Searched refs:bpf_log (Results 1 – 10 of 10) sorted by relevance
/linux/kernel/bpf/ |
H A D | btf.c | 5947 bpf_log(log, "arg#%d struct doesn't have a name\n", arg); in btf_is_prog_ctx_type() 5953 bpf_log(log, "btf_vmlinux is malformed\n"); in btf_is_prog_ctx_type() 5961 bpf_log(log, "Please fix kernel include/linux/bpf_types.h\n"); in btf_is_prog_ctx_type() 6007 bpf_log(log, "arg#%d type isn't a pointer\n", arg); in btf_validate_prog_ctx_type() 6034 bpf_log(log, "arg#%d type doesn't have a name\n", arg); in btf_validate_prog_ctx_type() 6106 bpf_log(log, "btf_vmlinux is malformed\n"); in btf_validate_prog_ctx_type() 6119 bpf_log(log, "arg#%d should be void pointer\n", arg); in btf_validate_prog_ctx_type() 6125 bpf_log(log, "arg#%d should be `struct %s *`\n", arg, ctx_tname); in btf_validate_prog_ctx_type() 6156 bpf_log(log, "kern ctx type id %u is not a struct\n", kctx_type_id); in get_kern_ctx_btf_id() 6550 bpf_log(log, "func '%s' offset %d is not multiple of 8\n", in btf_ctx_access() [all …]
|
H A D | bpf_lsm.c | 121 bpf_log(vlog, in bpf_lsm_verify_prog() 127 bpf_log(vlog, "attach_btf_id %u points to disabled hook %s\n", in bpf_lsm_verify_prog() 133 bpf_log(vlog, "attach_btf_id %u points to wrong type name %s\n", in bpf_lsm_verify_prog()
|
H A D | offload.c | 827 bpf_log(log, "metadata kfuncs require device-bound program\n"); in bpf_dev_bound_kfunc_check() 832 bpf_log(log, "metadata kfuncs can't be offloaded\n"); in bpf_dev_bound_kfunc_check()
|
H A D | log.c | 318 __printf(2, 3) void bpf_log(struct bpf_verifier_log *log, in bpf_log() function 330 EXPORT_SYMBOL_GPL(bpf_log);
|
H A D | verifier.c | 10049 bpf_log(log, "R%d is not a scalar\n", regno); in btf_check_func_arg_match() 10060 bpf_log(log, "arg#%d expects pointer to ctx\n", i); in btf_check_func_arg_match() 10070 bpf_log(log, "arg#%d is expected to be non-NULL\n", i); in btf_check_func_arg_match() 10082 bpf_log(log, "R%d is not a pointer to arena or scalar.\n", regno); in btf_check_func_arg_match() 10106 bpf_log(log, "verifier bug: unrecognized arg#%d type %d\n", in btf_check_func_arg_match() 22539 bpf_log(log, "Tracing programs must provide btf_id\n"); in bpf_check_attach_target() 22544 bpf_log(log, in bpf_check_attach_target() 22550 bpf_log(log, "attach_btf_id %u is invalid\n", btf_id); in bpf_check_attach_target() 22555 bpf_log(log, "attach_btf_id %u doesn't have a name\n", btf_id); in bpf_check_attach_target() 22564 bpf_log(log, "Target program bound device mismatch"); in bpf_check_attach_target() [all …]
|
/linux/drivers/hid/bpf/ |
H A D | hid_bpf_struct_ops.c | 120 bpf_log(log, "write access for struct %s at off %d with size %d\n", in hid_bpf_ops_btf_struct_access() 134 bpf_log(log, "write access to this struct is not supported\n"); in hid_bpf_ops_btf_struct_access() 136 bpf_log(log, in hid_bpf_ops_btf_struct_access()
|
/linux/net/ipv4/ |
H A D | bpf_tcp_ca.c | 70 bpf_log(log, "only read is supported\n"); in bpf_tcp_ca_btf_struct_access() 107 bpf_log(log, "no write support to tcp_sock at off %d\n", off); in bpf_tcp_ca_btf_struct_access() 112 bpf_log(log, in bpf_tcp_ca_btf_struct_access()
|
/linux/net/netfilter/ |
H A D | nf_conntrack_bpf.c | 247 bpf_log(log, "only read is supported\n"); in BTF_ID() 261 bpf_log(log, "no write support to nf_conn at off %d\n", off); in BTF_ID() 266 bpf_log(log, in BTF_ID()
|
/linux/net/bpf/ |
H A D | bpf_dummy_struct_ops.c | 251 bpf_log(log, "only access to bpf_dummy_ops_state is supported\n"); in bpf_dummy_ops_btf_struct_access() 256 bpf_log(log, "write access at off %d with size %d\n", off, size); in bpf_dummy_ops_btf_struct_access()
|
/linux/include/linux/ |
H A D | bpf_verifier.h | 803 __printf(2, 3) void bpf_log(struct bpf_verifier_log *log,
|