/kernel/linux/linux-5.10/fs/cifs/ |
H A D | fs_context.c | 36 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version() 40 cifs_dbg(VFS, "vers=1.0 (cifs) not permitted when mounting with smb3\n"); in cifs_parse_smb_version() 43 cifs_dbg(VFS, "Use of the less secure dialect vers=1.0 is not recommended unless required for access to very old servers\n"); in cifs_parse_smb_version() 49 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version() 53 cifs_dbg(VFS, "vers=2.0 not permitted when mounting with smb3\n"); in cifs_parse_smb_version() 61 cifs_dbg(VFS, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version() 64 cifs_dbg(VFS, "vers=2.0 mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version() 92 cifs_dbg(VFS, "Unknown vers= option specified: %s\n", value); in cifs_parse_smb_version() 129 cifs_dbg(VFS, "sec=krb5p is not supported!\n"); in cifs_parse_security_flavors() 164 cifs_dbg(VFS, "ba in cifs_parse_security_flavors() [all...] |
H A D | smb2transport.c | 111 cifs_server_dbg(VFS, "%s: Could not find session 0x%llx\n", in smb2_get_sign_key() 139 cifs_dbg(VFS, in smb2_get_sign_key() 230 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature() 240 cifs_server_dbg(VFS, in smb2_calc_signature() 253 cifs_server_dbg(VFS, in smb2_calc_signature() 261 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 277 cifs_server_dbg(VFS, in smb2_calc_signature() 313 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key() 320 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key() 326 cifs_server_dbg(VFS, " in generate_key() [all...] |
H A D | smb2misc.c | 52 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 56 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 59 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 62 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 171 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 187 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 192 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 201 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message() 208 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message() 216 cifs_dbg(VFS, "Invali in smb2_check_message() [all...] |
H A D | cifsencrypt.c | 65 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 72 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 89 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 100 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 127 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 134 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 507 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 517 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 523 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 546 cifs_dbg(VFS, " in calc_ntlmv2_hash() [all...] |
H A D | misc.c | 300 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 313 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 351 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 353 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 357 cifs_dbg(VFS, "%s: can't read BCC due to invalid WordCount(%u)\n", in checkSMB() 368 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 385 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 398 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 540 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino() 542 cifs_dbg(VFS, "Th in cifs_autodisable_serverino() [all...] |
H A D | connect.c | 421 cifs_server_dbg(VFS, "%s: no target servers for DFS failover\n", in cifs_reconnect() 558 cifs_server_dbg(VFS, "%s: failed to update DFS target hint: rc = %d\n", in cifs_reconnect() 563 cifs_server_dbg(VFS, "%s: failed to update vol info in DFS cache: rc = %d\n", in cifs_reconnect() 623 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 636 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 668 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive() 817 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 985 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 1125 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 1201 cifs_server_dbg(VFS, "N in cifs_demultiplex_thread() [all...] |
H A D | cifs_debug.h | 26 #define VFS 1 macro 47 * Use cifs_dbg(VFS, ...) for things we always want logged, and the user to see 67 } else if ((type) & VFS) { \ 68 pr_err_ ## ratefunc("VFS: " fmt, ##__VA_ARGS__); \ 90 } else if ((type) & VFS) { \ 91 pr_err_ ## ratefunc("VFS: \\\\%s " fmt, \ 116 } else if ((type) & VFS) { \ 117 pr_err_ ## ratefunc("VFS: %s " fmt, tn, ##__VA_ARGS__); \
|
H A D | smbencrypt.c | 67 cifs_dbg(VFS, "FIPS compliance enabled: DES not permitted\n"); in smbhash() 121 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour() 126 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour() 131 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
|
H A D | transport.c | 59 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry() 115 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in _cifs_mid_q_entry_release() 241 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 255 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 452 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 477 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst() 568 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 610 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 905 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 946 cifs_server_dbg(VFS, "SM in cifs_check_receive() [all...] |
H A D | sess.c | 91 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels() 96 cifs_dbg(VFS, "server %s does not support multichannel\n", ses->server->hostname); in cifs_try_adding_channels() 110 cifs_dbg(VFS, "no iface list available to open channels\n"); in cifs_try_adding_channels() 275 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel() 575 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge() 580 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge() 585 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge() 599 cifs_dbg(VFS, "tioffset + tilen too high %u + %u\n", in decode_ntlmssp_challenge() 607 cifs_dbg(VFS, "Challenge target info alloc failure\n"); in decode_ntlmssp_challenge() 683 cifs_dbg(VFS, "Erro in build_ntlmssp_auth_blob() [all...] |
H A D | smb2pdu.c | 525 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts() 626 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx() 667 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context() 699 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context() 881 cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 on mount for accessing older servers\n"); in SMB2_negotiate() 889 cifs_server_dbg(VFS, in SMB2_negotiate() 893 cifs_server_dbg(VFS, in SMB2_negotiate() 900 cifs_server_dbg(VFS, in SMB2_negotiate() 914 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate() 932 cifs_server_dbg(VFS, "Invali in SMB2_negotiate() [all...] |
H A D | cifs_debug.c | 40 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail() 43 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail() 57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids() 61 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids() 68 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids() 74 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids() 267 seq_printf(m, "Active VFS Requests: %d\n", GlobalTotalActiveXid); in cifs_debug_data_proc_show() 945 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 954 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write() 962 cifs_dbg(VFS, "Invali in cifs_security_flags_proc_write() [all...] |
/kernel/linux/linux-6.6/fs/smb/client/ |
H A D | smb2transport.c | 135 cifs_dbg(VFS, in smb2_get_sign_key() 243 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature() 253 cifs_server_dbg(VFS, in smb2_calc_signature() 264 cifs_server_dbg(VFS, in smb2_calc_signature() 272 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature() 288 cifs_server_dbg(VFS, in smb2_calc_signature() 326 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key() 333 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key() 339 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key() 345 cifs_server_dbg(VFS, " in generate_key() [all...] |
H A D | smb2misc.c | 39 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr() 43 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr() 46 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr() 49 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr() 170 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message() 180 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message() 187 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message() 201 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message() 206 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message() 215 cifs_dbg(VFS, "Invali in smb2_check_message() [all...] |
H A D | cifsencrypt.c | 195 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature() 202 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature() 214 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature() 240 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature() 247 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature() 543 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash() 553 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash() 559 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash() 582 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash() 602 cifs_dbg(VFS, " in calc_ntlmv2_hash() [all...] |
H A D | smbencrypt.c | 50 cifs_dbg(VFS, "%s: Could not init MD4\n", __func__); in mdfour() 55 cifs_dbg(VFS, "%s: Could not update MD4\n", __func__); in mdfour() 60 cifs_dbg(VFS, "%s: Could not finalize MD4\n", __func__); in mdfour()
|
H A D | sess.c | 89 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx", in cifs_ses_get_chan_index() 204 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels() 210 cifs_server_dbg(VFS, "no multichannel support\n"); in cifs_try_adding_channels() 219 cifs_dbg(VFS, "too many channel open attempts (%d channels left to open)\n", in cifs_try_adding_channels() 227 cifs_dbg(VFS, "server %s does not advertise interfaces\n", in cifs_try_adding_channels() 265 cifs_dbg(VFS, "failed to open extra channel on iface:%pIS rc=%d\n", in cifs_try_adding_channels() 276 cifs_dbg(VFS, "successfully opened new channel on iface:%pIS\n", in cifs_try_adding_channels() 395 cifs_dbg(VFS, "server %s does not advertise interfaces\n", ses->server->hostname); in cifs_chan_update_iface() 642 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel() 938 cifs_dbg(VFS, "challeng in decode_ntlmssp_challenge() [all...] |
H A D | cifs_debug.h | 26 #define VFS 1 macro 47 * Use cifs_dbg(VFS, ...) for things we always want logged, and the user to see 67 } else if ((type) & VFS) { \ 68 pr_err_ ## ratefunc("VFS: " fmt, ##__VA_ARGS__); \ 89 } else if ((type) & VFS) { \ 90 pr_err_ ## ratefunc("VFS: \\\\%s " fmt, \ 116 } else if ((type) & VFS) { \ 117 pr_err_ ## ratefunc("VFS: %s " fmt, tn, ##__VA_ARGS__); \
|
H A D | cifs_swn.c | 146 cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 154 cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); in cifs_swn_send_register_message() 159 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); in cifs_swn_send_register_message() 264 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", in cifs_find_swn_reg() 274 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", in cifs_find_swn_reg() 341 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 348 cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret); in cifs_get_swn_reg() 379 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); in cifs_swn_reg_release() 475 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); in cifs_swn_reconnect() 485 cifs_dbg(VFS, " in cifs_swn_reconnect() [all...] |
H A D | connect.c | 615 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers() 628 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers() 662 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive() 832 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response() 924 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!\n"); in cifs_enable_signing() 933 cifs_dbg(VFS, "Server does not support signing!\n"); in cifs_enable_signing() 940 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled\n"); in cifs_enable_signing() 1048 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3() 1198 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread() 1214 cifs_dbg(VFS, " in cifs_demultiplex_thread() [all...] |
H A D | netlink.c | 70 cifs_dbg(VFS, "%s: failed to register netlink family\n", in cifs_genl_init() 87 cifs_dbg(VFS, "%s: failed to unregister netlink family\n", in cifs_genl_exit()
|
H A D | smb2pdu.c | 169 cifs_dbg(VFS, in cifs_chan_skip_or_disable() 201 cifs_server_dbg(VFS, in cifs_chan_skip_or_disable() 398 cifs_dbg(VFS, "reconnect tcon failed rc = %d\n", rc); in smb2_reconnect() 441 cifs_server_dbg(VFS, "supports multichannel now\n"); in smb2_reconnect() 689 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts() 826 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx() 897 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context() 937 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context() 1115 cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 on mount for accessing older servers\n"); in SMB2_negotiate() 1124 cifs_server_dbg(VFS, in SMB2_negotiate() [all...] |
H A D | misc.c | 310 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr() 323 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr() 361 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB() 363 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB() 367 cifs_dbg(VFS, "%s: can't read BCC due to invalid WordCount(%u)\n", in checkSMB() 378 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB() 395 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB() 408 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB() 549 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino() 551 cifs_dbg(VFS, "Th in cifs_autodisable_serverino() [all...] |
H A D | transport.c | 49 cifs_dbg(VFS, "%s: null TCP session\n", __func__); in alloc_mid() 106 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in __release_mid() 220 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec() 234 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec() 409 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst() 442 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst() 558 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 601 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits() 912 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result() 953 cifs_server_dbg(VFS, "SM in cifs_check_receive() [all...] |
/kernel/linux/linux-5.10/tools/perf/util/c++/ |
H A D | clang.cpp | 69 StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) in getModuleFromSource() 75 Clang.setVirtualFileSystem(&*VFS); in getModuleFromSource() 77 Clang.createFileManager(&*VFS); in getModuleFromSource() 123 IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); in getModuleFromSource() 124 return getModuleFromSource(std::move(CFlags), Path, VFS); in getModuleFromSource() 68 getModuleFromSource(llvm::opt::ArgStringList CFlags, StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) getModuleFromSource() argument
|