Home
last modified time | relevance | path

Searched refs:log_buf (Results 1 – 5 of 5) sorted by relevance

/tools/lib/bpf/
Dbpf.c60 u32 kern_version, char *log_buf, size_t log_buf_sz) in bpf_load_program() argument
70 attr.log_buf = ptr_to_u64(NULL); in bpf_load_program()
76 if (fd >= 0 || !log_buf || !log_buf_sz) in bpf_load_program()
80 attr.log_buf = ptr_to_u64(log_buf); in bpf_load_program()
83 log_buf[0] = 0; in bpf_load_program()
Dbpf.h20 u32 kern_version, char *log_buf,
Dlibbpf.c842 char *log_buf; in load_program() local
847 log_buf = malloc(BPF_LOG_BUF_SIZE); in load_program()
848 if (!log_buf) in load_program()
853 log_buf, BPF_LOG_BUF_SIZE); in load_program()
864 if (log_buf && log_buf[0] != '\0') { in load_program()
867 pr_warning("\n%s\n", log_buf); in load_program()
874 } else if (log_buf) { in load_program()
881 free(log_buf); in load_program()
/tools/testing/selftests/net/
Dpsock_fanout.c100 static char log_buf[65536]; in sock_fanout_set_ebpf() local
122 attr.log_buf = (unsigned long) log_buf, in sock_fanout_set_ebpf()
123 attr.log_size = sizeof(log_buf), in sock_fanout_set_ebpf()
129 fprintf(stderr, "bpf verifier:\n%s\n", log_buf); in sock_fanout_set_ebpf()
/tools/build/feature/
Dtest-bpf.c11 attr.log_buf = 0; in main()