Home
last modified time | relevance | path

Searched refs:log (Results 1 – 25 of 26) sorted by relevance

12

/net/openvswitch/
Dflow_netlink.c151 u64 key_attrs, u64 mask_attrs, bool log) in match_validate() argument
290 OVS_NLERR(log, "Missing key (keys=%llx, expected=%llx)", in match_validate()
298 OVS_NLERR(log, "Unexpected mask (mask=%llx, allowed=%llx)", in match_validate()
463 u64 *attrsp, bool log, bool nz) in __parse_flow_nlattrs() argument
475 OVS_NLERR(log, "Key type %d is out of range max %d", in __parse_flow_nlattrs()
481 OVS_NLERR(log, "Duplicate key (type %d).", type); in __parse_flow_nlattrs()
487 OVS_NLERR(log, "Key %d has unexpected len %d expected %d", in __parse_flow_nlattrs()
498 OVS_NLERR(log, "Message has %d unknown bytes.", rem); in __parse_flow_nlattrs()
508 bool log) in parse_flow_mask_nlattrs() argument
510 return __parse_flow_nlattrs(attr, a, attrsp, log, true); in parse_flow_mask_nlattrs()
[all …]
Dflow_netlink.h36 u64 *attrsp, bool log);
39 u64 attrs, struct sw_flow_key *key, bool log);
47 bool log);
52 bool ovs_nla_get_ufid(struct sw_flow_id *, const struct nlattr *, bool log);
54 const struct sw_flow_key *key, bool log);
59 struct sw_flow_actions **sfa, bool log);
61 void *data, int len, bool log);
Dconntrack.c1323 const struct sw_flow_key *key, bool log) in ovs_ct_add_helper() argument
1332 OVS_NLERR(log, "Unknown helper \"%s\"", name); in ovs_ct_add_helper()
1348 OVS_NLERR(log, "Failed to load \"%s\" NAT helper, error: %d", in ovs_ct_add_helper()
1361 struct ovs_conntrack_info *info, bool log) in parse_nat() argument
1386 OVS_NLERR(log, "Unknown NAT attribute (type=%d, max=%d)", in parse_nat()
1392 OVS_NLERR(log, "NAT attribute type %d has unexpected length (%d != %d)", in parse_nat()
1402 OVS_NLERR(log, "Only one type of NAT may be specified"); in parse_nat()
1447 OVS_NLERR(log, "Unknown nat attribute (%d)", type); in parse_nat()
1453 OVS_NLERR(log, "NAT attribute has %d unknown bytes", rem); in parse_nat()
1459 OVS_NLERR(log, in parse_nat()
[all …]
Ddatapath.c547 bool log = !a[OVS_PACKET_ATTR_PROBE]; in ovs_packet_cmd_execute() local
577 packet, &flow->key, log); in ovs_packet_cmd_execute()
582 &flow->key, &acts, log); in ovs_packet_cmd_execute()
909 bool log = !a[OVS_FLOW_ATTR_PROBE]; in ovs_flow_cmd_new() local
914 OVS_NLERR(log, "Flow key attr not present in new flow."); in ovs_flow_cmd_new()
918 OVS_NLERR(log, "Flow actions attr not present in new flow."); in ovs_flow_cmd_new()
934 a[OVS_FLOW_ATTR_MASK], log); in ovs_flow_cmd_new()
940 &new_flow->key, log); in ovs_flow_cmd_new()
952 &new_flow->key, &acts, log); in ovs_flow_cmd_new()
954 OVS_NLERR(log, "Flow actions may not be safe on all matching packets."); in ovs_flow_cmd_new()
[all …]
Dconntrack.h21 bool log);
51 struct sw_flow_actions **acts, bool log) in ovs_ct_copy_action() argument
Dflow.c900 struct sw_flow_key *key, bool log) in ovs_flow_key_extract_userspace() argument
906 err = parse_flow_nlattrs(attr, a, &attrs, log); in ovs_flow_key_extract_userspace()
911 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log); in ovs_flow_key_extract_userspace()
Dflow.h280 struct sw_flow_key *key, bool log);
/net/netfilter/
Dnfnetlink_log.c101 __instance_lookup(struct nfnl_log_net *log, u_int16_t group_num) in __instance_lookup() argument
106 head = &log->instance_table[instance_hashfn(group_num)]; in __instance_lookup()
121 instance_lookup_get(struct nfnl_log_net *log, u_int16_t group_num) in instance_lookup_get() argument
126 inst = __instance_lookup(log, group_num); in instance_lookup_get()
158 struct nfnl_log_net *log = nfnl_log_pernet(net); in instance_create() local
161 spin_lock_bh(&log->instances_lock); in instance_create()
162 if (__instance_lookup(log, group_num)) { in instance_create()
198 &log->instance_table[instance_hashfn(group_num)]); in instance_create()
201 spin_unlock_bh(&log->instances_lock); in instance_create()
206 spin_unlock_bh(&log->instances_lock); in instance_create()
[all …]
Dnft_log.c111 priv->loginfo.u.log.level == NFT_LOGLEVEL_AUDIT) { in nft_log_eval()
163 li->u.log.level = in nft_log_init()
166 li->u.log.level = NFT_LOGLEVEL_WARNING; in nft_log_init()
168 if (li->u.log.level > NFT_LOGLEVEL_AUDIT) { in nft_log_init()
174 li->u.log.logflags = in nft_log_init()
176 if (li->u.log.logflags & ~NF_LOG_MASK) { in nft_log_init()
196 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_init()
220 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_destroy()
236 if (nla_put_be32(skb, NFTA_LOG_LEVEL, htonl(li->u.log.level))) in nft_log_dump()
239 if (li->u.log.logflags) { in nft_log_dump()
[all …]
Dnf_log.c30 struct nf_logger *log; in __find_logger() local
37 log = nft_log_dereference(loggers[pf][i]); in __find_logger()
38 if (!strncasecmp(str_logger, log->name, strlen(log->name))) in __find_logger()
39 return log; in __find_logger()
47 const struct nf_logger *log; in nf_log_set() local
53 log = nft_log_dereference(net->nf.nf_loggers[pf]); in nf_log_set()
54 if (log == NULL) in nf_log_set()
66 const struct nf_logger *log; in nf_log_unset() local
70 log = nft_log_dereference(net->nf.nf_loggers[i]); in nf_log_unset()
71 if (log == logger) in nf_log_unset()
[all …]
Dxt_LOG.c36 li.u.log.level = loginfo->level; in log_tg()
37 li.u.log.logflags = loginfo->logflags; in log_tg()
Dnf_log_common.c160 '0' + loginfo->u.log.level, prefix, in nf_log_dump_packet_common()
DKconfig515 tristate "Netfilter nf_tables log module"
517 This option adds the "log" expression that you can use to log
1064 will log every rule which match the packets as those traverse
1504 This option allows `quota2' to log ONCE when a quota limit
/net/bridge/netfilter/
Debt_log.c87 '0' + loginfo->u.log.level, prefix, in ebt_log_packet()
93 bitmask = loginfo->u.log.logflags; in ebt_log_packet()
186 li.u.log.level = info->loglevel; in ebt_log_tg()
187 li.u.log.logflags = info->bitmask; in ebt_log_tg()
DKconfig223 tristate "ebt: log support"
225 This option adds the log watcher, that you can use in any rule
/net/ipv6/netfilter/
Dnf_log_ipv6.c28 .log = {
50 logflags = info->u.log.logflags; in dump_ipv6_packet()
293 logflags = info->u.log.logflags; in dump_ipv6_mac_header()
Dip6_tables.c174 .log = {
/net/ipv4/netfilter/
Dnf_log_ipv4.c27 .log = {
44 logflags = info->u.log.logflags; in dump_ipv4_packet()
280 logflags = info->u.log.logflags; in dump_ipv4_mac_header()
Dnf_log_arp.c28 .log = {
/net/sched/
Dsch_fq.c703 static int fq_resize(struct Qdisc *sch, u32 log) in fq_resize() argument
710 if (q->fq_root && log == q->fq_trees_log) in fq_resize()
714 array = kvmalloc_node(sizeof(struct rb_root) << log, GFP_KERNEL | __GFP_RETRY_MAYFAIL, in fq_resize()
719 for (idx = 0; idx < (1U << log); idx++) in fq_resize()
726 fq_rehash(q, old_fq_root, q->fq_trees_log, array, log); in fq_resize()
729 q->fq_trees_log = log; in fq_resize()
/net/9p/
DKconfig44 Say Y if you want the 9P subsystem to log debug information.
/net/batman-adv/
DMakefile22 batman-adv-$(CONFIG_BATMAN_ADV_DEBUG) += log.o
DKconfig96 outputting debugging information to the debugfs log or tracing
/net/ipv4/
Dudp.c131 struct sock *sk, unsigned int log) in udp_lib_lport_inuse() argument
152 __set_bit(udp_sk(sk2)->udp_port_hash >> log, in udp_lib_lport_inuse()
255 udptable->log); in udp_lib_get_port()
265 !test_bit(snum >> udptable->log, bitmap) && in udp_lib_get_port()
3004 &table->log, in udp_table_init()
/net/mac80211/
DKconfig94 printing them into the kernel log.

12