Lines Matching refs:VFS
50 cifs_dbg(VFS, "Received Request not response\n"); in check_smb2_hdr()
54 cifs_dbg(VFS, "Bad protocol string signature header %x\n", in check_smb2_hdr()
57 cifs_dbg(VFS, "Mids do not match: %llu and %llu\n", in check_smb2_hdr()
60 cifs_dbg(VFS, "Bad SMB detected. The Mid=%llu\n", wire_mid); in check_smb2_hdr()
123 cifs_dbg(VFS, "Length less than SMB header size\n"); in smb2_check_message()
128 cifs_dbg(VFS, "SMB length greater than maximum, mid=%llu\n", in smb2_check_message()
137 cifs_dbg(VFS, "Illegal structure size %u\n", in smb2_check_message()
144 cifs_dbg(VFS, "Illegal SMB2 command %d\n", command); in smb2_check_message()
152 cifs_dbg(VFS, "Illegal response size %u for command %d\n", in smb2_check_message()
159 cifs_dbg(VFS, "Illegal response size %d for oplock break\n", in smb2_check_message()
166 cifs_dbg(VFS, "Total length %u RFC1002 length %u mismatch mid %llu\n", in smb2_check_message()
297 cifs_dbg(VFS, "no length check for command\n"); in smb2_get_data_area_len()
306 cifs_dbg(VFS, "offset %d too large, data area ignored\n", *off); in smb2_get_data_area_len()
310 cifs_dbg(VFS, "negative offset %d to data invalid ignore data area\n", in smb2_get_data_area_len()
315 cifs_dbg(VFS, "negative data length %d invalid, data area ignored\n", in smb2_get_data_area_len()
319 cifs_dbg(VFS, "data area larger than 128K: %d\n", *len); in smb2_get_data_area_len()
365 cifs_dbg(VFS, "data area offset %d overlaps SMB2 header %d\n", in smb2_calc_size()