Lines Matching refs:cifs_dbg

39 				cifs_dbg(VFS, "Received Request not response\n");  in check_smb2_hdr()
43 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
46 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
49 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
114 cifs_dbg(FYI, "no SPNEGO security blob in negprot rsp\n"); in get_neg_ctxt_len()
128 cifs_dbg(FYI, "length of negcontexts %d pad %d\n", in get_neg_ctxt_len()
170 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
186 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
191 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
200 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message()
207 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message()
215 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message()
223 cifs_dbg(VFS, "Invalid response size %d for oplock break\n", in smb2_check_message()
269 cifs_dbg(FYI, "Server response too short: calculated " in smb2_check_message()
379 cifs_dbg(VFS, "no length check for command %d\n", le16_to_cpu(shdr->Command)); in smb2_get_data_area_len()
388 cifs_dbg(VFS, "offset %d too large, data area ignored\n", *off); in smb2_get_data_area_len()
392 cifs_dbg(VFS, "negative offset %d to data invalid ignore data area\n", in smb2_get_data_area_len()
397 cifs_dbg(VFS, "negative data length %d invalid, data area ignored\n", in smb2_get_data_area_len()
401 cifs_dbg(VFS, "data area larger than 128K: %d\n", *len); in smb2_get_data_area_len()
436 cifs_dbg(FYI, "SMB2 data length %d offset %d\n", data_length, offset); in smb2_calc_size()
446 cifs_dbg(VFS, "data area offset %d overlaps SMB2 header %d\n", in smb2_calc_size()
454 cifs_dbg(FYI, "SMB2 len %d\n", len); in smb2_calc_size()
522 cifs_dbg(FYI, "Lease release rc %d\n", rc); in cifs_ses_oplock_break()
564 cifs_dbg(FYI, "found in the open list\n"); in smb2_tcon_has_lease()
565 cifs_dbg(FYI, "lease key match, lease break 0x%x\n", in smb2_tcon_has_lease()
604 cifs_dbg(FYI, "found in the pending open list\n"); in smb2_tcon_find_pending_open_lease()
605 cifs_dbg(FYI, "lease key match, lease break 0x%x\n", in smb2_tcon_find_pending_open_lease()
623 cifs_dbg(FYI, "Checking for lease break\n"); in smb2_is_valid_lease_break()
665 cifs_dbg(FYI, "Can not process lease break - no lease matched\n"); in smb2_is_valid_lease_break()
685 cifs_dbg(FYI, "Checking for oplock break\n"); in smb2_is_valid_oplock_break()
698 cifs_dbg(FYI, "oplock level 0x%x\n", rsp->OplockLevel); in smb2_is_valid_oplock_break()
716 cifs_dbg(FYI, "file id match, oplock break\n"); in smb2_is_valid_oplock_break()
745 cifs_dbg(FYI, "No file id matched, oplock break ignored\n"); in smb2_is_valid_oplock_break()
811 cifs_dbg(FYI, "%s: tc_count=%d\n", __func__, tcon->tc_count); in smb2_handle_cancelled_close()
916 cifs_dbg(VFS, "%s: Could not init sha512 shash\n", __func__); in smb311_update_preauth_hash()
923 cifs_dbg(VFS, "%s: Could not update sha512 shash\n", __func__); in smb311_update_preauth_hash()
930 cifs_dbg(VFS, "%s: Could not update sha512 shash\n", in smb311_update_preauth_hash()
938 cifs_dbg(VFS, "%s: Could not finalize sha512 shash\n", in smb311_update_preauth_hash()