| /net/openvswitch/ |
| A D | flow_netlink.c | 531 bool log) in parse_flow_mask_nlattrs() argument 791 log); in ip_tun_from_nlattr() 1101 a, log); in __parse_vlan_from_nlattrs() 1303 log); in metadata_from_nlattrs() 1430 log, in nsh_key_put_from_nlattr() 1474 log, in nsh_key_put_from_nlattr() 1553 log); in ovs_key_from_nlattrs() 1878 log); in ovs_nla_get_match() 2603 log); in validate_and_copy_sample() 3020 log); in validate_set() [all …]
|
| A D | flow_netlink.h | 36 u64 *attrsp, bool log); 39 u64 attrs, struct sw_flow_key *key, bool log); 47 bool log); 52 bool ovs_nla_get_ufid(struct sw_flow_id *, const struct nlattr *, bool log); 54 const struct sw_flow_key *key, bool log); 59 struct sw_flow_actions **sfa, bool log); 61 void *data, int len, bool log);
|
| A D | conntrack.c | 1191 OVS_NLERR(log, in parse_nat() 1198 OVS_NLERR(log, in parse_nat() 1239 const char **helper, bool log) in parse_ct() argument 1250 OVS_NLERR(log, in parse_ct() 1259 OVS_NLERR(log, in parse_ct() 1310 int err = parse_nat(a, info, log); in parse_ct() 1340 OVS_NLERR(log, in parse_ct() 1347 OVS_NLERR(log, in parse_ct() 1391 OVS_NLERR(log, "ct family unspecified"); in ovs_ct_copy_action() 1415 OVS_NLERR(log, in ovs_ct_copy_action() [all …]
|
| A D | datapath.c | 1048 key, log); in ovs_flow_cmd_new() 1171 bool log) in get_flow_actions() argument 1180 OVS_NLERR(log, in get_flow_actions() 1207 bool log) in ovs_nla_init_match_and_action() argument 1222 OVS_NLERR(log, in ovs_nla_init_match_and_action() 1229 &mask, log); in ovs_nla_init_match_and_action() 1261 OVS_NLERR(log, in ovs_flow_cmd_set() 1267 &acts, log); in ovs_flow_cmd_set() 1364 log); in ovs_flow_cmd_get() 1366 OVS_NLERR(log, in ovs_flow_cmd_get() [all …]
|
| A D | conntrack.h | 21 bool log); 52 struct sw_flow_actions **acts, bool log) in ovs_ct_copy_action() argument
|
| A D | flow.h | 296 struct sw_flow_key *key, bool log);
|
| A D | flow.c | 1078 struct sw_flow_key *key, bool log) in ovs_flow_key_extract_userspace() argument 1084 err = parse_flow_nlattrs(attr, a, &attrs, log); in ovs_flow_key_extract_userspace() 1089 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log); in ovs_flow_key_extract_userspace()
|
| /net/netfilter/ |
| A D | nfnetlink_log.c | 176 spin_lock_bh(&log->instances_lock); in instance_create() 216 spin_unlock_bh(&log->instances_lock); in instance_create() 221 spin_unlock_bh(&log->instances_lock); in instance_create() 253 spin_lock_bh(&log->instances_lock); in instance_destroy() 255 spin_unlock_bh(&log->instances_lock); in instance_destroy() 840 spin_lock_bh(&log->instances_lock); in nfulnl_rcv_nl_event() 956 instance_destroy(log, inst); in nfulnl_recv_config() 1031 struct nfnl_log_net *log; in get_first() local 1035 log = nfnl_log_pernet(net); in get_first() 1051 struct nfnl_log_net *log; in get_next() local [all …]
|
| A D | nft_log.c | 111 priv->loginfo.u.log.level == NFT_LOGLEVEL_AUDIT) { in nft_log_eval() 177 li->u.log.level = in nft_log_init() 180 li->u.log.level = NFT_LOGLEVEL_WARNING; in nft_log_init() 182 if (li->u.log.level > NFT_LOGLEVEL_AUDIT) { in nft_log_init() 188 li->u.log.logflags = in nft_log_init() 190 if (li->u.log.logflags & ~NF_LOG_MASK) { in nft_log_init() 210 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_init() 238 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_destroy() 255 if (nla_put_be32(skb, NFTA_LOG_LEVEL, htonl(li->u.log.level))) in nft_log_dump() 258 if (li->u.log.logflags) { in nft_log_dump() [all …]
|
| A D | nf_log.c | 30 struct nf_logger *log; in __find_logger() local 34 log = nft_log_dereference(loggers[pf][i]); in __find_logger() 35 if (!log) in __find_logger() 38 if (!strncasecmp(str_logger, log->name, strlen(log->name))) in __find_logger() 39 return log; in __find_logger() 47 const struct nf_logger *log; in nf_log_set() local 54 if (log == NULL) in nf_log_set() 66 const struct nf_logger *log; in nf_log_unset() local 71 if (log == logger) in nf_log_unset() 114 const struct nf_logger *log; in nf_log_unregister() local [all …]
|
| A D | xt_LOG.c | 36 li.u.log.level = loginfo->level; in log_tg() 37 li.u.log.logflags = loginfo->logflags; in log_tg()
|
| A D | nf_conntrack_bpf.c | 236 static int _nf_conntrack_btf_struct_access(struct bpf_verifier_log *log, in BTF_ID() 247 bpf_log(log, "only read is supported\n"); in BTF_ID() 261 bpf_log(log, "no write support to nf_conn at off %d\n", off); in BTF_ID() 266 bpf_log(log, in BTF_ID()
|
| A D | nf_log_syslog.c | 29 .log = { 77 logflags = info->u.log.logflags; in dump_arp_packet() 121 '0' + loginfo->u.log.level, prefix, in nf_log_dump_packet_common() 310 logflags = info->u.log.logflags; in dump_ipv4_packet() 549 logflags = info->u.log.logflags; in dump_ipv6_packet() 785 logflags = info->u.log.logflags; in dump_mac_header()
|
| /net/ceph/ |
| A D | ceph_common.c | 355 struct p_log *log) in get_secret() argument 369 error_plog(log, "Failed due to key not found: %s", in get_secret() 373 error_plog(log, "Failed due to expired key: %s", in get_secret() 377 error_plog(log, "Failed due to revoked key: %s", in get_secret() 381 error_plog(log, "Failed due to key error %d: %s", in get_secret() 403 struct p_log log = {.prefix = "libceph", .log = l}; in ceph_parse_mon_ips() local 423 struct p_log log = {.prefix = "libceph", .log = l}; in ceph_parse_param() local 436 error_plog(&log, "Failed to parse ip: %d", err); in ceph_parse_param() 445 error_plog(&log, "Failed to parse fsid: %d", err); in ceph_parse_param() 464 error_plog(&log, "Failed to parse secret: %d", err); in ceph_parse_param() [all …]
|
| /net/sched/ |
| A D | bpf_qdisc.c | 54 static int bpf_qdisc_qdisc_access(struct bpf_verifier_log *log, in bpf_qdisc_qdisc_access() argument 75 static int bpf_qdisc_sk_buff_access(struct bpf_verifier_log *log, in bpf_qdisc_sk_buff_access() argument 96 static int bpf_qdisc_btf_struct_access(struct bpf_verifier_log *log, in bpf_qdisc_btf_struct_access() argument 109 err = bpf_qdisc_sk_buff_access(log, reg, off, &end); in bpf_qdisc_btf_struct_access() 111 err = bpf_qdisc_qdisc_access(log, reg, off, &end); in bpf_qdisc_btf_struct_access() 113 bpf_log(log, "only read is supported\n"); in bpf_qdisc_btf_struct_access() 118 bpf_log(log, "no write support to %s at off %d\n", in bpf_qdisc_btf_struct_access() 124 bpf_log(log, in bpf_qdisc_btf_struct_access()
|
| A D | sch_fq.c | 886 static int fq_resize(struct Qdisc *sch, u32 log) in fq_resize() argument 893 if (q->fq_root && log == q->fq_trees_log) in fq_resize() 897 array = kvmalloc_node(sizeof(struct rb_root) << log, GFP_KERNEL | __GFP_RETRY_MAYFAIL, in fq_resize() 902 for (idx = 0; idx < (1U << log); idx++) in fq_resize() 909 fq_rehash(q, old_fq_root, q->fq_trees_log, array, log); in fq_resize() 912 WRITE_ONCE(q->fq_trees_log, log); in fq_resize()
|
| /net/bridge/netfilter/ |
| A D | ebt_log.c | 87 '0' + loginfo->u.log.level, prefix, in ebt_log_packet() 93 bitmask = loginfo->u.log.logflags; in ebt_log_packet() 186 li.u.log.level = info->loglevel; in ebt_log_tg() 187 li.u.log.logflags = info->bitmask; in ebt_log_tg()
|
| A D | Kconfig | 235 tristate "ebt: log support" 237 This option adds the log watcher, that you can use in any rule
|
| /net/ipv4/ |
| A D | bpf_tcp_ca.c | 61 static int bpf_tcp_ca_btf_struct_access(struct bpf_verifier_log *log, in bpf_tcp_ca_btf_struct_access() argument 70 bpf_log(log, "only read is supported\n"); in bpf_tcp_ca_btf_struct_access() 107 bpf_log(log, "no write support to tcp_sock at off %d\n", off); in bpf_tcp_ca_btf_struct_access() 112 bpf_log(log, in bpf_tcp_ca_btf_struct_access()
|
| A D | udp.c | 144 struct sock *sk, unsigned int log) in udp_lib_lport_inuse() argument 165 __set_bit(udp_sk(sk2)->udp_port_hash >> log, in udp_lib_lport_inuse() 268 udptable->log); in udp_lib_get_port() 278 !test_bit(snum >> udptable->log, bitmap) && in udp_lib_get_port() 3767 &table->log, in udp_table_init() 3825 udptable->log = ilog2(hash_entries); in udp_pernet_table_alloc()
|
| /net/bpf/ |
| A D | bpf_dummy_struct_ops.c | 236 static int bpf_dummy_ops_btf_struct_access(struct bpf_verifier_log *log, in bpf_dummy_ops_btf_struct_access() argument 252 bpf_log(log, "only access to bpf_dummy_ops_state is supported\n"); in bpf_dummy_ops_btf_struct_access() 257 bpf_log(log, "write access at off %d with size %d\n", off, size); in bpf_dummy_ops_btf_struct_access()
|
| /net/batman-adv/ |
| A D | Makefile | 20 batman-adv-$(CONFIG_BATMAN_ADV_DEBUG) += log.o
|
| /net/9p/ |
| A D | Kconfig | 61 Say Y if you want the 9P subsystem to log debug information.
|
| /net/smc/ |
| A D | smc_llc.h | 95 void smc_llc_link_clear(struct smc_link *link, bool log);
|
| /net/sunrpc/ |
| A D | Kconfig | 83 log in TAP format (https://testanything.org/). Only useful for
|