Lines Matching refs:VFS

515 		cifs_dbg(VFS, "Invalid response: negotiate context offset\n");  in smb311_decode_neg_context()
544 cifs_dbg(VFS, "unknown negcontext of type %d ignored\n", in smb311_decode_neg_context()
717 cifs_dbg(VFS, "Dialect not supported by server. Consider " in SMB2_negotiate()
727 cifs_dbg(VFS, in SMB2_negotiate()
731 cifs_dbg(VFS, in SMB2_negotiate()
738 cifs_dbg(VFS, in SMB2_negotiate()
749 cifs_dbg(VFS, "Illegal 0x%x dialect returned: not requested\n", in SMB2_negotiate()
767 cifs_dbg(VFS, "Illegal dialect returned by server 0x%x\n", in SMB2_negotiate()
834 cifs_dbg(VFS, "Missing expected negotiate contexts\n"); in SMB2_negotiate()
871 cifs_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n"); in smb3_validate_negotiate()
926 cifs_dbg(VFS, "Server does not support validate negotiate\n"); in smb3_validate_negotiate()
930 cifs_dbg(VFS, "validate protocol negotiate failed: %d\n", rc); in smb3_validate_negotiate()
937 cifs_dbg(VFS, "invalid protocol negotiate response size: %d\n", in smb3_validate_negotiate()
964 cifs_dbg(VFS, "protocol revalidation - security settings mismatch\n"); in smb3_validate_negotiate()
1149 cifs_dbg(VFS, "Verify user has a krb5 ticket and keyutils is installed\n"); in SMB2_auth_kerberos()
1160 cifs_dbg(VFS, in SMB2_auth_kerberos()
1170 cifs_dbg(VFS, in SMB2_auth_kerberos()
1203 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n"); in SMB2_auth_kerberos()
1247 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_auth_rawntlmssp_negotiate()
1270 cifs_dbg(VFS, "Invalid security buffer offset %d\n", in SMB2_sess_auth_rawntlmssp_negotiate()
1328 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n"); in SMB2_sess_auth_rawntlmssp_authenticate()
1362 cifs_dbg(VFS, in SMB2_select_sec()
1375 cifs_dbg(VFS, "secType %d not supported!\n", type); in SMB2_select_sec()
1420 cifs_dbg(VFS, "signing requested but authenticated as guest\n"); in SMB2_sess_setup()
1595 cifs_dbg(VFS, "unknown share type %d\n", rsp->ShareType); in SMB2_tcon()
1610 cifs_dbg(VFS, "DFS capability contradicts DFS flag\n"); in SMB2_tcon()
1614 cifs_dbg(VFS, "Encryption is requested but not supported\n"); in SMB2_tcon()
1626 cifs_dbg(VFS, "BAD_NETWORK_NAME: %s\n", tree); in SMB2_tcon()
2523 cifs_dbg(VFS, "srv returned invalid ioctl length: %d\n", *plen); in SMB2_ioctl()
2530 cifs_dbg(VFS, "Malformed ioctl resp: len %d offset %d\n", *plen, in SMB2_ioctl()
2663 cifs_dbg(VFS, "handle cancelled close fid 0x%llx returned error %d\n", in SMB2_close()
2681 cifs_dbg(VFS, "buffer length %d smaller than minimum size %d\n", in smb2_validate_iov()
2688 cifs_dbg(VFS, "buffer length %d or smb length %d too large\n", in smb2_validate_iov()
2694 cifs_dbg(VFS, "illegal server response, bad offset to data\n"); in smb2_validate_iov()
2816 cifs_dbg(VFS, in query_info()
3178 cifs_dbg(VFS, "SMB signature verification returned error = %d\n", in smb2_readv_callback()
3343 cifs_dbg(VFS, "Send error in read = %d\n", rc); in SMB2_read()
3668 cifs_dbg(VFS, "Send error in write = %d\n", rc); in SMB2_write()
3700 cifs_dbg(VFS, "malformed search entry would overflow\n"); in num_entries()
3711 cifs_dbg(VFS, "directory entry name would overflow frame end of buf %p\n", in num_entries()
3776 cifs_dbg(VFS, "info level %u isn't supported\n", in SMB2_query_directory()
3856 cifs_dbg(VFS, "illegal search buffer type\n"); in SMB2_query_directory()