/linux-master/tools/testing/selftests/bpf/prog_tests/ |
H A D | log_fixup.c | 16 char log_buf[8 * 1024]; local 25 memset(log_buf, 0, sizeof(log_buf)); 26 bpf_program__set_log_buf(skel->progs.bad_relo, log_buf, log_buf_size ?: sizeof(log_buf)); 33 ASSERT_HAS_SUBSTR(log_buf, 40 ASSERT_HAS_SUBSTR(log_buf, 43 ASSERT_HAS_SUBSTR(log_buf, 49 ASSERT_HAS_SUBSTR(log_buf, 53 ASSERT_NULL(strstr(log_buf, "max_states_per_ins 74 char log_buf[8 * 1024]; local 106 char log_buf[8 * 1024]; local 140 char log_buf[8 * 1024]; local [all...] |
H A D | cb_refs.c | 8 static char log_buf[1024 * 1024]; variable 22 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, 23 .kernel_log_size = sizeof(log_buf), 42 if (!ASSERT_OK_PTR(strstr(log_buf, cb_refs_tests[i].err_msg), "expected error message")) { 44 fprintf(stderr, "Verifier: %s\n", log_buf);
|
H A D | log_buf.c | 51 /* In the first round every prog has its own log_buf, so libbpf logs 63 /* log_level 0 with custom log_buf means that verbose logs are not 66 * custom log_buf 153 char *log_buf; local 156 log_buf = malloc(log_buf_sz); 157 if (!ASSERT_OK_PTR(log_buf, "log_buf_alloc")) 159 opts.log_buf = log_buf; 162 /* with log_level == 0 log_buf shoud stay empty for good prog */ 163 log_buf[ 205 char *log_buf = NULL; local [all...] |
H A D | global_func_dead_code.c | 12 char log_buf[4096]; local 47 bpf_program__set_log_buf(skel->progs.freplace_prog, log_buf, sizeof(log_buf)); 55 ASSERT_HAS_SUBSTR(log_buf, "Subprog global_dead doesn't exist", "dead_subprog_missing_msg");
|
H A D | spin_lock.c | 9 static char log_buf[1024 * 1024]; variable 75 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, 76 .kernel_log_size = sizeof(log_buf), 97 if (strstr(log_buf, "JIT does not support calling kernel function")) { 102 ret = match_regex(err_msg, log_buf); 108 fprintf(stderr, "Verifier: %s\n", log_buf);
|
H A D | verifier_log.c | 77 opts.log_buf = logs.reference; 100 opts.log_buf = logs.buf; 120 opts.log_buf = logs.buf; 178 opts.log_buf = logs.buf; 189 opts.log_buf = NULL; 198 opts.log_buf = logs.buf; 209 opts.log_buf = NULL; 218 opts.log_buf = logs.buf; 226 opts.log_buf = logs.buf; 234 opts.log_buf [all...] |
H A D | raw_tp_writable_reject_nbd_invalid.c | 23 .log_buf = error,
|
H A D | raw_tp_writable_test_run.c | 22 .log_buf = error, 39 .log_buf = error,
|
H A D | syscall.c | 7 __u64 log_buf; member in struct:args 20 .log_buf = (uintptr_t) verifier_log,
|
H A D | bpf_nf.c | 8 static char log_buf[1024 * 1024]; variable 140 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, 141 .kernel_log_size = sizeof(log_buf), 161 if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { 163 fprintf(stderr, "Verifier: %s\n", log_buf);
|
H A D | exceptions.c | 10 static char log_buf[1024 * 1024]; variable 89 LIBBPF_OPTS(bpf_object_open_opts, o, .kernel_log_buf = log_buf, \ 90 .kernel_log_size = sizeof(log_buf), \ 102 printf("%s\n", log_buf); \ 106 if (!ASSERT_OK_PTR(strstr(log_buf, msg), "strstr")) { \ 107 printf("%s\n", log_buf); \
|
H A D | fexit_bpf2bpf.c | 360 char log_buf[64 * 1024]; local 379 log_buf[0] = '\0'; 381 bpf_program__set_log_buf(prog, log_buf, sizeof(log_buf)); 388 printf("VERIFIER LOG:\n================\n%s\n================\n", log_buf); 393 ASSERT_HAS_SUBSTR(log_buf, exp_msg, "fail_msg");
|
H A D | bpf_tcp_ca.c | 220 const char *prog_name, *log_buf; local 229 log_buf = va_arg(args, char *); 230 if (!log_buf) 232 if (err_str && strstr(log_buf, err_str) != NULL) 235 printf(format, prog_name, log_buf);
|
/linux-master/tools/perf/util/intel-pt-decoder/ |
H A D | intel-pt-log.c | 27 struct log_buf { struct 40 static struct log_buf log_buf; variable in typeref:struct:log_buf 98 struct log_buf *b = cookie; 122 struct log_buf *b = cookie; 128 static FILE *log_buf__open(struct log_buf *b, FILE *backend, unsigned int sz) 165 static void log_buf__dump(struct log_buf *b) 187 log_buf__dump(&log_buf); 203 f = log_buf__open(&log_buf, f, intel_pt_log_on_error_size);
|
/linux-master/tools/power/acpi/tools/pfrut/ |
H A D | pfrut.c | 204 char *log_buf; local 409 log_buf = malloc(max_data_sz + 1); 410 if (!log_buf) { 411 perror("log_buf allocate failed."); 425 memcpy(log_buf, p_mmap, max_data_sz); 426 log_buf[max_data_sz] = '\0'; 427 printf("%s\n", log_buf); 428 free(log_buf);
|
/linux-master/tools/build/feature/ |
H A D | test-bpf.c | 37 attr.log_buf = 0;
|
/linux-master/tools/testing/selftests/bpf/ |
H A D | test_loader.c | 72 if (!tester->log_buf) { 74 tester->log_buf = calloc(tester->log_buf_sz, 1); 75 if (!ASSERT_OK_PTR(tester->log_buf, "tester_log_buf")) 87 free(tester->log_buf); 374 bpf_program__set_log_buf(prog, tester->log_buf, tester->log_buf_sz); 388 tester->log_buf[0] = '\0'; 392 static void emit_verifier_log(const char *log_buf, bool force) argument 396 fprintf(stdout, "VERIFIER LOG:\n=============\n%s=============\n", log_buf); 413 match = strstr(tester->log_buf + tester->next_match_pos, expect_msg); 417 emit_verifier_log(tester->log_buf, tru [all...] |
H A D | test_progs.c | 27 static void stdio_hijack_init(char **log_buf, size_t *log_cnt) argument 38 stdout = open_memstream(log_buf, log_cnt); 54 static void stdio_hijack(char **log_buf, size_t *log_cnt) argument 65 stdio_hijack_init(log_buf, log_cnt); 246 static void print_test_log(char *log_buf, size_t log_cnt) argument 248 log_buf[log_cnt] = '\0'; 249 fprintf(env.stdout, "%s", log_buf); 250 if (log_buf[log_cnt - 1] != '\n') 272 static void jsonw_write_log_message(json_writer_t *w, char *log_buf, size_t log_cnt) argument 275 * null byte. Yet in parallel mode, log_buf wil 1165 dispatch_thread_read_log(int sock_fd, char **log_buf, size_t *log_cnt) argument 1478 worker_main_send_log(int sock, char *log_buf, size_t log_cnt) argument [all...] |
H A D | testing_helpers.h | 21 __u32 kern_version, char *log_buf,
|
H A D | testing_helpers.c | 325 __u32 kern_version, char *log_buf, 332 .log_buf = log_buf, 323 bpf_test_load_program(enum bpf_prog_type type, const struct bpf_insn *insns, size_t insns_cnt, const char *license, __u32 kern_version, char *log_buf, size_t log_buf_sz) argument
|
/linux-master/samples/bpf/ |
H A D | cookie_uid_helper_example.c | 78 static char log_buf[1 << 16]; local 161 .log_buf = log_buf, 162 .log_size = sizeof(log_buf), 168 error(1, errno, "failed to load prog\n%s\n", log_buf);
|
/linux-master/tools/lib/bpf/ |
H A D | libbpf_probes.c | 105 char *log_buf, size_t log_buf_sz) 108 .log_buf = log_buf, 110 .log_level = log_buf ? 1 : 0, 134 opts.log_buf = buf; 147 opts.log_buf = buf; 103 probe_prog_load(enum bpf_prog_type prog_type, const struct bpf_insn *insns, size_t insns_cnt, char *log_buf, size_t log_buf_sz) argument
|
H A D | skel_internal.h | 57 __u64 log_buf; member in struct:bpf_loader_ctx 339 attr.log_buf = opts->ctx->log_buf;
|
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | syscall.c | 19 __u64 log_buf; member in struct:args 136 prog_load_attr.log_buf = ctx->log_buf;
|
/linux-master/tools/testing/selftests/net/ |
H A D | psock_fanout.c | 146 static char log_buf[65536]; local 168 attr.log_buf = (unsigned long) log_buf, 169 attr.log_size = sizeof(log_buf), 175 fprintf(stderr, "bpf verifier:\n%s\n", log_buf);
|