Lines Matching refs:response
322 kfree_sensitive(server->session_key.response);
323 server->session_key.response = NULL;
603 * Also, no need to ping if we got a response recently.
629 cifs_server_dbg(VFS, "No memory for large SMB response\n");
642 cifs_server_dbg(VFS, "No memory for SMB response\n");
663 * 2s client gets a response
664 * 30s echo workqueue job pops, and decides we got a response recently
668 * a response in >60s.
821 /* Regular SMB response */
827 cifs_dbg(FYI, "RFC 1002 positive session response\n");
832 * SMB negprot response.
834 cifs_dbg(FYI, "RFC 1002 negative session response\n");
847 cifs_server_dbg(VFS, "RFC 1002 unknown response type 0x%x\n", type);
1035 * response and going ahead and killing cifsd.
1063 cifs_server_dbg(VFS, "SMB response too long (%u bytes)\n", pdu_length);
1213 cifs_server_dbg(VFS, "SMB response too short (%u bytes)\n",
1229 cifs_dbg(VFS, "%s: malformed response (next_offset=%u)\n",
1668 kfree_sensitive(server->session_key.response);
1669 server->session_key.response = NULL;
3953 if (ses->auth_key.response) {
3954 cifs_dbg(FYI, "Free previous auth_key.response = %p\n",
3955 ses->auth_key.response);
3956 kfree_sensitive(ses->auth_key.response);
3957 ses->auth_key.response = NULL;