/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/cifs/ |
H A D | cifs_debug.h | 79 #define cERROR(set, fmt, arg...) \ macro 90 #define cERROR(set, fmt, arg...) macro
|
H A D | transport.c | 45 cERROR(1, "Null TCP session in AllocMidQEntry"); 170 cERROR(1, "sends on sock %p stuck for 15 seconds", 185 cERROR(1, "sent %d requested %d", rc, total_len); 191 cERROR(1, "tcp sent no data"); 224 cERROR(1, "Error %d sending data on socket to server", rc); 349 cERROR(1, "server not responding"); 403 cERROR(1, "Null session"); 472 cERROR(1, "unknown timeout flag %d", long_op); 491 cERROR(1, "No response to cmd %d mid %d", 522 cERROR( [all...] |
H A D | misc.c | 397 cERROR(1, "Received Request not response"); 401 cERROR(1, "Bad protocol string signature header %x", 404 cERROR(1, "Mids do not match"); 406 cERROR(1, "bad smb detected. The Mid=%d", smb->Mid); 438 cERROR(1, "rcvd invalid byte count (bcc)"); 440 cERROR(1, "Length less than smb header size"); 445 cERROR(1, "smb length greater than MaxBufSize, mid=%d", 455 cERROR(1, "Length read does not match RFC1001 length %d", 483 cERROR(1, "RFC1001 size %d bigger than SMB for Mid=%d", 726 cERROR( [all...] |
H A D | dns_resolve.c | 82 cERROR(1, "%s: unable to resolve: %*.*s",
|
H A D | sess.c | 387 cERROR(1, "challenge blob len %d too small", blob_len); 392 cERROR(1, "blob signature incorrect %s", pblob->Signature); 396 cERROR(1, "Incorrect message type %d", pblob->MessageType); 755 cERROR(1, "incorrect version of cifs.upcall (expected" 764 cERROR(1, "Kerberos signing key too long (%u bytes)", 793 cERROR(1, "Kerberos negotiated but upcall support disabled!"); 801 cERROR(1, "NTLMSSP requires Unicode support"); 824 cERROR(1, "invalid phase %d", phase); 836 cERROR(1, "secType %d not supported!", type); 841 cERROR( [all...] |
H A D | cifsacl.c | 211 cERROR(1, "unknown access control type %d", type); 300 cERROR(1, "ACE too small %d", le16_to_cpu(pace->size)); 305 cERROR(1, "ACL too small to parse ACE"); 350 cERROR(1, "ACL too small to parse DACL"); 440 cERROR(1, "ACL too small to parse SID %p", psid); 584 cERROR(1, "Unable to open file to get ACL"); 641 cERROR(1, "Unable to open file to set ACL"); 724 cERROR(1, "Unable to allocate security descriptor");
|
H A D | connect.c | 251 cERROR(1, "TotalDataSize %d is over maximum buffer %d", 360 cERROR(1, "No memory for large SMB response"); 373 cERROR(1, "No memory for SMB response"); 473 cERROR(1, "Unknown RFC 1002 frame"); 484 cERROR(1, "Invalid size SMB length %d pdu_length %d", 528 cERROR(1, "Received no data, expecting %d", 577 cERROR(1, "1st trans2 resp needs bigbuf"); 619 cERROR(1, "No task to wake, unknown frame received! " 964 cERROR(1, "no security value specified"); 972 cERROR( [all...] |
H A D | cifs_dfs_ref.c | 88 cERROR(1, "%s: no server name end in node name: %s", 145 cERROR(1, "%s: Failed to resolve server part of %s to IP: %d", 348 cERROR(1, "%s: Net Address path too short: %s",
|
H A D | cifs_debug.c | 63 cERROR(1, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d", 66 cERROR(1, "smb buf %p len %d", smb, smbCalcSize_LE(smb)); 78 cERROR(1, "Dump pending requests:"); 82 cERROR(1, "State: %d Cmd: %d Pid: %d Tsk: %p Mid %d", 89 cERROR(1, "IsLarge: %d buf: %p time rcv: %ld now: %ld", 95 cERROR(1, "IsMult: %d IsEnd: %d", mid_entry->multiRsp, 778 cERROR(1, "invalid flag %c", c); 789 cERROR(1, "invalid security flags %s", flags_string); 794 cERROR(1, "attempt to set unsupported security flags 0x%x",
|
H A D | readdir.c | 319 cERROR(1, "search entry %p began after end of SMB %p old entry %p", 326 cERROR(1, "search entry %p extends after end of SMB %p", 584 cERROR(1, "reached end of buf searching for pos in buf" 661 cERROR(1, "bad search response length %d past smb end", len); 778 cERROR(1, "Filldir for current dir failed"); 786 cERROR(1, "Filldir for parent dir failed"); 848 cERROR(1, "past SMB end, num to fill %d i %d",
|
H A D | cifs_unicode.c | 203 cERROR(1, "strtoUCS: char2uni of %d returned %d",
|
H A D | cifsfs.c | 132 cERROR(1, "cifs_mount failed w/return code = %d", rc); 169 cERROR(1, "cifs_read_super: get root inode failed"); 207 cERROR(1, "cifs_umount failed with return code %d", rc); 775 /* cERROR(1, "CIFSMaxBufSize %d 0x%x",CIFSMaxBufSize,CIFSMaxBufSize); */ 787 cERROR(1, "cifs_min_rcv set to maximum (64)");
|
H A D | fscache.c | 177 cERROR(1, "unknown error ret = %d", ret);
|
H A D | cifsencrypt.c | 106 cERROR(1, "null iovec entry"); 342 cERROR(1, "could not get v2 hash rc %d", rc);
|
H A D | file.c | 289 cERROR(1, "server %s of type %s returned" 447 cERROR(1, "no valid name if dentry freed"); 455 cERROR(1, "inode not valid"); 808 cERROR(1, "Error unlocking previously locked " 831 cERROR(1, "Error unlocking " 1207 cERROR(1, "Null inode passed to cifs_writeable_file"); 1499 cERROR(1, "No writable handles for inode"); 1512 cERROR(1, "Write2 ret %d, wrote %d",
|
H A D | cifssmb.c | 438 cERROR(1, "mount failed weak security disabled" 509 cERROR(1, "mount failed, cifs module not built " 528 cERROR(1, "Server requests plain text password" 549 cERROR(1, "Invalid security type"); 632 cERROR(1, "Server requires " 644 cERROR(1, "signing required but server lacks support"); 1052 cERROR(1, "Open response data too small"); 1382 cERROR(1, "Send error in read = %d", rc); 1400 cERROR(1, "Faulting on read rc = %d",rc); 1877 cERROR( [all...] |
H A D | cache.c | 93 cERROR(1, "CIFS: Unknown network family '%d'", sa->sa_family);
|
H A D | dir.c | 77 cERROR(1, "corrupt dentry"); 98 cERROR(1, "corrupt dentry"); 104 cERROR(1, "did not end path lookup where expected namelen is %d", 751 cERROR(1, "Unexpected lookup error %d", rc);
|
H A D | netmisc.c | 977 cERROR(1, "illegal time min %d sec %d", min, sec); 981 cERROR(1, "illegal hours %d", st->Hours); 985 cERROR(1, "illegal date, month %d day: %d", month, days);
|