TH_LOG 39 tools/testing/selftests/ptrace/get_syscall_info.c TH_LOG("wait #%d: " fmt, \ TH_LOG 80 tools/testing/selftests/ptrace/get_syscall_info.c TH_LOG("fork: %m"); TH_LOG 87 tools/testing/selftests/ptrace/get_syscall_info.c TH_LOG("PTRACE_TRACEME: %m"); TH_LOG 91 tools/testing/selftests/ptrace/get_syscall_info.c TH_LOG("kill SIGSTOP: %m"); TH_LOG 47 tools/testing/selftests/rtc/rtctest.c TH_LOG("Current RTC date/time is %02d/%02d/%02d %02d:%02d:%02d.", TH_LOG 60 tools/testing/selftests/rtc/rtctest.c TH_LOG("skip update IRQs not supported."); TH_LOG 85 tools/testing/selftests/rtc/rtctest.c TH_LOG("skip update IRQs not supported."); TH_LOG 129 tools/testing/selftests/rtc/rtctest.c TH_LOG("skip alarms are not supported."); TH_LOG 136 tools/testing/selftests/rtc/rtctest.c TH_LOG("Alarm time now set to %02d:%02d:%02d.", TH_LOG 156 tools/testing/selftests/rtc/rtctest.c TH_LOG("data: %lx", data); TH_LOG 185 tools/testing/selftests/rtc/rtctest.c TH_LOG("skip alarms are not supported."); TH_LOG 192 tools/testing/selftests/rtc/rtctest.c TH_LOG("Alarm time now set to %02d/%02d/%02d %02d:%02d:%02d.", TH_LOG 231 tools/testing/selftests/rtc/rtctest.c TH_LOG("skip alarms are not supported."); TH_LOG 238 tools/testing/selftests/rtc/rtctest.c TH_LOG("Alarm time now set to %02d:%02d:%02d.", TH_LOG 258 tools/testing/selftests/rtc/rtctest.c TH_LOG("data: %lx", data); TH_LOG 287 tools/testing/selftests/rtc/rtctest.c TH_LOG("skip alarms are not supported."); TH_LOG 294 tools/testing/selftests/rtc/rtctest.c TH_LOG("Alarm time now set to %02d/%02d/%02d %02d:%02d:%02d.", TH_LOG 234 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support CONFIG_SECCOMP"); TH_LOG 245 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support CONFIG_SECCOMP"); TH_LOG 250 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Unreachable!"); TH_LOG 261 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 272 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 277 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support CONFIG_SECCOMP_FILTER!"); TH_LOG 294 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Expected 0 or unsupported for NO_NEW_PRIVS"); TH_LOG 336 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Installing %d insn filter was allowed", prog.len); TH_LOG 343 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Installing %d insn filter wasn't allowed", prog.len); TH_LOG 382 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Allowed %d %d-insn filters (total with penalties:%d)", TH_LOG 510 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("getpid() shouldn't ever return"); TH_LOG 532 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("getpid() shouldn't ever return"); TH_LOG 714 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 981 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("sigaction failed"); TH_LOG 985 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("sigprocmask failed"); TH_LOG 1397 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed to set PTRACE_O_TRACESECCOMP"); TH_LOG 1642 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("PTRACE_GETREGS failed"); TH_LOG 1651 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("PTRACE_GETREGSET failed"); TH_LOG 1715 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("How is the syscall changed on this architecture?"); TH_LOG 1722 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Can't modify syscall return on this architecture"); TH_LOG 1770 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Unknown PTRACE_GETEVENTMSG: 0x%lx", msg); TH_LOG 1840 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Running this test as init is not supported. :)"); TH_LOG 2092 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 2098 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2101 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Did not reject crazy op value!"); TH_LOG 2107 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Did not reject mode strict with flags!"); TH_LOG 2111 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Did not reject mode strict with uargs!"); TH_LOG 2117 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Did not reject crazy filter flags!"); TH_LOG 2121 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Did not reject NULL filter!"); TH_LOG 2126 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support SECCOMP_SET_MODE_FILTER: %s", TH_LOG 2144 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 2149 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2152 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Could not install filter!"); TH_LOG 2158 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Switched to mode strict!"); TH_LOG 2163 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Switched to mode strict!"); TH_LOG 2203 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2207 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed to detect that a known-good filter flag (0x%X) is supported!", TH_LOG 2229 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed to detect that all known-good filter flags (0x%X) are supported!", TH_LOG 2240 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed to detect that an unknown filter flag (0x%X) is unsupported!", TH_LOG 2252 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed to detect that an unknown filter flag (0x%X) is unsupported! Does a new flag need to be added to this test?", TH_LOG 2270 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 2276 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2279 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Could not install initial filter with TSYNC!"); TH_LOG 2306 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("pthread_join of tid %u failed: %d\n", \ TH_LOG 2449 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 2455 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2458 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("setting filter failed"); TH_LOG 2473 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("cond broadcast non-zero"); TH_LOG 2490 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 2495 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2498 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support SECCOMP_SET_MODE_FILTER!"); TH_LOG 2511 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Could install filter on all threads!"); TH_LOG 2516 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("cond broadcast non-zero"); TH_LOG 2541 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("cond broadcast non-zero"); TH_LOG 2566 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 2572 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2575 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Could install filter on all threads!"); TH_LOG 2581 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("cond broadcast non-zero"); TH_LOG 2598 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 2603 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2606 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support SECCOMP_SET_MODE_FILTER!"); TH_LOG 2620 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Did not fail on diverged sibling."); TH_LOG 2626 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("cond broadcast non-zero"); TH_LOG 2644 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 2664 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2667 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support SECCOMP_SET_MODE_FILTER!"); TH_LOG 2673 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Did not fail on diverged sibling."); TH_LOG 2688 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("cond broadcast non-zero"); TH_LOG 2702 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Expected the remaining sibling to sync"); TH_LOG 2713 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("cond broadcast non-zero"); TH_LOG 2782 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 2787 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed to install filter!"); TH_LOG 2791 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed to read() sync from parent"); TH_LOG 2794 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed to get sync data from read()"); TH_LOG 2801 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Call to nanosleep() failed (errno %d)", errno); TH_LOG 2806 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed final read() from parent"); TH_LOG 2809 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Failed to get final data from read()"); TH_LOG 2931 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2934 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel accepted FILTER_FLAG_LOG flag in strict mode!"); TH_LOG 2937 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel returned unexpected errno for FILTER_FLAG_LOG flag in strict mode!"); TH_LOG 2948 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support the FILTER_FLAG_LOG flag!"); TH_LOG 2973 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support seccomp syscall!"); TH_LOG 2976 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support SECCOMP_GET_ACTION_AVAIL operation!"); TH_LOG 2983 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Expected action (0x%X) not available!", TH_LOG 3101 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 3198 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 3250 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 3322 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 3396 tools/testing/selftests/seccomp/seccomp_bpf.c TH_LOG("Kernel does not support PR_SET_NO_NEW_PRIVS!"); TH_LOG 355 tools/testing/selftests/uevent/uevent_filtering.c TH_LOG("Uevent filtering tests require root privileges. Skipping test"); TH_LOG 362 tools/testing/selftests/uevent/uevent_filtering.c TH_LOG(__DEV_FULL " does not exist. Skipping test");