Lines Matching refs:VFS

169 		cifs_dbg(VFS,
201 cifs_server_dbg(VFS,
398 cifs_dbg(VFS, "reconnect tcon failed rc = %d\n", rc);
441 cifs_server_dbg(VFS, "supports multichannel now\n");
689 cifs_server_dbg(VFS, "Bad frame length assembling neg contexts\n");
826 cifs_dbg(VFS, "Server does not support requested encryption type (AES256 GCM)\n");
897 cifs_server_dbg(VFS, "Invalid response: negotiate context offset\n");
937 cifs_server_dbg(VFS, "unknown negcontext of type %d ignored\n",
1115 cifs_server_dbg(VFS, "Dialect not supported by server. Consider specifying vers=1.0 or vers=2.0 on mount for accessing older servers\n");
1124 cifs_server_dbg(VFS,
1128 cifs_server_dbg(VFS,
1139 cifs_server_dbg(VFS,
1153 cifs_server_dbg(VFS, "Invalid 0x%x dialect returned: not requested\n",
1171 cifs_server_dbg(VFS, "Invalid dialect returned by server 0x%x\n",
1239 cifs_server_dbg(VFS, "Missing expected negotiate contexts\n");
1277 cifs_tcon_dbg(VFS, "Unexpected null user (anonymous) auth flag sent by server\n");
1338 cifs_tcon_dbg(VFS, "Server does not support validate negotiate\n");
1342 cifs_tcon_dbg(VFS, "validate protocol negotiate failed: %d\n",
1350 cifs_tcon_dbg(VFS, "Invalid protocol negotiate response size: %d\n",
1377 cifs_tcon_dbg(VFS, "protocol revalidation - security settings mismatch\n");
1596 cifs_dbg(VFS, "Verify user has a krb5 ticket and keyutils is installed\n");
1607 cifs_dbg(VFS, "bad cifs.upcall version. Expected %d got %d\n",
1623 cifs_dbg(VFS, "Kerberos can't allocate (%u bytes) memory\n",
1663 cifs_dbg(VFS, "Kerberos negotiated but upcall support disabled!\n");
1707 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n");
1727 cifs_dbg(VFS, "Invalid security buffer offset %d\n",
1794 cifs_dbg(VFS, "spnego not supported for SMB2 yet\n");
1820 cifs_dbg(VFS, "%s: dumping generated SMB2 session keys\n", __func__);
1825 cifs_dbg(VFS, "Session Id %*ph\n", (int)sizeof(ses->Suid),
1827 cifs_dbg(VFS, "Session Key %*ph\n",
1829 cifs_dbg(VFS, "Signing Key %*ph\n",
1852 cifs_dbg(VFS, "Unable to select appropriate authentication method!\n");
1864 cifs_dbg(VFS, "secType %d not supported!\n", type);
1911 cifs_server_dbg(VFS, "signing requested but authenticated as guest\n");
2102 cifs_server_dbg(VFS, "unknown share type %d\n", rsp->ShareType);
2115 cifs_tcon_dbg(VFS, "DFS capability contradicts DFS flag\n");
2119 cifs_tcon_dbg(VFS, "Encryption is requested but not supported\n");
2135 cifs_tcon_dbg(VFS, "BAD_NETWORK_NAME: %s\n", tree);
2275 cifs_dbg(VFS, "bad owner sid in posix create response\n");
2283 cifs_dbg(VFS, "bad group sid in posix create response\n");
3408 cifs_tcon_dbg(VFS, "srv returned invalid ioctl length: %d\n", *plen);
3415 cifs_tcon_dbg(VFS, "Malformed ioctl resp: len %d offset %d\n", *plen,
3565 cifs_dbg(VFS, "handle cancelled close fid 0x%llx returned error %d\n",
3589 cifs_dbg(VFS, "buffer length %d smaller than minimum size %d\n",
3596 cifs_dbg(VFS, "buffer length %d or smb length %d too large\n",
3602 cifs_dbg(VFS, "Invalid server response, bad offset to data\n");
3744 cifs_tcon_dbg(VFS,
4376 cifs_tcon_dbg(VFS, "SMB signature verification returned error = %d\n",
4546 cifs_dbg(VFS, "Send error in read = %d\n", rc);
4906 cifs_dbg(VFS, "Send error in write = %d\n", rc);
5033 cifs_dbg(VFS, "malformed search entry would overflow\n");
5049 cifs_dbg(VFS, "directory entry name would overflow frame end of buf %p\n",
5104 cifs_tcon_dbg(VFS, "info level %u isn't supported\n",
5176 cifs_tcon_dbg(VFS, "info level %u isn't supported\n",
5185 cifs_tcon_dbg(VFS, "bad info payload");
5218 cifs_tcon_dbg(VFS, "Invalid search buffer type\n");