Lines Matching full:smb

55  * check_session_id() - check for valid session id in smb header
57 * @id: session id from smb header
89 * @work: smb work
104 ksmbd_debug(SMB, "skip to check tree connect request\n"); in smb2_get_ksmbd_tcon()
109 ksmbd_debug(SMB, "NO tree connected\n"); in smb2_get_ksmbd_tcon()
124 * smb2_set_err_rsp() - set error response code on smb response
125 * @work: smb work containing response buffer
148 * @work: smb work containing smb header
172 * @work: smb work containing smb response buffer
192 * get_smb2_cmd_val() - get smb command code from smb header
193 * @work: smb work containing smb request buffer
210 * @work: smb work containing response buffer
227 * @work: smb work containing smb request buffer
263 ksmbd_debug(SMB, "conn->dialect 0x%x\n", conn->dialect); in init_smb2_neg_rsp()
296 * @work: smb work containing smb response buffer
320 ksmbd_debug(SMB, "Insufficient credits granted, given: %u, granted: %u\n", in smb2_set_rsp_credits()
353 ksmbd_debug(SMB, in smb2_set_rsp_credits()
362 * @work: smb work containing smb response buffer
396 ksmbd_debug(SMB, in init_chained_smb2_rsp()
405 ksmbd_debug(SMB, "related flag should be set\n"); in init_chained_smb2_rsp()
429 * @work: smb work containing smb request buffer
447 pr_err("next command(%u) offset exceeds smb msg size\n", in is_chained_smb2_message()
458 ksmbd_debug(SMB, "got SMB2 chained command\n"); in is_chained_smb2_message()
469 ksmbd_debug(SMB, "padding len %u\n", len); in is_chained_smb2_message()
480 * @work: smb work containing smb request buffer
519 * @work: smb work containing smb request buffer
559 * @work: smb work containing smb request buffer
588 ksmbd_debug(SMB, "Invalid user session, Uid %llu\n", sess_id); in smb2_check_user_session()
618 * smb2_get_name() - get filename string from on the wire smb format
659 ksmbd_debug(SMB, in setup_async_work()
815 ksmbd_debug(SMB, in assemble_neg_contexts()
827 ksmbd_debug(SMB, in assemble_neg_contexts()
841 ksmbd_debug(SMB, in assemble_neg_contexts()
855 ksmbd_debug(SMB, in assemble_neg_contexts()
866 ksmbd_debug(SMB, in assemble_neg_contexts()
914 ksmbd_debug(SMB, "Cipher ID = 0x%x\n", in decode_encrypt_ctxt()
924 * @conn: smb connection
934 * SMB 3.0 and 3.0.2 dialects use the SMB2_GLOBAL_CAP_ENCRYPTION flag. in smb3_encryption_negotiated()
935 * SMB 3.1.1 uses the cipher_type field. in smb3_encryption_negotiated()
965 ksmbd_debug(SMB, "Signing Algorithm ID = 0x%x\n", in decode_sign_cap_ctxt()
986 ksmbd_debug(SMB, "decoding %d negotiate contexts\n", neg_ctxt_cnt); in deassemble_neg_contexts()
988 ksmbd_debug(SMB, "Invalid response: negotiate context offset\n"); in deassemble_neg_contexts()
997 /* check that offset is not beyond end of SMB */ in deassemble_neg_contexts()
1010 ksmbd_debug(SMB, in deassemble_neg_contexts()
1020 ksmbd_debug(SMB, in deassemble_neg_contexts()
1029 ksmbd_debug(SMB, in deassemble_neg_contexts()
1037 ksmbd_debug(SMB, in deassemble_neg_contexts()
1040 ksmbd_debug(SMB, in deassemble_neg_contexts()
1044 ksmbd_debug(SMB, in deassemble_neg_contexts()
1061 * @work: smb work containing smb request buffer
1074 ksmbd_debug(SMB, "Received negotiate request\n"); in smb2_handle_negotiate()
1178 ksmbd_debug(SMB, "Server dialect :0x%x not supported\n", in smb2_handle_negotiate()
1206 ksmbd_debug(SMB, "negotiate context offset %d, count %d\n", in smb2_handle_negotiate()
1313 ksmbd_debug(SMB, "negotiate phase\n"); in ntlm_negotiate()
1386 ksmbd_debug(SMB, "blob len %d too small\n", secbuf_len); in session_user()
1406 ksmbd_debug(SMB, "session setup request for user %s\n", name); in session_user()
1423 ksmbd_debug(SMB, "authenticate phase\n"); in ntlm_authenticate()
1443 ksmbd_debug(SMB, "Unknown user name or an error\n"); in ntlm_authenticate()
1481 ksmbd_debug(SMB, "authentication failed\n"); in ntlm_authenticate()
1506 ksmbd_debug(SMB, in ntlm_authenticate()
1540 ksmbd_debug(SMB, "SMB3 signing key generation failed\n"); in ntlm_authenticate()
1584 ksmbd_debug(SMB, "krb5 authentication failed\n"); in krb5_authenticate()
1597 ksmbd_debug(SMB, in krb5_authenticate()
1626 ksmbd_debug(SMB, "SMB3 signing key generation failed\n"); in krb5_authenticate()
1654 ksmbd_debug(SMB, "Received request for session setup\n"); in smb2_sess_setup()
1862 * @work: smb work containing smb request buffer
1892 ksmbd_debug(SMB, "tree connect request for tree %s treename %s\n", in smb2_tree_connect()
1903 ksmbd_debug(SMB, "IPC share path request\n"); in smb2_tree_connect()
1972 * smb2_create_open_flags() - convert smb open flags to unix open flags
2035 * smb2_tree_disconnect() - handler for smb tree connect request
2036 * @work: smb work containing request buffer
2049 ksmbd_debug(SMB, "request\n"); in smb2_tree_disconnect()
2055 ksmbd_debug(SMB, "Invalid tid %d\n", req->hdr.Id.SyncId.TreeId); in smb2_tree_disconnect()
2069 * @work: smb work containing request buffer
2082 ksmbd_debug(SMB, "request\n"); in smb2_session_logoff()
2092 ksmbd_debug(SMB, "Invalid tid %d\n", req->hdr.Id.SyncId.TreeId); in smb2_session_logoff()
2111 * @work: smb work containing request buffer
2207 ksmbd_debug(SMB, in smb2_set_ea()
2239 ksmbd_debug(SMB, in smb2_set_ea()
2253 ksmbd_debug(SMB, in smb2_set_ea()
2303 ksmbd_debug(SMB, "XATTR stream name lookup failed: %d\n", rc); in smb2_set_stream_name_xattr()
2325 ksmbd_debug(SMB, "empty xattr in the file\n"); in smb2_remove_smb_xattrs()
2331 ksmbd_debug(SMB, "%s, len %zd\n", name, strlen(name)); in smb2_remove_smb_xattrs()
2339 ksmbd_debug(SMB, "remove xattr failed : %s\n", in smb2_remove_smb_xattrs()
2361 ksmbd_debug(SMB, in smb2_create_truncate()
2386 ksmbd_debug(SMB, "failed to store file attribute into xattr\n"); in smb2_new_xattrs()
2422 ksmbd_debug(SMB, "file does not exist, so creating\n"); in smb2_creat()
2424 ksmbd_debug(SMB, "creating directory\n"); in smb2_creat()
2431 ksmbd_debug(SMB, "creating regular file\n"); in smb2_creat()
2465 ksmbd_debug(SMB, in smb2_create_sd_buffer()
2497 * smb2_open() - handler for smb file open request
2498 * @work: smb work containing request buffer
2538 ksmbd_debug(SMB, "invalid flag in chained command\n"); in smb2_open()
2545 ksmbd_debug(SMB, "IPC pipe create request\n"); in smb2_open()
2568 ksmbd_debug(SMB, "converted name = %s\n", name); in smb2_open()
2586 ksmbd_debug(SMB, "Reject open(), vetoed file: %s\n", in smb2_open()
2686 ksmbd_debug(SMB, in smb2_open()
2697 ksmbd_debug(SMB, "get timewarp context\n"); in smb2_open()
2717 ksmbd_debug(SMB, "get posix context\n"); in smb2_open()
2745 ksmbd_debug(SMB, in smb2_open()
2761 ksmbd_debug(SMB, "can not get linux path for %s, rc = %d\n", in smb2_open()
2795 ksmbd_debug(SMB, "open() argument is a directory: %s, %x\n", in smb2_open()
2845 ksmbd_debug(SMB, in smb2_open()
2962 ksmbd_debug(SMB, "inherit posix acl failed : %d\n", posix_acl_rc); in smb2_open()
3068 ksmbd_debug(SMB, in smb2_open()
3115 ksmbd_debug(SMB, in smb2_open()
3122 ksmbd_debug(SMB, in smb2_open()
3132 ksmbd_debug(SMB, "get query on disk id context\n"); in smb2_open()
3188 ksmbd_debug(SMB, "lease granted on(%s) lease state 0x%x\n", in smb2_open()
3297 ksmbd_debug(SMB, "Error response: %x\n", rsp->hdr.Status); in smb2_open()
3410 * @info_level: smb information level
3597 ksmbd_debug(SMB, in smb2_populate_readdir_entry()
3651 ksmbd_debug(SMB, "Cannot lookup `%s' [%ld]\n", in process_query_dir_entries()
3658 ksmbd_debug(SMB, "Negative dentry `%s'\n", in process_query_dir_entries()
3915 ksmbd_debug(SMB, "Search Pattern not found\n"); in smb2_query_dir()
3919 ksmbd_debug(SMB, "Search pattern is %s\n", srch_ptr); in smb2_query_dir()
3923 ksmbd_debug(SMB, "Restart directory scan\n"); in smb2_query_dir()
4062 ksmbd_debug(SMB, "Buffer Overflow\n"); in buffer_check_err()
4118 ksmbd_debug(SMB, "FileInfoClass %u, FileId 0x%llx\n", in smb2_get_info_file_pipe()
4135 ksmbd_debug(SMB, "smb2_info_file_pipe for %u not supported\n", in smb2_get_info_file_pipe()
4144 * @work: smb work containing query info command buffer
4181 ksmbd_debug(SMB, in smb2_get_ea()
4197 ksmbd_debug(SMB, "no ea data in the file\n"); in smb2_get_ea()
4211 ksmbd_debug(SMB, "%s, len %d\n", name, name_len); in smb2_get_ea()
4288 ksmbd_debug(SMB, "single entry requested\n"); in smb2_get_ea()
4417 ksmbd_debug(SMB, "no right to read the attributes : 0x%x\n", in get_file_all_info()
4429 ksmbd_debug(SMB, "filename = %s\n", filename); in get_file_all_info()
4518 ksmbd_debug(SMB, "empty xattr in the file\n"); in get_file_stream_info()
4527 ksmbd_debug(SMB, "%s, len %d\n", stream_name, streamlen); in get_file_stream_info()
4779 ksmbd_debug(SMB, "Compound request set FID = %llu\n", in smb2_get_info_file()
4882 ksmbd_debug(SMB, "fileinfoclass %d not supported yet\n", in smb2_get_info_file()
5137 ksmbd_debug(SMB, "Unsupported addition info: 0x%x)\n", in smb2_get_info_sec()
5156 ksmbd_debug(SMB, "Compound request set FID = %llu\n", in smb2_get_info_sec()
5200 * @work: smb work containing query info request buffer
5212 ksmbd_debug(SMB, "GOT query info request\n"); in smb2_query_info()
5216 ksmbd_debug(SMB, "GOT SMB2_O_INFO_FILE\n"); in smb2_query_info()
5220 ksmbd_debug(SMB, "GOT SMB2_O_INFO_FILESYSTEM\n"); in smb2_query_info()
5224 ksmbd_debug(SMB, "GOT SMB2_O_INFO_SECURITY\n"); in smb2_query_info()
5228 ksmbd_debug(SMB, "InfoType %d not supported yet\n", in smb2_query_info()
5244 ksmbd_debug(SMB, "error while processing smb2 query rc = %d\n", in smb2_query_info()
5256 * @work: smb work containing close request buffer
5285 * @work: smb work containing close request buffer
5305 ksmbd_debug(SMB, "IPC pipe close request\n"); in smb2_close()
5328 ksmbd_debug(SMB, "file already closed\n"); in smb2_close()
5333 ksmbd_debug(SMB, in smb2_close()
5346 ksmbd_debug(SMB, "volatile_id = %llu\n", volatile_id); in smb2_close()
5398 * @work: smb work containing echo request buffer
5425 ksmbd_debug(SMB, "setting FILE_RENAME_INFO\n"); in smb2_rename()
5439 ksmbd_debug(SMB, "can't get last component in path %s\n", in smb2_rename()
5491 ksmbd_debug(SMB, "new name %s\n", new_name); in smb2_rename()
5503 ksmbd_debug(SMB, "Can't rename vetoed file: %s\n", new_name); in smb2_rename()
5513 ksmbd_debug(SMB, "cannot delete %s, rc %d\n", in smb2_rename()
5522 ksmbd_debug(SMB, in smb2_rename()
5551 ksmbd_debug(SMB, "setting FILE_LINK_INFORMATION\n"); in smb2_create_link()
5564 ksmbd_debug(SMB, "link name is %s\n", link_name); in smb2_create_link()
5571 ksmbd_debug(SMB, "target name is %s\n", target_name); in smb2_create_link()
5586 ksmbd_debug(SMB, "cannot delete %s\n", in smb2_create_link()
5594 ksmbd_debug(SMB, "link already exists\n"); in smb2_create_link()
5672 ksmbd_debug(SMB, in set_file_basic_info()
5700 * properly with any smb.conf option in set_file_allocation_info()
5764 ksmbd_debug(SMB, "truncated to newsize %lld\n", newsize); in set_end_of_file_info()
5767 ksmbd_debug(SMB, "truncate failed!, err %d\n", rc); in set_end_of_file_info()
5891 * @work: smb work containing set info command buffer
5932 ksmbd_debug(SMB, in smb2_set_info_file()
5957 ksmbd_debug(SMB, in smb2_set_info_file()
6015 * @work: smb work containing set info request buffer
6027 ksmbd_debug(SMB, "Received set info request\n"); in smb2_set_info()
6033 ksmbd_debug(SMB, "Compound request set FID = %llu\n", in smb2_set_info()
6050 ksmbd_debug(SMB, "Invalid id for close: %u\n", id); in smb2_set_info()
6057 ksmbd_debug(SMB, "GOT SMB2_O_INFO_FILE\n"); in smb2_set_info()
6061 ksmbd_debug(SMB, "GOT SMB2_O_INFO_SECURITY\n"); in smb2_set_info()
6105 ksmbd_debug(SMB, "error while processing smb2 query rc = %d\n", rc); in smb2_set_info()
6111 * @work: smb work containing read IPC pipe command buffer
6213 * @work: smb work containing read command buffer
6234 ksmbd_debug(SMB, "IPC pipe read request\n"); in smb2_read()
6277 ksmbd_debug(SMB, "limiting read size to max size(%u)\n", in smb2_read()
6283 ksmbd_debug(SMB, "filename %pD, offset %lld, len %zu\n", in smb2_read()
6307 ksmbd_debug(SMB, "nbytes %zu, offset %lld mincount %zu\n", in smb2_read()
6363 * @work: smb work containing write IPC pipe command buffer
6458 * @work: smb work containing write command buffer
6478 ksmbd_debug(SMB, "IPC pipe write request\n"); in smb2_write()
6510 ksmbd_debug(SMB, "User does not have write permission\n"); in smb2_write()
6528 ksmbd_debug(SMB, "limiting write size to max size(%u)\n", in smb2_write()
6534 ksmbd_debug(SMB, "flags %u\n", le32_to_cpu(req->Flags)); in smb2_write()
6548 ksmbd_debug(SMB, "filename %pD, offset %lld, len %zu\n", in smb2_write()
6599 * @work: smb work containing flush command buffer
6611 ksmbd_debug(SMB, "SMB2_FLUSH called for fid %llu\n", req->VolatileFileId); in smb2_flush()
6633 * @work: smb work containing cancel command buffer
6645 ksmbd_debug(SMB, "smb2 cancel called on mid %llu, async flags 0x%x\n", in smb2_cancel()
6660 ksmbd_debug(SMB, in smb2_cancel()
6679 ksmbd_debug(SMB, in smb2_cancel()
6728 ksmbd_debug(SMB, "received shared request\n"); in smb2_set_flock_flags()
6734 ksmbd_debug(SMB, "received exclusive request\n"); in smb2_set_flock_flags()
6740 ksmbd_debug(SMB, in smb2_set_flock_flags()
6746 ksmbd_debug(SMB, in smb2_set_flock_flags()
6752 ksmbd_debug(SMB, "received unlock request\n"); in smb2_set_flock_flags()
6802 * @work: smb work containing lock command buffer
6826 ksmbd_debug(SMB, "Received lock request\n"); in smb2_lock()
6829 ksmbd_debug(SMB, "Invalid file id for lock : %llu\n", req->VolatileFileId); in smb2_lock()
6838 ksmbd_debug(SMB, "lock count is %d\n", lock_count); in smb2_lock()
6873 ksmbd_debug(SMB, in smb2_lock()
7014 ksmbd_debug(SMB, "File unlocked\n"); in smb2_lock()
7025 ksmbd_debug(SMB, in smb2_lock()
7099 ksmbd_debug(SMB, "successful in taking lock\n"); in smb2_lock()
7110 ksmbd_debug(SMB, "successful in taking lock\n"); in smb2_lock()
7148 ksmbd_debug(SMB, "failed in taking lock(flags : %x), err : %d\n", flags, err); in smb2_lock()
7343 ksmbd_debug(SMB, "%s %s\n", netdev->name, in fsctl_query_iface_info_ioctl()
7581 * @work: smb work containing ioctl command buffer
7598 ksmbd_debug(SMB, "Compound request set FID = %llu\n", in smb2_ioctl()
7705 ksmbd_debug(SMB, in smb2_ioctl()
7750 ksmbd_debug(SMB, in smb2_ioctl()
7860 * beneficial when re-exporting nfs/smb mount, but note that in smb2_ioctl()
7891 ksmbd_debug(SMB, "not implemented yet ioctl command 0x%x\n", in smb2_ioctl()
7927 * @work: smb work containing oplock break command buffer
7971 ksmbd_debug(SMB, "unexpected oplock state 0x%x\n", opinfo->op_state); in smb20_oplock_break_ack()
8070 * @work: smb work containing lease break command buffer
8205 * @work: smb work containing oplock/lease break command buffer
8233 * @work: smb work containing notify command buffer
8257 * @work: smb work containing notify command buffer
8277 * @work: smb work containing notify command buffer
8321 * @work: smb work containing notify command buffer
8373 * @work: smb work containing notify command buffer
8436 * @work: smb work containing notify command buffer
8503 * @work: smb work containing response buffer