Home
last modified time | relevance | path

Searched refs:log_buf (Results 1 – 25 of 45) sorted by relevance

12

/linux/tools/testing/selftests/bpf/prog_tests/
H A Dlog_fixup.c16 char log_buf[8 * 1024]; in bad_core_relo() local
25 memset(log_buf, 0, sizeof(log_buf)); in bad_core_relo()
26 bpf_program__set_log_buf(skel->progs.bad_relo, log_buf, log_buf_size ?: sizeof(log_buf)); in bad_core_relo()
33 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo()
40 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo()
43 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo()
49 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo()
53 ASSERT_NULL(strstr(log_buf, "max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0\n"), in bad_core_relo()
58 ASSERT_NULL(strstr(log_buf, "struct task_struct___bad.fake_field (0:1 @ offset 4)\n"), in bad_core_relo()
61 ASSERT_NULL(strstr(log_buf, "max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0\n"), in bad_core_relo()
[all …]
H A Dlog_buf.c158 char *log_buf; in bpf_prog_load_log_buf() local
161 log_buf = malloc(log_buf_sz); in bpf_prog_load_log_buf()
162 if (!ASSERT_OK_PTR(log_buf, "log_buf_alloc")) in bpf_prog_load_log_buf()
164 opts.log_buf = log_buf; in bpf_prog_load_log_buf()
168 log_buf[0] = '\0'; in bpf_prog_load_log_buf()
172 ASSERT_STREQ(log_buf, "", "good_log_0"); in bpf_prog_load_log_buf()
178 log_buf[0] = '\0'; in bpf_prog_load_log_buf()
182 ASSERT_OK_PTR(strstr(log_buf, "0: R1=ctx() R10=fp0"), "good_log_2"); in bpf_prog_load_log_buf()
188 log_buf[0] = '\0'; in bpf_prog_load_log_buf()
192 ASSERT_OK_PTR(strstr(log_buf, "R0 !read_ok"), "bad_log_0"); in bpf_prog_load_log_buf()
[all …]
H A Dverifier_log.c77 opts.log_buf = logs.reference; in verif_log_subtest()
100 opts.log_buf = logs.buf; in verif_log_subtest()
120 opts.log_buf = logs.buf; in verif_log_subtest()
178 opts.log_buf = logs.buf; in verif_log_subtest()
189 opts.log_buf = NULL; in verif_log_subtest()
198 opts.log_buf = logs.buf; in verif_log_subtest()
209 opts.log_buf = NULL; in verif_log_subtest()
218 opts.log_buf = logs.buf; in verif_log_subtest()
226 opts.log_buf = logs.buf; in verif_log_subtest()
234 opts.log_buf = logs.buf; in verif_log_subtest()
[all …]
H A Dspin_lock.c9 static char log_buf[1024 * 1024]; variable
78 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_spin_lock_fail_prog()
79 .kernel_log_size = sizeof(log_buf), in test_spin_lock_fail_prog()
100 if (strstr(log_buf, "JIT does not support calling kernel function")) { in test_spin_lock_fail_prog()
105 ret = match_regex(err_msg, log_buf); in test_spin_lock_fail_prog()
111 fprintf(stderr, "Verifier: %s\n", log_buf); in test_spin_lock_fail_prog()
H A Dglobal_func_dead_code.c12 char log_buf[4096]; in test_global_func_dead_code() local
47 bpf_program__set_log_buf(skel->progs.freplace_prog, log_buf, sizeof(log_buf)); in test_global_func_dead_code()
55 ASSERT_HAS_SUBSTR(log_buf, "Subprog global_dead doesn't exist", "dead_subprog_missing_msg"); in test_global_func_dead_code()
H A Dtracing_failure.c35 char log_buf[256]; in test_tracing_fail_prog() local
47 bpf_program__set_log_buf(prog, log_buf, sizeof(log_buf)); in test_tracing_fail_prog()
53 ASSERT_HAS_SUBSTR(log_buf, exp_msg, "log_buf"); in test_tracing_fail_prog()
H A Dbpf_nf.c8 static char log_buf[1024 * 1024]; variable
156 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_bpf_nf_ct_fail()
157 .kernel_log_size = sizeof(log_buf), in test_bpf_nf_ct_fail()
177 if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { in test_bpf_nf()
179 fprintf(stderr, "Verifier: %s\n", log_buf); in test_bpf_nf()
H A Dexceptions.c10 static char log_buf[1024 * 1024]; variable
89 LIBBPF_OPTS(bpf_object_open_opts, o, .kernel_log_buf = log_buf, \ in test_exceptions_success()
90 .kernel_log_size = sizeof(log_buf), \ in test_exceptions_success()
102 printf("%s\n", log_buf); \ in test_exceptions_success()
106 if (!ASSERT_OK_PTR(strstr(log_buf, msg), "strstr")) { \ in test_exceptions_success()
107 printf("%s\n", log_buf); \ in test_exceptions_success()
H A Dfexit_bpf2bpf.c360 char log_buf[64 * 1024]; in test_obj_load_failure_common() local
379 log_buf[0] = '\0'; in test_obj_load_failure_common()
381 bpf_program__set_log_buf(prog, log_buf, sizeof(log_buf)); in test_obj_load_failure_common()
388 printf("VERIFIER LOG:\n================\n%s\n================\n", log_buf); in test_obj_load_failure_common()
393 ASSERT_HAS_SUBSTR(log_buf, exp_msg, "fail_msg"); in test_obj_load_failure_common()
H A Draw_tp_writable_test_run.c23 .log_buf = error, in serial_test_raw_tp_writable_test_run()
40 .log_buf = error, in serial_test_raw_tp_writable_test_run()
H A Dsyscall.c7 __u64 log_buf; member
20 .log_buf = (uintptr_t) verifier_log, in test_syscall_load_prog()
H A Dcore_reloc_raw.c48 .log_buf = log, in test_bad_local_id()
94 attr.log_buf = (__u64)log; in test_bad_local_id()
H A Dbpf_tcp_ca.c223 const char *prog_name, *log_buf; in libbpf_debug_print() local
232 log_buf = va_arg(args, char *); in libbpf_debug_print()
233 if (!log_buf) in libbpf_debug_print()
235 if (err_str && strstr(log_buf, err_str) != NULL) in libbpf_debug_print()
238 printf(format, prog_name, log_buf); in libbpf_debug_print()
H A Dlinked_list.c12 static char log_buf[1024 * 1024]; variable
104 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_linked_list_fail_prog()
105 .kernel_log_size = sizeof(log_buf), in test_linked_list_fail_prog()
125 if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { in test_linked_list_fail_prog()
127 fprintf(stderr, "Verifier: %s\n", log_buf); in test_linked_list_fail_prog()
H A Draw_tp_writable_reject_nbd_invalid.c24 .log_buf = error, in test_raw_tp_writable_reject_nbd_invalid()
/linux/tools/perf/util/intel-pt-decoder/
H A Dintel-pt-log.c27 struct log_buf { struct
40 static struct log_buf log_buf; argument
98 struct log_buf *b = cookie; in log_buf__write()
122 struct log_buf *b = cookie; in log_buf__close()
128 static FILE *log_buf__open(struct log_buf *b, FILE *backend, unsigned int sz) in log_buf__open()
165 static void log_buf__dump(struct log_buf *b) in log_buf__dump()
187 log_buf__dump(&log_buf); in intel_pt_log_dump_buf()
203 f = log_buf__open(&log_buf, f, intel_pt_log_on_error_size); in intel_pt_log_open()
/linux/tools/testing/selftests/bpf/
H A Dtest_progs.c51 static void stdio_hijack_init(char **log_buf, size_t *log_cnt) in stdio_hijack_init()
62 stdout = open_memstream(log_buf, log_cnt); in stdio_hijack_init()
78 static void stdio_hijack(char **log_buf, size_t *log_cnt) in stdio_hijack()
89 stdio_hijack_init(log_buf, log_cnt); in stdio_hijack()
367 static void print_test_log(char *log_buf, size_t log_cnt) in print_test_log()
369 log_buf[log_cnt] = '\0'; in print_test_log()
370 fprintf(env.stdout_saved, "%s", log_buf); in print_test_log()
371 if (log_buf[log_cnt - 1] != '\n')
393 static void jsonw_write_log_message(json_writer_t *w, char *log_buf, size_t log_cnt) in jsonw_write_log_message()
396 * null byte. Yet in parallel mode, log_buf wil in jsonw_write_log_message()
49 stdio_hijack_init(char ** log_buf,size_t * log_cnt) stdio_hijack_init() argument
76 stdio_hijack(char ** log_buf,size_t * log_cnt) stdio_hijack() argument
364 print_test_log(char * log_buf,size_t log_cnt) print_test_log() argument
390 jsonw_write_log_message(json_writer_t * w,char * log_buf,size_t log_cnt) jsonw_write_log_message() argument
1423 dispatch_thread_read_log(int sock_fd,char ** log_buf,size_t * log_cnt) dispatch_thread_read_log() argument
1736 worker_main_send_log(int sock,char * log_buf,size_t log_cnt) worker_main_send_log() argument
[all...]
H A Dtest_loader.c100 if (!tester->log_buf) {
102 tester->log_buf = calloc(tester->log_buf_sz, 1); in tester_init()
103 if (!ASSERT_OK_PTR(tester->log_buf, "tester_log_buf")) in tester_init()
115 free(tester->log_buf); in test_loader_fini()
733 bpf_program__set_log_buf(prog, tester->log_buf, tester->log_buf_sz); in validate_msgs()
747 tester->log_buf[0] = '\0'; in validate_msgs()
750 static void emit_verifier_log(const char *log_buf, bool force) in validate_msgs()
754 fprintf(stdout, "VERIFIER LOG:\n=============\n%s=============\n", log_buf); in validate_msgs()
895 void validate_msgs(const char *log_buf, struct expected_msgs *msgs, in should_do_test_run()
903 match_positive_msgs(log_buf, msg in get_xlated_program_text()
689 emit_verifier_log(const char * log_buf,bool force) emit_verifier_log() argument
710 validate_msgs(char * log_buf,struct expected_msgs * msgs,void (* emit_fn)(const char * buf,bool force)) validate_msgs() argument
[all...]
H A Dtest_progs.h74 char *log_buf;
95 char *log_buf;
167 char log_buf[MAX_LOG_TRUNK_SIZE + 1];
522 char *log_buf;
563 void validate_msgs(const char *log_buf, struct expected_msgs *msgs,
73 char *log_buf; global() member
94 char *log_buf; global() member
166 char log_buf[MAX_LOG_TRUNK_SIZE + 1]; global() member
521 char *log_buf; global() member
H A Dtesting_helpers.c326 __u32 kern_version, char *log_buf, in bpf_test_load_program() argument
333 .log_buf = log_buf, in bpf_test_load_program()
/linux/tools/power/acpi/tools/pfrut/
H A Dpfrut.c206 char *log_buf; in main() local
414 log_buf = malloc(max_data_sz + 1); in main()
415 if (!log_buf) { in main()
416 perror("log_buf allocate failed."); in main()
426 free(log_buf); in main()
430 memcpy(log_buf, p_mmap, max_data_sz); in main()
431 log_buf[max_data_sz] = '\0'; in main()
432 printf("%s\n", log_buf); in main()
433 free(log_buf); in main()
/linux/tools/lib/bpf/
H A Dlibbpf_probes.c105 char *log_buf, size_t log_buf_sz) in probe_prog_load() argument
108 .log_buf = log_buf, in probe_prog_load()
110 .log_level = log_buf ? 1 : 0, in probe_prog_load()
134 opts.log_buf = buf; in probe_prog_load()
147 opts.log_buf = buf; in probe_prog_load()
/linux/samples/bpf/
H A Dcookie_uid_helper_example.c78 static char log_buf[1 << 16]; in prog_load() local
161 .log_buf = log_buf, in prog_load()
162 .log_size = sizeof(log_buf), in prog_load()
168 error(1, errno, "failed to load prog\n%s\n", log_buf); in prog_load()
/linux/tools/testing/selftests/net/
H A Dpsock_fanout.c174 static char log_buf[65536]; in sock_fanout_set_ebpf() local
196 attr.log_buf = (unsigned long) log_buf; in sock_fanout_set_ebpf()
197 attr.log_size = sizeof(log_buf); in sock_fanout_set_ebpf()
203 fprintf(stderr, "bpf verifier:\n%s\n", log_buf); in sock_fanout_set_ebpf()
/linux/tools/testing/selftests/bpf/progs/
H A Dsyscall.c20 __u64 log_buf; member
137 prog_load_attr.log_buf = ctx->log_buf; in load_prog()

12