Lines Matching refs:cifs_dbg
52 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
56 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
59 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
62 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
118 cifs_dbg(FYI, "no SPNEGO security blob in negprot rsp\n"); in get_neg_ctxt_len()
132 cifs_dbg(FYI, "length of negcontexts %d pad %d\n", in get_neg_ctxt_len()
171 cifs_dbg(VFS, "no decryption - session id not found\n"); in smb2_check_message()
187 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
192 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
201 cifs_dbg(VFS, "Invalid structure size %u\n", in smb2_check_message()
208 cifs_dbg(VFS, "Invalid SMB2 command %d\n", command); in smb2_check_message()
216 cifs_dbg(VFS, "Invalid response size %u for command %d\n", in smb2_check_message()
224 cifs_dbg(VFS, "Invalid response size %d for oplock break\n", in smb2_check_message()
236 cifs_dbg(FYI, "Calculated size %u length %u mismatch mid %llu\n", in smb2_check_message()
371 cifs_dbg(VFS, "no length check for command %d\n", le16_to_cpu(shdr->Command)); in smb2_get_data_area_len()
380 cifs_dbg(VFS, "offset %d too large, data area ignored\n", *off); in smb2_get_data_area_len()
384 cifs_dbg(VFS, "negative offset %d to data invalid ignore data area\n", in smb2_get_data_area_len()
389 cifs_dbg(VFS, "negative data length %d invalid, data area ignored\n", in smb2_get_data_area_len()
393 cifs_dbg(VFS, "data area larger than 128K: %d\n", *len); in smb2_get_data_area_len()
428 cifs_dbg(FYI, "SMB2 data length %d offset %d\n", data_length, offset); in smb2_calc_size()
438 cifs_dbg(VFS, "data area offset %d overlaps SMB2 header %d\n", in smb2_calc_size()
446 cifs_dbg(FYI, "SMB2 len %d\n", len); in smb2_calc_size()
514 cifs_dbg(FYI, "Lease release rc %d\n", rc); in cifs_ses_oplock_break()
558 cifs_dbg(FYI, "found in the open list\n"); in smb2_tcon_has_lease()
559 cifs_dbg(FYI, "lease key match, lease break 0x%x\n", in smb2_tcon_has_lease()
598 cifs_dbg(FYI, "found in the pending open list\n"); in smb2_tcon_find_pending_open_lease()
599 cifs_dbg(FYI, "lease key match, lease break 0x%x\n", in smb2_tcon_find_pending_open_lease()
618 cifs_dbg(FYI, "Checking for lease break\n"); in smb2_is_valid_lease_break()
672 cifs_dbg(FYI, "Can not process lease break - no lease matched\n"); in smb2_is_valid_lease_break()
686 cifs_dbg(FYI, "Checking for oplock break\n"); in smb2_is_valid_oplock_break()
699 cifs_dbg(FYI, "oplock level 0x%x\n", rsp->OplockLevel); in smb2_is_valid_oplock_break()
719 cifs_dbg(FYI, "file id match, oplock break\n"); in smb2_is_valid_oplock_break()
748 cifs_dbg(FYI, "No file id matched, oplock break ignored\n"); in smb2_is_valid_oplock_break()
810 cifs_dbg(FYI, "%s: tc_count=%d\n", __func__, tcon->tc_count); in smb2_handle_cancelled_close()
910 cifs_dbg(VFS, "%s: Could not init sha512 shash\n", __func__); in smb311_update_preauth_hash()
917 cifs_dbg(VFS, "%s: Could not update sha512 shash\n", __func__); in smb311_update_preauth_hash()
925 cifs_dbg(VFS, "%s: Could not update sha512 shash\n", in smb311_update_preauth_hash()
933 cifs_dbg(VFS, "%s: Could not finalize sha512 shash\n", in smb311_update_preauth_hash()