Searched refs:bpf_log (Results 1 – 10 of 10) sorted by relevance
| /Linux-v6.6/kernel/bpf/ |
| D | btf.c | 5623 bpf_log(log, "btf_vmlinux is malformed\n"); in btf_get_prog_ctx_type() 5639 bpf_log(log, "arg#%d struct doesn't have a name\n", arg); in btf_get_prog_ctx_type() 5655 bpf_log(log, "Please fix kernel include/linux/bpf_types.h\n"); in btf_get_prog_ctx_type() 5710 bpf_log(log, "kern ctx type id %u is not a struct\n", kctx_type_id); in get_kern_ctx_btf_id() 5941 bpf_log(log, "func '%s' offset %d is not multiple of 8\n", in btf_ctx_access() 5958 bpf_log(log, "func '%s' doesn't have %d-th argument\n", in btf_ctx_access() 5994 bpf_log(log, in btf_ctx_access() 6001 bpf_log(log, "func '%s' doesn't have %d-th argument\n", in btf_ctx_access() 6019 bpf_log(log, in btf_ctx_access() 6057 bpf_log(log,"invalid btf_id for context argument offset %u\n", off); in btf_ctx_access() [all …]
|
| D | log.c | 315 __printf(2, 3) void bpf_log(struct bpf_verifier_log *log, in bpf_log() function 327 EXPORT_SYMBOL_GPL(bpf_log);
|
| D | bpf_lsm.c | 101 bpf_log(vlog, in bpf_lsm_verify_prog() 107 bpf_log(vlog, "attach_btf_id %u points to wrong type name %s\n", in bpf_lsm_verify_prog()
|
| D | offload.c | 820 bpf_log(log, "metadata kfuncs require device-bound program\n"); in bpf_dev_bound_kfunc_check() 825 bpf_log(log, "metadata kfuncs can't be offloaded\n"); in bpf_dev_bound_kfunc_check()
|
| D | verifier.c | 19278 bpf_log(log, "Tracing programs must provide btf_id\n"); in bpf_check_attach_target() 19283 bpf_log(log, in bpf_check_attach_target() 19289 bpf_log(log, "attach_btf_id %u is invalid\n", btf_id); in bpf_check_attach_target() 19294 bpf_log(log, "attach_btf_id %u doesn't have a name\n", btf_id); in bpf_check_attach_target() 19302 bpf_log(log, "Target program bound device mismatch"); in bpf_check_attach_target() 19312 bpf_log(log, "Subprog %s doesn't exist\n", tname); in bpf_check_attach_target() 19318 bpf_log(log, in bpf_check_attach_target() 19323 bpf_log(log, in bpf_check_attach_target() 19329 bpf_log(log, "Can attach to only JITed progs\n"); in bpf_check_attach_target() 19337 bpf_log(log, "Cannot recursively attach\n"); in bpf_check_attach_target() [all …]
|
| /Linux-v6.6/net/ipv4/ |
| D | bpf_tcp_ca.c | 80 bpf_log(log, "only read is supported\n"); in bpf_tcp_ca_btf_struct_access() 114 bpf_log(log, "no write support to tcp_sock at off %d\n", off); in bpf_tcp_ca_btf_struct_access() 119 bpf_log(log, in bpf_tcp_ca_btf_struct_access()
|
| /Linux-v6.6/net/bpf/ |
| D | bpf_dummy_struct_ops.c | 190 bpf_log(log, "only access to bpf_dummy_ops_state is supported\n"); in bpf_dummy_ops_btf_struct_access() 195 bpf_log(log, "write access at off %d with size %d\n", off, size); in bpf_dummy_ops_btf_struct_access()
|
| /Linux-v6.6/net/netfilter/ |
| D | nf_conntrack_bpf.c | 205 bpf_log(log, "only read is supported\n"); in BTF_ID() 219 bpf_log(log, "no write support to nf_conn at off %d\n", off); in BTF_ID() 224 bpf_log(log, in BTF_ID()
|
| /Linux-v6.6/tools/lib/bpf/ |
| D | relo_core.c | 53 #define pr_warn(fmt, log, ...) bpf_log((void *)log, fmt, "", ##__VA_ARGS__) 54 #define pr_info(fmt, log, ...) bpf_log((void *)log, fmt, "", ##__VA_ARGS__) 55 #define pr_debug(fmt, log, ...) bpf_log((void *)log, fmt, "", ##__VA_ARGS__) 56 #define libbpf_print(level, fmt, ...) bpf_log((void *)prog_name, fmt, ##__VA_ARGS__)
|
| /Linux-v6.6/include/linux/ |
| D | bpf_verifier.h | 649 __printf(2, 3) void bpf_log(struct bpf_verifier_log *log,
|