Home
last modified time | relevance | path

Searched refs:cERROR (Results 1 – 18 of 18) sorted by relevance

/fs/cifs/
Dtransport.c45 cERROR(1, ("Null TCP session in AllocMidQEntry")); in AllocMidQEntry()
111 cERROR(1, ("Null parms passed to AllocOplockQEntry")); in AllocOplockQEntry()
221 cERROR(1, in smb_sendv()
237 cERROR(1, ("sent %d requested %d", rc, total_len)); in smb_sendv()
243 cERROR(1, ("tcp sent no data")); in smb_sendv()
276 cERROR(1, ("Error %d sending data on socket to server", rc)); in smb_sendv()
401 cERROR(1, ("server not responding")); in wait_for_response()
455 cERROR(1, ("Null session")); in SendReceive2()
524 cERROR(1, ("unknown timeout flag %d", long_op)); in SendReceive2()
543 cERROR(1, ("No response to cmd %d mid %d", in SendReceive2()
[all …]
Dmisc.c398 cERROR(1, ("Received Request not response")); in checkSMBhdr()
402 cERROR(1, in checkSMBhdr()
406 cERROR(1, ("Mids do not match")); in checkSMBhdr()
408 cERROR(1, ("bad smb detected. The Mid=%d", smb->Mid)); in checkSMBhdr()
441 cERROR(1, ("rcvd invalid byte count (bcc)")); in checkSMB()
443 cERROR(1, ("Length less than smb header size")); in checkSMB()
448 cERROR(1, ("smb length greater than MaxBufSize, mid=%d", in checkSMB()
458 cERROR(1, ("Length read does not match RFC1001 length %d", in checkSMB()
486 cERROR(1, ("RFC1001 size %d bigger than SMB for Mid=%d", in checkSMB()
Dcifs_debug.c63 cERROR(1, ("Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d", in cifs_dump_detail()
66 cERROR(1, ("smb buf %p len %d", smb, smbCalcSize_LE(smb))); in cifs_dump_detail()
78 cERROR(1, ("Dump pending requests:")); in cifs_dump_mids()
82 cERROR(1, ("State: %d Cmd: %d Pid: %d Tsk: %p Mid %d", in cifs_dump_mids()
89 cERROR(1, ("IsLarge: %d buf: %p time rcv: %ld now: %ld", in cifs_dump_mids()
95 cERROR(1, ("IsMult: %d IsEnd: %d", mid_entry->multiRsp, in cifs_dump_mids()
746 cERROR(1, ("invalid flag %c", c)); in cifs_security_flags_proc_write()
757 cERROR(1, ("invalid security flags %s", flags_string)); in cifs_security_flags_proc_write()
762 cERROR(1, ("attempt to set unsupported security flags 0x%x", in cifs_security_flags_proc_write()
Dconnect.c245 cERROR(1, ("TotalDataSize %d is over maximum buffer %d", in check2ndT2()
354 cERROR(1, ("No memory for large SMB response")); in cifs_demultiplex_thread()
367 cERROR(1, ("No memory for SMB response")); in cifs_demultiplex_thread()
485 cERROR(1, ("Unknown RFC 1002 frame")); in cifs_demultiplex_thread()
496 cERROR(1, ("Invalid size SMB length %d pdu_length %d", in cifs_demultiplex_thread()
540 cERROR(1, ("Received no data, expecting %d", in cifs_demultiplex_thread()
589 cERROR(1,("1st trans2 resp needs bigbuf")); in cifs_demultiplex_thread()
631 cERROR(1, ("No task to wake, unknown frame received! " in cifs_demultiplex_thread()
968 cERROR(1, ("no security value specified")); in cifs_parse_mount_options()
976 cERROR(1, ("Krb5 cifs privacy not supported")); in cifs_parse_mount_options()
[all …]
Dcifsacl.c210 cERROR(1, ("unknown access control type %d", type)); in access_flags_to_mode()
299 cERROR(1, ("ACE too small, %d", le16_to_cpu(pace->size))); in dump_ace()
304 cERROR(1, ("ACL too small to parse ACE")); in dump_ace()
349 cERROR(1, ("ACL too small to parse DACL")); in parse_dacl()
439 cERROR(1, ("ACL too small to parse SID %p", psid)); in parse_sid()
598 cERROR(1, ("Unable to open file to get ACL")); in get_cifs_acl()
652 cERROR(1, ("Unable to open file to set ACL")); in set_cifs_acl()
715 cERROR(1, ("Unable to allocate security descriptor")); in mode_to_acl()
Dcifs_debug.h63 #define cERROR(button, prspec) if (button) cifserror prspec macro
70 #define cERROR(button, prspec) macro
Dsess.c610 cERROR(1, ("incorrect version of cifs.upcall (expected" in CIFS_SessSetup()
619 cERROR(1, ("Kerberos signing key too long (%u bytes)", in CIFS_SessSetup()
648 cERROR(1, ("Kerberos negotiated but upcall support disabled!")); in CIFS_SessSetup()
653 cERROR(1, ("secType %d not supported!", type)); in CIFS_SessSetup()
679 cERROR(1, ("bad word count %d", smb_buf->WordCount)); in CIFS_SessSetup()
697 cERROR(1, ("bad security blob length %d", blob_len)); in CIFS_SessSetup()
Dcifs_dfs_ref.c87 cERROR(1, ("%s: no server name end in node name: %s", in cifs_get_share_name()
139 cERROR(1, ("%s: Failed to resolve server part of %s to IP: %d", in compose_mount_options()
353 cERROR(1, ("%s: Net Address path too short: %s", in cifs_dfs_follow_mountpoint()
Dreaddir.c90 cERROR(1, ("Failed allocating dentry")); in construct_dentry()
533 cERROR(1, in nxt_dir_entry()
541 cERROR(1, ("search entry %p extends after end of SMB %p", in nxt_dir_entry()
800 cERROR(1, ("reached end of buf searching for pos in buf" in find_cifs_entry()
877 cERROR(1, ("bad search response length %d past smb end", len)); in cifs_get_name_from_search_buf()
1010 cERROR(1, ("Filldir for current dir failed")); in cifs_readdir()
1018 cERROR(1, ("Filldir for parent dir failed")); in cifs_readdir()
1079 cERROR(1, ("past SMB end, num to fill %d i %d", in cifs_readdir()
Dcifsfs.c136 cERROR(1, in cifs_read_super()
176 cERROR(1, ("cifs_read_super: get root inode failed")); in cifs_read_super()
211 cERROR(1, ("cifs_umount failed with return code %d", rc)); in cifs_put_super()
874 cERROR(1, ("cifs_min_rcv set to maximum (64)")); in cifs_init_request_bufs()
1142 cERROR(1, ("error %d create oplock thread", rc)); in init_cifs()
1150 cERROR(1, ("error %d create dnotify thread", rc)); in init_cifs()
Ddir.c75 cERROR(1, ("corrupt dentry")); in build_path_from_dentry()
96 cERROR(1, ("corrupt dentry")); in build_path_from_dentry()
102 cERROR(1, in build_path_from_dentry()
662 cERROR(1, ("Unexpected lookup error %d", rc)); in cifs_lookup()
Dcifs_unicode.c76 cERROR(1, in cifs_strtoUCS()
Dfile.c210 cERROR(1, ("could not find file instance for " in cifs_open()
375 cERROR(1, ("no valid name if dentry freed")); in cifs_reopen_file()
383 cERROR(1, ("inode not valid")); in cifs_reopen_file()
514 cERROR(1, ("close with pending write")); in cifs_close()
550 cERROR(1, ("writes pending, delay free of handle")); in cifs_close()
740 cERROR(1, ("Error unlocking previously locked " in cifs_lock()
1084 cERROR(1, ("Null inode passed to cifs_writeable_file")); in find_writable_file()
1375 cERROR(1, ("No writable handles for inode")); in cifs_writepages()
1385 cERROR(1, ("Write2 ret %d, wrote %d", in cifs_writepages()
Dcifsencrypt.c105 cERROR(1, ("null iovec entry")); in cifs_calc_signature2()
399 cERROR(1, ("could not get v2 hash rc %d", rc)); in setup_ntlmv2_rsp()
Ddns_resolve.c155 cERROR(1, ("%s: unable to resolve: %s", __func__, name)); in dns_resolve_server_name_to_ip()
Dcifssmb.c114 cERROR(1, ("Failed to allocate buffer for string\n")); in cifs_strncpy_to_host()
522 cERROR(1, ("mount failed weak security disabled" in CIFSSMBNegotiate()
593 cERROR(1, ("mount failed, cifs module not built " in CIFSSMBNegotiate()
612 cERROR(1, ("Server requests plain text password" in CIFSSMBNegotiate()
631 cERROR(1, ("Invalid security type")); in CIFSSMBNegotiate()
708 cERROR(1, ("Server requires " in CIFSSMBNegotiate()
720 cERROR(1, in CIFSSMBNegotiate()
1129 cERROR(1, ("Open response data too small")); in CIFSPOSIXCreate()
1460 cERROR(1, ("Send error in read = %d", rc)); in CIFSSMBRead()
1925 cERROR(1, ("Send error in Close = %d", rc)); in CIFSSMBClose()
[all …]
Dlink.c279 cERROR(1, ("SFU style symlinks not implemented yet")); in cifs_readlink()
Dnetmisc.c902 cERROR(1, ("illegal time min %d sec %d", min, sec)); in cnvrtDosUnixTm()
906 cERROR(1, ("illegal hours %d", st->Hours)); in cnvrtDosUnixTm()
910 cERROR(1, ("illegal date, month %d day: %d", month, days)); in cnvrtDosUnixTm()