/net/openvswitch/ |
D | flow_netlink.c | 151 u64 key_attrs, u64 mask_attrs, bool log) in match_validate() argument 290 OVS_NLERR(log, "Missing key (keys=%llx, expected=%llx)", in match_validate() 298 OVS_NLERR(log, "Unexpected mask (mask=%llx, allowed=%llx)", in match_validate() 463 u64 *attrsp, bool log, bool nz) in __parse_flow_nlattrs() argument 475 OVS_NLERR(log, "Key type %d is out of range max %d", in __parse_flow_nlattrs() 481 OVS_NLERR(log, "Duplicate key (type %d).", type); in __parse_flow_nlattrs() 487 OVS_NLERR(log, "Key %d has unexpected len %d expected %d", in __parse_flow_nlattrs() 498 OVS_NLERR(log, "Message has %d unknown bytes.", rem); in __parse_flow_nlattrs() 508 bool log) in parse_flow_mask_nlattrs() argument 510 return __parse_flow_nlattrs(attr, a, attrsp, log, true); in parse_flow_mask_nlattrs() [all …]
|
D | flow_netlink.h | 36 u64 *attrsp, bool log); 39 u64 attrs, struct sw_flow_key *key, bool log); 47 bool log); 52 bool ovs_nla_get_ufid(struct sw_flow_id *, const struct nlattr *, bool log); 54 const struct sw_flow_key *key, bool log); 59 struct sw_flow_actions **sfa, bool log); 61 void *data, int len, bool log);
|
D | conntrack.c | 1323 const struct sw_flow_key *key, bool log) in ovs_ct_add_helper() argument 1332 OVS_NLERR(log, "Unknown helper \"%s\"", name); in ovs_ct_add_helper() 1348 OVS_NLERR(log, "Failed to load \"%s\" NAT helper, error: %d", in ovs_ct_add_helper() 1361 struct ovs_conntrack_info *info, bool log) in parse_nat() argument 1386 OVS_NLERR(log, "Unknown NAT attribute (type=%d, max=%d)", in parse_nat() 1392 OVS_NLERR(log, "NAT attribute type %d has unexpected length (%d != %d)", in parse_nat() 1402 OVS_NLERR(log, "Only one type of NAT may be specified"); in parse_nat() 1447 OVS_NLERR(log, "Unknown nat attribute (%d)", type); in parse_nat() 1453 OVS_NLERR(log, "NAT attribute has %d unknown bytes", rem); in parse_nat() 1459 OVS_NLERR(log, in parse_nat() [all …]
|
D | datapath.c | 547 bool log = !a[OVS_PACKET_ATTR_PROBE]; in ovs_packet_cmd_execute() local 577 packet, &flow->key, log); in ovs_packet_cmd_execute() 582 &flow->key, &acts, log); in ovs_packet_cmd_execute() 909 bool log = !a[OVS_FLOW_ATTR_PROBE]; in ovs_flow_cmd_new() local 914 OVS_NLERR(log, "Flow key attr not present in new flow."); in ovs_flow_cmd_new() 918 OVS_NLERR(log, "Flow actions attr not present in new flow."); in ovs_flow_cmd_new() 934 a[OVS_FLOW_ATTR_MASK], log); in ovs_flow_cmd_new() 940 &new_flow->key, log); in ovs_flow_cmd_new() 952 &new_flow->key, &acts, log); in ovs_flow_cmd_new() 954 OVS_NLERR(log, "Flow actions may not be safe on all matching packets."); in ovs_flow_cmd_new() [all …]
|
D | conntrack.h | 21 bool log); 51 struct sw_flow_actions **acts, bool log) in ovs_ct_copy_action() argument
|
D | flow.c | 900 struct sw_flow_key *key, bool log) in ovs_flow_key_extract_userspace() argument 906 err = parse_flow_nlattrs(attr, a, &attrs, log); in ovs_flow_key_extract_userspace() 911 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log); in ovs_flow_key_extract_userspace()
|
D | flow.h | 280 struct sw_flow_key *key, bool log);
|
/net/netfilter/ |
D | nfnetlink_log.c | 101 __instance_lookup(struct nfnl_log_net *log, u_int16_t group_num) in __instance_lookup() argument 106 head = &log->instance_table[instance_hashfn(group_num)]; in __instance_lookup() 121 instance_lookup_get(struct nfnl_log_net *log, u_int16_t group_num) in instance_lookup_get() argument 126 inst = __instance_lookup(log, group_num); in instance_lookup_get() 158 struct nfnl_log_net *log = nfnl_log_pernet(net); in instance_create() local 161 spin_lock_bh(&log->instances_lock); in instance_create() 162 if (__instance_lookup(log, group_num)) { in instance_create() 198 &log->instance_table[instance_hashfn(group_num)]); in instance_create() 201 spin_unlock_bh(&log->instances_lock); in instance_create() 206 spin_unlock_bh(&log->instances_lock); in instance_create() [all …]
|
D | nft_log.c | 111 priv->loginfo.u.log.level == NFT_LOGLEVEL_AUDIT) { in nft_log_eval() 163 li->u.log.level = in nft_log_init() 166 li->u.log.level = NFT_LOGLEVEL_WARNING; in nft_log_init() 168 if (li->u.log.level > NFT_LOGLEVEL_AUDIT) { in nft_log_init() 174 li->u.log.logflags = in nft_log_init() 176 if (li->u.log.logflags & ~NF_LOG_MASK) { in nft_log_init() 196 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_init() 220 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_destroy() 236 if (nla_put_be32(skb, NFTA_LOG_LEVEL, htonl(li->u.log.level))) in nft_log_dump() 239 if (li->u.log.logflags) { in nft_log_dump() [all …]
|
D | nf_log.c | 30 struct nf_logger *log; in __find_logger() local 37 log = nft_log_dereference(loggers[pf][i]); in __find_logger() 38 if (!strncasecmp(str_logger, log->name, strlen(log->name))) in __find_logger() 39 return log; in __find_logger() 47 const struct nf_logger *log; in nf_log_set() local 53 log = nft_log_dereference(net->nf.nf_loggers[pf]); in nf_log_set() 54 if (log == NULL) in nf_log_set() 66 const struct nf_logger *log; in nf_log_unset() local 70 log = nft_log_dereference(net->nf.nf_loggers[i]); in nf_log_unset() 71 if (log == logger) in nf_log_unset() [all …]
|
D | xt_LOG.c | 36 li.u.log.level = loginfo->level; in log_tg() 37 li.u.log.logflags = loginfo->logflags; in log_tg()
|
D | nf_log_common.c | 160 '0' + loginfo->u.log.level, prefix, in nf_log_dump_packet_common()
|
D | Kconfig | 515 tristate "Netfilter nf_tables log module" 517 This option adds the "log" expression that you can use to log 1064 will log every rule which match the packets as those traverse 1504 This option allows `quota2' to log ONCE when a quota limit
|
/net/bridge/netfilter/ |
D | ebt_log.c | 87 '0' + loginfo->u.log.level, prefix, in ebt_log_packet() 93 bitmask = loginfo->u.log.logflags; in ebt_log_packet() 186 li.u.log.level = info->loglevel; in ebt_log_tg() 187 li.u.log.logflags = info->bitmask; in ebt_log_tg()
|
D | Kconfig | 223 tristate "ebt: log support" 225 This option adds the log watcher, that you can use in any rule
|
/net/ipv6/netfilter/ |
D | nf_log_ipv6.c | 28 .log = { 50 logflags = info->u.log.logflags; in dump_ipv6_packet() 293 logflags = info->u.log.logflags; in dump_ipv6_mac_header()
|
D | ip6_tables.c | 174 .log = {
|
/net/ipv4/netfilter/ |
D | nf_log_ipv4.c | 27 .log = { 44 logflags = info->u.log.logflags; in dump_ipv4_packet() 280 logflags = info->u.log.logflags; in dump_ipv4_mac_header()
|
D | nf_log_arp.c | 28 .log = {
|
/net/sched/ |
D | sch_fq.c | 703 static int fq_resize(struct Qdisc *sch, u32 log) in fq_resize() argument 710 if (q->fq_root && log == q->fq_trees_log) in fq_resize() 714 array = kvmalloc_node(sizeof(struct rb_root) << log, GFP_KERNEL | __GFP_RETRY_MAYFAIL, in fq_resize() 719 for (idx = 0; idx < (1U << log); idx++) in fq_resize() 726 fq_rehash(q, old_fq_root, q->fq_trees_log, array, log); in fq_resize() 729 q->fq_trees_log = log; in fq_resize()
|
/net/9p/ |
D | Kconfig | 44 Say Y if you want the 9P subsystem to log debug information.
|
/net/batman-adv/ |
D | Makefile | 22 batman-adv-$(CONFIG_BATMAN_ADV_DEBUG) += log.o
|
D | Kconfig | 96 outputting debugging information to the debugfs log or tracing
|
/net/ipv4/ |
D | udp.c | 131 struct sock *sk, unsigned int log) in udp_lib_lport_inuse() argument 152 __set_bit(udp_sk(sk2)->udp_port_hash >> log, in udp_lib_lport_inuse() 255 udptable->log); in udp_lib_get_port() 265 !test_bit(snum >> udptable->log, bitmap) && in udp_lib_get_port() 3004 &table->log, in udp_table_init()
|
/net/mac80211/ |
D | Kconfig | 94 printing them into the kernel log.
|