/linux/tools/testing/selftests/bpf/prog_tests/ |
H A D | log_fixup.c | 16 char log_buf[8 * 1024]; in bad_core_relo() local 25 memset(log_buf, 0, sizeof(log_buf)); in bad_core_relo() 26 bpf_program__set_log_buf(skel->progs.bad_relo, log_buf, log_buf_size ?: sizeof(log_buf)); in bad_core_relo() 33 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 40 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 43 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 49 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 53 ASSERT_NULL(strstr(log_buf, "max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0\n"), in bad_core_relo() 58 ASSERT_NULL(strstr(log_buf, "struct task_struct___bad.fake_field (0:1 @ offset 4)\n"), in bad_core_relo() 61 ASSERT_NULL(strstr(log_buf, "max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0\n"), in bad_core_relo() [all …]
|
H A D | log_buf.c | 52 /* In the first round every prog has its own log_buf, so libbpf logs in obj_load_log_buf() 64 /* log_level 0 with custom log_buf means that verbose logs are not in obj_load_log_buf() 67 * custom log_buf in obj_load_log_buf() 154 char *log_buf; in bpf_prog_load_log_buf() 157 log_buf = malloc(log_buf_sz); in bpf_prog_load_log_buf() 158 if (!ASSERT_OK_PTR(log_buf, "log_buf_alloc")) in bpf_prog_load_log_buf() 160 opts.log_buf = log_buf; in bpf_prog_load_log_buf() 163 /* with log_level == 0 log_buf should stay empty for good prog */ in bpf_prog_load_log_buf() 164 log_buf[ in bpf_prog_load_log_buf() 153 char *log_buf; bpf_prog_load_log_buf() local 205 char *log_buf = NULL; bpf_btf_load_log_buf() local [all...] |
H A D | verifier_log.c | 77 opts.log_buf = logs.reference; in verif_log_subtest() 100 opts.log_buf = logs.buf; in verif_log_subtest() 120 opts.log_buf = logs.buf; in verif_log_subtest() 178 opts.log_buf = logs.buf; in verif_log_subtest() 189 opts.log_buf = NULL; in verif_log_subtest() 198 opts.log_buf = logs.buf; in verif_log_subtest() 209 opts.log_buf = NULL; in verif_log_subtest() 218 opts.log_buf = logs.buf; in verif_log_subtest() 226 opts.log_buf = logs.buf; in verif_log_subtest() 234 opts.log_buf = logs.buf; in verif_log_subtest() [all …]
|
H A D | cb_refs.c | 8 static char log_buf[1024 * 1024]; variable 22 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_cb_refs() 23 .kernel_log_size = sizeof(log_buf), in test_cb_refs() 42 if (!ASSERT_OK_PTR(strstr(log_buf, cb_refs_tests[i].err_msg), "expected error message")) { in test_cb_refs() 44 fprintf(stderr, "Verifier: %s\n", log_buf); in test_cb_refs()
|
H A D | spin_lock.c | 9 static char log_buf[1024 * 1024]; variable 75 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_spin_lock_fail_prog() 76 .kernel_log_size = sizeof(log_buf), in test_spin_lock_fail_prog() 97 if (strstr(log_buf, "JIT does not support calling kernel function")) { in test_spin_lock_fail_prog() 102 ret = match_regex(err_msg, log_buf); in test_spin_lock_fail_prog() 108 fprintf(stderr, "Verifier: %s\n", log_buf); in test_spin_lock_fail_prog()
|
H A D | global_func_dead_code.c | 12 char log_buf[4096]; in test_global_func_dead_code() local 47 bpf_program__set_log_buf(skel->progs.freplace_prog, log_buf, sizeof(log_buf)); in test_global_func_dead_code() 55 ASSERT_HAS_SUBSTR(log_buf, "Subprog global_dead doesn't exist", "dead_subprog_missing_msg"); in test_global_func_dead_code()
|
H A D | bpf_nf.c | 8 static char log_buf[1024 * 1024]; variable 147 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_bpf_nf_ct_fail() 148 .kernel_log_size = sizeof(log_buf), in test_bpf_nf_ct_fail() 168 if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { in test_bpf_nf_ct_fail() 170 fprintf(stderr, "Verifier: %s\n", log_buf); in test_bpf_nf_ct_fail()
|
H A D | exceptions.c | 10 static char log_buf[1024 * 1024]; variable 89 LIBBPF_OPTS(bpf_object_open_opts, o, .kernel_log_buf = log_buf, \ in test_exceptions_success() 90 .kernel_log_size = sizeof(log_buf), \ in test_exceptions_success() 102 printf("%s\n", log_buf); \ in test_exceptions_success() 106 if (!ASSERT_OK_PTR(strstr(log_buf, msg), "strstr")) { \ in test_exceptions_success() 107 printf("%s\n", log_buf); \ in test_exceptions_success()
|
H A D | fexit_bpf2bpf.c | 360 char log_buf[64 * 1024]; in test_obj_load_failure_common() local 379 log_buf[0] = '\0'; in test_obj_load_failure_common() 381 bpf_program__set_log_buf(prog, log_buf, sizeof(log_buf)); in test_obj_load_failure_common() 388 printf("VERIFIER LOG:\n================\n%s\n================\n", log_buf); in test_obj_load_failure_common() 393 ASSERT_HAS_SUBSTR(log_buf, exp_msg, "fail_msg"); in test_obj_load_failure_common()
|
H A D | raw_tp_writable_test_run.c | 23 .log_buf = error, in serial_test_raw_tp_writable_test_run() 40 .log_buf = error, in serial_test_raw_tp_writable_test_run()
|
H A D | syscall.c | 7 __u64 log_buf; member 20 .log_buf = (uintptr_t) verifier_log, in test_syscall_load_prog()
|
H A D | bpf_tcp_ca.c | 227 const char *prog_name, *log_buf; in libbpf_debug_print() local 236 log_buf = va_arg(args, char *); in libbpf_debug_print() 237 if (!log_buf) in libbpf_debug_print() 239 if (err_str && strstr(log_buf, err_str) != NULL) in libbpf_debug_print() 242 printf(format, prog_name, log_buf); in libbpf_debug_print()
|
/linux/tools/perf/util/intel-pt-decoder/ |
H A D | intel-pt-log.c | 27 struct log_buf { struct 40 static struct log_buf log_buf; argument 98 struct log_buf *b = cookie; in log_buf__write() 122 struct log_buf *b = cookie; in log_buf__close() 128 static FILE *log_buf__open(struct log_buf *b, FILE *backend, unsigned int sz) in log_buf__open() 165 static void log_buf__dump(struct log_buf *b) in log_buf__dump() 187 log_buf__dump(&log_buf); in intel_pt_log_dump_buf() 203 f = log_buf__open(&log_buf, f, intel_pt_log_on_error_size); in intel_pt_log_open()
|
/linux/tools/testing/selftests/bpf/ |
H A D | test_progs.c | 45 static void stdio_hijack_init(char **log_buf, size_t *log_cnt) in stdio_hijack_init() 56 stdout = open_memstream(log_buf, log_cnt); in stdio_hijack() 72 static void stdio_hijack(char **log_buf, size_t *log_cnt) in stdio_restore_cleanup() 83 stdio_hijack_init(log_buf, log_cnt); in stdio_restore_cleanup() 278 static void print_test_log(char *log_buf, size_t log_cnt) in jsonw_write_log_message() 280 log_buf[log_cnt] = '\0'; in jsonw_write_log_message() 281 fprintf(env.stdout_saved, "%s", log_buf); in jsonw_write_log_message() 282 if (log_buf[log_cnt - 1] != '\n') in jsonw_write_log_message() 304 static void jsonw_write_log_message(json_writer_t *w, char *log_buf, size_t log_cnt) in dump_test_log() 307 * null byte. Yet in parallel mode, log_buf wil in dump_test_log() 27 stdio_hijack_init(char ** log_buf,size_t * log_cnt) stdio_hijack_init() argument 54 stdio_hijack(char ** log_buf,size_t * log_cnt) stdio_hijack() argument 246 print_test_log(char * log_buf,size_t log_cnt) print_test_log() argument 272 jsonw_write_log_message(json_writer_t * w,char * log_buf,size_t log_cnt) jsonw_write_log_message() argument 1165 dispatch_thread_read_log(int sock_fd,char ** log_buf,size_t * log_cnt) dispatch_thread_read_log() argument 1478 worker_main_send_log(int sock,char * log_buf,size_t log_cnt) worker_main_send_log() argument [all...] |
H A D | test_loader.c | 94 if (!tester->log_buf) { in test_loader_fini() 96 tester->log_buf = calloc(tester->log_buf_sz, 1); in test_loader_fini() 97 if (!ASSERT_OK_PTR(tester->log_buf, "tester_log_buf")) in test_loader_fini() 109 free(tester->log_buf); in free_test_spec() 619 bpf_program__set_log_buf(prog, tester->log_buf, tester->log_buf_sz); in run_subtest() 633 tester->log_buf[0] = '\0'; in run_subtest() 636 static void emit_verifier_log(const char *log_buf, bool force) in run_subtest() 640 fprintf(stdout, "VERIFIER LOG:\n=============\n%s=============\n", log_buf); in run_subtest() 657 static void validate_msgs(char *log_buf, struct expected_msgs *msgs, in run_subtest() 660 const char *log = log_buf, *prev_matc in run_subtest() 440 emit_verifier_log(const char * log_buf,bool force) emit_verifier_log() argument [all...] |
H A D | test_progs.h | 73 char *log_buf; member 94 char *log_buf; 160 char log_buf[MAX_LOG_TRUNK_SIZE + 1]; 456 char *log_buf; in test_loader__set_pre_execution_cb() 93 char *log_buf; global() member 156 char log_buf[MAX_LOG_TRUNK_SIZE + 1]; global() member 448 char *log_buf; global() member
|
H A D | testing_helpers.c | 326 __u32 kern_version, char *log_buf, in bpf_test_load_program() 333 .log_buf = log_buf, in bpf_test_load_program() 325 bpf_test_load_program(enum bpf_prog_type type,const struct bpf_insn * insns,size_t insns_cnt,const char * license,__u32 kern_version,char * log_buf,size_t log_buf_sz) bpf_test_load_program() argument
|
/linux/tools/power/acpi/tools/pfrut/ |
H A D | pfrut.c | 206 char *log_buf; in main() local 411 log_buf = malloc(max_data_sz + 1); in main() 412 if (!log_buf) { in main() 427 memcpy(log_buf, p_mmap, max_data_sz); in main() 428 log_buf[max_data_sz] = '\0'; in main() 429 printf("%s\n", log_buf); in main() 430 free(log_buf); in main()
|
/linux/tools/lib/bpf/ |
H A D | libbpf_probes.c | 105 char *log_buf, size_t log_buf_sz) in probe_prog_load() argument 108 .log_buf = log_buf, in probe_prog_load() 110 .log_level = log_buf ? 1 : 0, in probe_prog_load() 134 opts.log_buf = buf; in probe_prog_load() 147 opts.log_buf = buf; in probe_prog_load()
|
H A D | bpf.c | 248 char *log_buf; in bpf_prog_load() local 294 log_buf = OPTS_GET(opts, log_buf, NULL); in bpf_prog_load() 298 if (!!log_buf != !!log_size) in bpf_prog_load() 316 attr.log_buf = ptr_to_u64(log_buf); in bpf_prog_load() 368 if (log_level == 0 && log_buf) { in bpf_prog_load() 373 attr.log_buf = ptr_to_u64(log_buf); in bpf_prog_load() 1207 char *log_buf; in bpf_btf_load() local 1219 log_buf = OPTS_GET(opts, log_buf, NULL); in bpf_btf_load() 1225 if (log_size && !log_buf) in bpf_btf_load() 1240 attr.btf_log_buf = ptr_to_u64(log_buf); in bpf_btf_load() [all …]
|
H A D | skel_internal.h | 57 __u64 log_buf; member 339 attr.log_buf = opts->ctx->log_buf; in bpf_load_and_run()
|
/linux/samples/bpf/ |
H A D | cookie_uid_helper_example.c | 78 static char log_buf[1 << 16]; in prog_load() local 161 .log_buf = log_buf, in prog_load() 162 .log_size = sizeof(log_buf), in prog_load() 168 error(1, errno, "failed to load prog\n%s\n", log_buf); in prog_load()
|
/linux/tools/testing/selftests/net/ |
H A D | psock_fanout.c | 146 static char log_buf[65536]; in sock_fanout_set_ebpf() local 168 attr.log_buf = (unsigned long) log_buf; in sock_fanout_set_ebpf() 169 attr.log_size = sizeof(log_buf); in sock_fanout_set_ebpf() 175 fprintf(stderr, "bpf verifier:\n%s\n", log_buf); in sock_fanout_set_ebpf()
|
/linux/tools/testing/selftests/bpf/progs/ |
H A D | syscall.c | 20 __u64 log_buf; 137 prog_load_attr.log_buf = ctx->log_buf; in load_prog() 19 __u64 log_buf; global() member
|
/linux/drivers/gpu/drm/amd/amdgpu/ |
H A D | amdgpu_vcn.c | 1087 void *log_buf; in amdgpu_debugfs_vcn_fwlog_read() local 1099 log_buf = vcn->fw_shared.cpu_addr + vcn->fw_shared.mem_size; in amdgpu_debugfs_vcn_fwlog_read() 1101 plog = (volatile struct amdgpu_vcn_fwlog *)log_buf; in amdgpu_debugfs_vcn_fwlog_read() 1130 (log_buf + read_pos), read_num[i])) in amdgpu_debugfs_vcn_fwlog_read() 1171 volatile struct amdgpu_vcn_fwlog *log_buf = fw_log_cpu_addr; in amdgpu_vcn_fwlog_init() local 1180 log_buf->header_size = sizeof(struct amdgpu_vcn_fwlog); in amdgpu_vcn_fwlog_init() 1181 log_buf->buffer_size = AMDGPU_VCNFW_LOG_SIZE; in amdgpu_vcn_fwlog_init() 1182 log_buf->rptr = log_buf->header_size; in amdgpu_vcn_fwlog_init() 1183 log_buf->wptr = log_buf->header_size; in amdgpu_vcn_fwlog_init() 1184 log_buf->wrapped = 0; in amdgpu_vcn_fwlog_init()
|