Lines Matching refs:VFS

169 		cifs_dbg(VFS,  in cifs_chan_skip_or_disable()
201 cifs_server_dbg(VFS, in cifs_chan_skip_or_disable()
409 cifs_dbg(VFS, "reconnect tcon failed rc = %d\n", rc); in smb2_reconnect()
453 cifs_server_dbg(VFS, "supports multichannel now\n"); in smb2_reconnect()
701 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n"); in assemble_neg_contexts()
848 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n"); in decode_encrypt_ctx()
919 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n"); in smb311_decode_neg_context()
959 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context()
1137 …cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 o… in SMB2_negotiate()
1146 cifs_server_dbg(VFS, in SMB2_negotiate()
1150 cifs_server_dbg(VFS, in SMB2_negotiate()
1161 cifs_server_dbg(VFS, in SMB2_negotiate()
1175 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n", in SMB2_negotiate()
1193 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n", in SMB2_negotiate()
1261 cifs_server_dbg(VFS, "Missing expected negotiate contexts\n"); in SMB2_negotiate()
1299 cifs_tcon_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n"); in smb3_validate_negotiate()
1360 cifs_tcon_dbg(VFS, "Server does not support validate negotiate\n"); in smb3_validate_negotiate()
1364 cifs_tcon_dbg(VFS, "validate protocol negotiate failed: %d\n", in smb3_validate_negotiate()
1372 cifs_tcon_dbg(VFS, "Invalid protocol negotiate response size: %d\n", in smb3_validate_negotiate()
1399 cifs_tcon_dbg(VFS, "protocol revalidation - security settings mismatch\n"); in smb3_validate_negotiate()
1618 cifs_dbg(VFS, "Verify user has a krb5 ticket and keyutils is installed\n"); in SMB2_auth_kerberos()
1629 cifs_dbg(VFS, "bad cifs.upcall version. Expected %d got %d\n", in SMB2_auth_kerberos()
1645 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n", in SMB2_auth_kerberos()
1685 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in SMB2_auth_kerberos()
1729 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_auth_rawntlmssp_negotiate()
1749 cifs_dbg(VFS, "Invalid security buffer offset %d\n", in SMB2_sess_auth_rawntlmssp_negotiate()
1816 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_auth_rawntlmssp_authenticate()
1842 cifs_dbg(VFS, "%s: dumping generated SMB2 session keys\n", __func__); in SMB2_sess_auth_rawntlmssp_authenticate()
1847 cifs_dbg(VFS, "Session Id %*ph\n", (int)sizeof(ses->Suid), in SMB2_sess_auth_rawntlmssp_authenticate()
1849 cifs_dbg(VFS, "Session Key %*ph\n", in SMB2_sess_auth_rawntlmssp_authenticate()
1851 cifs_dbg(VFS, "Signing Key %*ph\n", in SMB2_sess_auth_rawntlmssp_authenticate()
1874 cifs_dbg(VFS, "Unable to select appropriate authentication method!\n"); in SMB2_select_sec()
1886 cifs_dbg(VFS, "secType %d not supported!\n", type); in SMB2_select_sec()
1933 cifs_server_dbg(VFS, "signing requested but authenticated as guest\n"); in SMB2_sess_setup()
2121 cifs_server_dbg(VFS, "unknown share type %d\n", rsp->ShareType); in SMB2_tcon()
2134 cifs_tcon_dbg(VFS, "DFS capability contradicts DFS flag\n"); in SMB2_tcon()
2138 cifs_tcon_dbg(VFS, "Encryption is requested but not supported\n"); in SMB2_tcon()
2154 cifs_tcon_dbg(VFS, "BAD_NETWORK_NAME: %s\n", tree); in SMB2_tcon()
2295 cifs_dbg(VFS, "bad owner sid in posix create response\n"); in parse_posix_ctxt()
2303 cifs_dbg(VFS, "bad group sid in posix create response\n"); in parse_posix_ctxt()
3484 cifs_tcon_dbg(VFS, "srv returned invalid ioctl length: %d\n", *plen); in SMB2_ioctl()
3491 cifs_tcon_dbg(VFS, "Malformed ioctl resp: len %d offset %d\n", *plen, in SMB2_ioctl()
3656 cifs_dbg(VFS, "handle cancelled close fid 0x%llx returned error %d\n", in __SMB2_close()
3685 cifs_dbg(VFS, "buffer length %d smaller than minimum size %d\n", in smb2_validate_iov()
3692 cifs_dbg(VFS, "buffer length %d or smb length %d too large\n", in smb2_validate_iov()
3698 cifs_dbg(VFS, "Invalid server response, bad offset to data\n"); in smb2_validate_iov()
3850 cifs_tcon_dbg(VFS, in query_info()
4519 cifs_tcon_dbg(VFS, "SMB signature verification returned error = %d\n", in smb2_readv_callback()
4689 cifs_dbg(VFS, "Send error in read = %d\n", rc); in SMB2_read()
5057 cifs_dbg(VFS, "Send error in write = %d\n", rc); in SMB2_write()
5189 cifs_dbg(VFS, "malformed search entry would overflow\n"); in num_entries()
5205 cifs_dbg(VFS, "directory entry name would overflow frame end of buf %p\n", in num_entries()
5260 cifs_tcon_dbg(VFS, "info level %u isn't supported\n", in SMB2_query_directory_init()
5332 cifs_tcon_dbg(VFS, "info level %u isn't supported\n", in smb2_parse_query_directory()
5341 cifs_tcon_dbg(VFS, "bad info payload"); in smb2_parse_query_directory()
5374 cifs_tcon_dbg(VFS, "Invalid search buffer type\n"); in smb2_parse_query_directory()