/external/curl/tests/ |
D | ftpserver.pl | 200 sub logmsg { subroutine 225 logmsg "failed to open log/server$idstr.input\n"; 257 logmsg "Error: eXsysread() failure: " . 262 logmsg "Error: eXsysread() failure: " . 283 logmsg "Error: eXsysread() failure: timed out\n"; 291 logmsg "Error: eXsysread() failure: signalled to die\n"; 296 logmsg "Warning: retrying sysread() interrupted system call\n"; 300 logmsg "Warning: retrying sysread() due to EAGAIN\n"; 304 logmsg "Warning: retrying sysread() due to EWOULDBLOCK\n"; 307 logmsg "Error: sysread() failure: $!\n"; [all …]
|
D | runtests.pl | 324 sub logmsg { subroutine 348 logmsg "runtests.pl received SIG$signame, exiting\n"; 429 logmsg "startnew: $cmd\n" if ($verbose); 435 logmsg "startnew: fork() failure detected\n"; 456 logmsg "startnew: $pidfile faked with pid=$child\n" if($verbose); 459 logmsg "startnew: failed to write fake $pidfile with pid=$child\n"; 464 logmsg "startnew: child process has failed to start\n" if($verbose); 484 logmsg "startnew: child process has died, server might start up\n" 576 logmsg " CMD: $testcmd\n" if($verbose); 588 logmsg " found no functions to make fail\n"; [all …]
|
D | sshserver.pl | 207 logmsg $error; 217 logmsg "cannot find $sshdexe"; 228 logmsg $sshderror if($verbose); 229 logmsg 'SCP, SFTP and SOCKS tests require OpenSSH 2.9.9 or later'; 232 logmsg "ssh server found $sshd is $sshdverstr" if($verbose); 258 logmsg 'SCP, SFTP and SOCKS tests require OpenSSH 2.9.9 or later'; 268 logmsg "cannot find $sftpsrvexe"; 271 logmsg "sftp server plugin found $sftpsrv" if($verbose); 279 logmsg "cannot find $sftpexe"; 282 logmsg "sftp client found $sftp" if($verbose); [all …]
|
/external/curl/tests/server/ |
D | rtspd.c | 268 logmsg("cannot install SIGHUP handler: %s", strerror(errno)); in install_signal_handlers() 274 logmsg("cannot install SIGPIPE handler: %s", strerror(errno)); in install_signal_handlers() 280 logmsg("cannot install SIGALRM handler: %s", strerror(errno)); in install_signal_handlers() 286 logmsg("cannot install SIGINT handler: %s", strerror(errno)); in install_signal_handlers() 294 logmsg("cannot install SIGTERM handler: %s", strerror(errno)); in install_signal_handlers() 302 logmsg("cannot install SIGBREAK handler: %s", strerror(errno)); in install_signal_handlers() 346 logmsg("ProcessRequest() called with testno %ld and line [%s]", in ProcessRequest() 370 logmsg("got unknown protocol %s", prot_str); in ProcessRequest() 390 logmsg("%s", logbuf); in ProcessRequest() 393 logmsg("Are-we-friendly question received"); in ProcessRequest() [all …]
|
D | sws.c | 281 logmsg("cannot install SIGHUP handler: %s", strerror(errno)); in install_signal_handlers() 287 logmsg("cannot install SIGPIPE handler: %s", strerror(errno)); in install_signal_handlers() 293 logmsg("cannot install SIGALRM handler: %s", strerror(errno)); in install_signal_handlers() 299 logmsg("cannot install SIGINT handler: %s", strerror(errno)); in install_signal_handlers() 307 logmsg("cannot install SIGTERM handler: %s", strerror(errno)); in install_signal_handlers() 315 logmsg("cannot install SIGBREAK handler: %s", strerror(errno)); in install_signal_handlers() 376 logmsg("fopen() failed with error: %d %s", error, strerror(error)); in parse_servercmd() 377 logmsg(" [1] Error opening file: %s", filename); in parse_servercmd() 378 logmsg(" Couldn't open test file %ld", req->testno); in parse_servercmd() 392 logmsg("getpart() failed with error: %d", error); in parse_servercmd() [all …]
|
D | fake_ntlm.c | 180 logmsg("fake_ntlm (user: %s) (proto: %s) (domain: %s) (cached creds: %s)", in main() 193 logmsg("fopen() failed with error: %d %s", error, strerror(error)); in main() 194 logmsg("Error opening file: %s", filename); in main() 195 logmsg("Couldn't open test file %ld", testnum); in main() 203 logmsg("getpart() type 1 input failed with error: %d", error); in main() 211 logmsg("fopen() failed with error: %d %s", error, strerror(error)); in main() 212 logmsg("Error opening file: %s", filename); in main() 213 logmsg("Couldn't open test file %ld", testnum); in main() 221 logmsg("getpart() type 3 input failed with error: %d", error); in main() 231 logmsg("fopen() failed with error: %d %s", error, strerror(error)); in main() [all …]
|
D | sockfilt.c | 214 logmsg("cannot install SIGHUP handler: %s", strerror(errno)); in install_signal_handlers() 220 logmsg("cannot install SIGPIPE handler: %s", strerror(errno)); in install_signal_handlers() 226 logmsg("cannot install SIGALRM handler: %s", strerror(errno)); in install_signal_handlers() 232 logmsg("cannot install SIGINT handler: %s", strerror(errno)); in install_signal_handlers() 240 logmsg("cannot install SIGTERM handler: %s", strerror(errno)); in install_signal_handlers() 248 logmsg("cannot install SIGBREAK handler: %s", strerror(errno)); in install_signal_handlers() 368 logmsg("signalled to die"); in fullread() 376 logmsg("reading from file descriptor: %d,", filedes); in fullread() 377 logmsg("unrecoverable read() failure: (%d) %s", in fullread() 383 logmsg("got 0 reading from stdin"); in fullread() [all …]
|
D | tftpd.c | 324 logmsg("alarm!"); in timer() 372 logmsg("cannot install SIGHUP handler: %s", strerror(errno)); in install_signal_handlers() 378 logmsg("cannot install SIGPIPE handler: %s", strerror(errno)); in install_signal_handlers() 384 logmsg("cannot install SIGINT handler: %s", strerror(errno)); in install_signal_handlers() 392 logmsg("cannot install SIGTERM handler: %s", strerror(errno)); in install_signal_handlers() 400 logmsg("cannot install SIGBREAK handler: %s", strerror(errno)); in install_signal_handlers() 579 logmsg("Couldn't create and/or open file %s for upload!", outfile); in write_behind() 774 logmsg("Error creating socket: (%d) %s", in main() 784 logmsg("setsockopt(SO_REUSEADDR) failed with error: (%d) %s", in main() 810 logmsg("Error binding socket on port %hu: (%d) %s", in main() [all …]
|
D | util.c | 99 void logmsg(const char *msg, ...) in logmsg() function 174 logmsg("Error initialising winsock -- aborting"); in win32_init() 182 logmsg("No suitable winsock.dll found -- aborting"); in win32_init() 268 logmsg("Couldn't write pid file: %s %s", filename, strerror(errno)); in write_pidfile() 273 logmsg("Wrote pid %ld to %s", pid, filename); in write_pidfile() 287 logmsg("Error creating lock file %s error: %d %s", in set_advisor_read_lock() 296 logmsg("Error closing lock file %s error: %d %s", in set_advisor_read_lock() 315 logmsg("Error removing lock file %s error: %d %s", in clear_advisor_read_lock()
|
D | util.h | 27 void logmsg(const char *msg, ...);
|
/external/android-clat/ |
D | clatd.c | 78 logmsg(ANDROID_LOG_FATAL, "binding packet socket: %s", strerror(errno)); in configure_packet_socket() 106 logmsg(ANDROID_LOG_FATAL, "attach packet filter failed: %s", strerror(errno)); in configure_packet_socket() 127 logmsg(ANDROID_LOG_FATAL, "No free IPv4 address in %s/%d", in ipv4_address_generate() 143 logmsg(ANDROID_LOG_FATAL, "Invalid IPv4 address %s", v4_addr); in ipv4_address_from_cmdline() 162 logmsg(ANDROID_LOG_INFO, "Using IPv4 address %s on %s", addrstr, tunnel->device4); in configure_tun_ip() 169 logmsg(ANDROID_LOG_FATAL, "configure_tun_ip/if_address(4) failed: %s", strerror(-status)); in configure_tun_ip() 175 logmsg(ANDROID_LOG_FATAL, "configure_tun_ip/if_up(4) failed: %s", strerror(-status)); in configure_tun_ip() 195 logmsg(ANDROID_LOG_FATAL, "capset failed: %s", strerror(errno)); in set_capability() 206 logmsg(ANDROID_LOG_FATAL, "setgroups failed: %s", strerror(errno)); in drop_root_but_keep_caps() 213 logmsg(ANDROID_LOG_FATAL, "setresgid failed: %s", strerror(errno)); in drop_root_but_keep_caps() [all …]
|
D | config.c | 50 logmsg(ANDROID_LOG_FATAL, "%s config item needed", item_name); in config_item_str() 71 logmsg(ANDROID_LOG_FATAL, "%s config item needed", item_name); in config_item_int16_t() 78 logmsg(ANDROID_LOG_FATAL, "%s config item is not numeric: %s (error=%s)", item_name, tmp, in config_item_int16_t() 83 logmsg(ANDROID_LOG_FATAL, "%s config item is not numeric: %s", item_name, tmp); in config_item_int16_t() 87 logmsg(ANDROID_LOG_FATAL, "%s config item contains non-numeric characters: %s", item_name, in config_item_int16_t() 92 logmsg(ANDROID_LOG_FATAL, "%s config item is too big/small: %d", item_name, conf_int); in config_item_int16_t() 113 logmsg(ANDROID_LOG_FATAL, "%s config item needed", item_name); in config_item_ip() 119 logmsg(ANDROID_LOG_FATAL, "invalid IPv4 address specified for %s: %s", item_name, tmp); in config_item_ip() 140 logmsg(ANDROID_LOG_FATAL, "%s config item needed", item_name); in config_item_ip6() 146 logmsg(ANDROID_LOG_FATAL, "invalid IPv6 address specified for %s: %s", item_name, tmp); in config_item_ip6() [all …]
|
D | main.c | 91 logmsg(ANDROID_LOG_FATAL, "Unknown option -%c. Exiting.", (char)optopt); in main() 97 logmsg(ANDROID_LOG_FATAL, "clatd called without an interface"); in main() 102 logmsg(ANDROID_LOG_FATAL, "invalid NetID %s", net_id_str); in main() 107 logmsg(ANDROID_LOG_FATAL, "invalid mark %s", mark_str); in main() 112 logmsg(ANDROID_LOG_FATAL, "invalid tunfd %s", tunfd_str); in main() 116 logmsg(ANDROID_LOG_FATAL, "no tunfd specified on commandline."); in main() 122 logmsg(ANDROID_LOG_FATAL, "interface name too long '%s'", tunnel.device4); in main() 126 logmsg(ANDROID_LOG_INFO, "Starting clat version %s on %s netid=%s mark=%s plat=%s v4=%s v6=%s", in main() 152 logmsg(ANDROID_LOG_FATAL, "sigterm handler failed: %s", strerror(errno)); in main() 158 logmsg(ANDROID_LOG_INFO, "Shutting down clat on %s", uplink_interface); in main()
|
D | ring.c | 35 logmsg(ANDROID_LOG_FATAL, "packet socket failed: %s", strerror(errno)); in ring_create() 41 logmsg(ANDROID_LOG_FATAL, "setsockopt(PACKET_VERSION, %d) failed: %s", ver, strerror(errno)); in ring_create() 47 logmsg(ANDROID_LOG_WARN, "PACKET_LOSS failed: %s", strerror(errno)); in ring_create() 63 logmsg(ANDROID_LOG_FATAL, "PACKET_RX_RING failed: %s", strerror(errno)); in ring_create() 71 logmsg(ANDROID_LOG_FATAL, "mmap %lu failed: %s", buflen, strerror(errno)); in ring_create() 80 logmsg(ANDROID_LOG_INFO, "Using ring buffer with %d frames (%d bytes) at %p", total_frames, in ring_create()
|
D | dns64.c | 49 logmsg(ANDROID_LOG_INFO, "Detecting NAT64 prefix from DNS..."); in plat_prefix() 58 logmsg(ANDROID_LOG_ERROR, "plat_prefix/dns(%s) status = %d/%s", ipv4_name, status, in plat_prefix() 68 logmsg(ANDROID_LOG_WARN, "plat_prefix/unexpected address family: %d", result->ai_family); in plat_prefix() 76 logmsg(ANDROID_LOG_INFO, "Detected NAT64 prefix %s/96", in plat_prefix()
|
D | setif.c | 153 logmsg(ANDROID_LOG_ERROR, "%s: setsockopt(%s): %s", __func__, optname, strerror(errno)); in do_anycast_setsockopt() 170 logmsg(ANDROID_LOG_ERROR, "%s: unknown ifindex for interface %s", __func__, ifname); in add_anycast_address()
|
D | logging.h | 24 void logmsg(int prio, const char *fmt, ...);
|
D | logging.c | 31 void logmsg(int prio, const char *fmt, ...) { in logmsg() function
|
D | getaddr.c | 128 logmsg(ANDROID_LOG_FATAL, "getinterface_ip/out of memory"); in getinterface_ip()
|
D | ipv6.c | 170 logmsg(ANDROID_LOG_ERROR, "ipv6_packet/unknown next header type: %x", ip6->ip6_nxt); in ipv6_packet()
|
/external/libevent/test/ |
D | regress_util.c | 475 static char *logmsg = NULL; variable 483 if (logmsg) in logfn() 484 free(logmsg); in logfn() 485 logmsg = strdup(msg); in logfn() 495 !logmsg || in fatalfn() 496 strcmp(logmsg, fatal_want_message)) in fatalfn() 561 if (logmsg) free(logmsg); \ in test_evutil_log() 562 logmsg = NULL; \ in test_evutil_log() 566 tt_assert(logmsg != NULL); \ in test_evutil_log() 567 tt_str_op(logmsg,==,msg); \ in test_evutil_log() [all …]
|
/external/toybox/toys/pending/ |
D | syslogd.c | 314 static void logmsg(char *msg, int len) in logmsg() function 482 logmsg("<46>Toybox: syslogd started", 27); //27 : the length of message in syslogd_main() 495 else if (!retval) logmsg("<46>-- MARK --", 14); in syslogd_main() 507 logmsg("<46>syslogd exiting", 19); in syslogd_main() 518 logmsg("<46>syslogd exiting", 19); in syslogd_main() 535 logmsg(buffer, len); in syslogd_main() 543 logmsg("<46>syslogd exiting", 19); in syslogd_main()
|
/external/openssh/ |
D | monitor.c | 418 Buffer logmsg; in monitor_read_log() local 422 buffer_init(&logmsg); in monitor_read_log() 425 buffer_append_space(&logmsg, 4); in monitor_read_log() 427 buffer_ptr(&logmsg), buffer_len(&logmsg)) != buffer_len(&logmsg)) { in monitor_read_log() 429 buffer_free(&logmsg); in monitor_read_log() 437 len = buffer_get_int(&logmsg); in monitor_read_log() 442 buffer_clear(&logmsg); in monitor_read_log() 443 buffer_append_space(&logmsg, len); in monitor_read_log() 445 buffer_ptr(&logmsg), buffer_len(&logmsg)) != buffer_len(&logmsg)) in monitor_read_log() 449 level = buffer_get_int(&logmsg); in monitor_read_log() [all …]
|
/external/ltp/testcases/kernel/sched/sched_stress/ |
D | sched.h | 54 void logmsg (const char *, ...);
|
D | sched.c | 76 void logmsg(const char *args, ...)
|