diff options
author | Jeff Layton <jlayton@redhat.com> | 2012-07-23 13:14:28 -0400 |
---|---|---|
committer | Steve French <smfrench@gmail.com> | 2012-07-23 17:36:26 -0400 |
commit | ac3aa2f8ae29c186c4742d15e39712af417c6d68 (patch) | |
tree | c2cc038cf4ad883d0f4085c5430db14af27e1328 | |
parent | 00401ff780c58b9dabffef668386c206efc71c7c (diff) |
cifs: remove extraneous newlines from cERROR and cFYI calls
Those macros add a newline on their own, so there's not any need to
embed one in the message itself.
Signed-off-by: Jeff Layton <jlayton@redhat.com>
Signed-off-by: Steve French <smfrench@gmail.com>
-rw-r--r-- | fs/cifs/cache.c | 2 | ||||
-rw-r--r-- | fs/cifs/cifsacl.c | 6 | ||||
-rw-r--r-- | fs/cifs/cifsencrypt.c | 48 | ||||
-rw-r--r-- | fs/cifs/cifssmb.c | 10 | ||||
-rw-r--r-- | fs/cifs/connect.c | 14 | ||||
-rw-r--r-- | fs/cifs/file.c | 2 | ||||
-rw-r--r-- | fs/cifs/link.c | 14 | ||||
-rw-r--r-- | fs/cifs/smbencrypt.c | 14 |
8 files changed, 55 insertions, 55 deletions
diff --git a/fs/cifs/cache.c b/fs/cifs/cache.c index 545509c3313b..282d6de7e410 100644 --- a/fs/cifs/cache.c +++ b/fs/cifs/cache.c | |||
@@ -152,7 +152,7 @@ static uint16_t cifs_super_get_key(const void *cookie_netfs_data, void *buffer, | |||
152 | 152 | ||
153 | sharename = extract_sharename(tcon->treeName); | 153 | sharename = extract_sharename(tcon->treeName); |
154 | if (IS_ERR(sharename)) { | 154 | if (IS_ERR(sharename)) { |
155 | cFYI(1, "%s: couldn't extract sharename\n", __func__); | 155 | cFYI(1, "%s: couldn't extract sharename", __func__); |
156 | sharename = NULL; | 156 | sharename = NULL; |
157 | return 0; | 157 | return 0; |
158 | } | 158 | } |
diff --git a/fs/cifs/cifsacl.c b/fs/cifs/cifsacl.c index 3cc1b251ca08..1885da4fca82 100644 --- a/fs/cifs/cifsacl.c +++ b/fs/cifs/cifsacl.c | |||
@@ -525,7 +525,7 @@ init_cifs_idmap(void) | |||
525 | struct key *keyring; | 525 | struct key *keyring; |
526 | int ret; | 526 | int ret; |
527 | 527 | ||
528 | cFYI(1, "Registering the %s key type\n", cifs_idmap_key_type.name); | 528 | cFYI(1, "Registering the %s key type", cifs_idmap_key_type.name); |
529 | 529 | ||
530 | /* create an override credential set with a special thread keyring in | 530 | /* create an override credential set with a special thread keyring in |
531 | * which requests are cached | 531 | * which requests are cached |
@@ -572,7 +572,7 @@ init_cifs_idmap(void) | |||
572 | sidgidtree = RB_ROOT; | 572 | sidgidtree = RB_ROOT; |
573 | register_shrinker(&cifs_shrinker); | 573 | register_shrinker(&cifs_shrinker); |
574 | 574 | ||
575 | cFYI(1, "cifs idmap keyring: %d\n", key_serial(keyring)); | 575 | cFYI(1, "cifs idmap keyring: %d", key_serial(keyring)); |
576 | return 0; | 576 | return 0; |
577 | 577 | ||
578 | failed_put_key: | 578 | failed_put_key: |
@@ -589,7 +589,7 @@ exit_cifs_idmap(void) | |||
589 | unregister_key_type(&cifs_idmap_key_type); | 589 | unregister_key_type(&cifs_idmap_key_type); |
590 | put_cred(root_cred); | 590 | put_cred(root_cred); |
591 | unregister_shrinker(&cifs_shrinker); | 591 | unregister_shrinker(&cifs_shrinker); |
592 | cFYI(1, "Unregistered %s key type\n", cifs_idmap_key_type.name); | 592 | cFYI(1, "Unregistered %s key type", cifs_idmap_key_type.name); |
593 | } | 593 | } |
594 | 594 | ||
595 | void | 595 | void |
diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c index 63c460e503b6..db768cb67e38 100644 --- a/fs/cifs/cifsencrypt.c +++ b/fs/cifs/cifsencrypt.c | |||
@@ -47,20 +47,20 @@ static int cifs_calc_signature(const struct kvec *iov, int n_vec, | |||
47 | return -EINVAL; | 47 | return -EINVAL; |
48 | 48 | ||
49 | if (!server->secmech.sdescmd5) { | 49 | if (!server->secmech.sdescmd5) { |
50 | cERROR(1, "%s: Can't generate signature\n", __func__); | 50 | cERROR(1, "%s: Can't generate signature", __func__); |
51 | return -1; | 51 | return -1; |
52 | } | 52 | } |
53 | 53 | ||
54 | rc = crypto_shash_init(&server->secmech.sdescmd5->shash); | 54 | rc = crypto_shash_init(&server->secmech.sdescmd5->shash); |
55 | if (rc) { | 55 | if (rc) { |
56 | cERROR(1, "%s: Could not init md5\n", __func__); | 56 | cERROR(1, "%s: Could not init md5", __func__); |
57 | return rc; | 57 | return rc; |
58 | } | 58 | } |
59 | 59 | ||
60 | rc = crypto_shash_update(&server->secmech.sdescmd5->shash, | 60 | rc = crypto_shash_update(&server->secmech.sdescmd5->shash, |
61 | server->session_key.response, server->session_key.len); | 61 | server->session_key.response, server->session_key.len); |
62 | if (rc) { | 62 | if (rc) { |
63 | cERROR(1, "%s: Could not update with response\n", __func__); | 63 | cERROR(1, "%s: Could not update with response", __func__); |
64 | return rc; | 64 | return rc; |
65 | } | 65 | } |
66 | 66 | ||
@@ -85,7 +85,7 @@ static int cifs_calc_signature(const struct kvec *iov, int n_vec, | |||
85 | iov[i].iov_base, iov[i].iov_len); | 85 | iov[i].iov_base, iov[i].iov_len); |
86 | } | 86 | } |
87 | if (rc) { | 87 | if (rc) { |
88 | cERROR(1, "%s: Could not update with payload\n", | 88 | cERROR(1, "%s: Could not update with payload", |
89 | __func__); | 89 | __func__); |
90 | return rc; | 90 | return rc; |
91 | } | 91 | } |
@@ -93,7 +93,7 @@ static int cifs_calc_signature(const struct kvec *iov, int n_vec, | |||
93 | 93 | ||
94 | rc = crypto_shash_final(&server->secmech.sdescmd5->shash, signature); | 94 | rc = crypto_shash_final(&server->secmech.sdescmd5->shash, signature); |
95 | if (rc) | 95 | if (rc) |
96 | cERROR(1, "%s: Could not generate md5 hash\n", __func__); | 96 | cERROR(1, "%s: Could not generate md5 hash", __func__); |
97 | 97 | ||
98 | return rc; | 98 | return rc; |
99 | } | 99 | } |
@@ -399,7 +399,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash, | |||
399 | wchar_t *server; | 399 | wchar_t *server; |
400 | 400 | ||
401 | if (!ses->server->secmech.sdeschmacmd5) { | 401 | if (!ses->server->secmech.sdeschmacmd5) { |
402 | cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash\n"); | 402 | cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash"); |
403 | return -1; | 403 | return -1; |
404 | } | 404 | } |
405 | 405 | ||
@@ -415,7 +415,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash, | |||
415 | 415 | ||
416 | rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash); | 416 | rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash); |
417 | if (rc) { | 417 | if (rc) { |
418 | cERROR(1, "calc_ntlmv2_hash: could not init hmacmd5\n"); | 418 | cERROR(1, "calc_ntlmv2_hash: could not init hmacmd5"); |
419 | return rc; | 419 | return rc; |
420 | } | 420 | } |
421 | 421 | ||
@@ -423,7 +423,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash, | |||
423 | len = ses->user_name ? strlen(ses->user_name) : 0; | 423 | len = ses->user_name ? strlen(ses->user_name) : 0; |
424 | user = kmalloc(2 + (len * 2), GFP_KERNEL); | 424 | user = kmalloc(2 + (len * 2), GFP_KERNEL); |
425 | if (user == NULL) { | 425 | if (user == NULL) { |
426 | cERROR(1, "calc_ntlmv2_hash: user mem alloc failure\n"); | 426 | cERROR(1, "calc_ntlmv2_hash: user mem alloc failure"); |
427 | rc = -ENOMEM; | 427 | rc = -ENOMEM; |
428 | return rc; | 428 | return rc; |
429 | } | 429 | } |
@@ -439,7 +439,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash, | |||
439 | (char *)user, 2 * len); | 439 | (char *)user, 2 * len); |
440 | kfree(user); | 440 | kfree(user); |
441 | if (rc) { | 441 | if (rc) { |
442 | cERROR(1, "%s: Could not update with user\n", __func__); | 442 | cERROR(1, "%s: Could not update with user", __func__); |
443 | return rc; | 443 | return rc; |
444 | } | 444 | } |
445 | 445 | ||
@@ -460,7 +460,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash, | |||
460 | (char *)domain, 2 * len); | 460 | (char *)domain, 2 * len); |
461 | kfree(domain); | 461 | kfree(domain); |
462 | if (rc) { | 462 | if (rc) { |
463 | cERROR(1, "%s: Could not update with domain\n", | 463 | cERROR(1, "%s: Could not update with domain", |
464 | __func__); | 464 | __func__); |
465 | return rc; | 465 | return rc; |
466 | } | 466 | } |
@@ -480,7 +480,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash, | |||
480 | (char *)server, 2 * len); | 480 | (char *)server, 2 * len); |
481 | kfree(server); | 481 | kfree(server); |
482 | if (rc) { | 482 | if (rc) { |
483 | cERROR(1, "%s: Could not update with server\n", | 483 | cERROR(1, "%s: Could not update with server", |
484 | __func__); | 484 | __func__); |
485 | return rc; | 485 | return rc; |
486 | } | 486 | } |
@@ -489,7 +489,7 @@ static int calc_ntlmv2_hash(struct cifs_ses *ses, char *ntlmv2_hash, | |||
489 | rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, | 489 | rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, |
490 | ntlmv2_hash); | 490 | ntlmv2_hash); |
491 | if (rc) | 491 | if (rc) |
492 | cERROR(1, "%s: Could not generate md5 hash\n", __func__); | 492 | cERROR(1, "%s: Could not generate md5 hash", __func__); |
493 | 493 | ||
494 | return rc; | 494 | return rc; |
495 | } | 495 | } |
@@ -501,7 +501,7 @@ CalcNTLMv2_response(const struct cifs_ses *ses, char *ntlmv2_hash) | |||
501 | unsigned int offset = CIFS_SESS_KEY_SIZE + 8; | 501 | unsigned int offset = CIFS_SESS_KEY_SIZE + 8; |
502 | 502 | ||
503 | if (!ses->server->secmech.sdeschmacmd5) { | 503 | if (!ses->server->secmech.sdeschmacmd5) { |
504 | cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash\n"); | 504 | cERROR(1, "calc_ntlmv2_hash: can't generate ntlmv2 hash"); |
505 | return -1; | 505 | return -1; |
506 | } | 506 | } |
507 | 507 | ||
@@ -527,14 +527,14 @@ CalcNTLMv2_response(const struct cifs_ses *ses, char *ntlmv2_hash) | |||
527 | rc = crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash, | 527 | rc = crypto_shash_update(&ses->server->secmech.sdeschmacmd5->shash, |
528 | ses->auth_key.response + offset, ses->auth_key.len - offset); | 528 | ses->auth_key.response + offset, ses->auth_key.len - offset); |
529 | if (rc) { | 529 | if (rc) { |
530 | cERROR(1, "%s: Could not update with response\n", __func__); | 530 | cERROR(1, "%s: Could not update with response", __func__); |
531 | return rc; | 531 | return rc; |
532 | } | 532 | } |
533 | 533 | ||
534 | rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, | 534 | rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, |
535 | ses->auth_key.response + CIFS_SESS_KEY_SIZE); | 535 | ses->auth_key.response + CIFS_SESS_KEY_SIZE); |
536 | if (rc) | 536 | if (rc) |
537 | cERROR(1, "%s: Could not generate md5 hash\n", __func__); | 537 | cERROR(1, "%s: Could not generate md5 hash", __func__); |
538 | 538 | ||
539 | return rc; | 539 | return rc; |
540 | } | 540 | } |
@@ -613,7 +613,7 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp) | |||
613 | 613 | ||
614 | rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash); | 614 | rc = crypto_shash_init(&ses->server->secmech.sdeschmacmd5->shash); |
615 | if (rc) { | 615 | if (rc) { |
616 | cERROR(1, "%s: Could not init hmacmd5\n", __func__); | 616 | cERROR(1, "%s: Could not init hmacmd5", __func__); |
617 | goto setup_ntlmv2_rsp_ret; | 617 | goto setup_ntlmv2_rsp_ret; |
618 | } | 618 | } |
619 | 619 | ||
@@ -621,14 +621,14 @@ setup_ntlmv2_rsp(struct cifs_ses *ses, const struct nls_table *nls_cp) | |||
621 | ses->auth_key.response + CIFS_SESS_KEY_SIZE, | 621 | ses->auth_key.response + CIFS_SESS_KEY_SIZE, |
622 | CIFS_HMAC_MD5_HASH_SIZE); | 622 | CIFS_HMAC_MD5_HASH_SIZE); |
623 | if (rc) { | 623 | if (rc) { |
624 | cERROR(1, "%s: Could not update with response\n", __func__); | 624 | cERROR(1, "%s: Could not update with response", __func__); |
625 | goto setup_ntlmv2_rsp_ret; | 625 | goto setup_ntlmv2_rsp_ret; |
626 | } | 626 | } |
627 | 627 | ||
628 | rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, | 628 | rc = crypto_shash_final(&ses->server->secmech.sdeschmacmd5->shash, |
629 | ses->auth_key.response); | 629 | ses->auth_key.response); |
630 | if (rc) | 630 | if (rc) |
631 | cERROR(1, "%s: Could not generate md5 hash\n", __func__); | 631 | cERROR(1, "%s: Could not generate md5 hash", __func__); |
632 | 632 | ||
633 | setup_ntlmv2_rsp_ret: | 633 | setup_ntlmv2_rsp_ret: |
634 | kfree(tiblob); | 634 | kfree(tiblob); |
@@ -650,7 +650,7 @@ calc_seckey(struct cifs_ses *ses) | |||
650 | tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, CRYPTO_ALG_ASYNC); | 650 | tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, CRYPTO_ALG_ASYNC); |
651 | if (IS_ERR(tfm_arc4)) { | 651 | if (IS_ERR(tfm_arc4)) { |
652 | rc = PTR_ERR(tfm_arc4); | 652 | rc = PTR_ERR(tfm_arc4); |
653 | cERROR(1, "could not allocate crypto API arc4\n"); | 653 | cERROR(1, "could not allocate crypto API arc4"); |
654 | return rc; | 654 | return rc; |
655 | } | 655 | } |
656 | 656 | ||
@@ -668,7 +668,7 @@ calc_seckey(struct cifs_ses *ses) | |||
668 | 668 | ||
669 | rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, CIFS_CPHTXT_SIZE); | 669 | rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, CIFS_CPHTXT_SIZE); |
670 | if (rc) { | 670 | if (rc) { |
671 | cERROR(1, "could not encrypt session key rc: %d\n", rc); | 671 | cERROR(1, "could not encrypt session key rc: %d", rc); |
672 | crypto_free_blkcipher(tfm_arc4); | 672 | crypto_free_blkcipher(tfm_arc4); |
673 | return rc; | 673 | return rc; |
674 | } | 674 | } |
@@ -705,13 +705,13 @@ cifs_crypto_shash_allocate(struct TCP_Server_Info *server) | |||
705 | 705 | ||
706 | server->secmech.hmacmd5 = crypto_alloc_shash("hmac(md5)", 0, 0); | 706 | server->secmech.hmacmd5 = crypto_alloc_shash("hmac(md5)", 0, 0); |
707 | if (IS_ERR(server->secmech.hmacmd5)) { | 707 | if (IS_ERR(server->secmech.hmacmd5)) { |
708 | cERROR(1, "could not allocate crypto hmacmd5\n"); | 708 | cERROR(1, "could not allocate crypto hmacmd5"); |
709 | return PTR_ERR(server->secmech.hmacmd5); | 709 | return PTR_ERR(server->secmech.hmacmd5); |
710 | } | 710 | } |
711 | 711 | ||
712 | server->secmech.md5 = crypto_alloc_shash("md5", 0, 0); | 712 | server->secmech.md5 = crypto_alloc_shash("md5", 0, 0); |
713 | if (IS_ERR(server->secmech.md5)) { | 713 | if (IS_ERR(server->secmech.md5)) { |
714 | cERROR(1, "could not allocate crypto md5\n"); | 714 | cERROR(1, "could not allocate crypto md5"); |
715 | rc = PTR_ERR(server->secmech.md5); | 715 | rc = PTR_ERR(server->secmech.md5); |
716 | goto crypto_allocate_md5_fail; | 716 | goto crypto_allocate_md5_fail; |
717 | } | 717 | } |
@@ -720,7 +720,7 @@ cifs_crypto_shash_allocate(struct TCP_Server_Info *server) | |||
720 | crypto_shash_descsize(server->secmech.hmacmd5); | 720 | crypto_shash_descsize(server->secmech.hmacmd5); |
721 | server->secmech.sdeschmacmd5 = kmalloc(size, GFP_KERNEL); | 721 | server->secmech.sdeschmacmd5 = kmalloc(size, GFP_KERNEL); |
722 | if (!server->secmech.sdeschmacmd5) { | 722 | if (!server->secmech.sdeschmacmd5) { |
723 | cERROR(1, "cifs_crypto_shash_allocate: can't alloc hmacmd5\n"); | 723 | cERROR(1, "cifs_crypto_shash_allocate: can't alloc hmacmd5"); |
724 | rc = -ENOMEM; | 724 | rc = -ENOMEM; |
725 | goto crypto_allocate_hmacmd5_sdesc_fail; | 725 | goto crypto_allocate_hmacmd5_sdesc_fail; |
726 | } | 726 | } |
@@ -732,7 +732,7 @@ cifs_crypto_shash_allocate(struct TCP_Server_Info *server) | |||
732 | crypto_shash_descsize(server->secmech.md5); | 732 | crypto_shash_descsize(server->secmech.md5); |
733 | server->secmech.sdescmd5 = kmalloc(size, GFP_KERNEL); | 733 | server->secmech.sdescmd5 = kmalloc(size, GFP_KERNEL); |
734 | if (!server->secmech.sdescmd5) { | 734 | if (!server->secmech.sdescmd5) { |
735 | cERROR(1, "cifs_crypto_shash_allocate: can't alloc md5\n"); | 735 | cERROR(1, "cifs_crypto_shash_allocate: can't alloc md5"); |
736 | rc = -ENOMEM; | 736 | rc = -ENOMEM; |
737 | goto crypto_allocate_md5_sdesc_fail; | 737 | goto crypto_allocate_md5_sdesc_fail; |
738 | } | 738 | } |
diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c index 4ee522b3f66f..684a0723021f 100644 --- a/fs/cifs/cifssmb.c +++ b/fs/cifs/cifssmb.c | |||
@@ -4137,7 +4137,7 @@ UnixQFileInfoRetry: | |||
4137 | rc = validate_t2((struct smb_t2_rsp *)pSMBr); | 4137 | rc = validate_t2((struct smb_t2_rsp *)pSMBr); |
4138 | 4138 | ||
4139 | if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) { | 4139 | if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) { |
4140 | cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response.\n" | 4140 | cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response. " |
4141 | "Unix Extensions can be disabled on mount " | 4141 | "Unix Extensions can be disabled on mount " |
4142 | "by specifying the nosfu mount option."); | 4142 | "by specifying the nosfu mount option."); |
4143 | rc = -EIO; /* bad smb */ | 4143 | rc = -EIO; /* bad smb */ |
@@ -4223,7 +4223,7 @@ UnixQPathInfoRetry: | |||
4223 | rc = validate_t2((struct smb_t2_rsp *)pSMBr); | 4223 | rc = validate_t2((struct smb_t2_rsp *)pSMBr); |
4224 | 4224 | ||
4225 | if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) { | 4225 | if (rc || get_bcc(&pSMBr->hdr) < sizeof(FILE_UNIX_BASIC_INFO)) { |
4226 | cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response.\n" | 4226 | cERROR(1, "Malformed FILE_UNIX_BASIC_INFO response. " |
4227 | "Unix Extensions can be disabled on mount " | 4227 | "Unix Extensions can be disabled on mount " |
4228 | "by specifying the nosfu mount option."); | 4228 | "by specifying the nosfu mount option."); |
4229 | rc = -EIO; /* bad smb */ | 4229 | rc = -EIO; /* bad smb */ |
@@ -4675,7 +4675,7 @@ parse_DFS_referrals(TRANSACTION2_GET_DFS_REFER_RSP *pSMBr, | |||
4675 | 4675 | ||
4676 | if (*num_of_nodes < 1) { | 4676 | if (*num_of_nodes < 1) { |
4677 | cERROR(1, "num_referrals: must be at least > 0," | 4677 | cERROR(1, "num_referrals: must be at least > 0," |
4678 | "but we get num_referrals = %d\n", *num_of_nodes); | 4678 | "but we get num_referrals = %d", *num_of_nodes); |
4679 | rc = -EINVAL; | 4679 | rc = -EINVAL; |
4680 | goto parse_DFS_referrals_exit; | 4680 | goto parse_DFS_referrals_exit; |
4681 | } | 4681 | } |
@@ -4692,14 +4692,14 @@ parse_DFS_referrals(TRANSACTION2_GET_DFS_REFER_RSP *pSMBr, | |||
4692 | data_end = (char *)(&(pSMBr->PathConsumed)) + | 4692 | data_end = (char *)(&(pSMBr->PathConsumed)) + |
4693 | le16_to_cpu(pSMBr->t2.DataCount); | 4693 | le16_to_cpu(pSMBr->t2.DataCount); |
4694 | 4694 | ||
4695 | cFYI(1, "num_referrals: %d dfs flags: 0x%x ...\n", | 4695 | cFYI(1, "num_referrals: %d dfs flags: 0x%x ...", |
4696 | *num_of_nodes, | 4696 | *num_of_nodes, |
4697 | le32_to_cpu(pSMBr->DFSFlags)); | 4697 | le32_to_cpu(pSMBr->DFSFlags)); |
4698 | 4698 | ||
4699 | *target_nodes = kzalloc(sizeof(struct dfs_info3_param) * | 4699 | *target_nodes = kzalloc(sizeof(struct dfs_info3_param) * |
4700 | *num_of_nodes, GFP_KERNEL); | 4700 | *num_of_nodes, GFP_KERNEL); |
4701 | if (*target_nodes == NULL) { | 4701 | if (*target_nodes == NULL) { |
4702 | cERROR(1, "Failed to allocate buffer for target_nodes\n"); | 4702 | cERROR(1, "Failed to allocate buffer for target_nodes"); |
4703 | rc = -ENOMEM; | 4703 | rc = -ENOMEM; |
4704 | goto parse_DFS_referrals_exit; | 4704 | goto parse_DFS_referrals_exit; |
4705 | } | 4705 | } |
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c index 94b7788c3189..e8c3e6b2af8a 100644 --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c | |||
@@ -2412,7 +2412,7 @@ cifs_put_smb_ses(struct cifs_ses *ses) | |||
2412 | int xid; | 2412 | int xid; |
2413 | struct TCP_Server_Info *server = ses->server; | 2413 | struct TCP_Server_Info *server = ses->server; |
2414 | 2414 | ||
2415 | cFYI(1, "%s: ses_count=%d\n", __func__, ses->ses_count); | 2415 | cFYI(1, "%s: ses_count=%d", __func__, ses->ses_count); |
2416 | spin_lock(&cifs_tcp_ses_lock); | 2416 | spin_lock(&cifs_tcp_ses_lock); |
2417 | if (--ses->ses_count > 0) { | 2417 | if (--ses->ses_count > 0) { |
2418 | spin_unlock(&cifs_tcp_ses_lock); | 2418 | spin_unlock(&cifs_tcp_ses_lock); |
@@ -2700,7 +2700,7 @@ cifs_put_tcon(struct cifs_tcon *tcon) | |||
2700 | int xid; | 2700 | int xid; |
2701 | struct cifs_ses *ses = tcon->ses; | 2701 | struct cifs_ses *ses = tcon->ses; |
2702 | 2702 | ||
2703 | cFYI(1, "%s: tc_count=%d\n", __func__, tcon->tc_count); | 2703 | cFYI(1, "%s: tc_count=%d", __func__, tcon->tc_count); |
2704 | spin_lock(&cifs_tcp_ses_lock); | 2704 | spin_lock(&cifs_tcp_ses_lock); |
2705 | if (--tcon->tc_count > 0) { | 2705 | if (--tcon->tc_count > 0) { |
2706 | spin_unlock(&cifs_tcp_ses_lock); | 2706 | spin_unlock(&cifs_tcp_ses_lock); |
@@ -3009,11 +3009,11 @@ bind_socket(struct TCP_Server_Info *server) | |||
3009 | saddr6 = (struct sockaddr_in6 *)&server->srcaddr; | 3009 | saddr6 = (struct sockaddr_in6 *)&server->srcaddr; |
3010 | if (saddr6->sin6_family == AF_INET6) | 3010 | if (saddr6->sin6_family == AF_INET6) |
3011 | cERROR(1, "cifs: " | 3011 | cERROR(1, "cifs: " |
3012 | "Failed to bind to: %pI6c, error: %d\n", | 3012 | "Failed to bind to: %pI6c, error: %d", |
3013 | &saddr6->sin6_addr, rc); | 3013 | &saddr6->sin6_addr, rc); |
3014 | else | 3014 | else |
3015 | cERROR(1, "cifs: " | 3015 | cERROR(1, "cifs: " |
3016 | "Failed to bind to: %pI4, error: %d\n", | 3016 | "Failed to bind to: %pI4, error: %d", |
3017 | &saddr4->sin_addr.s_addr, rc); | 3017 | &saddr4->sin_addr.s_addr, rc); |
3018 | } | 3018 | } |
3019 | } | 3019 | } |
@@ -3304,9 +3304,9 @@ void reset_cifs_unix_caps(int xid, struct cifs_tcon *tcon, | |||
3304 | cFYI(1, "resetting capabilities failed"); | 3304 | cFYI(1, "resetting capabilities failed"); |
3305 | } else | 3305 | } else |
3306 | cERROR(1, "Negotiating Unix capabilities " | 3306 | cERROR(1, "Negotiating Unix capabilities " |
3307 | "with the server failed. Consider " | 3307 | "with the server failed. Consider " |
3308 | "mounting with the Unix Extensions\n" | 3308 | "mounting with the Unix Extensions " |
3309 | "disabled, if problems are found, " | 3309 | "disabled if problems are found " |
3310 | "by specifying the nounix mount " | 3310 | "by specifying the nounix mount " |
3311 | "option."); | 3311 | "option."); |
3312 | 3312 | ||
diff --git a/fs/cifs/file.c b/fs/cifs/file.c index 513adbc211d7..dd28caa0a5ce 100644 --- a/fs/cifs/file.c +++ b/fs/cifs/file.c | |||
@@ -3169,7 +3169,7 @@ static int cifs_readpage(struct file *file, struct page *page) | |||
3169 | return rc; | 3169 | return rc; |
3170 | } | 3170 | } |
3171 | 3171 | ||
3172 | cFYI(1, "readpage %p at offset %d 0x%x\n", | 3172 | cFYI(1, "readpage %p at offset %d 0x%x", |
3173 | page, (int)offset, (int)offset); | 3173 | page, (int)offset, (int)offset); |
3174 | 3174 | ||
3175 | rc = cifs_readpage_worker(file, page, &offset); | 3175 | rc = cifs_readpage_worker(file, page, &offset); |
diff --git a/fs/cifs/link.c b/fs/cifs/link.c index 6b0e06434391..90d8add2a2a9 100644 --- a/fs/cifs/link.c +++ b/fs/cifs/link.c | |||
@@ -56,14 +56,14 @@ symlink_hash(unsigned int link_len, const char *link_str, u8 *md5_hash) | |||
56 | md5 = crypto_alloc_shash("md5", 0, 0); | 56 | md5 = crypto_alloc_shash("md5", 0, 0); |
57 | if (IS_ERR(md5)) { | 57 | if (IS_ERR(md5)) { |
58 | rc = PTR_ERR(md5); | 58 | rc = PTR_ERR(md5); |
59 | cERROR(1, "%s: Crypto md5 allocation error %d\n", __func__, rc); | 59 | cERROR(1, "%s: Crypto md5 allocation error %d", __func__, rc); |
60 | return rc; | 60 | return rc; |
61 | } | 61 | } |
62 | size = sizeof(struct shash_desc) + crypto_shash_descsize(md5); | 62 | size = sizeof(struct shash_desc) + crypto_shash_descsize(md5); |
63 | sdescmd5 = kmalloc(size, GFP_KERNEL); | 63 | sdescmd5 = kmalloc(size, GFP_KERNEL); |
64 | if (!sdescmd5) { | 64 | if (!sdescmd5) { |
65 | rc = -ENOMEM; | 65 | rc = -ENOMEM; |
66 | cERROR(1, "%s: Memory allocation failure\n", __func__); | 66 | cERROR(1, "%s: Memory allocation failure", __func__); |
67 | goto symlink_hash_err; | 67 | goto symlink_hash_err; |
68 | } | 68 | } |
69 | sdescmd5->shash.tfm = md5; | 69 | sdescmd5->shash.tfm = md5; |
@@ -71,17 +71,17 @@ symlink_hash(unsigned int link_len, const char *link_str, u8 *md5_hash) | |||
71 | 71 | ||
72 | rc = crypto_shash_init(&sdescmd5->shash); | 72 | rc = crypto_shash_init(&sdescmd5->shash); |
73 | if (rc) { | 73 | if (rc) { |
74 | cERROR(1, "%s: Could not init md5 shash\n", __func__); | 74 | cERROR(1, "%s: Could not init md5 shash", __func__); |
75 | goto symlink_hash_err; | 75 | goto symlink_hash_err; |
76 | } | 76 | } |
77 | rc = crypto_shash_update(&sdescmd5->shash, link_str, link_len); | 77 | rc = crypto_shash_update(&sdescmd5->shash, link_str, link_len); |
78 | if (rc) { | 78 | if (rc) { |
79 | cERROR(1, "%s: Could not update iwth link_str\n", __func__); | 79 | cERROR(1, "%s: Could not update iwth link_str", __func__); |
80 | goto symlink_hash_err; | 80 | goto symlink_hash_err; |
81 | } | 81 | } |
82 | rc = crypto_shash_final(&sdescmd5->shash, md5_hash); | 82 | rc = crypto_shash_final(&sdescmd5->shash, md5_hash); |
83 | if (rc) | 83 | if (rc) |
84 | cERROR(1, "%s: Could not generate md5 hash\n", __func__); | 84 | cERROR(1, "%s: Could not generate md5 hash", __func__); |
85 | 85 | ||
86 | symlink_hash_err: | 86 | symlink_hash_err: |
87 | crypto_free_shash(md5); | 87 | crypto_free_shash(md5); |
@@ -115,7 +115,7 @@ CIFSParseMFSymlink(const u8 *buf, | |||
115 | 115 | ||
116 | rc = symlink_hash(link_len, link_str, md5_hash); | 116 | rc = symlink_hash(link_len, link_str, md5_hash); |
117 | if (rc) { | 117 | if (rc) { |
118 | cFYI(1, "%s: MD5 hash failure: %d\n", __func__, rc); | 118 | cFYI(1, "%s: MD5 hash failure: %d", __func__, rc); |
119 | return rc; | 119 | return rc; |
120 | } | 120 | } |
121 | 121 | ||
@@ -154,7 +154,7 @@ CIFSFormatMFSymlink(u8 *buf, unsigned int buf_len, const char *link_str) | |||
154 | 154 | ||
155 | rc = symlink_hash(link_len, link_str, md5_hash); | 155 | rc = symlink_hash(link_len, link_str, md5_hash); |
156 | if (rc) { | 156 | if (rc) { |
157 | cFYI(1, "%s: MD5 hash failure: %d\n", __func__, rc); | 157 | cFYI(1, "%s: MD5 hash failure: %d", __func__, rc); |
158 | return rc; | 158 | return rc; |
159 | } | 159 | } |
160 | 160 | ||
diff --git a/fs/cifs/smbencrypt.c b/fs/cifs/smbencrypt.c index d5cd9aa7eacc..a0a58fbe2c10 100644 --- a/fs/cifs/smbencrypt.c +++ b/fs/cifs/smbencrypt.c | |||
@@ -78,7 +78,7 @@ smbhash(unsigned char *out, const unsigned char *in, unsigned char *key) | |||
78 | tfm_des = crypto_alloc_blkcipher("ecb(des)", 0, CRYPTO_ALG_ASYNC); | 78 | tfm_des = crypto_alloc_blkcipher("ecb(des)", 0, CRYPTO_ALG_ASYNC); |
79 | if (IS_ERR(tfm_des)) { | 79 | if (IS_ERR(tfm_des)) { |
80 | rc = PTR_ERR(tfm_des); | 80 | rc = PTR_ERR(tfm_des); |
81 | cERROR(1, "could not allocate des crypto API\n"); | 81 | cERROR(1, "could not allocate des crypto API"); |
82 | goto smbhash_err; | 82 | goto smbhash_err; |
83 | } | 83 | } |
84 | 84 | ||
@@ -91,7 +91,7 @@ smbhash(unsigned char *out, const unsigned char *in, unsigned char *key) | |||
91 | 91 | ||
92 | rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, 8); | 92 | rc = crypto_blkcipher_encrypt(&desc, &sgout, &sgin, 8); |
93 | if (rc) | 93 | if (rc) |
94 | cERROR(1, "could not encrypt crypt key rc: %d\n", rc); | 94 | cERROR(1, "could not encrypt crypt key rc: %d", rc); |
95 | 95 | ||
96 | crypto_free_blkcipher(tfm_des); | 96 | crypto_free_blkcipher(tfm_des); |
97 | smbhash_err: | 97 | smbhash_err: |
@@ -139,14 +139,14 @@ mdfour(unsigned char *md4_hash, unsigned char *link_str, int link_len) | |||
139 | md4 = crypto_alloc_shash("md4", 0, 0); | 139 | md4 = crypto_alloc_shash("md4", 0, 0); |
140 | if (IS_ERR(md4)) { | 140 | if (IS_ERR(md4)) { |
141 | rc = PTR_ERR(md4); | 141 | rc = PTR_ERR(md4); |
142 | cERROR(1, "%s: Crypto md4 allocation error %d\n", __func__, rc); | 142 | cERROR(1, "%s: Crypto md4 allocation error %d", __func__, rc); |
143 | return rc; | 143 | return rc; |
144 | } | 144 | } |
145 | size = sizeof(struct shash_desc) + crypto_shash_descsize(md4); | 145 | size = sizeof(struct shash_desc) + crypto_shash_descsize(md4); |
146 | sdescmd4 = kmalloc(size, GFP_KERNEL); | 146 | sdescmd4 = kmalloc(size, GFP_KERNEL); |
147 | if (!sdescmd4) { | 147 | if (!sdescmd4) { |
148 | rc = -ENOMEM; | 148 | rc = -ENOMEM; |
149 | cERROR(1, "%s: Memory allocation failure\n", __func__); | 149 | cERROR(1, "%s: Memory allocation failure", __func__); |
150 | goto mdfour_err; | 150 | goto mdfour_err; |
151 | } | 151 | } |
152 | sdescmd4->shash.tfm = md4; | 152 | sdescmd4->shash.tfm = md4; |
@@ -154,17 +154,17 @@ mdfour(unsigned char *md4_hash, unsigned char *link_str, int link_len) | |||
154 | 154 | ||
155 | rc = crypto_shash_init(&sdescmd4->shash); | 155 | rc = crypto_shash_init(&sdescmd4->shash); |
156 | if (rc) { | 156 | if (rc) { |
157 | cERROR(1, "%s: Could not init md4 shash\n", __func__); | 157 | cERROR(1, "%s: Could not init md4 shash", __func__); |
158 | goto mdfour_err; | 158 | goto mdfour_err; |
159 | } | 159 | } |
160 | rc = crypto_shash_update(&sdescmd4->shash, link_str, link_len); | 160 | rc = crypto_shash_update(&sdescmd4->shash, link_str, link_len); |
161 | if (rc) { | 161 | if (rc) { |
162 | cERROR(1, "%s: Could not update with link_str\n", __func__); | 162 | cERROR(1, "%s: Could not update with link_str", __func__); |
163 | goto mdfour_err; | 163 | goto mdfour_err; |
164 | } | 164 | } |
165 | rc = crypto_shash_final(&sdescmd4->shash, md4_hash); | 165 | rc = crypto_shash_final(&sdescmd4->shash, md4_hash); |
166 | if (rc) | 166 | if (rc) |
167 | cERROR(1, "%s: Could not genereate md4 hash\n", __func__); | 167 | cERROR(1, "%s: Could not genereate md4 hash", __func__); |
168 | 168 | ||
169 | mdfour_err: | 169 | mdfour_err: |
170 | crypto_free_shash(md4); | 170 | crypto_free_shash(md4); |