Lines Matching refs:VFS

525 		cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n");
626 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n");
667 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n");
699 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n",
881 cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 on mount for accessing older servers\n");
889 cifs_server_dbg(VFS,
893 cifs_server_dbg(VFS,
900 cifs_server_dbg(VFS,
914 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n",
932 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n",
999 cifs_server_dbg(VFS, "Missing expected negotiate contexts\n");
1037 cifs_tcon_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n");
1097 cifs_tcon_dbg(VFS, "Server does not support validate negotiate\n");
1101 cifs_tcon_dbg(VFS, "validate protocol negotiate failed: %d\n",
1109 cifs_tcon_dbg(VFS, "Invalid protocol negotiate response size: %d\n",
1136 cifs_tcon_dbg(VFS, "protocol revalidation - security settings mismatch\n");
1336 cifs_dbg(VFS, "Verify user has a krb5 ticket and keyutils is installed\n");
1347 cifs_dbg(VFS, "bad cifs.upcall version. Expected %d got %d\n",
1358 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n",
1393 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n");
1437 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n");
1460 cifs_dbg(VFS, "Invalid security buffer offset %d\n",
1520 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n");
1542 cifs_dbg(VFS, "%s: dumping generated SMB2 session keys\n", __func__);
1547 cifs_dbg(VFS, "Session Id %*ph\n", (int)sizeof(ses->Suid),
1549 cifs_dbg(VFS, "Session Key %*ph\n",
1551 cifs_dbg(VFS, "Signing Key %*ph\n",
1572 cifs_dbg(VFS, "Unable to select appropriate authentication method!\n");
1584 cifs_dbg(VFS, "secType %d not supported!\n", type);
1629 cifs_server_dbg(VFS, "signing requested but authenticated as guest\n");
1813 cifs_server_dbg(VFS, "unknown share type %d\n", rsp->ShareType);
1828 cifs_tcon_dbg(VFS, "DFS capability contradicts DFS flag\n");
1832 cifs_tcon_dbg(VFS, "Encryption is requested but not supported\n");
1845 cifs_tcon_dbg(VFS, "BAD_NETWORK_NAME: %s\n", tree);
1977 cifs_dbg(VFS, "bad owner sid in posix create response\n");
1985 cifs_dbg(VFS, "bad group sid in posix create response\n");
3116 cifs_tcon_dbg(VFS, "srv returned invalid ioctl length: %d\n", *plen);
3123 cifs_tcon_dbg(VFS, "Malformed ioctl resp: len %d offset %d\n", *plen,
3275 cifs_dbg(VFS, "handle cancelled close fid 0x%llx returned error %d\n",
3299 cifs_dbg(VFS, "buffer length %d smaller than minimum size %d\n",
3306 cifs_dbg(VFS, "buffer length %d or smb length %d too large\n",
3312 cifs_dbg(VFS, "Invalid server response, bad offset to data\n");
3454 cifs_tcon_dbg(VFS,
3965 cifs_tcon_dbg(VFS, "SMB signature verification returned error = %d\n",
4128 cifs_dbg(VFS, "Send error in read = %d\n", rc);
4468 cifs_dbg(VFS, "Send error in write = %d\n", rc);
4596 cifs_dbg(VFS, "malformed search entry would overflow\n");
4612 cifs_dbg(VFS, "directory entry name would overflow frame end of buf %p\n",
4664 cifs_tcon_dbg(VFS, "info level %u isn't supported\n",
4733 cifs_tcon_dbg(VFS, "info level %u isn't supported\n",
4742 cifs_tcon_dbg(VFS, "bad info payload");
4775 cifs_tcon_dbg(VFS, "Invalid search buffer type\n");