error_msg
static void ar_context_abort(struct ar_context *ctx, const char *error_msg)
ohci_err(ohci, "AR error: %s; DMA stopped\n", error_msg);
char error_msg[80];
vscnprintf(error_msg, sizeof(error_msg), fmt, args);
msg = error_msg;
len = scnprintf(error->error_msg, sizeof(error->error_msg),
len += scnprintf(error->error_msg + len,
sizeof(error->error_msg) - len,
return error->error_msg;
drm_info(&i915->drm, "%s\n", error_msg(error));
if (*error->error_msg)
err_printf(m, "%s\n", error->error_msg);
char error_msg[128];
goto error_msg;
error_msg:
char *error_msg = NULL;
error_msg = "Success";
error_msg = "Command failed";
error_msg = "Invalid signature";
error_msg = "Invalid command value/Feature not supported";
error_msg = "Invalid command type";
error_msg = "Invalid data size";
error_msg = "Invalid command parameter";
error_msg = "Secure/encrypted command required";
error_msg = "No secure session established";
error_msg = "Secure session already established";
error_msg = "Secure session failed";
error_msg = "Other permission/Authentication failed";
error_msg = "Invalid BIOS administrator password";
error_msg = "Nonce did not match";
error_msg = "Generic/Other error";
error_msg = "BIOS Admin password does not meet password policy requirements";
error_msg = "BIOS Setup password is not set";
error_msg = "P21 is not provisioned";
error_msg = "P21 is already provisioned or provisioning is in progress and a signing key has already been sent";
error_msg = "P21 in use (cannot deprovision)";
error_msg = "HEP not activated";
error_msg = "HEP Transport already set";
error_msg = "Check the current HEP state";
error_msg = "Generic/Other error";
pr_warn_ratelimited("Returned error 0x%x, \"%s\"\n", error_code, error_msg);
char *error_msg[5] = {};
error_msg[i++] = "Error data in FIFO\n";
error_msg[i++] = " Framing Error\n";
error_msg[i++] = " Parity Error\n";
error_msg[i++] = " Overrun Error\n";
for (i = 0; error_msg[i] != NULL; i++)
dev_err(&priv->pdev->dev, error_msg[i]);
const char *error_msg = "bad slave string format, expecting "
dev_err(dev, "%s", error_msg);
dev_err(dev, "%s", error_msg);
error_msg = "directory entry overrun";
error_msg = "directory entry too close to block end";
error_msg = "inode out of bounds";
error_msg = "'.' directory cannot be the last in data block";
error_msg, offset, le32_to_cpu(de->inode),
error_msg, offset, le32_to_cpu(de->inode),
const char *error_msg = NULL;
error_msg = "rec_len is smaller than minimal";
error_msg = "rec_len % 4 != 0";
error_msg = "rec_len is too small for name_len";
const char *error_msg;
error_msg = "invalid magic";
error_msg = "unexpected eh_depth";
error_msg = "invalid eh_max";
error_msg = "too large eh_max";
error_msg = "invalid eh_entries";
error_msg = "eh_entries is 0 but eh_depth is > 0";
error_msg = "invalid extent entries";
error_msg = "too large eh_depth";
error_msg = "extent tree corrupted";
(unsigned long long) pblk, error_msg,
const char *error_msg;
error_msg = "invalid name_len for '.'";
error_msg = "invalid name for '.'";
error_msg = "invalid rec_len for '.'";
error_msg = "invalid name_len for '..'";
error_msg = "invalid name for '..'";
error_msg = "invalid rec_len for '..'";
error_msg);
const char *error_msg = NULL;
error_msg = "rec_len is smaller than minimal";
error_msg = "rec_len % 4 != 0";
error_msg = "rec_len is too small for name_len";
error_msg = "directory entry overrun";
error_msg = "directory entry too close to end";
if (unlikely(error_msg != NULL))
(unsigned long long)OCFS2_I(dir)->ip_blkno, error_msg,
return error_msg == NULL ? 1 : 0;
const char *error_msg; /* error message, if any */
const char *error_msg,
TP_ARGS(err_type, error_msg, label, error_count, mc_index,
__string( msg, error_msg )
con->error_msg = "socket closed (con state " #x ")"; \
if (!con->error_msg)
con->error_msg = "socket error on read";
if (!con->error_msg)
con->error_msg = "socket error on write";
ceph_pr_addr(&con->peer_addr), con->error_msg);
con->error_msg = NULL;
con->error_msg = "error allocating memory for incoming message";
con->error_msg = "bad message sequence # for incoming message";
con->error_msg = "bad crc/signature";
con->error_msg = "io error";
con->error_msg = "protocol error, garbage tag";
con->error_msg = "connect error";
con->error_msg = "protocol error, bad banner";
con->error_msg = "wrong peer at address";
con->error_msg = "bad authorize reply";
con->error_msg = "missing required protocol features";
con->error_msg = "protocol version mismatch";
con->error_msg = "connect authorization failure";
con->error_msg = "missing required protocol features";
con->error_msg = "protocol error, got WAIT as client";
con->error_msg = "protocol error, garbage tag during connect";
con->error_msg = "server is speaking msgr1 protocol";
con->error_msg = "protocol error, bad banner";
con->error_msg = "missing required protocol features";
con->error_msg = "missing required protocol features";
con->error_msg = "protocol error, unexpected hello";
con->error_msg = "wrong peer at address";
con->error_msg = "protocol error, unexpected auth_bad_method";
con->error_msg = "protocol error, unexpected auth_reply_more";
con->error_msg = "protocol error, unexpected auth_done";
con->error_msg = "protocol error, unexpected auth_signature";
con->error_msg = "integrity error, bad auth signature";
con->error_msg = "protocol error, unexpected server_ident";
con->error_msg = "wrong peer at address";
con->error_msg = "missing required protocol features";
con->error_msg = "protocol error, unexpected ident_missing_features";
con->error_msg = "missing required protocol features";
con->error_msg = "protocol error, unexpected session_reconnect_ok";
con->error_msg = "protocol error, unexpected session_retry";
con->error_msg = "protocol error, unexpected session_retry_global";
con->error_msg = "protocol error, unexpected session_reset";
con->error_msg = "protocol error, bad session_reset";
con->error_msg = "protocol error, unexpected keepalive2_ack";
con->error_msg = "protocol error, unexpected ack";
con->error_msg = "protocol error, bad tag";
con->error_msg = "bad message sequence # for incoming message";
con->error_msg = "protocol error, unexpected message";
con->error_msg = "integrity error, bad preamble auth tag";
con->error_msg = "integrity error, bad crc";
con->error_msg = "protocol error, bad preamble";
con->error_msg = "integrity error, bad crc";
con->error_msg = "integrity error, bad control remainder auth tag";
con->error_msg = "integrity error, bad epilogue auth tag";
con->error_msg = "protocol error, bad epilogue";
con->error_msg = "protocol error, bad epilogue";
con->error_msg = "integrity error, bad crc";
if (ret && ret != -EAGAIN && !con->error_msg)
con->error_msg = "read processing error";
con->error_msg = "connect error";
con->error_msg = "connect error";
con->error_msg = "connect error";
if (ret && ret != -EAGAIN && !con->error_msg)
con->error_msg = "write processing error";
if (ret && ret != -EAGAIN && !con->error_msg)
con->error_msg = "write processing error";
const char *error_msg)
int msg_size = strlen(error_msg);
printf("value:%c%s", break_names ? '\n' : ' ', error_msg);
#define __BPF_TEST_FAIL(name, __retval, type, error_msg) \
.expected_err_msg = error_msg, \
#define TC_FAIL(name, retval, error_msg) __BPF_TEST_FAIL(name, retval, tc_test, error_msg)
#define SYSCALL_NULL_CTX_FAIL(name, retval, error_msg) \
__BPF_TEST_FAIL(name, retval, syscall_null_ctx_test, error_msg)
const char *error_msg;
error_msg = "socket already in use (e.g. auditd)";
error_msg = strerror(-self->audit_fd);
TH_LOG("Failed to initialize audit: %s", error_msg);
const char *error_msg;
error_msg = "socket already in use (e.g. auditd)";
error_msg = strerror(-self->audit_fd);
TH_LOG("Failed to initialize audit: %s", error_msg);
const char *error_msg;
error_msg = "socket already in use (e.g. auditd)";
error_msg = strerror(-self->audit_fd);
TH_LOG("Failed to initialize audit: %s", error_msg);