/Linux-v4.19/scripts/gdb/linux/ |
D | dmesg.py | 38 log_buf = utils.read_memoryview(inf, start, length).tobytes() 43 log_buf = a.tobytes() + b.tobytes() 46 while pos < log_buf.__len__(): 47 length = utils.read_u16(log_buf[pos + 8:pos + 10]) 55 text_len = utils.read_u16(log_buf[pos + 10:pos + 12]) 56 text = log_buf[pos + 16:pos + 16 + text_len].decode( 58 time_stamp = utils.read_u64(log_buf[pos:pos + 8])
|
/Linux-v4.19/tools/lib/bpf/ |
D | btf.c | 323 char *log_buf = NULL; in btf__new() local 334 log_buf = malloc(BPF_LOG_BUF_SIZE); in btf__new() 335 if (!log_buf) { in btf__new() 339 *log_buf = 0; in btf__new() 353 log_buf, log_buf_size, false); in btf__new() 358 if (log_buf && *log_buf) in btf__new() 359 elog("%s\n", log_buf); in btf__new() 374 free(log_buf); in btf__new()
|
D | bpf.c | 185 char *log_buf, size_t log_buf_sz) in bpf_load_program_xattr() argument 202 attr.log_buf = ptr_to_u64(NULL); in bpf_load_program_xattr() 211 if (fd >= 0 || !log_buf || !log_buf_sz) in bpf_load_program_xattr() 215 attr.log_buf = ptr_to_u64(log_buf); in bpf_load_program_xattr() 218 log_buf[0] = 0; in bpf_load_program_xattr() 224 __u32 kern_version, char *log_buf, in bpf_load_program() argument 238 return bpf_load_program_xattr(&load_attr, log_buf, log_buf_sz); in bpf_load_program() 244 char *log_buf, size_t log_buf_sz, int log_level) in bpf_verify_program() argument 253 attr.log_buf = ptr_to_u64(log_buf); in bpf_verify_program() 256 log_buf[0] = 0; in bpf_verify_program() [all …]
|
D | bpf.h | 75 char *log_buf, size_t log_buf_sz); 78 __u32 kern_version, char *log_buf, 83 char *log_buf, size_t log_buf_sz, int log_level); 109 int bpf_load_btf(void *btf, __u32 btf_size, char *log_buf, __u32 log_buf_size,
|
D | libbpf.c | 1313 char *log_buf; in load_program() local 1329 log_buf = malloc(BPF_LOG_BUF_SIZE); in load_program() 1330 if (!log_buf) in load_program() 1333 ret = bpf_load_program_xattr(&load_attr, log_buf, BPF_LOG_BUF_SIZE); in load_program() 1345 if (log_buf && log_buf[0] != '\0') { in load_program() 1348 pr_warning("\n%s\n", log_buf); in load_program() 1369 if (log_buf) in load_program() 1374 free(log_buf); in load_program()
|
/Linux-v4.19/samples/bpf/ |
D | cookie_uid_helper_example.c | 78 static char log_buf[1 << 16]; in prog_load() local 162 log_buf, sizeof(log_buf)); in prog_load() 164 error(1, errno, "failed to load prog\n%s\n", log_buf); in prog_load()
|
/Linux-v4.19/tools/testing/selftests/net/ |
D | psock_fanout.c | 146 static char log_buf[65536]; in sock_fanout_set_ebpf() local 168 attr.log_buf = (unsigned long) log_buf, in sock_fanout_set_ebpf() 169 attr.log_size = sizeof(log_buf), in sock_fanout_set_ebpf() 175 fprintf(stderr, "bpf verifier:\n%s\n", log_buf); in sock_fanout_set_ebpf()
|
D | reuseport_bpf_numa.c | 92 attr.log_buf = (unsigned long) &bpf_log_buf; in attach_bpf()
|
D | reuseport_bpf.c | 117 attr.log_buf = (unsigned long) &bpf_log_buf; in attach_ebpf()
|
/Linux-v4.19/tools/build/feature/ |
D | test-bpf.c | 31 attr.log_buf = 0; in main()
|
/Linux-v4.19/Documentation/kdump/ |
D | gdbmacros.txt | 180 set $msg = ((struct printk_log *) (log_buf + $idx)) 183 set $log = log_buf + $idx + sizeof(*$msg) 238 parameter is the index into log_buf, the second is optional and 249 set $msg = ((struct printk_log *) (log_buf + $i))
|
/Linux-v4.19/drivers/net/ethernet/mellanox/mlx5/core/diag/ |
D | fw_tracer.c | 142 tracer->buff.log_buf = buff; in mlx5_fw_tracer_create_log_buf() 156 free_pages((unsigned long)tracer->buff.log_buf, get_order(tracer->buff.size)); in mlx5_fw_tracer_create_log_buf() 166 if (!tracer->buff.log_buf) in mlx5_fw_tracer_destroy_log_buf() 170 free_pages((unsigned long)tracer->buff.log_buf, get_order(tracer->buff.size)); in mlx5_fw_tracer_destroy_log_buf() 644 memcpy(tmp_trace_block, tracer->buff.log_buf + start_offset, in mlx5_fw_tracer_handle_traces() 663 ts_event = tracer->buff.log_buf + prev_start_offset + in mlx5_fw_tracer_handle_traces() 691 memcpy(tmp_trace_block, tracer->buff.log_buf + start_offset, in mlx5_fw_tracer_handle_traces()
|
D | fw_tracer.h | 78 void *log_buf; member
|
/Linux-v4.19/kernel/printk/ |
D | printk.c | 441 static char *log_buf = __log_buf; variable 447 return log_buf; in log_buf_addr_get() 471 struct printk_log *msg = (struct printk_log *)(log_buf + idx); in log_from_idx() 478 return (struct printk_log *)log_buf; in log_from_idx() 485 struct printk_log *msg = (struct printk_log *)(log_buf + idx); in log_next() 494 msg = (struct printk_log *)log_buf; in log_next() 612 memset(log_buf + log_next_idx, 0, sizeof(struct printk_log)); in log_store() 617 msg = (struct printk_log *)(log_buf + log_next_idx); in log_store() 1019 VMCOREINFO_SYMBOL(log_buf); in log_buf_vmcoreinfo_setup() 1098 if (log_buf != __log_buf) in setup_log_buf() [all …]
|
/Linux-v4.19/samples/mic/mpssd/ |
D | mpssd.c | 1559 char *map, *temp, log_buf[17] = {'\0'}; in set_log_buf_info() local 1588 strncpy(log_buf, temp - 19, 16); in set_log_buf_info() 1589 setsysfs(mic->name, "log_buf_addr", log_buf); in set_log_buf_info() 1590 mpsslog("%s: log_buf_addr: %s\n", mic->name, log_buf); in set_log_buf_info() 1598 strncpy(log_buf, temp - 19, 16); in set_log_buf_info() 1599 setsysfs(mic->name, "log_buf_len", log_buf); in set_log_buf_info() 1600 mpsslog("%s: log_buf_len: %s\n", mic->name, log_buf); in set_log_buf_info()
|
/Linux-v4.19/tools/testing/selftests/bpf/ |
D | test_verifier_log.c | 57 attr.log_buf = ptr_to_u64(log); in load()
|
/Linux-v4.19/drivers/block/mtip32xx/ |
D | mtip32xx.h | 415 u16 *log_buf; member
|
D | mtip32xx.c | 611 dd->port->log_buf, in mtip_handle_tfe() 618 buf = (unsigned char *)dd->port->log_buf; in mtip_handle_tfe() 2926 port->log_buf = port->block1 + AHCI_SECTBUF_OFFSET; in mtip_dma_alloc() 2952 dd->port->log_buf, in mtip_hw_get_identify() 2959 buf = (unsigned char *)dd->port->log_buf; in mtip_hw_get_identify()
|
/Linux-v4.19/drivers/gpu/drm/qxl/ |
D | qxl_dev.h | 353 uint8_t log_buf[QXL_LOG_BUF_SIZE]; member
|
/Linux-v4.19/tools/include/uapi/linux/ |
D | bpf.h | 322 __aligned_u64 log_buf; /* user supplied buffer */ member
|
/Linux-v4.19/include/uapi/linux/ |
D | bpf.h | 322 __aligned_u64 log_buf; /* user supplied buffer */ member
|
/Linux-v4.19/kernel/bpf/ |
D | verifier.c | 5925 if (attr->log_level || attr->log_buf || attr->log_size) { in bpf_check() 5930 log->ubuf = (char __user *) (unsigned long) attr->log_buf; in bpf_check()
|