VFS 40 fs/cifs/cifs_debug.c cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", VFS 43 fs/cifs/cifs_debug.c cifs_dbg(VFS, "smb buf %p len %u\n", smb, VFS 57 fs/cifs/cifs_debug.c cifs_dbg(VFS, "Dump pending requests:\n"); VFS 61 fs/cifs/cifs_debug.c cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", VFS 68 fs/cifs/cifs_debug.c cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", VFS 74 fs/cifs/cifs_debug.c cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", VFS 907 fs/cifs/cifs_debug.c cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", VFS 916 fs/cifs/cifs_debug.c cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", VFS 924 fs/cifs/cifs_debug.c cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); VFS 929 fs/cifs/cifs_debug.c cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", VFS 65 fs/cifs/cifs_debug.h } else if ((type) & VFS) { \ VFS 91 fs/cifs/cifs_debug.h } else if ((type) & VFS) { \ VFS 118 fs/cifs/cifs_debug.h } else if ((type) & VFS) { \ VFS 151 fs/cifs/cifs_spnego.c cifs_dbg(VFS, "unknown or missing server auth type, use krb5\n"); VFS 281 fs/cifs/cifs_unicode.c cifs_dbg(VFS, "strtoUTF16: char2uni of 0x%x returned %d\n", VFS 586 fs/cifs/cifsacl.c cifs_dbg(VFS, "unknown access control type %d\n", type); VFS 676 fs/cifs/cifsacl.c cifs_dbg(VFS, "ACE too small %d\n", le16_to_cpu(pace->size)); VFS 681 fs/cifs/cifsacl.c cifs_dbg(VFS, "ACL too small to parse ACE\n"); VFS 725 fs/cifs/cifsacl.c cifs_dbg(VFS, "ACL too small to parse DACL\n"); VFS 864 fs/cifs/cifsacl.c cifs_dbg(VFS, "ACL too small to parse SID %p\n", psid); VFS 1154 fs/cifs/cifsacl.c cifs_dbg(VFS, "Unable to open file to set ACL\n"); VFS 1198 fs/cifs/cifsacl.c cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); VFS 1206 fs/cifs/cifsacl.c cifs_dbg(VFS, "parse sec desc failed rc = %d\n", rc); VFS 1246 fs/cifs/cifsacl.c cifs_dbg(VFS, "%s: error %d getting sec desc\n", __func__, rc); VFS 65 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "null iovec entry\n"); VFS 72 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not update with payload\n", VFS 89 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not update with payload\n", VFS 100 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not generate hash\n", __func__); VFS 127 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not init md5\n", __func__); VFS 134 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not update with response\n", __func__); VFS 507 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); VFS 517 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not set NT Hash as a key\n", __func__); VFS 523 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: could not init hmacmd5\n", __func__); VFS 546 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not update with user\n", __func__); VFS 566 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not update with domain\n", VFS 586 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not update with server\n", VFS 595 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); VFS 613 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: can't generate ntlmv2 hash\n", __func__); VFS 620 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not set NTLMV2 Hash as a key\n", VFS 627 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: could not init hmacmd5\n", __func__); VFS 640 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not update with response\n", __func__); VFS 648 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); VFS 669 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "error %d finding domain name\n", VFS 680 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "error %d building av pair blob\n", rc); VFS 726 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "could not get v2 hash rc %d\n", rc); VFS 733 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "Could not calculate CR1 rc: %d\n", rc); VFS 741 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not set NTLMV2 Hash as a key\n", VFS 748 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not init hmacmd5\n", __func__); VFS 756 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not update with response\n", __func__); VFS 763 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); VFS 786 fs/cifs/cifsencrypt.c cifs_dbg(VFS, "could not allocate arc4 context\n"); VFS 241 fs/cifs/cifsfs.c cifs_dbg(VFS, "%s: get root inode failed\n", __func__); VFS 816 fs/cifs/cifsfs.c cifs_dbg(VFS, "cifs_mount failed w/return code = %d\n", VFS 1088 fs/cifs/cifsfs.c cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); VFS 1144 fs/cifs/cifsfs.c cifs_dbg(VFS, "missing cifsFileInfo on copy range src file\n"); VFS 1155 fs/cifs/cifsfs.c cifs_dbg(VFS, "source and target of copy not on same server\n"); VFS 1413 fs/cifs/cifsfs.c cifs_dbg(VFS, "cifs_min_rcv set to maximum (64)\n"); VFS 1522 fs/cifs/cifsfs.c cifs_dbg(VFS, VFS 546 fs/cifs/cifssmb.c cifs_dbg(VFS, "Server requires signing, but it's disabled in SecurityFlags!"); VFS 555 fs/cifs/cifssmb.c cifs_dbg(VFS, "Server does not support signing!"); VFS 562 fs/cifs/cifssmb.c cifs_dbg(VFS, "Signing is enabled, and RDMA read/write will be disabled"); VFS 643 fs/cifs/cifssmb.c cifs_dbg(VFS, "mount failed, cifs module not built with CIFS_WEAK_PW_HASH support\n"); VFS 1222 fs/cifs/cifssmb.c cifs_dbg(VFS, "Open response data too small\n"); VFS 1720 fs/cifs/cifssmb.c cifs_dbg(VFS, "SMB signature verification returned error = %d\n", VFS 1880 fs/cifs/cifssmb.c cifs_dbg(VFS, "Send error in read = %d\n", rc); VFS 2119 fs/cifs/cifssmb.c cifs_dbg(VFS, "No writable handle to retry writepages rc=%d\n", VFS 2729 fs/cifs/cifssmb.c cifs_dbg(VFS, "Send error in Close = %d\n", rc); VFS 2757 fs/cifs/cifssmb.c cifs_dbg(VFS, "Send error in Flush = %d\n", rc); VFS 4028 fs/cifs/cifssmb.c cifs_dbg(VFS, "acl length %d does not match %d\n", VFS 4038 fs/cifs/cifssmb.c cifs_dbg(VFS, "bad acl length %d\n", *pbuflen); VFS 4402 fs/cifs/cifssmb.c cifs_dbg(VFS, "Malformed FILE_UNIX_BASIC_INFO response. Unix Extensions can be disabled on mount by specifying the nosfu mount option.\n"); VFS 4484 fs/cifs/cifssmb.c cifs_dbg(VFS, "Malformed FILE_UNIX_BASIC_INFO response. Unix Extensions can be disabled on mount by specifying the nosfu mount option.\n"); VFS 4638 fs/cifs/cifssmb.c cifs_dbg(VFS, "ignoring corrupt resume name\n"); VFS 4765 fs/cifs/cifssmb.c cifs_dbg(VFS, "ignoring corrupt resume name\n"); VFS 4813 fs/cifs/cifssmb.c cifs_dbg(VFS, "Send error in FindClose = %d\n", rc); VFS 5245 fs/cifs/cifssmb.c cifs_dbg(VFS, "Send error in QFSAttributeInfo = %d\n", rc); VFS 5386 fs/cifs/cifssmb.c cifs_dbg(VFS, "Send error in QFSUnixInfo = %d\n", rc); VFS 5469 fs/cifs/cifssmb.c cifs_dbg(VFS, "Send error in SETFSUnixInfo = %d\n", rc); VFS 520 fs/cifs/connect.c cifs_server_dbg(VFS, "%s: no target servers for DFS failover\n", VFS 655 fs/cifs/connect.c cifs_server_dbg(VFS, "%s: failed to update DFS target hint: rc = %d\n", VFS 660 fs/cifs/connect.c cifs_server_dbg(VFS, "%s: failed to update vol info in DFS cache: rc = %d\n", VFS 719 fs/cifs/connect.c cifs_server_dbg(VFS, "No memory for large SMB response\n"); VFS 732 fs/cifs/connect.c cifs_server_dbg(VFS, "No memory for SMB response\n"); VFS 763 fs/cifs/connect.c cifs_server_dbg(VFS, "has not responded in %lu seconds. Reconnecting...\n", VFS 902 fs/cifs/connect.c cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type); VFS 1069 fs/cifs/connect.c cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length); VFS 1210 fs/cifs/connect.c cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n", VFS 1277 fs/cifs/connect.c cifs_server_dbg(VFS, "No task to wake, unknown frame " VFS 1422 fs/cifs/connect.c cifs_dbg(VFS, "sec=krb5p is not supported!\n"); VFS 1457 fs/cifs/connect.c cifs_dbg(VFS, "bad security option: %s\n", value); VFS 1501 fs/cifs/connect.c cifs_dbg(VFS, "bad cache= option: %s\n", value); VFS 1516 fs/cifs/connect.c cifs_dbg(VFS, "mount with legacy dialect disabled\n"); VFS 1520 fs/cifs/connect.c cifs_dbg(VFS, "vers=1.0 (cifs) not permitted when mounting with smb3\n"); VFS 1528 fs/cifs/connect.c cifs_dbg(VFS, "mount with legacy dialect disabled\n"); VFS 1532 fs/cifs/connect.c cifs_dbg(VFS, "vers=2.0 not permitted when mounting with smb3\n"); VFS 1540 fs/cifs/connect.c cifs_dbg(VFS, "vers=1.0 (cifs) mount not permitted when legacy dialects disabled\n"); VFS 1543 fs/cifs/connect.c cifs_dbg(VFS, "vers=2.0 mount not permitted when legacy dialects disabled\n"); VFS 1571 fs/cifs/connect.c cifs_dbg(VFS, "Unknown vers= option specified: %s\n", value); VFS 1589 fs/cifs/connect.c cifs_dbg(VFS, "Device name not specified.\n"); VFS 1735 fs/cifs/connect.c cifs_dbg(VFS, "Unable to allocate memory for devname.\n"); VFS 1738 fs/cifs/connect.c cifs_dbg(VFS, "Malformed UNC in devname.\n"); VFS 1741 fs/cifs/connect.c cifs_dbg(VFS, "Unknown error parsing devname.\n"); VFS 1837 fs/cifs/connect.c cifs_dbg(VFS, VFS 1843 fs/cifs/connect.c cifs_dbg(VFS, VFS 1953 fs/cifs/connect.c cifs_dbg(VFS, "FS-Cache support needs CONFIG_CIFS_FSCACHE kernel config option set\n"); VFS 1973 fs/cifs/connect.c cifs_dbg(VFS, VFS 1981 fs/cifs/connect.c cifs_dbg(VFS, VFS 1989 fs/cifs/connect.c cifs_dbg(VFS, VFS 2005 fs/cifs/connect.c cifs_dbg(VFS, VFS 2012 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid backupuid value\n", VFS 2020 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid backupgid value\n", VFS 2028 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid uid value\n", VFS 2036 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid cruid value\n", VFS 2043 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid gid value\n", VFS 2051 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid file_mode value\n", VFS 2059 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid dir_mode value\n", VFS 2068 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid port value\n", VFS 2076 fs/cifs/connect.c cifs_dbg(VFS, "Invalid minimum encrypted read offload size (esize)\n"); VFS 2083 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid blocksize value\n", VFS 2095 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid blocksize\n", VFS 2103 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid rsize value\n", VFS 2111 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid wsize value\n", VFS 2119 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid actimeo value\n", VFS 2125 fs/cifs/connect.c cifs_dbg(VFS, "attribute cache timeout too large\n"); VFS 2131 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid handletimeout value\n", VFS 2137 fs/cifs/connect.c cifs_dbg(VFS, "Invalid handle cache timeout, longer than 16 minutes\n"); VFS 2143 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid echo interval value\n", VFS 2151 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid snapshot time\n", VFS 2160 fs/cifs/connect.c cifs_dbg(VFS, "%s: Invalid max_credits value\n", VFS 2449 fs/cifs/connect.c cifs_dbg(VFS, "SMB Direct requires Version >=3.0\n"); VFS 2456 fs/cifs/connect.c cifs_dbg(VFS, "Multiuser mounts require kernels with CONFIG_KEYS enabled\n"); VFS 2461 fs/cifs/connect.c cifs_dbg(VFS, "CIFS mount error: No usable UNC path provided in device string!\n"); VFS 2467 fs/cifs/connect.c cifs_dbg(VFS, "Malformed UNC. Unable to find share name.\n"); VFS 2826 fs/cifs/connect.c cifs_dbg(VFS, "CONFIG_CIFS_SMB_DIRECT is not enabled\n"); VFS 2833 fs/cifs/connect.c cifs_dbg(VFS, "RDMA transport established\n"); VFS 2843 fs/cifs/connect.c cifs_dbg(VFS, "Error connecting to socket. Aborting operation.\n"); VFS 2856 fs/cifs/connect.c cifs_dbg(VFS, "error %d create cifsd thread\n", rc); VFS 2951 fs/cifs/connect.c cifs_server_dbg(VFS, VFS 2974 fs/cifs/connect.c cifs_server_dbg(VFS, "failed to connect to IPC (rc=%d)\n", rc); VFS 3060 fs/cifs/connect.c cifs_server_dbg(VFS, "%s: Session Logoff failure rc=%d\n", VFS 3463 fs/cifs/connect.c cifs_dbg(VFS, VFS 3473 fs/cifs/connect.c cifs_dbg(VFS, VFS 3492 fs/cifs/connect.c cifs_dbg(VFS, VFS 3500 fs/cifs/connect.c cifs_dbg(VFS, "Encryption is not supported on share\n"); VFS 3512 fs/cifs/connect.c cifs_dbg(VFS, "Server does not support mounting with posix SMB3.11 extensions.\n"); VFS 3534 fs/cifs/connect.c cifs_dbg(VFS, VFS 3542 fs/cifs/connect.c cifs_dbg(VFS, VFS 3554 fs/cifs/connect.c cifs_dbg(VFS, VFS 3565 fs/cifs/connect.c cifs_dbg(VFS, "cache=ro requested on mount but NO_CACHING flag set on share\n"); VFS 3567 fs/cifs/connect.c cifs_dbg(VFS, "cache=singleclient requested on mount but NO_CACHING flag set on share\n"); VFS 3777 fs/cifs/connect.c cifs_server_dbg(VFS, "Failed to bind to: %pI6c, error: %d\n", VFS 3780 fs/cifs/connect.c cifs_server_dbg(VFS, "Failed to bind to: %pI4, error: %d\n", VFS 3884 fs/cifs/connect.c cifs_server_dbg(VFS, "Error %d creating socket\n", rc); VFS 4022 fs/cifs/connect.c cifs_dbg(VFS, "POSIXPATH support change\n"); VFS 4025 fs/cifs/connect.c cifs_dbg(VFS, "possible reconnect error\n"); VFS 4026 fs/cifs/connect.c cifs_dbg(VFS, "server disabled POSIX path support\n"); VFS 4031 fs/cifs/connect.c cifs_dbg(VFS, "per-share encryption not supported yet\n"); VFS 4077 fs/cifs/connect.c cifs_dbg(VFS, "Negotiating Unix capabilities with the server failed. Consider mounting with the Unix Extensions disabled if problems are found by specifying the nounix mount option.\n"); VFS 4167 fs/cifs/connect.c cifs_dbg(VFS, "mounting share with read only caching. Ensure that the share will not be modified while in use.\n"); VFS 4170 fs/cifs/connect.c cifs_dbg(VFS, "mounting share in single client RW caching mode. Ensure that no other systems will be accessing the share.\n"); VFS 4187 fs/cifs/connect.c cifs_dbg(VFS, "mount options mfsymlinks and sfu both enabled\n"); VFS 4193 fs/cifs/connect.c cifs_dbg(VFS, "mount option dynperm ignored if cifsacl mount option supported\n"); VFS 4284 fs/cifs/connect.c cifs_server_dbg(VFS, "persistent handles not supported by server\n"); VFS 4321 fs/cifs/connect.c cifs_dbg(VFS, "mounted to read only share\n"); VFS 4324 fs/cifs/connect.c cifs_dbg(VFS, "read only mount of RW share\n"); VFS 4608 fs/cifs/connect.c cifs_dbg(VFS, "No username specified\n"); VFS 4621 fs/cifs/connect.c cifs_dbg(VFS, "CIFS mount error: iocharset %s not found\n", VFS 4732 fs/cifs/connect.c cifs_server_dbg(VFS, "cannot query dirs between root and final path, " VFS 5246 fs/cifs/connect.c cifs_server_dbg(VFS, "Send error in SessSetup = %d\n", rc); VFS 121 fs/cifs/dir.c cifs_dbg(VFS, "corrupt dentry\n"); VFS 148 fs/cifs/dir.c cifs_dbg(VFS, "corrupt dentry\n"); VFS 576 fs/cifs/file.c cifs_dbg(VFS, "server %s of type %s returned unexpected error on SMB posix open, disabling posix open support. Check if server update available.\n", VFS 1325 fs/cifs/file.c cifs_dbg(VFS, "Can't push all brlocks!\n"); VFS 1480 fs/cifs/file.c cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n", VFS 1500 fs/cifs/file.c cifs_dbg(VFS, "Error unlocking previously locked range %d during test of lock\n", VFS 1725 fs/cifs/file.c cifs_dbg(VFS, "%s failed rc=%d\n", __func__, rc); VFS 1939 fs/cifs/file.c cifs_dbg(VFS, "Null inode passed to cifs_writeable_file\n"); VFS 2367 fs/cifs/file.c cifs_dbg(VFS, "No writable handle in writepages rc=%d\n", VFS 2870 fs/cifs/file.c cifs_dbg(VFS, VFS 3593 fs/cifs/file.c cifs_dbg(VFS, VFS 4708 fs/cifs/file.c cifs_dbg(VFS, "Push locks rc = %d\n", rc); VFS 72 fs/cifs/fscache.c cifs_dbg(VFS, "Unknown network family '%d'\n", sa->sa_family); VFS 267 fs/cifs/fscache.c cifs_dbg(VFS, "unknown error ret = %d\n", ret); VFS 1096 fs/cifs/inode.c cifs_dbg(VFS, "server does not support POSIX extensions"); VFS 1938 fs/cifs/inode.c cifs_dbg(VFS, "%s: could not invalidate inode %p\n", VFS 109 fs/cifs/ioctl.c cifs_dbg(VFS, "src file seems to be from a different filesystem type\n"); VFS 62 fs/cifs/link.c cifs_dbg(VFS, "%s: Could not init md5 shash\n", __func__); VFS 67 fs/cifs/link.c cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); VFS 72 fs/cifs/link.c cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__); VFS 296 fs/cifs/misc.c cifs_dbg(VFS, "Bad protocol string signature header 0x%x\n", VFS 309 fs/cifs/misc.c cifs_dbg(VFS, "Server sent request, not response. mid=%u\n", VFS 347 fs/cifs/misc.c cifs_dbg(VFS, "rcvd invalid byte count (bcc)\n"); VFS 349 fs/cifs/misc.c cifs_dbg(VFS, "Length less than smb header size\n"); VFS 360 fs/cifs/misc.c cifs_dbg(VFS, "Length read does not match RFC1001 length %d\n", VFS 377 fs/cifs/misc.c cifs_dbg(VFS, "RFC1001 size %u smaller than SMB for mid=%u\n", VFS 390 fs/cifs/misc.c cifs_dbg(VFS, "RFC1001 size %u more than 512 bytes larger than SMB for mid=%u\n", VFS 543 fs/cifs/misc.c cifs_dbg(VFS, "Autodisabling the use of server inode numbers on %s.\n", VFS 545 fs/cifs/misc.c cifs_dbg(VFS, "The server doesn't seem to support them properly or the files might be on different servers (DFS).\n"); VFS 546 fs/cifs/misc.c cifs_dbg(VFS, "Hardlinks will not be recognized on this mount. Consider mounting with the \"noserverino\" option to silence this message.\n"); VFS 701 fs/cifs/misc.c cifs_dbg(VFS, "num_referrals: must be at least > 0, but we get num_referrals = %d\n", VFS 709 fs/cifs/misc.c cifs_dbg(VFS, "Referrals of V%d version are not supported, should be V3\n", VFS 887 fs/cifs/misc.c cifs_dbg(VFS, "couldn't get user pages (rc=%zd)\n", rc); VFS 892 fs/cifs/misc.c cifs_dbg(VFS, "get pages rc=%zd more than %zu\n", rc, VFS 903 fs/cifs/misc.c cifs_dbg(VFS, "out of vec array capacity (%u vs %u)\n", VFS 946 fs/cifs/misc.c cifs_dbg(VFS, "could not allocate crypto %s\n", name); VFS 956 fs/cifs/misc.c cifs_dbg(VFS, "no memory left to allocate crypto %s\n", name); VFS 960 fs/cifs/netmisc.c cifs_dbg(VFS, "illegal time min %d sec %lld\n", min, sec); VFS 964 fs/cifs/netmisc.c cifs_dbg(VFS, "illegal hours %d\n", st->Hours); VFS 968 fs/cifs/netmisc.c cifs_dbg(VFS, "illegal date, month %d day: %d\n", month, day); VFS 383 fs/cifs/readdir.c cifs_dbg(VFS, "invalid offset %u\n", next_offset); VFS 391 fs/cifs/readdir.c cifs_dbg(VFS, "search entry %p began after end of SMB %p old entry %p\n", VFS 398 fs/cifs/readdir.c cifs_dbg(VFS, "search entry %p extends after end of SMB %p\n", VFS 661 fs/cifs/readdir.c cifs_dbg(VFS, "ntwrk_buf_start is NULL during readdir\n"); VFS 683 fs/cifs/readdir.c cifs_dbg(VFS, "reached end of buf searching for pos in buf %d index to find %lld rc %d\n", VFS 721 fs/cifs/readdir.c cifs_dbg(VFS, "bad search response length %zd past smb end\n", VFS 862 fs/cifs/readdir.c cifs_dbg(VFS, "past SMB end, num to fill %d i %d\n", VFS 297 fs/cifs/sess.c cifs_dbg(VFS, "challenge blob len %d too small\n", blob_len); VFS 302 fs/cifs/sess.c cifs_dbg(VFS, "blob signature incorrect %s\n", VFS 307 fs/cifs/sess.c cifs_dbg(VFS, "Incorrect message type %d\n", VFS 321 fs/cifs/sess.c cifs_dbg(VFS, "tioffset + tilen too high %u + %u", VFS 329 fs/cifs/sess.c cifs_dbg(VFS, "Challenge target info alloc failure"); VFS 404 fs/cifs/sess.c cifs_dbg(VFS, "Error %d during NTLMSSP authentication\n", rc); VFS 411 fs/cifs/sess.c cifs_dbg(VFS, "Error %d during NTLMSSP allocation\n", rc); VFS 760 fs/cifs/sess.c cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); VFS 829 fs/cifs/sess.c cifs_dbg(VFS, "Error %d during NTLM authentication\n", VFS 870 fs/cifs/sess.c cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); VFS 938 fs/cifs/sess.c cifs_dbg(VFS, "Error %d during NTLMv2 authentication\n", rc); VFS 978 fs/cifs/sess.c cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); VFS 1054 fs/cifs/sess.c cifs_dbg(VFS, VFS 1064 fs/cifs/sess.c cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory", VFS 1104 fs/cifs/sess.c cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); VFS 1119 fs/cifs/sess.c cifs_dbg(VFS, "bad security blob length %d\n", VFS 1173 fs/cifs/sess.c cifs_dbg(VFS, "NTLMSSP requires Unicode support\n"); VFS 1257 fs/cifs/sess.c cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); VFS 1269 fs/cifs/sess.c cifs_dbg(VFS, "bad security blob length %d\n", VFS 1342 fs/cifs/sess.c cifs_dbg(VFS, "bad word count %d\n", smb_buf->WordCount); VFS 1358 fs/cifs/sess.c cifs_dbg(VFS, "bad security blob length %d\n", VFS 1408 fs/cifs/sess.c cifs_dbg(VFS, VFS 1437 fs/cifs/sess.c cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); VFS 1445 fs/cifs/sess.c cifs_dbg(VFS, "secType %d not supported!\n", type); VFS 272 fs/cifs/smb1ops.c cifs_dbg(VFS, "TotalDataSize %d is over maximum buffer %d\n", VFS 401 fs/cifs/smb1ops.c cifs_dbg(VFS, "1st trans2 resp needs bigbuf\n"); VFS 955 fs/cifs/smb1ops.c cifs_dbg(VFS, "reparse points not handled for SMB1 symlinks\n"); VFS 81 fs/cifs/smb2file.c cifs_dbg(VFS, VFS 302 fs/cifs/smb2inode.c cifs_dbg(VFS, "Invalid command\n"); VFS 51 fs/cifs/smb2misc.c cifs_dbg(VFS, "Received Request not response\n"); VFS 55 fs/cifs/smb2misc.c cifs_dbg(VFS, "Bad protocol string signature header %x\n", VFS 58 fs/cifs/smb2misc.c cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", VFS 61 fs/cifs/smb2misc.c cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); VFS 162 fs/cifs/smb2misc.c cifs_dbg(VFS, "no decryption - session id not found\n"); VFS 178 fs/cifs/smb2misc.c cifs_dbg(VFS, "Length less than SMB header size\n"); VFS 183 fs/cifs/smb2misc.c cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", VFS 192 fs/cifs/smb2misc.c cifs_dbg(VFS, "Illegal structure size %u\n", VFS 199 fs/cifs/smb2misc.c cifs_dbg(VFS, "Illegal SMB2 command %d\n", command); VFS 207 fs/cifs/smb2misc.c cifs_dbg(VFS, "Illegal response size %u for command %d\n", VFS 215 fs/cifs/smb2misc.c cifs_dbg(VFS, "Illegal response size %d for oplock break\n", VFS 364 fs/cifs/smb2misc.c cifs_dbg(VFS, "no length check for command\n"); VFS 373 fs/cifs/smb2misc.c cifs_dbg(VFS, "offset %d too large, data area ignored\n", *off); VFS 377 fs/cifs/smb2misc.c cifs_dbg(VFS, "negative offset %d to data invalid ignore data area\n", VFS 382 fs/cifs/smb2misc.c cifs_dbg(VFS, "negative data length %d invalid, data area ignored\n", VFS 386 fs/cifs/smb2misc.c cifs_dbg(VFS, "data area larger than 128K: %d\n", *len); VFS 431 fs/cifs/smb2misc.c cifs_dbg(VFS, "data area offset %d overlaps SMB2 header %d\n", VFS 738 fs/cifs/smb2misc.c cifs_dbg(VFS, "Close unmatched open\n"); VFS 840 fs/cifs/smb2misc.c cifs_dbg(VFS, "%s: could not init sha512 shash\n", __func__); VFS 847 fs/cifs/smb2misc.c cifs_dbg(VFS, "%s: could not update sha512 shash\n", __func__); VFS 855 fs/cifs/smb2misc.c cifs_dbg(VFS, "%s: could not update sha512 shash\n", VFS 863 fs/cifs/smb2misc.c cifs_dbg(VFS, "%s: could not finalize sha512 shash\n", VFS 112 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "Possible client or server bug - zero credits\n"); VFS 115 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "disabling echoes and oplocks\n"); VFS 229 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "trying to return %d credits to old session\n", VFS 269 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "Encrypted frame parsing not supported yet\n"); VFS 293 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Mid: %llu Pid: %d\n", VFS 296 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "smb buf %p len %u\n", buf, VFS 460 fs/cifs/smb2ops.c cifs_dbg(VFS, "%s: malformed interface info\n", __func__); VFS 466 fs/cifs/smb2ops.c cifs_dbg(VFS, "%s: incomplete interface info\n", __func__); VFS 525 fs/cifs/smb2ops.c cifs_dbg(VFS, VFS 575 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "error %d on ioctl to get interface list\n", rc); VFS 1378 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "refcpy ioctl error %d getting resume key\n", rc); VFS 1382 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "Invalid refcopy resume key length\n"); VFS 1536 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "invalid passthru query flags: 0x%x\n", qi.flags); VFS 1665 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "invalid cchunk response size\n"); VFS 1679 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "invalid copy chunk response\n"); VFS 1684 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "invalid num chunks written\n"); VFS 2442 fs/cifs/smb2ops.c cifs_dbg(VFS, "session %p has no tcon available for a dfs referral request\n", VFS 2479 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "ioctl error in %s rc=%d\n", __func__, rc); VFS 2488 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "parse error in %s rc=%d\n", __func__, rc); VFS 2516 fs/cifs/smb2ops.c cifs_dbg(VFS, "%lld not a supported symlink type\n", VFS 2547 fs/cifs/smb2ops.c cifs_dbg(VFS, "srv returned malformed symlink buffer\n"); VFS 2569 fs/cifs/smb2ops.c cifs_dbg(VFS, "reparse buffer is too small. Must be " VFS 2576 fs/cifs/smb2ops.c cifs_dbg(VFS, "srv returned invalid reparse buf " VFS 2592 fs/cifs/smb2ops.c cifs_dbg(VFS, "srv returned unknown symlink buffer " VFS 2721 fs/cifs/smb2ops.c cifs_tcon_dbg(VFS, "srv returned invalid ioctl len: %d\n", VFS 3679 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "%s: Could not get %scryption key\n", __func__, VFS 3686 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); VFS 3694 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "%s: Failed to set aead key %d\n", __func__, rc); VFS 3700 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "%s: Failed to set authsize %d\n", __func__, rc); VFS 3706 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "%s: Failed to alloc aead request\n", __func__); VFS 3717 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "%s: Failed to init sg\n", __func__); VFS 3725 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "%s: Failed to alloc iv\n", __func__); VFS 3939 fs/cifs/smb2ops.c cifs_dbg(VFS, "%s: something went wrong\n", __func__); VFS 3967 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "only big read responses are supported\n"); VFS 4102 fs/cifs/smb2ops.c cifs_dbg(VFS, "error decrypting rc=%d\n", rc); VFS 4289 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "too many PDUs in compound\n"); VFS 4335 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "Transform message is too small (%u)\n", VFS 4343 fs/cifs/smb2ops.c cifs_server_dbg(VFS, "Transform message is broken\n"); VFS 568 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); VFS 686 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); VFS 718 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", VFS 896 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, "Dialect not supported by server. Consider " VFS 906 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, VFS 910 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, VFS 917 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, VFS 931 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, "Illegal 0x%x dialect returned: not requested\n", VFS 949 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, "Illegal dialect returned by server 0x%x\n", VFS 1009 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, "Missing expected negotiate contexts\n"); VFS 1047 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n"); VFS 1104 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "Server does not support validate negotiate\n"); VFS 1108 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "validate protocol negotiate failed: %d\n", rc); VFS 1115 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "invalid protocol negotiate response size: %d\n", VFS 1142 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "protocol revalidation - security settings mismatch\n"); VFS 1336 fs/cifs/smb2pdu.c cifs_dbg(VFS, VFS 1346 fs/cifs/smb2pdu.c cifs_dbg(VFS, VFS 1379 fs/cifs/smb2pdu.c cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); VFS 1423 fs/cifs/smb2pdu.c cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); VFS 1446 fs/cifs/smb2pdu.c cifs_dbg(VFS, "Invalid security buffer offset %d\n", VFS 1504 fs/cifs/smb2pdu.c cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); VFS 1538 fs/cifs/smb2pdu.c cifs_dbg(VFS, VFS 1551 fs/cifs/smb2pdu.c cifs_dbg(VFS, "secType %d not supported!\n", type); VFS 1596 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, "signing requested but authenticated as guest\n"); VFS 1775 fs/cifs/smb2pdu.c cifs_server_dbg(VFS, "unknown share type %d\n", rsp->ShareType); VFS 1790 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "DFS capability contradicts DFS flag\n"); VFS 1794 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "Encryption is requested but not supported\n"); VFS 1807 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "BAD_NETWORK_NAME: %s\n", tree); VFS 2864 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "srv returned invalid ioctl length: %d\n", *plen); VFS 2871 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "Malformed ioctl resp: len %d offset %d\n", *plen, VFS 3011 fs/cifs/smb2pdu.c cifs_dbg(VFS, "handle cancelled close fid 0x%llx returned error %d\n", VFS 3029 fs/cifs/smb2pdu.c cifs_dbg(VFS, "buffer length %d smaller than minimum size %d\n", VFS 3036 fs/cifs/smb2pdu.c cifs_dbg(VFS, "buffer length %d or smb length %d too large\n", VFS 3042 fs/cifs/smb2pdu.c cifs_dbg(VFS, "illegal server response, bad offset to data\n"); VFS 3176 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, VFS 3657 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "SMB signature verification returned error = %d\n", VFS 3814 fs/cifs/smb2pdu.c cifs_dbg(VFS, "Send error in read = %d\n", rc); VFS 4142 fs/cifs/smb2pdu.c cifs_dbg(VFS, "Send error in write = %d\n", rc); VFS 4174 fs/cifs/smb2pdu.c cifs_dbg(VFS, "malformed search entry would overflow\n"); VFS 4185 fs/cifs/smb2pdu.c cifs_dbg(VFS, "directory entry name would overflow frame end of buf %p\n", VFS 4250 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "info level %u isn't supported\n", VFS 4341 fs/cifs/smb2pdu.c cifs_tcon_dbg(VFS, "illegal search buffer type\n"); VFS 179 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); VFS 188 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: sha256 alloc failed\n", __func__); VFS 195 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not update with response\n", __func__); VFS 202 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not init sha256", __func__); VFS 218 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not update with payload\n", VFS 249 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: crypto alloc failed\n", __func__); VFS 256 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not set with session key\n", __func__); VFS 262 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not init sign hmac\n", __func__); VFS 269 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not update with n\n", __func__); VFS 276 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not update with label\n", __func__); VFS 283 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not update with zero\n", __func__); VFS 290 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not update with context\n", __func__); VFS 297 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not update with L\n", __func__); VFS 304 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__); VFS 351 fs/cifs/smb2transport.c cifs_dbg(VFS, "%s: dumping generated AES session keys\n", __func__); VFS 356 fs/cifs/smb2transport.c cifs_dbg(VFS, "Session Id %*ph\n", (int)sizeof(ses->Suid), VFS 358 fs/cifs/smb2transport.c cifs_dbg(VFS, "Session Key %*ph\n", VFS 360 fs/cifs/smb2transport.c cifs_dbg(VFS, "Signing Key %*ph\n", VFS 362 fs/cifs/smb2transport.c cifs_dbg(VFS, "ServerIn Key %*ph\n", VFS 364 fs/cifs/smb2transport.c cifs_dbg(VFS, "ServerOut Key %*ph\n", VFS 440 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not find session\n", __func__); VFS 450 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not set key for cmac aes\n", __func__); VFS 461 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not init cmac aes\n", __func__); VFS 477 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Could not update with payload\n", VFS 584 fs/cifs/smb2transport.c cifs_dbg(VFS, "Null TCP session in smb2_mid_entry_alloc\n"); VFS 672 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", VFS 746 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Failed to alloc encrypt aead\n", VFS 761 fs/cifs/smb2transport.c cifs_server_dbg(VFS, "%s: Failed to alloc decrypt aead\n", VFS 138 fs/cifs/smbdirect.c cifs_dbg(VFS, "%s:%d " fmt, __func__, __LINE__, ##args);\ VFS 1071 fs/cifs/smbdirect.c cifs_dbg(VFS, "Can't fit data to SGL, n_vec=%d\n", n_vec); VFS 1511 fs/cifs/smbdirect.c cifs_dbg(VFS, "RDMA transport re-established\n"); VFS 2030 fs/cifs/smbdirect.c cifs_dbg(VFS, "CIFS: invalid msg iter dir %u\n", VFS 2052 fs/cifs/smbdirect.c cifs_dbg(VFS, "CIFS: invalid msg type %d\n", VFS 67 fs/cifs/smbencrypt.c cifs_dbg(VFS, "FIPS compliance enabled: DES not permitted\n"); VFS 121 fs/cifs/smbencrypt.c cifs_dbg(VFS, "%s: Could not init md4 shash\n", __func__); VFS 126 fs/cifs/smbencrypt.c cifs_dbg(VFS, "%s: Could not update with link_str\n", __func__); VFS 131 fs/cifs/smbencrypt.c cifs_dbg(VFS, "%s: Could not generate md4 hash\n", __func__); VFS 59 fs/cifs/transport.c cifs_dbg(VFS, "Null TCP session in AllocMidQEntry\n"); VFS 115 fs/cifs/transport.c cifs_server_dbg(VFS, "invalid mid allocation time\n"); VFS 245 fs/cifs/transport.c cifs_server_dbg(VFS, "sends on sock %p stuck for 15 seconds\n", VFS 259 fs/cifs/transport.c cifs_server_dbg(VFS, "tcp sent no data\n"); VFS 456 fs/cifs/transport.c cifs_server_dbg(VFS, "Error %d sending data on socket to server\n", VFS 480 fs/cifs/transport.c cifs_server_dbg(VFS, "Encryption requested but transform " VFS 572 fs/cifs/transport.c cifs_server_dbg(VFS, "wait timed out after %d ms\n", VFS 613 fs/cifs/transport.c cifs_server_dbg(VFS, "wait timed out after %d ms\n", VFS 898 fs/cifs/transport.c cifs_server_dbg(VFS, "%s: invalid mid state mid=%llu state=%d\n", VFS 939 fs/cifs/transport.c cifs_server_dbg(VFS, "SMB signature verification returned error = %d\n", VFS 1016 fs/cifs/transport.c cifs_dbg(VFS, "Null session\n"); VFS 1136 fs/cifs/transport.c cifs_server_dbg(VFS, "Cancelling wait for mid %llu cmd: %d\n", VFS 1274 fs/cifs/transport.c cifs_dbg(VFS, "Null smb session\n"); VFS 1279 fs/cifs/transport.c cifs_dbg(VFS, "Null tcp session\n"); VFS 1291 fs/cifs/transport.c cifs_server_dbg(VFS, "Illegal length, greater than maximum frame, %d\n", VFS 1358 fs/cifs/transport.c cifs_server_dbg(VFS, "Bad MID state?\n"); VFS 1413 fs/cifs/transport.c cifs_dbg(VFS, "Null smb session\n"); VFS 1420 fs/cifs/transport.c cifs_dbg(VFS, "Null tcp session\n"); VFS 1432 fs/cifs/transport.c cifs_tcon_dbg(VFS, "Illegal length, greater than maximum frame, %d\n", VFS 1534 fs/cifs/transport.c cifs_tcon_dbg(VFS, "Bad MID state?\n"); VFS 258 fs/cifs/xattr.c cifs_dbg(VFS, "%s: error %zd getting sec desc\n", VFS 1326 fs/nfs/dir.c dfprintk(VFS, "NFS: dentry_delete(%pd2, %x)\n", VFS 1408 fs/nfs/dir.c dfprintk(VFS, "NFS: lookup(%pd2)\n", dentry); VFS 1533 fs/nfs/dir.c dfprintk(VFS, "NFS: atomic_open(%s/%lu), %pd\n", VFS 1763 fs/nfs/dir.c dfprintk(VFS, "NFS: create(%s/%lu), %pd\n", VFS 1790 fs/nfs/dir.c dfprintk(VFS, "NFS: mknod(%s/%lu), %pd\n", VFS 1816 fs/nfs/dir.c dfprintk(VFS, "NFS: mkdir(%s/%lu), %pd\n", VFS 1844 fs/nfs/dir.c dfprintk(VFS, "NFS: rmdir(%s/%lu), %pd\n", VFS 1881 fs/nfs/dir.c dfprintk(VFS, "NFS: safe_remove(%pd2)\n", dentry); VFS 1913 fs/nfs/dir.c dfprintk(VFS, "NFS: unlink(%s/%lu, %pd)\n", dir->i_sb->s_id, VFS 1964 fs/nfs/dir.c dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s)\n", dir->i_sb->s_id, VFS 1986 fs/nfs/dir.c dfprintk(VFS, "NFS: symlink(%s/%lu, %pd, %s) error %d\n", VFS 2020 fs/nfs/dir.c dfprintk(VFS, "NFS: link(%pd2 -> %pd2)\n", VFS 2072 fs/nfs/dir.c dfprintk(VFS, "NFS: rename(%pd2 -> %pd2, ct=%d)\n", VFS 2629 fs/nfs/dir.c dfprintk(VFS, "NFS: permission(%s/%lu), mask=0x%x, res=%d\n", VFS 1806 fs/nfs/inode.c dfprintk(VFS, "NFS: %s(%s/%lu fh_crc=0x%08x ct=%d info=0x%x)\n", VFS 441 fs/nfs/unlink.c dfprintk(VFS, "NFS: silly-rename(%pd2, ct=%d)\n", VFS 463 fs/nfs/unlink.c dfprintk(VFS, "NFS: trying to rename %pd to %s\n", VFS 69 tools/perf/util/c++/clang.cpp StringRef Path, IntrusiveRefCntPtr<vfs::FileSystem> VFS) VFS 74 tools/perf/util/c++/clang.cpp Clang.setVirtualFileSystem(&*VFS); VFS 119 tools/perf/util/c++/clang.cpp IntrusiveRefCntPtr<vfs::FileSystem> VFS(vfs::getRealFileSystem()); VFS 120 tools/perf/util/c++/clang.cpp return getModuleFromSource(std::move(CFlags), Path, VFS);