Lines Matching defs:to
84 /* Special value to leave the Kerberos Replay Cache set to use
216 "signaling providers to reset offline status\n");
248 "Unable to find peer [%s] in list of services, "
269 * the service has been socket/dbus activated and has to be configured and added
270 * to the services' list now */
285 "Unable to get the configuration for the service: %s\n",
360 "Failed to parse message, killing connection\n");
385 /* For {dbus,socket}-activated services we will have to unregister then
386 * when the sbus_connection is freed. That's the reason we have to
388 * from there and set the destructor back to NULL just before freeing
396 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to mark service [%s]!\n", svc_name);
424 /* try to delist service */
494 * call to the SIGCHLD handler
504 DEBUG(SSSDBG_TRACE_FUNC, "Sending startup notification to systemd\n");
509 "Error sending notification to systemd %d: %s\n",
529 /* We need to attach a spy to the connection structure so that if some code
531 * try to access or even free, freed memory. */
534 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to attach spy\n");
572 /* There's no reason for trying to terminate the parent process
592 * mode. Make sure we send the signal to the right process */
608 DEBUG(SSSDBG_FATAL_FAILURE, "Unable to terminate parent "
648 struct tevent_timer *to;
653 to = tevent_add_timer(ctx->ev, ctx, tv, services_startup_timeout, ctx);
654 if (!to) {
680 /* If a service is running as unprivileged user, we need to make sure this
739 /* Signal all services to reload their DNS configuration */
757 /* Avoid a race condition where we are trying to
758 * order a service to reload that hasn't started
772 "Out of memory trying to allocate memory to invoke: %s\n",
917 DEBUG(SSSDBG_OP_FAILURE, "Failed to get id_provider for " \
964 /* Check if services we are about to start are in the list if known */
983 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to get the user to run as\n");
990 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to set allowed UIDs.\n");
1022 "Failed to get the explicitly configured services!\n");
1034 DEBUG(SSSDBG_OP_FAILURE, "Failed to add implicit configured "
1056 DEBUG(SSSDBG_CRIT_FAILURE, "Failed to get the unprivileged user\n");
1070 DEBUG(SSSDBG_FATAL_FAILURE, "Failed to expand application domains\n");
1156 DEBUG(SSSDBG_FATAL_FAILURE,"Failed to start service '%s'\n", svc->name);
1245 DEBUG(SSSDBG_FATAL_FAILURE,"Failed to start service '%s'\n", svc->name);
1294 "Failed to find ID provider from [%s] configuration\n", name);
1304 "Failed to find command from [%s] configuration\n", name);
1398 * We'll add it to the service list, but we don't need
1399 * to poll it.
1408 DEBUG(SSSDBG_FATAL_FAILURE,"Failed to start service '%s'\n", svc->name);
1427 /* Send D-Bus message to other services to rotate their logs.
1428 * NSS service receives also message to clear memory caches. */
1474 /* Unset the sbus_connection destructor used to
1476 * it may lead to a double-free here. */
1605 "Signaling providers to go offline immediately.\n");
1607 /* Signal all providers to immediately go offline */
1629 "Signaling providers to reset offline immediately.\n");
1649 * to access the monitor context on process shutdown */
1659 * optimisations which should not happen according to code: chown (unlink)
1663 * it's better to disable optimisation (in-lining) of this function.
1691 DEBUG(SSSDBG_FATAL_FAILURE, "Unable to setup ConfDB [%d]: %s\n",
1703 /* Allow configuration database to be accessible
1783 /* Tell the monitor to signal the children */
1818 * This way, if there is a script writing to the file
1819 * repeatedly, we won't be attempting to update multiple
1867 DEBUG(SSSDBG_MINOR_FAILURE, "Falling back to polling\n");
1990 "Unable to set KRB5RCACHEDIR: %s."
1991 "Will attempt to use libkrb5 defaults\n",
2019 /* Handle SIGUSR1 (tell all providers to go offline) */
2027 /* Handle SIGUSR2 (tell all providers to go reset offline) */
2039 /* Watch for changes to the DNS resolv.conf */
2052 * We need to handle DB upgrades or DB creation only
2084 "Failed to read disable_netlink from confdb: [%d] %s\n",
2135 * would be able to do so and the SSSD would end up hitting a systemd
2228 * with a double-free due to a cycling call */
2250 /* Add a timed event to start up the service.
2251 * We have to do this in order to avoid a race
2253 * and attempts to connect to the SBUS before
2260 "Unable to queue service %s for startup\n", svc->name);
2284 "Could not fork child to start service [%s]. "
2322 /* We have to call _exit() instead of exit() here
2323 * because a bug in D-BUS will cause the server to
2380 /* Handle the actual checks for how many times to restart this
2401 * and can't come back up, this is the only way to
2419 "Failed to allocate timed event: mt_svc_restart.\n");
2465 /* Set debug level to invalid value so we can decide if -d 0 was used. */
2487 * to save it and pass it to the children later.
2558 /* Open before server_setup() does to have logging
2569 * keys are private to the daemon and cannot be read by any other process
2578 "to the root user. (%d, %s)", errno, strerror(errno));
2586 "to the root user. (%d, %s)", errno, strerror(errno));
2590 /* Warn if nscd seems to be running */
2601 "recommended not to run NSCD in parallel with SSSD, "
2602 "unless NSCD is configured not to cache the passwd, "
2608 "NSCD socket was detected and seems to be configured "
2609 "to cache some of the databases controlled by "
2611 "recommended not to run NSCD in parallel with SSSD, "
2612 "unless NSCD is configured not to cache these.");
2617 "seems to be configured not to interfere with "
2654 * if that's all we were asked to do */