/linux-6.3-rc2/tools/testing/selftests/bpf/prog_tests/ |
A D | log_fixup.c | 16 char log_buf[8 * 1024]; in bad_core_relo() local 25 memset(log_buf, 0, sizeof(log_buf)); in bad_core_relo() 26 bpf_program__set_log_buf(skel->progs.bad_relo, log_buf, log_buf_size ?: sizeof(log_buf)); in bad_core_relo() 32 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 39 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 42 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 48 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 73 char log_buf[8 * 1024]; in bad_core_relo_subprog() local 82 bpf_program__set_log_buf(skel->progs.bad_relo_subprog, log_buf, sizeof(log_buf)); in bad_core_relo_subprog() 105 char log_buf[8 * 1024]; in missing_map() local [all …]
|
A D | log_buf.c | 153 char *log_buf; in bpf_prog_load_log_buf() local 159 opts.log_buf = log_buf; in bpf_prog_load_log_buf() 163 log_buf[0] = '\0'; in bpf_prog_load_log_buf() 174 log_buf[0] = '\0'; in bpf_prog_load_log_buf() 185 log_buf[0] = '\0'; in bpf_prog_load_log_buf() 195 free(log_buf); in bpf_prog_load_log_buf() 221 opts.log_buf = log_buf; in bpf_btf_load_log_buf() 225 log_buf[0] = '\0'; in bpf_btf_load_log_buf() 235 log_buf[0] = '\0'; in bpf_btf_load_log_buf() 253 log_buf[0] = '\0'; in bpf_btf_load_log_buf() [all …]
|
A D | cb_refs.c | 8 static char log_buf[1024 * 1024]; variable 22 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_cb_refs() 23 .kernel_log_size = sizeof(log_buf), in test_cb_refs() 42 if (!ASSERT_OK_PTR(strstr(log_buf, cb_refs_tests[i].err_msg), "expected error message")) { in test_cb_refs() 44 fprintf(stderr, "Verifier: %s\n", log_buf); in test_cb_refs()
|
A D | spin_lock.c | 8 static char log_buf[1024 * 1024]; variable 50 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_spin_lock_fail_prog() 51 .kernel_log_size = sizeof(log_buf), in test_spin_lock_fail_prog() 72 if (strstr(log_buf, "JIT does not support calling kernel function")) { in test_spin_lock_fail_prog() 77 if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { in test_spin_lock_fail_prog() 79 fprintf(stderr, "Verifier: %s\n", log_buf); in test_spin_lock_fail_prog()
|
A D | bpf_nf.c | 8 static char log_buf[1024 * 1024]; variable 139 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_bpf_nf_ct_fail() 140 .kernel_log_size = sizeof(log_buf), in test_bpf_nf_ct_fail() 160 if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { in test_bpf_nf_ct_fail() 162 fprintf(stderr, "Verifier: %s\n", log_buf); in test_bpf_nf_ct_fail()
|
A D | bpf_tcp_ca.c | 221 const char *prog_name, *log_buf; in libbpf_debug_print() local 230 log_buf = va_arg(args, char *); in libbpf_debug_print() 231 if (!log_buf) in libbpf_debug_print() 233 if (err_str && strstr(log_buf, err_str) != NULL) in libbpf_debug_print() 236 printf(format, prog_name, log_buf); in libbpf_debug_print()
|
A D | syscall.c | 7 __u64 log_buf; member 20 .log_buf = (uintptr_t) verifier_log, in test_syscall()
|
A D | raw_tp_writable_test_run.c | 22 .log_buf = error, in serial_test_raw_tp_writable_test_run() 39 .log_buf = error, in serial_test_raw_tp_writable_test_run()
|
A D | raw_tp_writable_reject_nbd_invalid.c | 23 .log_buf = error, in test_raw_tp_writable_reject_nbd_invalid()
|
A D | linked_list.c | 11 static char log_buf[1024 * 1024]; variable 109 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_linked_list_fail_prog() 110 .kernel_log_size = sizeof(log_buf), in test_linked_list_fail_prog() 130 if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { in test_linked_list_fail_prog() 132 fprintf(stderr, "Verifier: %s\n", log_buf); in test_linked_list_fail_prog()
|
/linux-6.3-rc2/tools/testing/selftests/bpf/ |
A D | test_loader.c | 26 if (!tester->log_buf) { in tester_init() 28 tester->log_buf = malloc(tester->log_buf_sz); in tester_init() 29 if (!ASSERT_OK_PTR(tester->log_buf, "tester_log_buf")) in tester_init() 41 free(tester->log_buf); in test_loader_fini() 122 tester->log_buf[0] = '\0'; in prepare_case() 125 static void emit_verifier_log(const char *log_buf, bool force) in emit_verifier_log() argument 141 match = strstr(tester->log_buf, spec->expect_msg); in validate_case() 145 emit_verifier_log(tester->log_buf, true /*force*/); in validate_case() 207 emit_verifier_log(tester->log_buf, false /*force*/); in run_subtest() 212 emit_verifier_log(tester->log_buf, true /*force*/); in run_subtest() [all …]
|
A D | test_progs.c | 248 log_buf[log_cnt] = '\0'; in print_test_log() 1272 &state->log_buf, in dispatch_thread() 1440 src = log_buf; in worker_main_send_log() 1464 if (state->log_buf) { in free_subtest_state() 1465 free(state->log_buf); in free_subtest_state() 1466 state->log_buf = NULL; in free_subtest_state() 1573 if (state->log_buf) { in worker_main() 1574 free(state->log_buf); in worker_main() 1575 state->log_buf = NULL; in worker_main() 1611 free(test_state->log_buf); in free_test_states() [all …]
|
A D | testing_helpers.c | 219 __u32 kern_version, char *log_buf, in bpf_test_load_program() argument 226 .log_buf = log_buf, in bpf_test_load_program()
|
A D | test_progs.h | 73 char *log_buf; member 93 char *log_buf; member 155 char log_buf[MAX_LOG_TRUNK_SIZE + 1]; member 413 char *log_buf; member
|
A D | testing_helpers.h | 13 __u32 kern_version, char *log_buf,
|
/linux-6.3-rc2/tools/perf/util/intel-pt-decoder/ |
A D | intel-pt-log.c | 27 struct log_buf { struct 40 static struct log_buf log_buf; argument 98 struct log_buf *b = cookie; in log_buf__write() 122 struct log_buf *b = cookie; in log_buf__close() 128 static FILE *log_buf__open(struct log_buf *b, FILE *backend, unsigned int sz) in log_buf__open() 165 static void log_buf__dump(struct log_buf *b) in log_buf__dump() 187 log_buf__dump(&log_buf); in intel_pt_log_dump_buf() 203 f = log_buf__open(&log_buf, f, intel_pt_log_on_error_size); in intel_pt_log_open()
|
/linux-6.3-rc2/tools/power/acpi/tools/pfrut/ |
A D | pfrut.c | 192 char *log_buf; in main() local 397 log_buf = malloc(max_data_sz + 1); in main() 398 if (!log_buf) { in main() 413 memcpy(log_buf, p_mmap, max_data_sz); in main() 414 log_buf[max_data_sz] = '\0'; in main() 415 printf("%s\n", log_buf); in main() 416 free(log_buf); in main()
|
/linux-6.3-rc2/tools/lib/bpf/ |
A D | libbpf_probes.c | 105 char *log_buf, size_t log_buf_sz) in probe_prog_load() argument 108 .log_buf = log_buf, in probe_prog_load() 110 .log_level = log_buf ? 1 : 0, in probe_prog_load() 134 opts.log_buf = buf; in probe_prog_load() 147 opts.log_buf = buf; in probe_prog_load()
|
A D | bpf.c | 242 char *log_buf; in bpf_prog_load() local 287 log_buf = OPTS_GET(opts, log_buf, NULL); in bpf_prog_load() 291 if (!!log_buf != !!log_size) in bpf_prog_load() 295 if (log_level && !log_buf) in bpf_prog_load() 313 attr.log_buf = ptr_to_u64(log_buf); in bpf_prog_load() 363 if (log_level == 0 && log_buf) { in bpf_prog_load() 368 attr.log_buf = ptr_to_u64(log_buf); in bpf_prog_load() 1085 char *log_buf; in bpf_btf_load() local 1097 log_buf = OPTS_GET(opts, log_buf, NULL); in bpf_btf_load() 1103 if (log_size && !log_buf) in bpf_btf_load() [all …]
|
A D | bpf.h | 98 char *log_buf; member 100 #define bpf_prog_load_opts__last_field log_buf 117 char *log_buf; member
|
A D | skel_internal.h | 57 __u64 log_buf; member 339 attr.log_buf = opts->ctx->log_buf; in bpf_load_and_run()
|
/linux-6.3-rc2/samples/bpf/ |
A D | cookie_uid_helper_example.c | 78 static char log_buf[1 << 16]; in prog_load() local 161 .log_buf = log_buf, in prog_load() 162 .log_size = sizeof(log_buf), in prog_load() 168 error(1, errno, "failed to load prog\n%s\n", log_buf); in prog_load()
|
/linux-6.3-rc2/tools/testing/selftests/bpf/progs/ |
A D | syscall.c | 13 __u64 log_buf; member 99 prog_load_attr.log_buf = ctx->log_buf; in bpf_prog()
|
/linux-6.3-rc2/tools/testing/selftests/net/ |
A D | psock_fanout.c | 146 static char log_buf[65536]; in sock_fanout_set_ebpf() local 168 attr.log_buf = (unsigned long) log_buf, in sock_fanout_set_ebpf() 169 attr.log_size = sizeof(log_buf), in sock_fanout_set_ebpf() 175 fprintf(stderr, "bpf verifier:\n%s\n", log_buf); in sock_fanout_set_ebpf()
|
/linux-6.3-rc2/drivers/gpu/drm/amd/amdgpu/ |
A D | amdgpu_vcn.c | 1038 void *log_buf; in amdgpu_debugfs_vcn_fwlog_read() local 1050 log_buf = vcn->fw_shared.cpu_addr + vcn->fw_shared.mem_size; in amdgpu_debugfs_vcn_fwlog_read() 1052 plog = (volatile struct amdgpu_vcn_fwlog *)log_buf; in amdgpu_debugfs_vcn_fwlog_read() 1081 (log_buf + read_pos), read_num[i])) in amdgpu_debugfs_vcn_fwlog_read() 1122 volatile struct amdgpu_vcn_fwlog *log_buf = fw_log_cpu_addr; in amdgpu_vcn_fwlog_init() local 1131 log_buf->header_size = sizeof(struct amdgpu_vcn_fwlog); in amdgpu_vcn_fwlog_init() 1132 log_buf->buffer_size = AMDGPU_VCNFW_LOG_SIZE; in amdgpu_vcn_fwlog_init() 1133 log_buf->rptr = log_buf->header_size; in amdgpu_vcn_fwlog_init() 1134 log_buf->wptr = log_buf->header_size; in amdgpu_vcn_fwlog_init() 1135 log_buf->wrapped = 0; in amdgpu_vcn_fwlog_init()
|