Home
last modified time | relevance | path

Searched refs:VFS (Results 1 - 25 of 76) sorted by relevance

1234

/kernel/linux/linux-5.10/fs/cifs/
H A Dfs_context.c36 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version()
40 cifs_dbg(VFS, "vers=1.0 (cifs) not permitted when mounting with smb3\n"); in cifs_parse_smb_version()
43 cifs_dbg(VFS, "Use of the less secure dialect vers=1.0 is not recommended unless required for access to very old servers\n"); in cifs_parse_smb_version()
49 cifs_dbg(VFS, "mount with legacy dialect disabled\n"); in cifs_parse_smb_version()
53 cifs_dbg(VFS, "vers=2.0 not permitted when mounting with smb3\n"); in cifs_parse_smb_version()
61 cifs_dbg(VFS, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version()
64 cifs_dbg(VFS, "vers=2.0 mount not permitted when legacy dialects disabled\n"); in cifs_parse_smb_version()
92 cifs_dbg(VFS, "Unknown vers= option specified: %s\n", value); in cifs_parse_smb_version()
129 cifs_dbg(VFS, "sec=krb5p is not supported!\n"); in cifs_parse_security_flavors()
164 cifs_dbg(VFS, "ba in cifs_parse_security_flavors()
[all...]
H A Dsmb2transport.c111 cifs_server_dbg(VFS, "%s: Could not find session 0x%llx\n", in smb2_get_sign_key()
139 cifs_dbg(VFS, in smb2_get_sign_key()
230 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature()
240 cifs_server_dbg(VFS, in smb2_calc_signature()
253 cifs_server_dbg(VFS, in smb2_calc_signature()
261 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature()
277 cifs_server_dbg(VFS, in smb2_calc_signature()
313 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key()
320 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key()
326 cifs_server_dbg(VFS, " in generate_key()
[all...]
H A Dsmb2misc.c52 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
56 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
59 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
62 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
171 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
187 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
192 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
201 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message()
208 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message()
216 cifs_dbg(VFS, "Invali in smb2_check_message()
[all...]
H A Dcifsencrypt.c65 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature()
72 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
89 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
100 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature()
127 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature()
134 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature()
507 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash()
517 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash()
523 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash()
546 cifs_dbg(VFS, " in calc_ntlmv2_hash()
[all...]
H A Dmisc.c300 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr()
313 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr()
351 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB()
353 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
357 cifs_dbg(VFS, "%s: can't read BCC due to invalid WordCount(%u)\n", in checkSMB()
368 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB()
385 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
398 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
540 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino()
542 cifs_dbg(VFS, "Th in cifs_autodisable_serverino()
[all...]
H A Dconnect.c421 cifs_server_dbg(VFS, "%s: no target servers for DFS failover\n", in cifs_reconnect()
558 cifs_server_dbg(VFS, "%s: failed to update DFS target hint: rc = %d\n", in cifs_reconnect()
563 cifs_server_dbg(VFS, "%s: failed to update vol info in DFS cache: rc = %d\n", in cifs_reconnect()
623 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers()
636 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers()
668 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive()
817 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response()
985 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3()
1125 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread()
1201 cifs_server_dbg(VFS, "N in cifs_demultiplex_thread()
[all...]
H A Dcifs_debug.h26 #define VFS 1 macro
47 * Use cifs_dbg(VFS, ...) for things we always want logged, and the user to see
67 } else if ((type) & VFS) { \
68 pr_err_ ## ratefunc("VFS: " fmt, ##__VA_ARGS__); \
90 } else if ((type) & VFS) { \
91 pr_err_ ## ratefunc("VFS: \\\\%s " fmt, \
116 } else if ((type) & VFS) { \
117 pr_err_ ## ratefunc("VFS: %s " fmt, tn, ##__VA_ARGS__); \
H A Dsmbencrypt.c67 cifs_dbg(VFS, "FIPS compliance enabled: DES not permitted\n"); in smbhash()
121 cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); in mdfour()
126 cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); in mdfour()
131 cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); in mdfour()
H A Dtransport.c59 cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); in AllocMidQEntry()
115 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in _cifs_mid_q_entry_release()
241 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec()
255 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec()
452 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst()
477 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst()
568 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
610 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
905 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result()
946 cifs_server_dbg(VFS, "SM in cifs_check_receive()
[all...]
H A Dsess.c91 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels()
96 cifs_dbg(VFS, "server %s does not support multichannel\n", ses->server->hostname); in cifs_try_adding_channels()
110 cifs_dbg(VFS, "no iface list available to open channels\n"); in cifs_try_adding_channels()
275 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel()
575 cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); in decode_ntlmssp_challenge()
580 cifs_dbg(VFS, "blob signature incorrect %s\n", in decode_ntlmssp_challenge()
585 cifs_dbg(VFS, "Incorrect message type %d\n", in decode_ntlmssp_challenge()
599 cifs_dbg(VFS, "tioffset + tilen too high %u + %u\n", in decode_ntlmssp_challenge()
607 cifs_dbg(VFS, "Challenge target info alloc failure\n"); in decode_ntlmssp_challenge()
683 cifs_dbg(VFS, "Erro in build_ntlmssp_auth_blob()
[all...]
H A Dsmb2pdu.c525 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts()
626 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx()
667 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context()
699 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context()
881 cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 on mount for accessing older servers\n"); in SMB2_negotiate()
889 cifs_server_dbg(VFS, in SMB2_negotiate()
893 cifs_server_dbg(VFS, in SMB2_negotiate()
900 cifs_server_dbg(VFS, in SMB2_negotiate()
914 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate()
932 cifs_server_dbg(VFS, "Invali in SMB2_negotiate()
[all...]
H A Dcifs_debug.c40 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", in cifs_dump_detail()
43 cifs_dbg(VFS, "smb buf %p len %u\n", smb, in cifs_dump_detail()
57 cifs_dbg(VFS, "Dump pending requests:\n"); in cifs_dump_mids()
61 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", in cifs_dump_mids()
68 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", in cifs_dump_mids()
74 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", in cifs_dump_mids()
267 seq_printf(m, "Active VFS Requests: %d\n", GlobalTotalActiveXid); in cifs_debug_data_proc_show()
945 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
954 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", in cifs_security_flags_proc_write()
962 cifs_dbg(VFS, "Invali in cifs_security_flags_proc_write()
[all...]
/kernel/linux/linux-6.6/fs/smb/client/
H A Dsmb2transport.c135 cifs_dbg(VFS, in smb2_get_sign_key()
243 cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); in smb2_calc_signature()
253 cifs_server_dbg(VFS, in smb2_calc_signature()
264 cifs_server_dbg(VFS, in smb2_calc_signature()
272 cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); in smb2_calc_signature()
288 cifs_server_dbg(VFS, in smb2_calc_signature()
326 cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); in generate_key()
333 cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); in generate_key()
339 cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); in generate_key()
345 cifs_server_dbg(VFS, " in generate_key()
[all...]
H A Dsmb2misc.c39 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
43 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
46 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
49 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
170 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
180 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message()
187 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message()
201 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
206 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
215 cifs_dbg(VFS, "Invali in smb2_check_message()
[all...]
H A Dcifsencrypt.c195 cifs_dbg(VFS, "null iovec entry\n"); in __cifs_calc_signature()
202 cifs_dbg(VFS, "%s: Could not update with payload\n", in __cifs_calc_signature()
214 cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); in __cifs_calc_signature()
240 cifs_dbg(VFS, "%s: Could not init md5\n", __func__); in cifs_calc_signature()
247 cifs_dbg(VFS, "%s: Could not update with response\n", __func__); in cifs_calc_signature()
543 cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); in calc_ntlmv2_hash()
553 cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); in calc_ntlmv2_hash()
559 cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); in calc_ntlmv2_hash()
582 cifs_dbg(VFS, "%s: Could not update with user\n", __func__); in calc_ntlmv2_hash()
602 cifs_dbg(VFS, " in calc_ntlmv2_hash()
[all...]
H A Dsmbencrypt.c50 cifs_dbg(VFS, "%s: Could not init MD4\n", __func__); in mdfour()
55 cifs_dbg(VFS, "%s: Could not update MD4\n", __func__); in mdfour()
60 cifs_dbg(VFS, "%s: Could not finalize MD4\n", __func__); in mdfour()
H A Dsess.c89 cifs_dbg(VFS, "unable to get chan index for server: 0x%llx", in cifs_ses_get_chan_index()
204 cifs_dbg(VFS, "multichannel is not supported on this protocol version, use 3.0 or above\n"); in cifs_try_adding_channels()
210 cifs_server_dbg(VFS, "no multichannel support\n"); in cifs_try_adding_channels()
219 cifs_dbg(VFS, "too many channel open attempts (%d channels left to open)\n", in cifs_try_adding_channels()
227 cifs_dbg(VFS, "server %s does not advertise interfaces\n", in cifs_try_adding_channels()
265 cifs_dbg(VFS, "failed to open extra channel on iface:%pIS rc=%d\n", in cifs_try_adding_channels()
276 cifs_dbg(VFS, "successfully opened new channel on iface:%pIS\n", in cifs_try_adding_channels()
395 cifs_dbg(VFS, "server %s does not advertise interfaces\n", ses->server->hostname); in cifs_chan_update_iface()
642 cifs_dbg(VFS, "%s: crypto alloc failed\n", __func__); in cifs_ses_add_channel()
938 cifs_dbg(VFS, "challeng in decode_ntlmssp_challenge()
[all...]
H A Dcifs_debug.h26 #define VFS 1 macro
47 * Use cifs_dbg(VFS, ...) for things we always want logged, and the user to see
67 } else if ((type) & VFS) { \
68 pr_err_ ## ratefunc("VFS: " fmt, ##__VA_ARGS__); \
89 } else if ((type) & VFS) { \
90 pr_err_ ## ratefunc("VFS: \\\\%s " fmt, \
116 } else if ((type) & VFS) { \
117 pr_err_ ## ratefunc("VFS: %s " fmt, tn, ##__VA_ARGS__); \
H A Dcifs_swn.c146 cifs_dbg(VFS, "%s: Failed to get kerberos auth info: %d\n", __func__, ret); in cifs_swn_send_register_message()
154 cifs_dbg(VFS, "%s: Failed to get NTLM auth info: %d\n", __func__, ret); in cifs_swn_send_register_message()
159 cifs_dbg(VFS, "%s: secType %d not supported!\n", __func__, authtype); in cifs_swn_send_register_message()
264 cifs_dbg(VFS, "%s: failed to extract host name from target '%s': %d\n", in cifs_find_swn_reg()
274 cifs_dbg(VFS, "%s: failed to extract share name from target '%s': %d\n", in cifs_find_swn_reg()
341 cifs_dbg(VFS, "%s: failed to extract host name from target: %d\n", __func__, ret); in cifs_get_swn_reg()
348 cifs_dbg(VFS, "%s: failed to extract share name from target: %d\n", __func__, ret); in cifs_get_swn_reg()
379 cifs_dbg(VFS, "%s: Failed to send unregister message: %d\n", __func__, ret); in cifs_swn_reg_release()
475 cifs_dbg(VFS, "%s: failed to store address: %d\n", __func__, ret); in cifs_swn_reconnect()
485 cifs_dbg(VFS, " in cifs_swn_reconnect()
[all...]
H A Dconnect.c615 cifs_server_dbg(VFS, "No memory for large SMB response\n"); in allocate_buffers()
628 cifs_server_dbg(VFS, "No memory for SMB response\n"); in allocate_buffers()
662 cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", in server_unresponsive()
832 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); in is_smb_response()
924 cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!\n"); in cifs_enable_signing()
933 cifs_dbg(VFS, "Server does not support signing!\n"); in cifs_enable_signing()
940 cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled\n"); in cifs_enable_signing()
1048 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); in standard_receive3()
1198 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", in cifs_demultiplex_thread()
1214 cifs_dbg(VFS, " in cifs_demultiplex_thread()
[all...]
H A Dnetlink.c70 cifs_dbg(VFS, "%s: failed to register netlink family\n", in cifs_genl_init()
87 cifs_dbg(VFS, "%s: failed to unregister netlink family\n", in cifs_genl_exit()
H A Dsmb2pdu.c169 cifs_dbg(VFS, in cifs_chan_skip_or_disable()
201 cifs_server_dbg(VFS, in cifs_chan_skip_or_disable()
398 cifs_dbg(VFS, "reconnect tcon failed rc = %d\n", rc); in smb2_reconnect()
441 cifs_server_dbg(VFS, "supports multichannel now\n"); in smb2_reconnect()
689 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts()
826 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx()
897 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context()
937 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context()
1115 cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 on mount for accessing older servers\n"); in SMB2_negotiate()
1124 cifs_server_dbg(VFS, in SMB2_negotiate()
[all...]
H A Dmisc.c310 cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", in check_smb_hdr()
323 cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", in check_smb_hdr()
361 cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); in checkSMB()
363 cifs_dbg(VFS, "Length less than smb header size\n"); in checkSMB()
367 cifs_dbg(VFS, "%s: can't read BCC due to invalid WordCount(%u)\n", in checkSMB()
378 cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", in checkSMB()
395 cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", in checkSMB()
408 cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", in checkSMB()
549 cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s\n", in cifs_autodisable_serverino()
551 cifs_dbg(VFS, "Th in cifs_autodisable_serverino()
[all...]
H A Dtransport.c49 cifs_dbg(VFS, "%s: null TCP session\n", __func__); in alloc_mid()
106 cifs_server_dbg(VFS, "Invalid mid allocation time\n"); in __release_mid()
220 cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", in smb_send_kvec()
234 cifs_server_dbg(VFS, "tcp sent no data\n"); in smb_send_kvec()
409 cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", in __smb_send_rqst()
442 cifs_server_dbg(VFS, "Encryption requested but transform callback is missing\n"); in smb_send_rqst()
558 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
601 cifs_server_dbg(VFS, "wait timed out after %d ms\n", in wait_for_free_credits()
912 cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", in cifs_sync_mid_result()
953 cifs_server_dbg(VFS, "SM in cifs_check_receive()
[all...]
/kernel/linux/linux-5.10/tools/perf/util/c++/
H A Dclang.cpp69 StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) in getModuleFromSource()
75 Clang.setVirtualFileSystem(&*VFS); in getModuleFromSource()
77 Clang.createFileManager(&*VFS); in getModuleFromSource()
123 IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); in getModuleFromSource()
124 return getModuleFromSource(std::move(CFlags), Path, VFS); in getModuleFromSource()
68 getModuleFromSource(llvm::opt::ArgStringList CFlags, StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) getModuleFromSource() argument

Completed in 35 milliseconds

1234