Home
last modified time | relevance | path

Searched refs:log (Results 1 – 25 of 29) sorted by relevance

12

/net/openvswitch/
Dflow_netlink.c154 u64 key_attrs, u64 mask_attrs, bool log) in match_validate() argument
293 OVS_NLERR(log, "Missing key (keys=%llx, expected=%llx)", in match_validate()
301 OVS_NLERR(log, "Unexpected mask (mask=%llx, allowed=%llx)", in match_validate()
466 u64 *attrsp, bool log, bool nz) in __parse_flow_nlattrs() argument
478 OVS_NLERR(log, "Key type %d is out of range max %d", in __parse_flow_nlattrs()
484 OVS_NLERR(log, "Duplicate key (type %d).", type); in __parse_flow_nlattrs()
490 OVS_NLERR(log, "Key %d has unexpected len %d expected %d", in __parse_flow_nlattrs()
501 OVS_NLERR(log, "Message has %d unknown bytes.", rem); in __parse_flow_nlattrs()
511 bool log) in parse_flow_mask_nlattrs() argument
513 return __parse_flow_nlattrs(attr, a, attrsp, log, true); in parse_flow_mask_nlattrs()
[all …]
Dflow_netlink.h36 u64 *attrsp, bool log);
39 u64 attrs, struct sw_flow_key *key, bool log);
47 bool log);
52 bool ovs_nla_get_ufid(struct sw_flow_id *, const struct nlattr *, bool log);
54 const struct sw_flow_key *key, bool log);
59 struct sw_flow_actions **sfa, bool log);
61 void *data, int len, bool log);
Dconntrack.c1347 const struct sw_flow_key *key, bool log) in ovs_ct_add_helper() argument
1356 OVS_NLERR(log, "Unknown helper \"%s\"", name); in ovs_ct_add_helper()
1372 OVS_NLERR(log, "Failed to load \"%s\" NAT helper, error: %d", in ovs_ct_add_helper()
1385 struct ovs_conntrack_info *info, bool log) in parse_nat() argument
1410 OVS_NLERR(log, "Unknown NAT attribute (type=%d, max=%d)", in parse_nat()
1416 OVS_NLERR(log, "NAT attribute type %d has unexpected length (%d != %d)", in parse_nat()
1426 OVS_NLERR(log, "Only one type of NAT may be specified"); in parse_nat()
1471 OVS_NLERR(log, "Unknown nat attribute (%d)", type); in parse_nat()
1477 OVS_NLERR(log, "NAT attribute has %d unknown bytes", rem); in parse_nat()
1483 OVS_NLERR(log, in parse_nat()
[all …]
Ddatapath.c581 bool log = !a[OVS_PACKET_ATTR_PROBE]; in ovs_packet_cmd_execute() local
619 packet, &flow->key, log); in ovs_packet_cmd_execute()
624 &flow->key, &acts, log); in ovs_packet_cmd_execute()
954 bool log = !a[OVS_FLOW_ATTR_PROBE]; in ovs_flow_cmd_new() local
959 OVS_NLERR(log, "Flow key attr not present in new flow."); in ovs_flow_cmd_new()
963 OVS_NLERR(log, "Flow actions attr not present in new flow."); in ovs_flow_cmd_new()
985 a[OVS_FLOW_ATTR_MASK], log); in ovs_flow_cmd_new()
993 key, log); in ovs_flow_cmd_new()
999 &new_flow->key, &acts, log); in ovs_flow_cmd_new()
1001 OVS_NLERR(log, "Flow actions may not be safe on all matching packets."); in ovs_flow_cmd_new()
[all …]
Dconntrack.h21 bool log);
52 struct sw_flow_actions **acts, bool log) in ovs_ct_copy_action() argument
Dflow.c932 struct sw_flow_key *key, bool log) in ovs_flow_key_extract_userspace() argument
938 err = parse_flow_nlattrs(attr, a, &attrs, log); in ovs_flow_key_extract_userspace()
943 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log); in ovs_flow_key_extract_userspace()
Dflow.h282 struct sw_flow_key *key, bool log);
/net/netfilter/
Dnfnetlink_log.c105 __instance_lookup(struct nfnl_log_net *log, u_int16_t group_num) in __instance_lookup() argument
110 head = &log->instance_table[instance_hashfn(group_num)]; in __instance_lookup()
125 instance_lookup_get(struct nfnl_log_net *log, u_int16_t group_num) in instance_lookup_get() argument
130 inst = __instance_lookup(log, group_num); in instance_lookup_get()
162 struct nfnl_log_net *log = nfnl_log_pernet(net); in instance_create() local
165 spin_lock_bh(&log->instances_lock); in instance_create()
166 if (__instance_lookup(log, group_num)) { in instance_create()
202 &log->instance_table[instance_hashfn(group_num)]); in instance_create()
205 spin_unlock_bh(&log->instances_lock); in instance_create()
210 spin_unlock_bh(&log->instances_lock); in instance_create()
[all …]
Dnft_log.c111 priv->loginfo.u.log.level == NFT_LOGLEVEL_AUDIT) { in nft_log_eval()
177 li->u.log.level = in nft_log_init()
180 li->u.log.level = NFT_LOGLEVEL_WARNING; in nft_log_init()
182 if (li->u.log.level > NFT_LOGLEVEL_AUDIT) { in nft_log_init()
188 li->u.log.logflags = in nft_log_init()
190 if (li->u.log.logflags & ~NF_LOG_MASK) { in nft_log_init()
210 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_init()
238 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_destroy()
254 if (nla_put_be32(skb, NFTA_LOG_LEVEL, htonl(li->u.log.level))) in nft_log_dump()
257 if (li->u.log.logflags) { in nft_log_dump()
[all …]
Dnf_log.c30 struct nf_logger *log; in __find_logger() local
37 log = nft_log_dereference(loggers[pf][i]); in __find_logger()
38 if (!strncasecmp(str_logger, log->name, strlen(log->name))) in __find_logger()
39 return log; in __find_logger()
47 const struct nf_logger *log; in nf_log_set() local
53 log = nft_log_dereference(net->nf.nf_loggers[pf]); in nf_log_set()
54 if (log == NULL) in nf_log_set()
66 const struct nf_logger *log; in nf_log_unset() local
70 log = nft_log_dereference(net->nf.nf_loggers[i]); in nf_log_unset()
71 if (log == logger) in nf_log_unset()
[all …]
Dxt_LOG.c36 li.u.log.level = loginfo->level; in log_tg()
37 li.u.log.logflags = loginfo->logflags; in log_tg()
Dnf_log_syslog.c29 .log = {
71 logflags = info->u.log.logflags; in dump_arp_packet()
114 '0' + loginfo->u.log.level, prefix, in nf_log_dump_packet_common()
302 logflags = info->u.log.logflags; in dump_ipv4_packet()
541 logflags = info->u.log.logflags; in dump_ipv6_packet()
777 logflags = info->u.log.logflags; in dump_ipv4_mac_header()
852 logflags = info->u.log.logflags; in dump_ipv6_mac_header()
DKconfig522 tristate "Netfilter nf_tables log module"
524 This option adds the "log" expression that you can use to log
1090 will log every rule which match the packets as those traverse
1530 This option allows `quota2' to log ONCE when a quota limit
/net/ceph/
Dceph_common.c379 struct p_log *log) in get_secret() argument
393 error_plog(log, "Failed due to key not found: %s", in get_secret()
397 error_plog(log, "Failed due to expired key: %s", in get_secret()
401 error_plog(log, "Failed due to revoked key: %s", in get_secret()
405 error_plog(log, "Failed due to key error %d: %s", in get_secret()
427 struct p_log log = {.prefix = "libceph", .log = l}; in ceph_parse_mon_ips() local
434 error_plog(&log, "Failed to parse monitor IPs: %d", ret); in ceph_parse_mon_ips()
447 struct p_log log = {.prefix = "libceph", .log = l}; in ceph_parse_param() local
449 token = __fs_parse(&log, ceph_parameters, param, &result); in ceph_parse_param()
461 error_plog(&log, "Failed to parse ip: %d", err); in ceph_parse_param()
[all …]
/net/ipv4/
Dbpf_tcp_ca.c101 static int bpf_tcp_ca_btf_struct_access(struct bpf_verifier_log *log, in bpf_tcp_ca_btf_struct_access() argument
110 return btf_struct_access(log, btf, t, off, size, atype, next_btf_id); in bpf_tcp_ca_btf_struct_access()
113 bpf_log(log, "only read is supported\n"); in bpf_tcp_ca_btf_struct_access()
138 bpf_log(log, "no write support to tcp_sock at off %d\n", off); in bpf_tcp_ca_btf_struct_access()
143 bpf_log(log, in bpf_tcp_ca_btf_struct_access()
Dudp.c136 struct sock *sk, unsigned int log) in udp_lib_lport_inuse() argument
157 __set_bit(udp_sk(sk2)->udp_port_hash >> log, in udp_lib_lport_inuse()
260 udptable->log); in udp_lib_get_port()
270 !test_bit(snum >> udptable->log, bitmap) && in udp_lib_get_port()
3246 &table->log, in udp_table_init()
/net/bridge/netfilter/
Debt_log.c87 '0' + loginfo->u.log.level, prefix, in ebt_log_packet()
93 bitmask = loginfo->u.log.logflags; in ebt_log_packet()
186 li.u.log.level = info->loglevel; in ebt_log_tg()
187 li.u.log.logflags = info->bitmask; in ebt_log_tg()
DKconfig221 tristate "ebt: log support"
223 This option adds the log watcher, that you can use in any rule
/net/sched/
Dsch_fq.c747 static int fq_resize(struct Qdisc *sch, u32 log) in fq_resize() argument
754 if (q->fq_root && log == q->fq_trees_log) in fq_resize()
758 array = kvmalloc_node(sizeof(struct rb_root) << log, GFP_KERNEL | __GFP_RETRY_MAYFAIL, in fq_resize()
763 for (idx = 0; idx < (1U << log); idx++) in fq_resize()
770 fq_rehash(q, old_fq_root, q->fq_trees_log, array, log); in fq_resize()
773 q->fq_trees_log = log; in fq_resize()
/net/batman-adv/
DMakefile20 batman-adv-$(CONFIG_BATMAN_ADV_DEBUG) += log.o
/net/9p/
DKconfig43 Say Y if you want the 9P subsystem to log debug information.
/net/smc/
Dsmc_llc.h85 void smc_llc_link_clear(struct smc_link *link, bool log);
Dsmc_core.h454 void smcr_link_clear(struct smc_link *lnk, bool log);
/net/tls/
Dtls_device.c707 resync_async->log[resync_async->loglen++] = *seq; in tls_device_rx_resync_async()
718 if (req_seq == resync_async->log[i] && in tls_device_rx_resync_async()
/net/mac80211/
DKconfig94 printing them into the kernel log.

12