aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJeff Layton <jlayton@redhat.com>2012-07-23 13:14:28 -0400
committerSteve French <smfrench@gmail.com>2012-07-23 17:36:26 -0400
commitac3aa2f8ae29c186c4742d15e39712af417c6d68 (patch)
treec2cc038cf4ad883d0f4085c5430db14af27e1328
parent00401ff780c58b9dabffef668386c206efc71c7c (diff)
cifs: remove extraneous newlines from cERROR and cFYI calls
Those macros add a newline on their own, so there's not any need to embed one in the message itself. Signed-off-by: Jeff Layton <jlayton@redhat.com> Signed-off-by: Steve French <smfrench@gmail.com>
-rw-r--r--fs/cifs/cache.c2
-rw-r--r--fs/cifs/cifsacl.c6
-rw-r--r--fs/cifs/cifsencrypt.c48
-rw-r--r--fs/cifs/cifssmb.c10
-rw-r--r--fs/cifs/connect.c14
-rw-r--r--fs/cifs/file.c2
-rw-r--r--fs/cifs/link.c14
-rw-r--r--fs/cifs/smbencrypt.c14
8 files changed, 55 insertions, 55 deletions
diff --git a/fs/cifs/cache.c b/fs/cifs/cache.c
index 545509c3313b..282d6de7e410 100644
--- a/fs/cifs/cache.c
+++ b/fs/cifs/cache.c
@@ -152,7 +152,7 @@ static uint16_t cifs_super_get_key(const void *cookie_netfs_data, void *buffer,
152 152
153 sharename = extract_sharename(tcon->treeName); 153 sharename = extract_sharename(tcon->treeName);
154 if (IS_ERR(sharename)) { 154 if (IS_ERR(sharename)) {
155 cFYI(1, "%s: couldn't extract sharename\n", __func__); 155 cFYI(1, "%s: couldn't extract sharename", __func__);
156 sharename = NULL; 156 sharename = NULL;
157 return 0; 157 return 0;
158 } 158 }
diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c
index 3cc1b251ca08..1885da4fca82 100644
--- a/fs/cifs/cifsacl.c
+++ b/fs/cifs/cifsacl.c
@@ -525,7 +525,7 @@ init_cifs_idmap(void)
525 struct key *keyring; 525 struct key *keyring;
526 int ret; 526 int ret;
527 527
528 cFYI(1, "Registering the %s key type\n", cifs_idmap_key_type.name); 528 cFYI(1, "Registering the %s key type", cifs_idmap_key_type.name);
529 529
530 /* create an override credential set with a special thread keyring in 530 /* create an override credential set with a special thread keyring in
531 * which requests are cached 531 * which requests are cached
@@ -572,7 +572,7 @@ init_cifs_idmap(void)
572 sidgidtree = RB_ROOT; 572 sidgidtree = RB_ROOT;
573 register_shrinker(&cifs_shrinker); 573 register_shrinker(&cifs_shrinker);
574 574
575 cFYI(1, "cifs idmap keyring: %d\n", key_serial(keyring)); 575 cFYI(1, "cifs idmap keyring: %d", key_serial(keyring));
576 return 0; 576 return 0;
577 577
578failed_put_key: 578failed_put_key:
@@ -589,7 +589,7 @@ exit_cifs_idmap(void)
589 unregister_key_type(&cifs_idmap_key_type); 589 unregister_key_type(&cifs_idmap_key_type);
590 put_cred(root_cred); 590 put_cred(root_cred);
591 unregister_shrinker(&cifs_shrinker); 591 unregister_shrinker(&cifs_shrinker);
592 cFYI(1, "Unregistered %s key type\n", cifs_idmap_key_type.name); 592 cFYI(1, "Unregistered %s key type", cifs_idmap_key_type.name);
593} 593}
594 594
595void 595void
diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
index 63c460e503b6..db768cb67e38 100644
--- a/fs/cifs/cifsencrypt.c
+++ b/fs/cifs/cifsencrypt.c
@@ -47,20 +47,20 @@ static int cifs_calc_signature(const struct kvec *iov, int n_vec,
47 return -EINVAL; 47 return -EINVAL;
48 48
49 if (!server->secmech.sdescmd5) { 49 if (!server->secmech.sdescmd5) {
50 cERROR(1, "%s: Can't generate signature\n", __func__); 50 cERROR(1, "%s: Can't generate signature", __func__);
51 return -1; 51 return -1;
52 } 52 }
53 53
54 rc = crypto_shash_init(&server->secmech.sdescmd5->shash); 54 rc = crypto_shash_init(&server->secmech.sdescmd5->shash);
55 if (rc) { 55 if (rc) {
56 cERROR(1, "%s: Could not init md5\n", __func__); 56 cERROR(1, "%s: Could not init md5", __func__);
57 return rc; 57 return rc;
58 } 58 }
59 59
60 rc = crypto_shash_update(&server->secmech.sdescmd5->shash, 60 rc = crypto_shash_update(&server->secmech.sdescmd5->shash,
61 server->session_key.response, server->session_key.len); 61 server->session_key.response, server->session_key.len);
62 if (rc) { 62 if (rc) {
63 cERROR(1, "%s: Could not update with response\n", __func__); 63 cERROR(1, "%s: Could not update with response", __func__);
64 return rc; 64 return rc;
65 } 65 }
66 66
@@ -85,7 +85,7 @@ static int cifs_calc_signature(const struct kvec *iov, int n_vec,
85 iov[i].iov_base, iov[i].iov_len); 85 iov[i].iov_base, iov[i].iov_len);
86 } 86 }
87 if (rc) { 87 if (rc) {
88 cERROR(1, "%s: Could not update with payload\n", 88 cERROR(1, "%s: Could not update with payload",
89 __func__); 89 __func__);
90 return rc; 90 return rc;
91 } 91 }
@@ -93,7 +93,7 @@ static int cifs_calc_signature(const struct kvec *iov, int n_vec,
93 93
94 rc = crypto_shash_final(&server->secmech.sdescmd5->shash, signature); 94 rc = crypto_shash_final(&server->secmech.sdescmd5->shash, signature);
95 if (rc) 95 if (rc)
96 cERROR(1, "%s: Could not generate md5 hash\n", __func__); 96 cERROR(1, "%s: Could not generate md5 hash", __func__);
97 97
98 return rc; 98 return rc;
99} 99}
@@ -399,7 +399,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash,
399 wchar_t *server; 399 wchar_t *server;
400 400
401 if (!ses->server->secmech.sdeschmacmd5) { 401 if (!ses->server->secmech.sdeschmacmd5) {
402 cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash\n"); 402 cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash");
403 return -1; 403 return -1;
404 } 404 }
405 405
@@ -415,7 +415,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash,
415 415
416 rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash); 416 rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash);
417 if (rc) { 417 if (rc) {
418 cERROR(1, "calc_ntlmv2_hash: could not init hmacmd5\n"); 418 cERROR(1, "calc_ntlmv2_hash: could not init hmacmd5");
419 return rc; 419 return rc;
420 } 420 }
421 421
@@ -423,7 +423,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash,
423 len = ses->user_name ? strlen(ses->user_name) : 0; 423 len = ses->user_name ? strlen(ses->user_name) : 0;
424 user = kmalloc(2 + (len * 2), GFP_KERNEL); 424 user = kmalloc(2 + (len * 2), GFP_KERNEL);
425 if (user == NULL) { 425 if (user == NULL) {
426 cERROR(1, "calc_ntlmv2_hash: user mem alloc failure\n"); 426 cERROR(1, "calc_ntlmv2_hash: user mem alloc failure");
427 rc = -ENOMEM; 427 rc = -ENOMEM;
428 return rc; 428 return rc;
429 } 429 }
@@ -439,7 +439,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash,
439 (char *)user, 2 * len); 439 (char *)user, 2 * len);
440 kfree(user); 440 kfree(user);
441 if (rc) { 441 if (rc) {
442 cERROR(1, "%s: Could not update with user\n", __func__); 442 cERROR(1, "%s: Could not update with user", __func__);
443 return rc; 443 return rc;
444 } 444 }
445 445
@@ -460,7 +460,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash,
460 (char *)domain, 2 * len); 460 (char *)domain, 2 * len);
461 kfree(domain); 461 kfree(domain);
462 if (rc) { 462 if (rc) {
463 cERROR(1, "%s: Could not update with domain\n", 463 cERROR(1, "%s: Could not update with domain",
464 __func__); 464 __func__);
465 return rc; 465 return rc;
466 } 466 }
@@ -480,7 +480,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash,
480 (char *)server, 2 * len); 480 (char *)server, 2 * len);
481 kfree(server); 481 kfree(server);
482 if (rc) { 482 if (rc) {
483 cERROR(1, "%s: Could not update with server\n", 483 cERROR(1, "%s: Could not update with server",
484 __func__); 484 __func__);
485 return rc; 485 return rc;
486 } 486 }
@@ -489,7 +489,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash,
489 rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, 489 rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash,
490 ntlmv2_hash); 490 ntlmv2_hash);
491 if (rc) 491 if (rc)
492 cERROR(1, "%s: Could not generate md5 hash\n", __func__); 492 cERROR(1, "%s: Could not generate md5 hash", __func__);
493 493
494 return rc; 494 return rc;
495} 495}
@@ -501,7 +501,7 @@ CalcNTLMv2_response(const struct cifs_ses *ses, char *ntlmv2_hash)
501 unsigned int offset = CIFS_SESS_KEY_SIZE + 8; 501 unsigned int offset = CIFS_SESS_KEY_SIZE + 8;
502 502
503 if (!ses->server->secmech.sdeschmacmd5) { 503 if (!ses->server->secmech.sdeschmacmd5) {
504 cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash\n"); 504 cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash");
505 return -1; 505 return -1;
506 } 506 }
507 507
@@ -527,14 +527,14 @@ CalcNTLMv2_response(const struct cifs_ses *ses, char *ntlmv2_hash)
527 rc = crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash, 527 rc = crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash,
528 ses->auth_key.response + offset, ses->auth_key.len - offset); 528 ses->auth_key.response + offset, ses->auth_key.len - offset);
529 if (rc) { 529 if (rc) {
530 cERROR(1, "%s: Could not update with response\n", __func__); 530 cERROR(1, "%s: Could not update with response", __func__);
531 return rc; 531 return rc;
532 } 532 }
533 533
534 rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, 534 rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash,
535 ses->auth_key.response + CIFS_SESS_KEY_SIZE); 535 ses->auth_key.response + CIFS_SESS_KEY_SIZE);
536 if (rc) 536 if (rc)
537 cERROR(1, "%s: Could not generate md5 hash\n", __func__); 537 cERROR(1, "%s: Could not generate md5 hash", __func__);
538 538
539 return rc; 539 return rc;
540} 540}
@@ -613,7 +613,7 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
613 613
614 rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash); 614 rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash);
615 if (rc) { 615 if (rc) {
616 cERROR(1, "%s: Could not init hmacmd5\n", __func__); 616 cERROR(1, "%s: Could not init hmacmd5", __func__);
617 goto setup_ntlmv2_rsp_ret; 617 goto setup_ntlmv2_rsp_ret;
618 } 618 }
619 619
@@ -621,14 +621,14 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp)
621 ses->auth_key.response + CIFS_SESS_KEY_SIZE, 621 ses->auth_key.response + CIFS_SESS_KEY_SIZE,
622 CIFS_HMAC_MD5_HASH_SIZE); 622 CIFS_HMAC_MD5_HASH_SIZE);
623 if (rc) { 623 if (rc) {
624 cERROR(1, "%s: Could not update with response\n", __func__); 624 cERROR(1, "%s: Could not update with response", __func__);
625 goto setup_ntlmv2_rsp_ret; 625 goto setup_ntlmv2_rsp_ret;
626 } 626 }
627 627
628 rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, 628 rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash,
629 ses->auth_key.response); 629 ses->auth_key.response);
630 if (rc) 630 if (rc)
631 cERROR(1, "%s: Could not generate md5 hash\n", __func__); 631 cERROR(1, "%s: Could not generate md5 hash", __func__);
632 632
633setup_ntlmv2_rsp_ret: 633setup_ntlmv2_rsp_ret:
634 kfree(tiblob); 634 kfree(tiblob);
@@ -650,7 +650,7 @@ calc_seckey(struct cifs_ses *ses)
650 tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, CRYPTO_ALG_ASYNC); 650 tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, CRYPTO_ALG_ASYNC);
651 if (IS_ERR(tfm_arc4)) { 651 if (IS_ERR(tfm_arc4)) {
652 rc = PTR_ERR(tfm_arc4); 652 rc = PTR_ERR(tfm_arc4);
653 cERROR(1, "could not allocate crypto API arc4\n"); 653 cERROR(1, "could not allocate crypto API arc4");
654 return rc; 654 return rc;
655 } 655 }
656 656
@@ -668,7 +668,7 @@ calc_seckey(struct cifs_ses *ses)
668 668
669 rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, CIFS_CPHTXT_SIZE); 669 rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, CIFS_CPHTXT_SIZE);
670 if (rc) { 670 if (rc) {
671 cERROR(1, "could not encrypt session key rc: %d\n", rc); 671 cERROR(1, "could not encrypt session key rc: %d", rc);
672 crypto_free_blkcipher(tfm_arc4); 672 crypto_free_blkcipher(tfm_arc4);
673 return rc; 673 return rc;
674 } 674 }
@@ -705,13 +705,13 @@ cifs_crypto_shash_allocate(struct TCP_Server_Info *server)
705 705
706 server->secmech.hmacmd5 = crypto_alloc_shash("hmac(md5)", 0, 0); 706 server->secmech.hmacmd5 = crypto_alloc_shash("hmac(md5)", 0, 0);
707 if (IS_ERR(server->secmech.hmacmd5)) { 707 if (IS_ERR(server->secmech.hmacmd5)) {
708 cERROR(1, "could not allocate crypto hmacmd5\n"); 708 cERROR(1, "could not allocate crypto hmacmd5");
709 return PTR_ERR(server->secmech.hmacmd5); 709 return PTR_ERR(server->secmech.hmacmd5);
710 } 710 }
711 711
712 server->secmech.md5 = crypto_alloc_shash("md5", 0, 0); 712 server->secmech.md5 = crypto_alloc_shash("md5", 0, 0);
713 if (IS_ERR(server->secmech.md5)) { 713 if (IS_ERR(server->secmech.md5)) {
714 cERROR(1, "could not allocate crypto md5\n"); 714 cERROR(1, "could not allocate crypto md5");
715 rc = PTR_ERR(server->secmech.md5); 715 rc = PTR_ERR(server->secmech.md5);
716 goto crypto_allocate_md5_fail; 716 goto crypto_allocate_md5_fail;
717 } 717 }
@@ -720,7 +720,7 @@ cifs_crypto_shash_allocate(struct TCP_Server_Info *server)
720 crypto_shash_descsize(server->secmech.hmacmd5); 720 crypto_shash_descsize(server->secmech.hmacmd5);
721 server->secmech.sdeschmacmd5 = kmalloc(size, GFP_KERNEL); 721 server->secmech.sdeschmacmd5 = kmalloc(size, GFP_KERNEL);
722 if (!server->secmech.sdeschmacmd5) { 722 if (!server->secmech.sdeschmacmd5) {
723 cERROR(1, "cifs_crypto_shash_allocate: can't alloc hmacmd5\n"); 723 cERROR(1, "cifs_crypto_shash_allocate: can't alloc hmacmd5");
724 rc = -ENOMEM; 724 rc = -ENOMEM;
725 goto crypto_allocate_hmacmd5_sdesc_fail; 725 goto crypto_allocate_hmacmd5_sdesc_fail;
726 } 726 }
@@ -732,7 +732,7 @@ cifs_crypto_shash_allocate(struct TCP_Server_Info *server)
732 crypto_shash_descsize(server->secmech.md5); 732 crypto_shash_descsize(server->secmech.md5);
733 server->secmech.sdescmd5 = kmalloc(size, GFP_KERNEL); 733 server->secmech.sdescmd5 = kmalloc(size, GFP_KERNEL);
734 if (!server->secmech.sdescmd5) { 734 if (!server->secmech.sdescmd5) {
735 cERROR(1, "cifs_crypto_shash_allocate: can't alloc md5\n"); 735 cERROR(1, "cifs_crypto_shash_allocate: can't alloc md5");
736 rc = -ENOMEM; 736 rc = -ENOMEM;
737 goto crypto_allocate_md5_sdesc_fail; 737 goto crypto_allocate_md5_sdesc_fail;
738 } 738 }
diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c
index 4ee522b3f66f..684a0723021f 100644
--- a/fs/cifs/cifssmb.c
+++ b/fs/cifs/cifssmb.c
@@ -4137,7 +4137,7 @@ UnixQFileInfoRetry:
4137 rc = validate_t2((struct smb_t2_rsp *)pSMBr); 4137 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4138 4138
4139 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) { 4139 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) {
4140 cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response.\n" 4140 cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response. "
4141 "Unix Extensions can be disabled on mount " 4141 "Unix Extensions can be disabled on mount "
4142 "by specifying the nosfu mount option."); 4142 "by specifying the nosfu mount option.");
4143 rc = -EIO; /* bad smb */ 4143 rc = -EIO; /* bad smb */
@@ -4223,7 +4223,7 @@ UnixQPathInfoRetry:
4223 rc = validate_t2((struct smb_t2_rsp *)pSMBr); 4223 rc = validate_t2((struct smb_t2_rsp *)pSMBr);
4224 4224
4225 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) { 4225 if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) {
4226 cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response.\n" 4226 cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response. "
4227 "Unix Extensions can be disabled on mount " 4227 "Unix Extensions can be disabled on mount "
4228 "by specifying the nosfu mount option."); 4228 "by specifying the nosfu mount option.");
4229 rc = -EIO; /* bad smb */ 4229 rc = -EIO; /* bad smb */
@@ -4675,7 +4675,7 @@ parse_DFS_referrals(TRANSACTION2_GET_DFS_REFER_RSP *pSMBr,
4675 4675
4676 if (*num_of_nodes < 1) { 4676 if (*num_of_nodes < 1) {
4677 cERROR(1, "num_referrals: must be at least > 0," 4677 cERROR(1, "num_referrals: must be at least > 0,"
4678 "but we get num_referrals = %d\n", *num_of_nodes); 4678 "but we get num_referrals = %d", *num_of_nodes);
4679 rc = -EINVAL; 4679 rc = -EINVAL;
4680 goto parse_DFS_referrals_exit; 4680 goto parse_DFS_referrals_exit;
4681 } 4681 }
@@ -4692,14 +4692,14 @@ parse_DFS_referrals(TRANSACTION2_GET_DFS_REFER_RSP *pSMBr,
4692 data_end = (char *)(&(pSMBr->PathConsumed)) + 4692 data_end = (char *)(&(pSMBr->PathConsumed)) +
4693 le16_to_cpu(pSMBr->t2.DataCount); 4693 le16_to_cpu(pSMBr->t2.DataCount);
4694 4694
4695 cFYI(1, "num_referrals: %d dfs flags: 0x%x ...\n", 4695 cFYI(1, "num_referrals: %d dfs flags: 0x%x ...",
4696 *num_of_nodes, 4696 *num_of_nodes,
4697 le32_to_cpu(pSMBr->DFSFlags)); 4697 le32_to_cpu(pSMBr->DFSFlags));
4698 4698
4699 *target_nodes = kzalloc(sizeof(struct dfs_info3_param) * 4699 *target_nodes = kzalloc(sizeof(struct dfs_info3_param) *
4700 *num_of_nodes, GFP_KERNEL); 4700 *num_of_nodes, GFP_KERNEL);
4701 if (*target_nodes == NULL) { 4701 if (*target_nodes == NULL) {
4702 cERROR(1, "Failed to allocate buffer for target_nodes\n"); 4702 cERROR(1, "Failed to allocate buffer for target_nodes");
4703 rc = -ENOMEM; 4703 rc = -ENOMEM;
4704 goto parse_DFS_referrals_exit; 4704 goto parse_DFS_referrals_exit;
4705 } 4705 }
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
index 94b7788c3189..e8c3e6b2af8a 100644
--- a/fs/cifs/connect.c
+++ b/fs/cifs/connect.c
@@ -2412,7 +2412,7 @@ cifs_put_smb_ses(struct cifs_ses *ses)
2412 int xid; 2412 int xid;
2413 struct TCP_Server_Info *server = ses->server; 2413 struct TCP_Server_Info *server = ses->server;
2414 2414
2415 cFYI(1, "%s: ses_count=%d\n", __func__, ses->ses_count); 2415 cFYI(1, "%s: ses_count=%d", __func__, ses->ses_count);
2416 spin_lock(&cifs_tcp_ses_lock); 2416 spin_lock(&cifs_tcp_ses_lock);
2417 if (--ses->ses_count > 0) { 2417 if (--ses->ses_count > 0) {
2418 spin_unlock(&cifs_tcp_ses_lock); 2418 spin_unlock(&cifs_tcp_ses_lock);
@@ -2700,7 +2700,7 @@ cifs_put_tcon(struct cifs_tcon *tcon)
2700 int xid; 2700 int xid;
2701 struct cifs_ses *ses = tcon->ses; 2701 struct cifs_ses *ses = tcon->ses;
2702 2702
2703 cFYI(1, "%s: tc_count=%d\n", __func__, tcon->tc_count); 2703 cFYI(1, "%s: tc_count=%d", __func__, tcon->tc_count);
2704 spin_lock(&cifs_tcp_ses_lock); 2704 spin_lock(&cifs_tcp_ses_lock);
2705 if (--tcon->tc_count > 0) { 2705 if (--tcon->tc_count > 0) {
2706 spin_unlock(&cifs_tcp_ses_lock); 2706 spin_unlock(&cifs_tcp_ses_lock);
@@ -3009,11 +3009,11 @@ bind_socket(struct TCP_Server_Info *server)
3009 saddr6 = (struct sockaddr_in6 *)&server->srcaddr; 3009 saddr6 = (struct sockaddr_in6 *)&server->srcaddr;
3010 if (saddr6->sin6_family == AF_INET6) 3010 if (saddr6->sin6_family == AF_INET6)
3011 cERROR(1, "cifs: " 3011 cERROR(1, "cifs: "
3012 "Failed to bind to: %pI6c, error: %d\n", 3012 "Failed to bind to: %pI6c, error: %d",
3013 &saddr6->sin6_addr, rc); 3013 &saddr6->sin6_addr, rc);
3014 else 3014 else
3015 cERROR(1, "cifs: " 3015 cERROR(1, "cifs: "
3016 "Failed to bind to: %pI4, error: %d\n", 3016 "Failed to bind to: %pI4, error: %d",
3017 &saddr4->sin_addr.s_addr, rc); 3017 &saddr4->sin_addr.s_addr, rc);
3018 } 3018 }
3019 } 3019 }
@@ -3304,9 +3304,9 @@ void reset_cifs_unix_caps(int xid, struct cifs_tcon *tcon,
3304 cFYI(1, "resetting capabilities failed"); 3304 cFYI(1, "resetting capabilities failed");
3305 } else 3305 } else
3306 cERROR(1, "Negotiating Unix capabilities " 3306 cERROR(1, "Negotiating Unix capabilities "
3307 "with the server failed. Consider " 3307 "with the server failed. Consider "
3308 "mounting with the Unix Extensions\n" 3308 "mounting with the Unix Extensions "
3309 "disabled, if problems are found, " 3309 "disabled if problems are found "
3310 "by specifying the nounix mount " 3310 "by specifying the nounix mount "
3311 "option."); 3311 "option.");
3312 3312
diff --git a/fs/cifs/file.c b/fs/cifs/file.c
index 513adbc211d7..dd28caa0a5ce 100644
--- a/fs/cifs/file.c
+++ b/fs/cifs/file.c
@@ -3169,7 +3169,7 @@ static int cifs_readpage(struct file *file, struct page *page)
3169 return rc; 3169 return rc;
3170 } 3170 }
3171 3171
3172 cFYI(1, "readpage %p at offset %d 0x%x\n", 3172 cFYI(1, "readpage %p at offset %d 0x%x",
3173 page, (int)offset, (int)offset); 3173 page, (int)offset, (int)offset);
3174 3174
3175 rc = cifs_readpage_worker(file, page, &offset); 3175 rc = cifs_readpage_worker(file, page, &offset);
diff --git a/fs/cifs/link.c b/fs/cifs/link.c
index 6b0e06434391..90d8add2a2a9 100644
--- a/fs/cifs/link.c
+++ b/fs/cifs/link.c
@@ -56,14 +56,14 @@ symlink_hash(unsigned int link_len, const char *link_str, u8 *md5_hash)
56 md5 = crypto_alloc_shash("md5", 0, 0); 56 md5 = crypto_alloc_shash("md5", 0, 0);
57 if (IS_ERR(md5)) { 57 if (IS_ERR(md5)) {
58 rc = PTR_ERR(md5); 58 rc = PTR_ERR(md5);
59 cERROR(1, "%s: Crypto md5 allocation error %d\n", __func__, rc); 59 cERROR(1, "%s: Crypto md5 allocation error %d", __func__, rc);
60 return rc; 60 return rc;
61 } 61 }
62 size = sizeof(struct shash_desc) + crypto_shash_descsize(md5); 62 size = sizeof(struct shash_desc) + crypto_shash_descsize(md5);
63 sdescmd5 = kmalloc(size, GFP_KERNEL); 63 sdescmd5 = kmalloc(size, GFP_KERNEL);
64 if (!sdescmd5) { 64 if (!sdescmd5) {
65 rc = -ENOMEM; 65 rc = -ENOMEM;
66 cERROR(1, "%s: Memory allocation failure\n", __func__); 66 cERROR(1, "%s: Memory allocation failure", __func__);
67 goto symlink_hash_err; 67 goto symlink_hash_err;
68 } 68 }
69 sdescmd5->shash.tfm = md5; 69 sdescmd5->shash.tfm = md5;
@@ -71,17 +71,17 @@ symlink_hash(unsigned int link_len, const char *link_str, u8 *md5_hash)
71 71
72 rc = crypto_shash_init(&sdescmd5->shash); 72 rc = crypto_shash_init(&sdescmd5->shash);
73 if (rc) { 73 if (rc) {
74 cERROR(1, "%s: Could not init md5 shash\n", __func__); 74 cERROR(1, "%s: Could not init md5 shash", __func__);
75 goto symlink_hash_err; 75 goto symlink_hash_err;
76 } 76 }
77 rc = crypto_shash_update(&sdescmd5->shash, link_str, link_len); 77 rc = crypto_shash_update(&sdescmd5->shash, link_str, link_len);
78 if (rc) { 78 if (rc) {
79 cERROR(1, "%s: Could not update iwth link_str\n", __func__); 79 cERROR(1, "%s: Could not update iwth link_str", __func__);
80 goto symlink_hash_err; 80 goto symlink_hash_err;
81 } 81 }
82 rc = crypto_shash_final(&sdescmd5->shash, md5_hash); 82 rc = crypto_shash_final(&sdescmd5->shash, md5_hash);
83 if (rc) 83 if (rc)
84 cERROR(1, "%s: Could not generate md5 hash\n", __func__); 84 cERROR(1, "%s: Could not generate md5 hash", __func__);
85 85
86symlink_hash_err: 86symlink_hash_err:
87 crypto_free_shash(md5); 87 crypto_free_shash(md5);
@@ -115,7 +115,7 @@ CIFSParseMFSymlink(const u8 *buf,
115 115
116 rc = symlink_hash(link_len, link_str, md5_hash); 116 rc = symlink_hash(link_len, link_str, md5_hash);
117 if (rc) { 117 if (rc) {
118 cFYI(1, "%s: MD5 hash failure: %d\n", __func__, rc); 118 cFYI(1, "%s: MD5 hash failure: %d", __func__, rc);
119 return rc; 119 return rc;
120 } 120 }
121 121
@@ -154,7 +154,7 @@ CIFSFormatMFSymlink(u8 *buf, unsigned int buf_len, const char *link_str)
154 154
155 rc = symlink_hash(link_len, link_str, md5_hash); 155 rc = symlink_hash(link_len, link_str, md5_hash);
156 if (rc) { 156 if (rc) {
157 cFYI(1, "%s: MD5 hash failure: %d\n", __func__, rc); 157 cFYI(1, "%s: MD5 hash failure: %d", __func__, rc);
158 return rc; 158 return rc;
159 } 159 }
160 160
diff --git a/fs/cifs/smbencrypt.c b/fs/cifs/smbencrypt.c
index d5cd9aa7eacc..a0a58fbe2c10 100644
--- a/fs/cifs/smbencrypt.c
+++ b/fs/cifs/smbencrypt.c
@@ -78,7 +78,7 @@ smbhash(unsigned char *out, const unsigned char *in, unsigned char *key)
78 tfm_des = crypto_alloc_blkcipher("ecb(des)", 0, CRYPTO_ALG_ASYNC); 78 tfm_des = crypto_alloc_blkcipher("ecb(des)", 0, CRYPTO_ALG_ASYNC);
79 if (IS_ERR(tfm_des)) { 79 if (IS_ERR(tfm_des)) {
80 rc = PTR_ERR(tfm_des); 80 rc = PTR_ERR(tfm_des);
81 cERROR(1, "could not allocate des crypto API\n"); 81 cERROR(1, "could not allocate des crypto API");
82 goto smbhash_err; 82 goto smbhash_err;
83 } 83 }
84 84
@@ -91,7 +91,7 @@ smbhash(unsigned char *out, const unsigned char *in, unsigned char *key)
91 91
92 rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, 8); 92 rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, 8);
93 if (rc) 93 if (rc)
94 cERROR(1, "could not encrypt crypt key rc: %d\n", rc); 94 cERROR(1, "could not encrypt crypt key rc: %d", rc);
95 95
96 crypto_free_blkcipher(tfm_des); 96 crypto_free_blkcipher(tfm_des);
97smbhash_err: 97smbhash_err:
@@ -139,14 +139,14 @@ mdfour(unsigned char *md4_hash, unsigned char *link_str, int link_len)
139 md4 = crypto_alloc_shash("md4", 0, 0); 139 md4 = crypto_alloc_shash("md4", 0, 0);
140 if (IS_ERR(md4)) { 140 if (IS_ERR(md4)) {
141 rc = PTR_ERR(md4); 141 rc = PTR_ERR(md4);
142 cERROR(1, "%s: Crypto md4 allocation error %d\n", __func__, rc); 142 cERROR(1, "%s: Crypto md4 allocation error %d", __func__, rc);
143 return rc; 143 return rc;
144 } 144 }
145 size = sizeof(struct shash_desc) + crypto_shash_descsize(md4); 145 size = sizeof(struct shash_desc) + crypto_shash_descsize(md4);
146 sdescmd4 = kmalloc(size, GFP_KERNEL); 146 sdescmd4 = kmalloc(size, GFP_KERNEL);
147 if (!sdescmd4) { 147 if (!sdescmd4) {
148 rc = -ENOMEM; 148 rc = -ENOMEM;
149 cERROR(1, "%s: Memory allocation failure\n", __func__); 149 cERROR(1, "%s: Memory allocation failure", __func__);
150 goto mdfour_err; 150 goto mdfour_err;
151 } 151 }
152 sdescmd4->shash.tfm = md4; 152 sdescmd4->shash.tfm = md4;
@@ -154,17 +154,17 @@ mdfour(unsigned char *md4_hash, unsigned char *link_str, int link_len)
154 154
155 rc = crypto_shash_init(&sdescmd4->shash); 155 rc = crypto_shash_init(&sdescmd4->shash);
156 if (rc) { 156 if (rc) {
157 cERROR(1, "%s: Could not init md4 shash\n", __func__); 157 cERROR(1, "%s: Could not init md4 shash", __func__);
158 goto mdfour_err; 158 goto mdfour_err;
159 } 159 }
160 rc = crypto_shash_update(&sdescmd4->shash, link_str, link_len); 160 rc = crypto_shash_update(&sdescmd4->shash, link_str, link_len);
161 if (rc) { 161 if (rc) {
162 cERROR(1, "%s: Could not update with link_str\n", __func__); 162 cERROR(1, "%s: Could not update with link_str", __func__);
163 goto mdfour_err; 163 goto mdfour_err;
164 } 164 }
165 rc = crypto_shash_final(&sdescmd4->shash, md4_hash); 165 rc = crypto_shash_final(&sdescmd4->shash, md4_hash);
166 if (rc) 166 if (rc)
167 cERROR(1, "%s: Could not genereate md4 hash\n", __func__); 167 cERROR(1, "%s: Could not genereate md4 hash", __func__);
168 168
169mdfour_err: 169mdfour_err:
170 crypto_free_shash(md4); 170 crypto_free_shash(md4);