/external/linux-kselftest/tools/testing/selftests/bpf/prog_tests/ |
D | log_fixup.c | 16 char log_buf[8 * 1024]; in bad_core_relo() local 25 memset(log_buf, 0, sizeof(log_buf)); in bad_core_relo() 26 bpf_program__set_log_buf(skel->progs.bad_relo, log_buf, log_buf_size ?: sizeof(log_buf)); in bad_core_relo() 32 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 39 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 42 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 48 ASSERT_HAS_SUBSTR(log_buf, in bad_core_relo() 52 ASSERT_NULL(strstr(log_buf, "max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0\n"), in bad_core_relo() 57 ASSERT_NULL(strstr(log_buf, "struct task_struct___bad.fake_field (0:1 @ offset 4)\n"), in bad_core_relo() 60 ASSERT_NULL(strstr(log_buf, "max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0\n"), in bad_core_relo() [all …]
|
D | log_buf.c | 153 char *log_buf; in bpf_prog_load_log_buf() local 156 log_buf = malloc(log_buf_sz); in bpf_prog_load_log_buf() 157 if (!ASSERT_OK_PTR(log_buf, "log_buf_alloc")) in bpf_prog_load_log_buf() 159 opts.log_buf = log_buf; in bpf_prog_load_log_buf() 163 log_buf[0] = '\0'; in bpf_prog_load_log_buf() 167 ASSERT_STREQ(log_buf, "", "good_log_0"); in bpf_prog_load_log_buf() 174 log_buf[0] = '\0'; in bpf_prog_load_log_buf() 178 ASSERT_OK_PTR(strstr(log_buf, "0: R1=ctx(off=0,imm=0) R10=fp0"), "good_log_2"); in bpf_prog_load_log_buf() 185 log_buf[0] = '\0'; in bpf_prog_load_log_buf() 189 ASSERT_OK_PTR(strstr(log_buf, "R0 !read_ok"), "bad_log_0"); in bpf_prog_load_log_buf() [all …]
|
D | cb_refs.c | 8 static char log_buf[1024 * 1024]; variable 22 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_cb_refs() 23 .kernel_log_size = sizeof(log_buf), in test_cb_refs() 42 if (!ASSERT_OK_PTR(strstr(log_buf, cb_refs_tests[i].err_msg), "expected error message")) { in test_cb_refs() 44 fprintf(stderr, "Verifier: %s\n", log_buf); in test_cb_refs()
|
D | test_global_funcs.c | 11 char *log_buf; in libbpf_debug_print() local 19 log_buf = va_arg(args, char *); in libbpf_debug_print() 20 if (!log_buf) in libbpf_debug_print() 22 if (err_str && strstr(log_buf, err_str) == 0) in libbpf_debug_print() 25 printf(format, log_buf); in libbpf_debug_print()
|
D | map_kptr.c | 8 static char log_buf[1024 * 1024]; variable 43 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_map_kptr_fail_prog() 44 .kernel_log_size = sizeof(log_buf), in test_map_kptr_fail_prog() 64 if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { in test_map_kptr_fail_prog() 66 fprintf(stderr, "Verifier: %s\n", log_buf); in test_map_kptr_fail_prog()
|
D | bpf_nf.c | 8 static char log_buf[1024 * 1024]; variable 139 LIBBPF_OPTS(bpf_object_open_opts, opts, .kernel_log_buf = log_buf, in test_bpf_nf_ct_fail() 140 .kernel_log_size = sizeof(log_buf), in test_bpf_nf_ct_fail() 160 if (!ASSERT_OK_PTR(strstr(log_buf, err_msg), "expected error message")) { in test_bpf_nf_ct_fail() 162 fprintf(stderr, "Verifier: %s\n", log_buf); in test_bpf_nf_ct_fail()
|
D | bpf_tcp_ca.c | 221 const char *prog_name, *log_buf; in libbpf_debug_print() local 230 log_buf = va_arg(args, char *); in libbpf_debug_print() 231 if (!log_buf) in libbpf_debug_print() 233 if (err_str && strstr(log_buf, err_str) != NULL) in libbpf_debug_print() 236 printf(format, prog_name, log_buf); in libbpf_debug_print()
|
D | syscall.c | 7 __u64 log_buf; member 20 .log_buf = (uintptr_t) verifier_log, in test_syscall()
|
D | raw_tp_writable_test_run.c | 22 .log_buf = error, in serial_test_raw_tp_writable_test_run() 39 .log_buf = error, in serial_test_raw_tp_writable_test_run()
|
/external/linux-kselftest/tools/testing/selftests/bpf/ |
D | test_progs.c | 26 static void stdio_hijack_init(char **log_buf, size_t *log_cnt) in stdio_hijack_init() argument 37 stdout = open_memstream(log_buf, log_cnt); in stdio_hijack_init() 53 static void stdio_hijack(char **log_buf, size_t *log_cnt) in stdio_hijack() argument 64 stdio_hijack_init(log_buf, log_cnt); in stdio_hijack() 225 static void print_test_log(char *log_buf, size_t log_cnt) in print_test_log() argument 227 log_buf[log_cnt] = '\0'; in print_test_log() 228 fprintf(env.stdout, "%s", log_buf); in print_test_log() 229 if (log_buf[log_cnt - 1] != '\n') in print_test_log() 288 print_test_log(test_state->log_buf, test_state->log_cnt); in dump_test_log() 300 print_test_log(subtest_state->log_buf, in dump_test_log() [all …]
|
D | testing_helpers.c | 219 __u32 kern_version, char *log_buf, in bpf_test_load_program() argument 226 .log_buf = log_buf, in bpf_test_load_program()
|
D | test_progs.h | 70 char *log_buf; member 90 char *log_buf; member 152 char log_buf[MAX_LOG_TRUNK_SIZE + 1]; member
|
/external/strace/tests-m32/ |
D | bpf-obj_get_info_by_fd.c | 183 static char log_buf[4096]; variable 197 if (size > offsetof(struct BPF_PROG_LOAD_struct, log_buf)) in print_prog_load() 199 sizeof(log_buf)); in print_prog_load() 258 .log_size = sizeof(log_buf), in main() 259 .log_buf = (uintptr_t) log_buf, in main() 268 offsetofend(struct BPF_PROG_LOAD_struct, log_buf), in main() 289 log_buf); in main()
|
D | bpf.c | 506 static char *log_buf; variable 516 if (!log_buf) in get_log_buf() 517 log_buf = tail_alloc(log_buf_size); in get_log_buf() 518 return log_buf; in get_log_buf() 544 attr->log_buf = (uintptr_t) get_log_buf_tail(); in init_BPF_PROG_LOAD_attr3() 567 attr->log_buf = (uintptr_t) get_log_buf(); in init_BPF_PROG_LOAD_attr4() 570 strncpy(log_buf, "log test", 9); in init_BPF_PROG_LOAD_attr4() 602 .log_buf = 0, 621 .log_buf = 0xffffffff00000000,
|
/external/strace/tests-mx32/ |
D | bpf-obj_get_info_by_fd.c | 183 static char log_buf[4096]; variable 197 if (size > offsetof(struct BPF_PROG_LOAD_struct, log_buf)) in print_prog_load() 199 sizeof(log_buf)); in print_prog_load() 258 .log_size = sizeof(log_buf), in main() 259 .log_buf = (uintptr_t) log_buf, in main() 268 offsetofend(struct BPF_PROG_LOAD_struct, log_buf), in main() 289 log_buf); in main()
|
D | bpf.c | 506 static char *log_buf; variable 516 if (!log_buf) in get_log_buf() 517 log_buf = tail_alloc(log_buf_size); in get_log_buf() 518 return log_buf; in get_log_buf() 544 attr->log_buf = (uintptr_t) get_log_buf_tail(); in init_BPF_PROG_LOAD_attr3() 567 attr->log_buf = (uintptr_t) get_log_buf(); in init_BPF_PROG_LOAD_attr4() 570 strncpy(log_buf, "log test", 9); in init_BPF_PROG_LOAD_attr4() 602 .log_buf = 0, 621 .log_buf = 0xffffffff00000000,
|
/external/strace/tests/ |
D | bpf-obj_get_info_by_fd.c | 183 static char log_buf[4096]; variable 197 if (size > offsetof(struct BPF_PROG_LOAD_struct, log_buf)) in print_prog_load() 199 sizeof(log_buf)); in print_prog_load() 258 .log_size = sizeof(log_buf), in main() 259 .log_buf = (uintptr_t) log_buf, in main() 268 offsetofend(struct BPF_PROG_LOAD_struct, log_buf), in main() 289 log_buf); in main()
|
D | bpf.c | 506 static char *log_buf; variable 516 if (!log_buf) in get_log_buf() 517 log_buf = tail_alloc(log_buf_size); in get_log_buf() 518 return log_buf; in get_log_buf() 544 attr->log_buf = (uintptr_t) get_log_buf_tail(); in init_BPF_PROG_LOAD_attr3() 567 attr->log_buf = (uintptr_t) get_log_buf(); in init_BPF_PROG_LOAD_attr4() 570 strncpy(log_buf, "log test", 9); in init_BPF_PROG_LOAD_attr4() 602 .log_buf = 0, 621 .log_buf = 0xffffffff00000000,
|
/external/libbpf/src/ |
D | libbpf_probes.c | 105 char *log_buf, size_t log_buf_sz) in probe_prog_load() argument 108 .log_buf = log_buf, in probe_prog_load() 110 .log_level = log_buf ? 1 : 0, in probe_prog_load() 134 opts.log_buf = buf; in probe_prog_load() 147 opts.log_buf = buf; in probe_prog_load()
|
D | bpf.c | 248 char *log_buf; in bpf_prog_load() local 294 log_buf = OPTS_GET(opts, log_buf, NULL); in bpf_prog_load() 298 if (!!log_buf != !!log_size) in bpf_prog_load() 316 attr.log_buf = ptr_to_u64(log_buf); in bpf_prog_load() 368 if (log_level == 0 && log_buf) { in bpf_prog_load() 373 attr.log_buf = ptr_to_u64(log_buf); in bpf_prog_load() 1206 char *log_buf; in bpf_btf_load() local 1218 log_buf = OPTS_GET(opts, log_buf, NULL); in bpf_btf_load() 1224 if (log_size && !log_buf) in bpf_btf_load() 1239 attr.btf_log_buf = ptr_to_u64(log_buf); in bpf_btf_load() [all …]
|
/external/ltp/testcases/kernel/syscalls/bpf/ |
D | bpf_common.c | 84 const size_t prog_size, char *const log_buf, in bpf_init_prog_attr() argument 103 attr->log_buf = ptr_to_u64(log_buf); in bpf_init_prog_attr()
|
/external/linux-kselftest/tools/testing/selftests/bpf/progs/ |
D | syscall.c | 13 __u64 log_buf; member 99 prog_load_attr.log_buf = ctx->log_buf; in bpf_prog()
|
/external/linux-kselftest/tools/testing/selftests/net/ |
D | psock_fanout.c | 146 static char log_buf[65536]; in sock_fanout_set_ebpf() local 168 attr.log_buf = (unsigned long) log_buf, in sock_fanout_set_ebpf() 169 attr.log_size = sizeof(log_buf), in sock_fanout_set_ebpf() 175 fprintf(stderr, "bpf verifier:\n%s\n", log_buf); in sock_fanout_set_ebpf()
|
/external/trusty/bootloader/test-runner/ |
D | test-runner-comm-port.c | 111 void log_buf(const char* buf, size_t size) { in log_buf() function 147 log_buf(msg, trusty_strlen(msg)); in log_msg()
|
/external/bcc/src/cc/ |
D | libbpf.c | 657 char *log_buf, size_t log_buf_sz) in libbpf_bpf_prog_load() argument 662 if (!opts || !log_buf != !log_buf_sz) { in libbpf_bpf_prog_load() 684 p.log_buf = log_buf; in libbpf_bpf_prog_load() 784 char *log_buf, unsigned log_buf_size, bool allow_rlimit) in bcc_prog_load_xattr() argument 801 log_buf[0] = 0; in bcc_prog_load_xattr() 802 opts_log_buf = log_buf; in bcc_prog_load_xattr() 936 …pf_bpf_prog_load(prog_type, new_prog_name, license, insns, insns_cnt, opts, log_buf, log_buf_size); in bcc_prog_load_xattr() 939 bpf_print_hints(ret, log_buf); in bcc_prog_load_xattr() 977 if (log_buf && ret < 0) in bcc_prog_load_xattr() 978 bpf_print_hints(ret, log_buf); in bcc_prog_load_xattr() [all …]
|