| /fs/smb/client/ |
| A D | smb2transport.c | 135 cifs_dbg(VFS, in smb3_get_sign_key() 282 cifs_server_dbg(VFS, in smb2_calc_signature() 292 cifs_server_dbg(VFS, in smb2_calc_signature() 316 cifs_server_dbg(VFS, in smb2_calc_signature() 506 cifs_dbg(VFS, "Session Key %*ph\n", in generate_smb3signingkey() 508 cifs_dbg(VFS, "Signing Key %*ph\n", in generate_smb3signingkey() 512 cifs_dbg(VFS, "ServerIn Key %*ph\n", in generate_smb3signingkey() 514 cifs_dbg(VFS, "ServerOut Key %*ph\n", in generate_smb3signingkey() 517 cifs_dbg(VFS, "ServerIn Key %*ph\n", in generate_smb3signingkey() 519 cifs_dbg(VFS, "ServerOut Key %*ph\n", in generate_smb3signingkey() [all …]
|
| A D | cifsencrypt.c | 81 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 88 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 100 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 126 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 369 cifs_dbg(VFS | ONCE, "%s: bad length(%u) for type %u\n", in find_av_name() 598 cifs_dbg(VFS, "%s called with nls_cp==NULL\n", __func__); in setup_ntlmv2_rsp() 631 cifs_dbg(VFS, "error %d building av pair blob\n", rc); in setup_ntlmv2_rsp() 662 cifs_dbg(VFS, "Could not allocate HMAC-MD5, rc=%d\n", rc); in setup_ntlmv2_rsp() 669 cifs_dbg(VFS, "Could not get NTLMv2 hash, rc=%d\n", rc); in setup_ntlmv2_rsp() 676 cifs_dbg(VFS, "Could not calculate CR1, rc=%d\n", rc); in setup_ntlmv2_rsp() [all …]
|
| A D | smb2misc.c | 39 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 43 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 46 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 49 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 170 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 180 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message() 187 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message() 201 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 763 cifs_tcon_dbg(VFS, "Close interrupted close\n"); in smb2_cancelled_close_fid() 933 cifs_dbg(VFS, "%s: Could not update sha512 shash\n", in smb311_update_preauth_hash() [all …]
|
| A D | connect.c | 1372 cifs_server_dbg(VFS, in cifs_demultiplex_thread() 2041 cifs_server_dbg(VFS, in cifs_setup_ipc() 2717 cifs_dbg(VFS, in cifs_get_tcon() 2727 cifs_dbg(VFS, in cifs_get_tcon() 2746 cifs_dbg(VFS, in cifs_get_tcon() 2780 cifs_dbg(VFS, in cifs_get_tcon() 2799 cifs_dbg(VFS, in cifs_get_tcon() 2807 cifs_dbg(VFS, in cifs_get_tcon() 2819 cifs_dbg(VFS, in cifs_get_tcon() 2865 cifs_dbg(VFS, in cifs_get_tcon() [all …]
|
| A D | cifs_swn.c | 146 cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 154 cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 159 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); in cifs_swn_send_register_message() 264 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", in cifs_find_swn_reg() 274 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", in cifs_find_swn_reg() 341 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 379 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); in cifs_swn_reg_release() 475 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); in cifs_swn_reconnect() 485 cifs_dbg(VFS, "%s: Failed to unregister for witness notifications: %d\n", in cifs_swn_reconnect() 496 cifs_dbg(VFS, "%s: Failed to register for witness notifications: %d\n", in cifs_swn_reconnect() [all …]
|
| A D | sess.c | 64 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx", in cifs_ses_get_chan_index() 179 cifs_server_dbg(VFS, "no multichannel support\n"); in cifs_try_adding_channels() 589 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel() 913 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 918 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 960 cifs_dbg(VFS, "tioffset + tilen too high %u + %u\n", in decode_ntlmssp_challenge() 969 cifs_dbg(VFS, "Challenge target info alloc failure\n"); in decode_ntlmssp_challenge() 1646 cifs_dbg(VFS, "bad security blob length %d\n", in sess_auth_kerberos() 1804 cifs_dbg(VFS, "bad security blob length %d\n", in sess_auth_rawntlmssp_negotiate() 1898 cifs_dbg(VFS, "bad security blob length %d\n", in sess_auth_rawntlmssp_authenticate() [all …]
|
| A D | cifstransport.c | 42 cifs_dbg(VFS, "%s: null TCP session\n", __func__); in alloc_mid() 199 cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", in cifs_check_receive() 283 cifs_dbg(VFS, "Null smb session\n"); in SendReceive() 288 cifs_dbg(VFS, "Null tcp session\n"); in SendReceive() 304 cifs_server_dbg(VFS, "Invalid length, greater than maximum frame, %d\n", in SendReceive() 369 cifs_server_dbg(VFS, "Bad MID state?\n"); in SendReceive() 424 cifs_dbg(VFS, "Null smb session\n"); in SendReceiveBlockingLock() 431 cifs_dbg(VFS, "Null tcp session\n"); in SendReceiveBlockingLock() 447 cifs_tcon_dbg(VFS, "Invalid length, greater than maximum frame, %d\n", in SendReceiveBlockingLock() 553 cifs_tcon_dbg(VFS, "Bad MID state?\n"); in SendReceiveBlockingLock()
|
| A D | cifs_debug.h | 26 #define VFS 1 macro 67 } else if ((type) & VFS) { \ 89 } else if ((type) & VFS) { \ 116 } else if ((type) & VFS) { \
|
| A D | smbencrypt.c | 43 cifs_dbg(VFS, "%s: Could not init MD4\n", __func__); in mdfour() 48 cifs_dbg(VFS, "%s: Could not update MD4\n", __func__); in mdfour() 53 cifs_dbg(VFS, "%s: Could not finalize MD4\n", __func__); in mdfour()
|
| A D | misc.c | 322 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 343 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 381 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 383 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 387 cifs_dbg(VFS, "%s: can't read BCC due to invalid WordCount(%u)\n", in checkSMB() 398 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 415 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 571 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino() 936 cifs_dbg(VFS, "Referrals of V%d version are not supported, should be V3\n", in parse_dfs_referrals() 1034 cifs_dbg(VFS, "Could not allocate shash TFM '%s'\n", name); in cifs_alloc_hash() [all …]
|
| A D | reparse.c | 103 cifs_dbg(VFS, in create_native_symlink() 134 VFS, in create_native_symlink() 734 cifs_dbg(VFS, "srv returned malformed nfs buffer\n"); in parse_reparse_nfs() 743 cifs_dbg(VFS, "srv returned malformed nfs symlink buffer\n"); in parse_reparse_nfs() 751 cifs_dbg(VFS, "srv returned null byte in nfs symlink target location\n"); in parse_reparse_nfs() 779 cifs_dbg(VFS, "%s: unhandled inode type: 0x%llx\n", in parse_reparse_nfs() 804 cifs_dbg(VFS, "srv returned malformed symlink buffer\n"); in smb2_parse_native_symlink() 998 cifs_dbg(VFS, "srv returned malformed symlink buffer\n"); in parse_reparse_native_symlink() 1021 cifs_dbg(VFS, "srv returned malformed wsl symlink buffer\n"); in parse_reparse_wsl_symlink() 1038 cifs_dbg(VFS, "srv returned null byte in wsl symlink target location\n"); in parse_reparse_wsl_symlink() [all …]
|
| A D | smb2pdu.c | 177 cifs_dbg(VFS, in cifs_chan_skip_or_disable() 209 cifs_server_dbg(VFS, in cifs_chan_skip_or_disable() 1149 cifs_server_dbg(VFS, in SMB2_negotiate() 1153 cifs_server_dbg(VFS, in SMB2_negotiate() 1164 cifs_server_dbg(VFS, in SMB2_negotiate() 1863 cifs_dbg(VFS, "Session Key %*ph\n", in SMB2_sess_auth_rawntlmssp_authenticate() 1865 cifs_dbg(VFS, "Signing Key %*ph\n", in SMB2_sess_auth_rawntlmssp_authenticate() 3872 cifs_tcon_dbg(VFS, in query_info() 4773 cifs_dbg(VFS, "Send error in read = %d\n", rc); in SMB2_read() 5188 cifs_dbg(VFS, "Send error in write = %d\n", rc); in SMB2_write() [all …]
|
| A D | netlink.c | 70 cifs_dbg(VFS, "%s: failed to register netlink family\n", in cifs_genl_init() 87 cifs_dbg(VFS, "%s: failed to unregister netlink family\n", in cifs_genl_exit()
|
| A D | cifs_debug.c | 44 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d Wct: %d\n", in cifs_dump_detail() 48 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail() 62 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 65 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 72 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 78 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 1170 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 1179 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 1187 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); in cifs_security_flags_proc_write() 1192 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", in cifs_security_flags_proc_write()
|
| A D | transport.c | 68 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in __release_mid() 182 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 196 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 370 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 403 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst() 492 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 535 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 760 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 876 cifs_dbg(VFS, "Null session\n"); in compound_send_recv()
|
| A D | readdir.c | 475 cifs_dbg(VFS, "Invalid offset %u\n", next_offset); in nxt_dir_entry() 483 cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", in nxt_dir_entry() 490 cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", in nxt_dir_entry() 512 cifs_dbg(VFS, "Invalid POSIX info payload\n"); in cifs_fill_dirent_posix() 777 cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); in find_cifs_entry() 798 cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", in find_cifs_entry() 954 cifs_dbg(VFS, "bad search response length %zd past smb end\n", in cifs_filldir() 1169 cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", in cifs_readdir()
|
| A D | cifsacl.c | 597 cifs_dbg(VFS, "unknown access control type %d\n", type); in access_flags_to_mode() 733 cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); in dump_ace() 738 cifs_dbg(VFS, "ACL too small to parse ACE\n"); in dump_ace() 783 cifs_dbg(VFS, "ACL too small to parse DACL\n"); in parse_dacl() 1193 cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); in parse_sid() 1298 cifs_dbg(VFS, "Server returned illegal ACL size\n"); in build_sec_desc() 1542 cifs_dbg(VFS, "Unable to open file to set ACL\n"); in set_cifs_acl() 1588 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in cifs_acl_to_fattr() 1597 cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); in cifs_acl_to_fattr() 1644 cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); in id_mode_to_cifs_acl()
|
| A D | smb2ops.c | 169 cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); in smb2_add_credits() 444 cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, in smb2_dump_detail() 664 cifs_dbg(VFS, in parse_server_interfaces() 713 cifs_dbg(VFS, in parse_server_interfaces() 777 cifs_dbg(VFS, "%s: invalid Next pointer %zu > %zd\n", in parse_server_interfaces() 1865 cifs_tcon_dbg(VFS, "Invalid cchunk response size\n"); in smb2_copychunk_range() 1879 cifs_tcon_dbg(VFS, "Invalid copy chunk response\n"); in smb2_copychunk_range() 1884 cifs_tcon_dbg(VFS, "Invalid num chunks written\n"); in smb2_copychunk_range() 4795 cifs_dbg(VFS, "error decrypting rc=%d\n", rc); in smb2_decrypt_offload() 5014 cifs_server_dbg(VFS, "too many PDUs in compound\n"); in receive_encrypted_standard() [all …]
|
| A D | cifsfs.c | 283 cifs_dbg(VFS, "%s: get root inode failed\n", __func__); in cifs_read_super() 988 cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", in cifs_smb3_do_mount() 1292 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_remap_file_range() 1397 cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); in cifs_file_copychunk_range() 1712 cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); in cifs_init_request_bufs() 1858 cifs_dbg(VFS, in init_cifs() 1881 cifs_dbg(VFS, "dir_cache_timeout set to max of 65000 seconds\n"); in init_cifs()
|
| A D | fs_context.c | 656 cifs_dbg(VFS, "Device name not specified\n"); in smb3_parse_devname() 1163 cifs_dbg(VFS, "SMB3 compression support is experimental\n"); in smb3_fs_context_parse_param() 1171 cifs_dbg(VFS, "conflicting hard vs. soft mount options\n"); in smb3_fs_context_parse_param() 1181 cifs_dbg(VFS, "conflicting hard vs soft mount options\n"); in smb3_fs_context_parse_param() 1633 cifs_dbg(VFS, "rootfs support requires CONFIG_CIFS_ROOT config option\n"); in smb3_fs_context_parse_param() 2126 cifs_dbg(VFS, "mount options mfsymlinks and sfu both enabled\n"); in smb3_update_mnt_flags()
|
| A D | dfs.c | 330 cifs_dbg(VFS, "%s: failed to match target ip: %d\n", __func__, rc); in target_share_matches_server() 359 cifs_dbg(VFS, "%s: failed to parse target share: %d\n", __func__, rc); in tree_connect_dfs_target()
|
| /fs/smb/server/ |
| A D | vfs.c | 224 ksmbd_debug(VFS, "path create failed for %s, err %d\n", in ksmbd_vfs_mkdir() 259 ksmbd_debug(VFS, "%s, len %zd\n", name, strlen(name)); in ksmbd_vfs_getcasexattr() 528 ksmbd_debug(VFS, "smb write failed, err = %d\n", err); in ksmbd_vfs_write() 613 ksmbd_debug(VFS, "rmdir failed, err %d\n", err); in ksmbd_vfs_remove_file() 617 ksmbd_debug(VFS, "unlink failed, err %d\n", err); in ksmbd_vfs_remove_file() 669 ksmbd_debug(VFS, "vfs_link failed err %d\n", err); in ksmbd_vfs_link() 783 ksmbd_debug(VFS, "vfs_rename failed err %d\n", err); in ksmbd_vfs_rename() 871 ksmbd_debug(VFS, "listxattr failed\n"); in ksmbd_vfs_listxattr() 951 ksmbd_debug(VFS, "setxattr failed, err %d\n", err); in ksmbd_vfs_setxattr() 1100 ksmbd_debug(VFS, "failed to delete, err %d\n", err); in ksmbd_vfs_unlink() [all …]
|
| A D | ndr.c | 245 ksmbd_debug(VFS, "v%d version is not supported\n", da->version); in ndr_decode_dos_attr() 254 ksmbd_debug(VFS, "ndr version mismatched(version: %d, version2: %d)\n", in ndr_decode_dos_attr() 460 ksmbd_debug(VFS, "v%d version is not supported\n", acl->version); in ndr_decode_v4_ntacl() 468 ksmbd_debug(VFS, "ndr version mismatched(version: %d, version2: %d)\n", in ndr_decode_v4_ntacl()
|
| /fs/nfs/ |
| A D | dir.c | 1876 dfprintk(VFS, "NFS: dentry_delete(%pd2, %x)\n", in nfs_dentry_delete() 1953 dfprintk(VFS, "NFS: lookup(%pd2)\n", dentry); in nfs_lookup() 2077 dfprintk(VFS, "NFS: atomic_open(%s/%lu), %pd\n", in nfs_atomic_open() 2366 dfprintk(VFS, "NFS: create(%s/%lu), %pd\n", in nfs_do_create() 2404 dfprintk(VFS, "NFS: mknod(%s/%lu), %pd\n", in nfs_mknod() 2431 dfprintk(VFS, "NFS: mkdir(%s/%lu), %pd\n", in nfs_mkdir() 2469 dfprintk(VFS, "NFS: rmdir(%s/%lu), %pd\n", in nfs_rmdir() 2507 dfprintk(VFS, "NFS: safe_remove(%pd2)\n", dentry); in nfs_safe_remove() 2620 dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s) error %d\n", in nfs_symlink() 2651 dfprintk(VFS, "NFS: link(%pd2 -> %pd2)\n", in nfs_link() [all …]
|
| /fs/ecryptfs/ |
| A D | Kconfig | 9 Encrypted filesystem that operates on the VFS layer. See
|