Home
last modified time | relevance | path

Searched refs:bpf_log (Results 1 – 11 of 11) sorted by relevance

/linux-6.15/kernel/bpf/
H A Dbtf.c6751 bpf_log(log, in btf_ctx_access()
6883 bpf_log(log, in btf_ctx_access()
7158 bpf_log(log, in btf_struct_walk()
7360 bpf_log(log, in btf_distill_func_proto()
7367 bpf_log(log, in btf_distill_func_proto()
7377 bpf_log(log, in btf_distill_func_proto()
7386 bpf_log(log, in btf_distill_func_proto()
7392 bpf_log(log, in btf_distill_func_proto()
7453 bpf_log(log, in btf_check_func_type_match()
7471 bpf_log(log, in btf_check_func_type_match()
[all …]
H A Dbpf_lsm.c121 bpf_log(vlog, in bpf_lsm_verify_prog()
127 bpf_log(vlog, "attach_btf_id %u points to disabled hook %s\n", in bpf_lsm_verify_prog()
133 bpf_log(vlog, "attach_btf_id %u points to wrong type name %s\n", in bpf_lsm_verify_prog()
H A Dlog.c318 __printf(2, 3) void bpf_log(struct bpf_verifier_log *log, in bpf_log() function
330 EXPORT_SYMBOL_GPL(bpf_log);
H A Doffload.c832 bpf_log(log, "metadata kfuncs require device-bound program\n"); in bpf_dev_bound_kfunc_check()
837 bpf_log(log, "metadata kfuncs can't be offloaded\n"); in bpf_dev_bound_kfunc_check()
H A Dverifier.c10346 bpf_log(log, "R%d is not a scalar\n", regno); in btf_check_func_arg_match()
23073 bpf_log(log, in bpf_check_attach_target()
23108 bpf_log(log, in bpf_check_attach_target()
23116 bpf_log(log, in bpf_check_attach_target()
23121 bpf_log(log, in bpf_check_attach_target()
23129 bpf_log(log, in bpf_check_attach_target()
23138 bpf_log(log, in bpf_check_attach_target()
23163 bpf_log(log, "Cannot recursively attach\n"); in bpf_check_attach_target()
23184 bpf_log(log, "Cannot extend fentry/fexit\n"); in bpf_check_attach_target()
23197 bpf_log(log, in bpf_check_attach_target()
[all …]
/linux-6.15/drivers/hid/bpf/
H A Dhid_bpf_struct_ops.c120 bpf_log(log, "write access for struct %s at off %d with size %d\n", in hid_bpf_ops_btf_struct_access()
134 bpf_log(log, "write access to this struct is not supported\n"); in hid_bpf_ops_btf_struct_access()
136 bpf_log(log, in hid_bpf_ops_btf_struct_access()
/linux-6.15/net/ipv4/
H A Dbpf_tcp_ca.c70 bpf_log(log, "only read is supported\n"); in bpf_tcp_ca_btf_struct_access()
107 bpf_log(log, "no write support to tcp_sock at off %d\n", off); in bpf_tcp_ca_btf_struct_access()
112 bpf_log(log, in bpf_tcp_ca_btf_struct_access()
/linux-6.15/net/netfilter/
H A Dnf_conntrack_bpf.c247 bpf_log(log, "only read is supported\n"); in BTF_ID()
261 bpf_log(log, "no write support to nf_conn at off %d\n", off); in BTF_ID()
266 bpf_log(log, in BTF_ID()
/linux-6.15/net/bpf/
H A Dbpf_dummy_struct_ops.c251 bpf_log(log, "only access to bpf_dummy_ops_state is supported\n"); in bpf_dummy_ops_btf_struct_access()
256 bpf_log(log, "write access at off %d with size %d\n", off, size); in bpf_dummy_ops_btf_struct_access()
/linux-6.15/tools/lib/bpf/
H A Drelo_core.c53 #define pr_warn(fmt, log, ...) bpf_log((void *)log, fmt, "", ##__VA_ARGS__)
54 #define pr_info(fmt, log, ...) bpf_log((void *)log, fmt, "", ##__VA_ARGS__)
55 #define pr_debug(fmt, log, ...) bpf_log((void *)log, fmt, "", ##__VA_ARGS__)
56 #define libbpf_print(level, fmt, ...) bpf_log((void *)prog_name, fmt, ##__VA_ARGS__)
/linux-6.15/include/linux/
H A Dbpf_verifier.h830 __printf(2, 3) void bpf_log(struct bpf_verifier_log *log,