sa_family); in cifs_fscache_get_client_cookie()
280 cifs_dbg(VFS, "unknown error ret = %d\n", ret); in __cifs_readpage_from_fscache()
Dcifssmb.c469 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!\n"); in cifs_enable_signing()
478 cifs_dbg(VFS, "Server does not support signing!\n"); in cifs_enable_signing()
485 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled\n"); in cifs_enable_signing()
568 cifs_dbg(VFS, "mount failed, cifs module not built with CIFS_WEAK_PW_HASH support\n"); in decode_lanman_negprot_rsp()
1149 cifs_dbg(VFS, "Open response data too small\n"); in CIFSPOSIXCreate()
1646 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_readv_callback()
1806 cifs_dbg(VFS, "Send error in read = %d\n", rc); in CIFSSMBRead()
2045 cifs_dbg(VFS, "No writable handle to retry writepages rc=%d\n", in cifs_writev_requeue()
2655 cifs_dbg(VFS, "Send error in Close = %d\n", rc); in CIFSSMBClose()
2683 cifs_dbg(VFS, "Send error in Flush = %d\n", rc); in CIFSSMBFlush()
[all …]
Dcifs_spnego.c151 cifs_dbg(VFS, "unknown or missing server auth type, use krb5\n"); in cifs_get_spnego_key()
/fs/nfs/
Ddir.c1477 dfprintk(VFS, "NFS: dentry_delete(%pd2, %x)\n", in nfs_dentry_delete()
1560 dfprintk(VFS, "NFS: lookup(%pd2)\n", dentry); in nfs_lookup()
1676 dfprintk(VFS, "NFS: atomic_open(%s/%lu), %pd\n", in nfs_atomic_open()
1923 dfprintk(VFS, "NFS: create(%s/%lu), %pd\n", in nfs_create()
1950 dfprintk(VFS, "NFS: mknod(%s/%lu), %pd\n", in nfs_mknod()
1976 dfprintk(VFS, "NFS: mkdir(%s/%lu), %pd\n", in nfs_mkdir()
2004 dfprintk(VFS, "NFS: rmdir(%s/%lu), %pd\n", in nfs_rmdir()
2041 dfprintk(VFS, "NFS: safe_remove(%pd2)\n", dentry); in nfs_safe_remove()
2073 dfprintk(VFS, "NFS: unlink(%s/%lu, %pd)\n", dir->i_sb->s_id, in nfs_unlink()
2124 dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s)\n", dir->i_sb->s_id, in nfs_symlink()
[all …]
Dunlink.c441 dfprintk(VFS, "NFS: silly-rename(%pd2, ct=%d)\n", in nfs_sillyrename()
463 dfprintk(VFS, "NFS: trying to rename %pd to %s\n", in nfs_sillyrename()
/fs/ecryptfs/
DKconfig9 Encrypted filesystem that operates on the VFS layer. See
/fs/affs/
DChanges206 - Handling of hard links rewritten. To the VFS
306 - Minor changes to adhere to the new VFS interface.
327 - Almost complete rewrite for the new VFS
/fs/jffs2/
DREADME.Locking49 avoid deadlocks with garbage collection -- the VFS will lock the i_sem
53 VFS. If the garbage collection code were to attempt to lock the i_sem

12