/external/dnsmasq/src/ |
H A D | dnsmasq.c | 19 struct daemon *daemon; variable in typeref:struct:daemon 117 if (daemon->edns_pktsz < PACKETSZ) 118 daemon->edns_pktsz = PACKETSZ; 119 daemon->packet_buff_sz = daemon->edns_pktsz > DNSMASQ_PACKETSZ ? 120 daemon->edns_pktsz : DNSMASQ_PACKETSZ; 121 daemon->packet = safe_malloc(daemon->packet_buff_sz); 124 if (!daemon [all...] |
H A D | forward.c | 126 for (serv = daemon->servers; serv; serv=serv->next) 184 (daemon->options & OPT_NODOTS_LOCAL) && !strchr(qdomain, '.') && namelen != 0) 211 unsigned int crc = questions_crc(header, plen, daemon->namebuff); 213 unsigned short gotname = extract_request(header, plen, daemon->namebuff, NULL); 217 if (!daemon->servers) 224 if (!(daemon->options & OPT_ORDER)) 227 daemon->last_server = NULL; 231 start = daemon->servers; /* at end of list, recycle */ 237 flags = search_servers(now, &addrp, gotname, daemon->namebuff, &type, &domain); 263 if (type != 0 || (daemon [all...] |
H A D | netlink.c | 54 if ((daemon->netlinkfd = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE)) != -1) 56 if (bind(daemon->netlinkfd, (struct sockaddr *)&addr, sizeof(addr)) == -1) 59 if (errno != EPERM || bind(daemon->netlinkfd, (struct sockaddr *)&addr, sizeof(addr)) == -1) 60 daemon->netlinkfd = -1; 64 if (daemon->netlinkfd == -1 || 65 getsockname(daemon->netlinkfd, (struct sockaddr *)&addr, &slen) == 1) 91 while ((rc = recvmsg(daemon->netlinkfd, &msg, MSG_PEEK | MSG_TRUNC)) == -1 && errno == EINTR); 108 while ((rc = recvmsg(daemon->netlinkfd, &msg, 0)) == -1 && errno == EINTR); 152 while((len = sendto(daemon->netlinkfd, (void *)&req, sizeof(req), 0, 243 if ((flags = fcntl(daemon [all...] |
H A D | tftp.c | 44 char *packet = daemon->packet; 53 int port = daemon->start_tftp_port; /* may be zero to use ephemeral port */ 78 iov.iov_len = daemon->packet_buff_sz; 81 daemon->srv_save = NULL; 86 if (daemon->options & OPT_NOWILD) 129 for (tmp = daemon->dhcp_except; tmp; tmp = tmp->next) 172 if (errno == EADDRINUSE && daemon->start_tftp_port != 0) 174 if (++port <= daemon->end_tftp_port) 205 !(daemon->options & OPT_TFTP_NOBLOCK)) 210 if (transfer->blocksize > (unsigned)daemon [all...] |
H A D | option.c | 35 { "daemon", LOG_DAEMON }, 116 { "no-daemon", 0, 0, 'd' }, 587 r->next = daemon->txt; 588 daemon->txt = r; 962 new->next = daemon->dhcp_match; 963 daemon->dhcp_match = new; 968 new->next = daemon->dhcp_opts; 969 daemon->dhcp_opts = new; 1010 daemon->options |= rept; 1111 daemon [all...] |
H A D | lease.c | 34 daemon->dhcp_buff = safe_malloc(256); 35 daemon->dhcp_buff2 = safe_malloc(256); 37 leases_left = daemon->dhcp_max; 39 if (daemon->options & OPT_LEASE_RO) 46 if (daemon->lease_change_command) 48 strcpy(daemon->dhcp_buff, daemon->lease_change_command); 49 strcat(daemon->dhcp_buff, " init"); 50 leasestream = popen(daemon->dhcp_buff, "r"); 63 leasestream = daemon [all...] |
H A D | helper.c | 81 if (!(daemon->options & OPT_DEBUG) && uid != 0) 88 if (daemon->options & OPT_NO_FORK) 89 /* send error to daemon process if no-fork */ 93 /* kill daemon */ 114 unsigned char *buf = (unsigned char *)daemon->namebuff; 131 p = daemon->dhcp_buff; 144 for (p = daemon->packet, i = 0; i < data.clid_len; i++) 153 sprintf(daemon->dhcp_buff2, "%u ", data.length); 155 sprintf(daemon->dhcp_buff2, "%lu ", (unsigned long)data.expires); 196 my_setenv("DNSMASQ_CLIENT_ID", daemon [all...] |
H A D | dbus.c | 69 for (w = daemon->watches; w; w = w->next) 77 w->next = daemon->watches; 78 daemon->watches = w; 88 for (up = &(daemon->watches), w = daemon->watches; w; w = w->next) 110 for (serv = daemon->servers; serv; serv = serv->next) 132 source_addr.in.sin_port = htons(daemon->query_port); 163 source_addr.in6.sin6_port = htons(daemon->query_port); 184 for (serv = daemon->servers; serv; serv = serv->next) 217 serv->next = daemon [all...] |
H A D | network.c | 64 for (bridge = daemon->bridges; bridge; bridge = bridge->next) 88 if (daemon->if_names || (addr && daemon->if_addrs)) 92 for (tmp = daemon->if_names; tmp; tmp = tmp->next) 96 for (tmp = daemon->if_addrs; tmp; tmp = tmp->next) 111 for (tmp = daemon->if_except; tmp; tmp = tmp->next) 155 if (daemon->if_names && loopback) 158 for (lo = daemon->if_names; lo; lo = lo->next) 171 lo->next = daemon->if_names; 172 daemon [all...] |
H A D | dhcp.c | 57 if (daemon->options & OPT_NOWILD) 70 saddr.sin_port = htons(daemon->dhcp_server_port); 79 daemon->dhcpfd = fd; 86 if (daemon->options & OPT_NO_PING) 87 daemon->dhcp_icmp_fd = -1; 88 else if ((daemon->dhcp_icmp_fd = make_icmp_sock()) == -1 || 89 setsockopt(daemon->dhcp_icmp_fd, SOL_SOCKET, SO_RCVBUF, &oneopt, sizeof(oneopt)) == -1 ) 98 daemon->dhcp_packet.iov_len = sizeof(struct dhcp_packet); 99 daemon->dhcp_packet.iov_base = safe_malloc(daemon [all...] |
H A D | rfc2131.c | 130 struct dhcp_packet *mess = (struct dhcp_packet *)daemon->dhcp_packet.iov_base; 174 so reassign mess from daemon->packet. Also, the size 185 if (expand_buf(&daemon->dhcp_packet, size)) 187 mess = (struct dhcp_packet *)daemon->dhcp_packet.iov_base; 223 for (vendor = daemon->dhcp_vendors; vendor; vendor = vendor->next) 273 for (mac = daemon->dhcp_macs; mac; mac = mac->next) 320 for (context_tmp = daemon->dhcp; context_tmp; context_tmp = context_tmp->next) 345 if (daemon->options & OPT_LOG_OPTS) 350 strcpy(daemon->namebuff, inet_ntoa(context_tmp->start)); 353 ntohl(mess->xid), daemon [all...] |
H A D | log.c | 61 log_stderr = !!(daemon->options & OPT_DEBUG); 63 if (daemon->log_fac != -1) 64 log_fac = daemon->log_fac; 66 else if (daemon->options & OPT_DEBUG) 70 if (daemon->log_file) 73 daemon->max_logs = 0; 76 max_logs = daemon->max_logs; 78 if (!log_reopen(daemon->log_file))
|
H A D | rfc1035.c | 554 for (doctor = daemon->doctors; doctor; doctor = doctor->next) 630 minttl = daemon->neg_ttl; 649 if (daemon->doctors) 730 if (!found && !(daemon->options & OPT_NO_NEG)) 810 if ((daemon->options & OPT_NO_REBIND) && 831 if (!found && !(daemon->options & OPT_NO_NEG)) 953 for (mx = daemon->mxnames; mx; mx = mx->next) 957 for (txt = daemon->txt; txt; txt = txt->next) 961 for (intr = daemon->int_names; intr; intr = intr->next) 965 for (ptr = daemon [all...] |
H A D | bpf.c | 107 if (!(daemon->options & OPT_NOWILD) && IN6_IS_ADDR_LINKLOCAL(addr)) 146 if ((daemon->dhcp_raw_fd = open(ifreq.iov_base, O_RDWR, 0)) != -1) 184 if (ioctl(daemon->dhcpfd, SIOCGIFADDR, ifr) < 0) 219 udp.uh_sport = htons(daemon->dhcp_server_port); 220 udp.uh_dport = htons(daemon->dhcp_client_port); 238 ioctl(daemon->dhcp_raw_fd, BIOCSETIF, ifr); 249 while (writev(daemon->dhcp_raw_fd, iov, 4) == -1 && retry_send());
|
H A D | cache.c | 78 if (daemon->options & OPT_LOG) 81 bignames_left = daemon->cachesize/10; 83 if (daemon->cachesize > 0) 85 crecp = safe_malloc(daemon->cachesize*sizeof(struct crec)); 87 for (i=0; i < daemon->cachesize; i++, crecp++) 96 rehash(daemon->cachesize); 694 for (a = daemon->cnames; a; a = a->next) 756 char *token = daemon->namebuff, *domain_suffix = NULL; 786 domain_suffix = daemon->domain_suffix; 835 if ((daemon [all...] |
/external/chromium_org/v8/tools/testrunner/server/ |
H A D | local_handler.py | 62 with self.server.daemon.peer_list_lock: 63 response = [ p.Pack() for p in self.server.daemon.peers 68 self.server.daemon.DeletePeer(data[1]) 71 compression.Send([action, self.server.daemon.pubkey_fingerprint], 78 fingerprint = self.server.daemon.CopyToTrusted(data[1]) 86 self.server.daemon.AddPerfData(test_key, test_duration, arch, mode) 91 self.server.daemon.UpdatePeerPerformance(data[1], data[2]) 99 with self.server.daemon.peer_list_lock: 100 for p in self.server.daemon.peers: 103 (self.server.daemon [all...] |
H A D | presence_handler.py | 63 trusted = self.server.daemon.IsTrusted(pubkey_fingerprint) 64 response = [STARTUP_RESPONSE, self.server.daemon.jobs, 65 self.server.daemon.relative_perf, 66 self.server.daemon.pubkey_fingerprint, trusted] 72 self.server.daemon.AddPeer(p) 79 p.trusted = self.server.daemon.IsTrusted(pubkey_fingerprint) 81 self.server.daemon.AddPeer(p) 84 self.server.daemon.DeletePeer(self.client_address[0]) 85 if self.client_address[0] == self.server.daemon.ip: 90 def __init__(self, daemon) [all...] |
H A D | status_handler.py | 85 response = self.server.daemon.ListTrusted() 89 response = self.server.daemon.SignTrusted(data[1]) 93 self.server.daemon.AcceptNewTrusted(data[1:]) 97 self.server.daemon.MarkPeerAsTrusting(self.client_address[0]) 101 response = self.server.daemon.IsTrusted(data[1]) 109 def __init__(self, daemon): 110 address = (daemon.ip, constants.STATUS_PORT) 112 self.daemon = daemon
|
H A D | work_handler.py | 53 server_root = self.server.daemon.root 73 endpoint.Execute(v8_root, self.ctx, tests, self.request, self.server.daemon) 146 def __init__(self, daemon): 147 address = (daemon.ip, constants.PEER_PORT) 150 self.daemon = daemon
|
/external/guava/guava/src/com/google/common/util/concurrent/ |
H A D | ThreadFactoryBuilder.java | 30 * <li> whether threads should be marked as {@linkplain Thread#setDaemon daemon} 47 private Boolean daemon = null; field in class:ThreadFactoryBuilder 74 * Sets daemon or not for new threads created with this ThreadFactory. 76 * @param daemon whether or not new Threads created with this ThreadFactory 77 * will be daemon threads 80 public ThreadFactoryBuilder setDaemon(boolean daemon) { argument 81 this.daemon = daemon; 148 final Boolean daemon = builder.daemon; [all...] |
/external/chromium_org/v8/tools/ |
H A D | test-server.py | 114 if os.path.exists(os.path.join(testrunner_dir, "server/daemon.py")): 162 def _StartDaemon(daemon): 166 daemon.start() 173 daemon = main.Server(PIDFILE, ROOT) 174 _StartDaemon(daemon) 176 daemon = main.Server(PIDFILE, ROOT) 177 daemon.stop() 179 daemon = main.Server(PIDFILE, ROOT) 180 daemon.stop() 181 _StartDaemon(daemon) [all...] |
/external/chromium_org/third_party/skia/experimental/webtry/sys/ |
H A D | webtry_init | 15 # environment variables and updated the start-stop-daemon calls 44 # Function that starts the daemon/service 49 # 0 if daemon has been started 50 # 1 if daemon was already running 51 # 2 if daemon could not be started 52 start-stop-daemon --start --pidfile $PIDFILE --exec $DAEMON --make-pidfile --background --chuid webtry --test > /dev/null \ 54 start-stop-daemon --start --pidfile $PIDFILE --exec $DAEMON --make-pidfile --background --chuid webtry --exec $DAEMON -- \ 63 # Function that stops the daemon/service 68 # 0 if daemon has been stopped 69 # 1 if daemon wa [all...] |
/external/skia/experimental/webtry/sys/ |
H A D | webtry_init | 15 # environment variables and updated the start-stop-daemon calls 44 # Function that starts the daemon/service 49 # 0 if daemon has been started 50 # 1 if daemon was already running 51 # 2 if daemon could not be started 52 start-stop-daemon --start --pidfile $PIDFILE --exec $DAEMON --make-pidfile --background --chuid webtry --test > /dev/null \ 54 start-stop-daemon --start --pidfile $PIDFILE --exec $DAEMON --make-pidfile --background --chuid webtry --exec $DAEMON -- \ 63 # Function that stops the daemon/service 68 # 0 if daemon has been stopped 69 # 1 if daemon wa [all...] |
/external/mdnsresponder/mDNSPosix/ |
H A D | mdnsd.sh | 18 # Linux /etc/init.d script to start/stop the mdnsd daemon. 33 # Some systems have start-stop-daemon, some don't. 34 if [ -r /sbin/start-stop-daemon ]; then 35 START="start-stop-daemon --start --quiet --exec" 38 # STOP="start-stop-daemon --stop -s TERM --quiet --oknodo --exec" 39 STOP="start-stop-daemon --stop --quiet --oknodo --exec" 50 echo -n "Starting Apple Darwin Multicast DNS / DNS Service Discovery daemon:" 56 echo -n "Stopping Apple Darwin Multicast DNS / DNS Service Discovery daemon:" 61 echo -n "Restarting Apple Darwin Multicast DNS / DNS Service Discovery daemon:"
|
/external/chromium_org/tools/android/forwarder2/ |
H A D | device_forwarder_main.cc | 20 #include "tools/android/forwarder2/daemon.h" 41 // Lets the daemon fetch the exit notifier file descriptor. 153 Daemon daemon(kLogFilePath, kDaemonIdentifier, &client_delegate, 157 return !daemon.Kill(); 159 if (!daemon.SpawnIfNeeded())
|