/fs/cifs/ |
D | smb2transport.c | 111 cifs_server_dbg(VFS, "%s: Could not find session 0x%llx\n", in smb2_get_sign_key() 139 cifs_dbg(VFS, in smb2_get_sign_key() 230 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature() 240 cifs_server_dbg(VFS, in smb2_calc_signature() 253 cifs_server_dbg(VFS, in smb2_calc_signature() 261 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 277 cifs_server_dbg(VFS, in smb2_calc_signature() 313 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key() 320 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key() 326 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key() [all …]
|
D | fs_context.c | 36 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version() 40 cifs_dbg(VFS, "vers=1.0 (cifs) not permitted when mounting with smb3\n"); in cifs_parse_smb_version() 43 …cifs_dbg(VFS, "Use of the less secure dialect vers=1.0 is not recommended unless required for acce… in cifs_parse_smb_version() 49 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version() 53 cifs_dbg(VFS, "vers=2.0 not permitted when mounting with smb3\n"); in cifs_parse_smb_version() 61 cifs_dbg(VFS, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version() 64 cifs_dbg(VFS, "vers=2.0 mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version() 92 cifs_dbg(VFS, "Unknown vers= option specified: %s\n", value); in cifs_parse_smb_version() 129 cifs_dbg(VFS, "sec=krb5p is not supported!\n"); in cifs_parse_security_flavors() 164 cifs_dbg(VFS, "bad security option: %s\n", value); in cifs_parse_security_flavors() [all …]
|
D | cifsencrypt.c | 65 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 72 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 89 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 100 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 127 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 134 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 507 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 517 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 523 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 546 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash() [all …]
|
D | smb2misc.c | 52 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 56 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 59 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 62 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 171 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 187 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 192 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 201 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message() 208 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message() 216 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message() [all …]
|
D | connect.c | 421 cifs_server_dbg(VFS, "%s: no target servers for DFS failover\n", in cifs_reconnect() 558 cifs_server_dbg(VFS, "%s: failed to update DFS target hint: rc = %d\n", in cifs_reconnect() 563 cifs_server_dbg(VFS, "%s: failed to update vol info in DFS cache: rc = %d\n", in cifs_reconnect() 623 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 636 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 668 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive() 817 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 985 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 1125 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 1201 cifs_server_dbg(VFS, "No task to wake, unknown frame received! NumMids %d\n", in cifs_demultiplex_thread() [all …]
|
D | misc.c | 300 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 313 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 351 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 353 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 357 cifs_dbg(VFS, "%s: can't read BCC due to invalid WordCount(%u)\n", in checkSMB() 368 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 385 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 398 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 540 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino() 542 …cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different… in cifs_autodisable_serverino() [all …]
|
D | sess.c | 91 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels() 96 cifs_dbg(VFS, "server %s does not support multichannel\n", ses->server->hostname); in cifs_try_adding_channels() 110 cifs_dbg(VFS, "no iface list available to open channels\n"); in cifs_try_adding_channels() 275 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel() 575 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 580 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 585 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 599 cifs_dbg(VFS, "tioffset + tilen too high %u + %u\n", in decode_ntlmssp_challenge() 607 cifs_dbg(VFS, "Challenge target info alloc failure\n"); in decode_ntlmssp_challenge() 683 cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); in build_ntlmssp_auth_blob() [all …]
|
D | transport.c | 59 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry() 115 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in _cifs_mid_q_entry_release() 241 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 255 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 452 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 477 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst() 568 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 610 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 905 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 946 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() [all …]
|
D | cifs_debug.h | 26 #define VFS 1 macro 67 } else if ((type) & VFS) { \ 90 } else if ((type) & VFS) { \ 116 } else if ((type) & VFS) { \
|
D | smbencrypt.c | 67 cifs_dbg(VFS, "FIPS compliance enabled: DES not permitted\n"); in smbhash() 121 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour() 126 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour() 131 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
|
D | smb2pdu.c | 525 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts() 626 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx() 667 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context() 699 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context() 881 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate() 889 cifs_server_dbg(VFS, in SMB2_negotiate() 893 cifs_server_dbg(VFS, in SMB2_negotiate() 900 cifs_server_dbg(VFS, in SMB2_negotiate() 914 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate() 932 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n", in SMB2_negotiate() [all …]
|
D | cifs_debug.c | 40 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail() 43 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail() 57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 61 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 68 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 74 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 945 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 954 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 962 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write() 967 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
|
D | readdir.c | 496 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry() 504 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 511 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 533 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix() 795 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry() 817 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 855 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 1013 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
D | smb2ops.c | 116 cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); in smb2_add_credits() 119 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits() 235 cifs_server_dbg(VFS, "trying to return %d credits to old session\n", in smb2_adjust_credits() 275 cifs_server_dbg(VFS, "Encrypted frame parsing not supported yet\n"); in __smb2_find_mid() 315 cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", in smb2_dump_detail() 318 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail() 476 cifs_dbg(VFS, "%s: malformed interface info\n", __func__); in parse_server_interfaces() 483 cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); in parse_server_interfaces() 542 cifs_dbg(VFS, in parse_server_interfaces() 599 cifs_tcon_dbg(VFS, "error %d on ioctl to get interface list\n", rc); in SMB3_request_interfaces() [all …]
|
D | cifsacl.c | 586 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode() 676 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace() 681 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace() 725 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl() 916 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid() 1222 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl() 1266 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr() 1275 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr() 1315 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
|
D | cifsfs.c | 249 cifs_dbg(VFS, "%s: get root inode failed\n", __func__); in cifs_read_super() 831 cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", in cifs_smb3_do_mount() 1107 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_remap_file_range() 1163 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_file_copychunk_range() 1174 cifs_dbg(VFS, "source and target of copy not on same server\n"); in cifs_file_copychunk_range() 1442 cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); in cifs_init_request_bufs() 1551 cifs_dbg(VFS, in init_cifs()
|
D | link.c | 62 cifs_dbg(VFS, "%s: Could not init md5 shash\n", __func__); in symlink_hash() 67 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in symlink_hash() 72 cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); in symlink_hash()
|
D | fscache.c | 72 cifs_dbg(VFS, "Unknown network family '%d'\n", sa->sa_family); in cifs_fscache_get_client_cookie() 280 cifs_dbg(VFS, "unknown error ret = %d\n", ret); in __cifs_readpage_from_fscache()
|
D | cifssmb.c | 469 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!\n"); in cifs_enable_signing() 478 cifs_dbg(VFS, "Server does not support signing!\n"); in cifs_enable_signing() 485 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled\n"); in cifs_enable_signing() 568 cifs_dbg(VFS, "mount failed, cifs module not built with CIFS_WEAK_PW_HASH support\n"); in decode_lanman_negprot_rsp() 1149 cifs_dbg(VFS, "Open response data too small\n"); in CIFSPOSIXCreate() 1646 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_readv_callback() 1806 cifs_dbg(VFS, "Send error in read = %d\n", rc); in CIFSSMBRead() 2045 cifs_dbg(VFS, "No writable handle to retry writepages rc=%d\n", in cifs_writev_requeue() 2655 cifs_dbg(VFS, "Send error in Close = %d\n", rc); in CIFSSMBClose() 2683 cifs_dbg(VFS, "Send error in Flush = %d\n", rc); in CIFSSMBFlush() [all …]
|
D | cifs_spnego.c | 151 cifs_dbg(VFS, "unknown or missing server auth type, use krb5\n"); in cifs_get_spnego_key()
|
/fs/nfs/ |
D | dir.c | 1477 dfprintk(VFS, "NFS: dentry_delete(%pd2, %x)\n", in nfs_dentry_delete() 1560 dfprintk(VFS, "NFS: lookup(%pd2)\n", dentry); in nfs_lookup() 1676 dfprintk(VFS, "NFS: atomic_open(%s/%lu), %pd\n", in nfs_atomic_open() 1923 dfprintk(VFS, "NFS: create(%s/%lu), %pd\n", in nfs_create() 1950 dfprintk(VFS, "NFS: mknod(%s/%lu), %pd\n", in nfs_mknod() 1976 dfprintk(VFS, "NFS: mkdir(%s/%lu), %pd\n", in nfs_mkdir() 2004 dfprintk(VFS, "NFS: rmdir(%s/%lu), %pd\n", in nfs_rmdir() 2041 dfprintk(VFS, "NFS: safe_remove(%pd2)\n", dentry); in nfs_safe_remove() 2073 dfprintk(VFS, "NFS: unlink(%s/%lu, %pd)\n", dir->i_sb->s_id, in nfs_unlink() 2124 dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s)\n", dir->i_sb->s_id, in nfs_symlink() [all …]
|
D | unlink.c | 441 dfprintk(VFS, "NFS: silly-rename(%pd2, ct=%d)\n", in nfs_sillyrename() 463 dfprintk(VFS, "NFS: trying to rename %pd to %s\n", in nfs_sillyrename()
|
/fs/ecryptfs/ |
D | Kconfig | 9 Encrypted filesystem that operates on the VFS layer. See
|
/fs/affs/ |
D | Changes | 206 - Handling of hard links rewritten. To the VFS 306 - Minor changes to adhere to the new VFS interface. 327 - Almost complete rewrite for the new VFS
|
/fs/jffs2/ |
D | README.Locking | 49 avoid deadlocks with garbage collection -- the VFS will lock the i_sem 53 VFS. If the garbage collection code were to attempt to lock the i_sem
|