Searched refs:cERROR (Results 1 - 19 of 19) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/
H A Dcifs_debug.h79 #define cERROR(set, fmt, arg...) \ macro
90 #define cERROR(set, fmt, arg...) macro
H A Dtransport.c45 cERROR(1, "Null TCP session in AllocMidQEntry");
170 cERROR(1, "sends on sock %p stuck for 15 seconds",
185 cERROR(1, "sent %d requested %d", rc, total_len);
191 cERROR(1, "tcp sent no data");
224 cERROR(1, "Error %d sending data on socket to server", rc);
349 cERROR(1, "server not responding");
403 cERROR(1, "Null session");
472 cERROR(1, "unknown timeout flag %d", long_op);
491 cERROR(1, "No response to cmd %d mid %d",
522 cERROR(
[all...]
H A Dmisc.c397 cERROR(1, "Received Request not response");
401 cERROR(1, "Bad protocol string signature header %x",
404 cERROR(1, "Mids do not match");
406 cERROR(1, "bad smb detected. The Mid=%d", smb->Mid);
438 cERROR(1, "rcvd invalid byte count (bcc)");
440 cERROR(1, "Length less than smb header size");
445 cERROR(1, "smb length greater than MaxBufSize, mid=%d",
455 cERROR(1, "Length read does not match RFC1001 length %d",
483 cERROR(1, "RFC1001 size %d bigger than SMB for Mid=%d",
726 cERROR(
[all...]
H A Ddns_resolve.c82 cERROR(1, "%s: unable to resolve: %*.*s",
H A Dsess.c387 cERROR(1, "challenge blob len %d too small", blob_len);
392 cERROR(1, "blob signature incorrect %s", pblob->Signature);
396 cERROR(1, "Incorrect message type %d", pblob->MessageType);
755 cERROR(1, "incorrect version of cifs.upcall (expected"
764 cERROR(1, "Kerberos signing key too long (%u bytes)",
793 cERROR(1, "Kerberos negotiated but upcall support disabled!");
801 cERROR(1, "NTLMSSP requires Unicode support");
824 cERROR(1, "invalid phase %d", phase);
836 cERROR(1, "secType %d not supported!", type);
841 cERROR(
[all...]
H A Dcifsacl.c211 cERROR(1, "unknown access control type %d", type);
300 cERROR(1, "ACE too small %d", le16_to_cpu(pace->size));
305 cERROR(1, "ACL too small to parse ACE");
350 cERROR(1, "ACL too small to parse DACL");
440 cERROR(1, "ACL too small to parse SID %p", psid);
584 cERROR(1, "Unable to open file to get ACL");
641 cERROR(1, "Unable to open file to set ACL");
724 cERROR(1, "Unable to allocate security descriptor");
H A Dconnect.c251 cERROR(1, "TotalDataSize %d is over maximum buffer %d",
360 cERROR(1, "No memory for large SMB response");
373 cERROR(1, "No memory for SMB response");
473 cERROR(1, "Unknown RFC 1002 frame");
484 cERROR(1, "Invalid size SMB length %d pdu_length %d",
528 cERROR(1, "Received no data, expecting %d",
577 cERROR(1, "1st trans2 resp needs bigbuf");
619 cERROR(1, "No task to wake, unknown frame received! "
964 cERROR(1, "no security value specified");
972 cERROR(
[all...]
H A Dcifs_dfs_ref.c88 cERROR(1, "%s: no server name end in node name: %s",
145 cERROR(1, "%s: Failed to resolve server part of %s to IP: %d",
348 cERROR(1, "%s: Net Address path too short: %s",
H A Dcifs_debug.c63 cERROR(1, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d",
66 cERROR(1, "smb buf %p len %d", smb, smbCalcSize_LE(smb));
78 cERROR(1, "Dump pending requests:");
82 cERROR(1, "State: %d Cmd: %d Pid: %d Tsk: %p Mid %d",
89 cERROR(1, "IsLarge: %d buf: %p time rcv: %ld now: %ld",
95 cERROR(1, "IsMult: %d IsEnd: %d", mid_entry->multiRsp,
778 cERROR(1, "invalid flag %c", c);
789 cERROR(1, "invalid security flags %s", flags_string);
794 cERROR(1, "attempt to set unsupported security flags 0x%x",
H A Dreaddir.c319 cERROR(1, "search entry %p began after end of SMB %p old entry %p",
326 cERROR(1, "search entry %p extends after end of SMB %p",
584 cERROR(1, "reached end of buf searching for pos in buf"
661 cERROR(1, "bad search response length %d past smb end", len);
778 cERROR(1, "Filldir for current dir failed");
786 cERROR(1, "Filldir for parent dir failed");
848 cERROR(1, "past SMB end, num to fill %d i %d",
H A Dcifs_unicode.c203 cERROR(1, "strtoUCS: char2uni of %d returned %d",
H A Dcifsfs.c132 cERROR(1, "cifs_mount failed w/return code = %d", rc);
169 cERROR(1, "cifs_read_super: get root inode failed");
207 cERROR(1, "cifs_umount failed with return code %d", rc);
775 /* cERROR(1, "CIFSMaxBufSize %d 0x%x",CIFSMaxBufSize,CIFSMaxBufSize); */
787 cERROR(1, "cifs_min_rcv set to maximum (64)");
H A Dfscache.c177 cERROR(1, "unknown error ret = %d", ret);
H A Dcifsencrypt.c106 cERROR(1, "null iovec entry");
342 cERROR(1, "could not get v2 hash rc %d", rc);
H A Dfile.c289 cERROR(1, "server %s of type %s returned"
447 cERROR(1, "no valid name if dentry freed");
455 cERROR(1, "inode not valid");
808 cERROR(1, "Error unlocking previously locked "
831 cERROR(1, "Error unlocking "
1207 cERROR(1, "Null inode passed to cifs_writeable_file");
1499 cERROR(1, "No writable handles for inode");
1512 cERROR(1, "Write2 ret %d, wrote %d",
H A Dcifssmb.c438 cERROR(1, "mount failed weak security disabled"
509 cERROR(1, "mount failed, cifs module not built "
528 cERROR(1, "Server requests plain text password"
549 cERROR(1, "Invalid security type");
632 cERROR(1, "Server requires "
644 cERROR(1, "signing required but server lacks support");
1052 cERROR(1, "Open response data too small");
1382 cERROR(1, "Send error in read = %d", rc);
1400 cERROR(1, "Faulting on read rc = %d",rc);
1877 cERROR(
[all...]
H A Dcache.c93 cERROR(1, "CIFS: Unknown network family '%d'", sa->sa_family);
H A Ddir.c77 cERROR(1, "corrupt dentry");
98 cERROR(1, "corrupt dentry");
104 cERROR(1, "did not end path lookup where expected namelen is %d",
751 cERROR(1, "Unexpected lookup error %d", rc);
H A Dnetmisc.c977 cERROR(1, "illegal time min %d sec %d", min, sec);
981 cERROR(1, "illegal hours %d", st->Hours);
985 cERROR(1, "illegal date, month %d day: %d", month, days);

Completed in 204 milliseconds