/net/openvswitch/ |
D | flow_netlink.c | 154 u64 key_attrs, u64 mask_attrs, bool log) in match_validate() argument 293 OVS_NLERR(log, "Missing key (keys=%llx, expected=%llx)", in match_validate() 301 OVS_NLERR(log, "Unexpected mask (mask=%llx, allowed=%llx)", in match_validate() 466 u64 *attrsp, bool log, bool nz) in __parse_flow_nlattrs() argument 478 OVS_NLERR(log, "Key type %d is out of range max %d", in __parse_flow_nlattrs() 484 OVS_NLERR(log, "Duplicate key (type %d).", type); in __parse_flow_nlattrs() 490 OVS_NLERR(log, "Key %d has unexpected len %d expected %d", in __parse_flow_nlattrs() 501 OVS_NLERR(log, "Message has %d unknown bytes.", rem); in __parse_flow_nlattrs() 511 bool log) in parse_flow_mask_nlattrs() argument 513 return __parse_flow_nlattrs(attr, a, attrsp, log, true); in parse_flow_mask_nlattrs() [all …]
|
D | flow_netlink.h | 36 u64 *attrsp, bool log); 39 u64 attrs, struct sw_flow_key *key, bool log); 47 bool log); 52 bool ovs_nla_get_ufid(struct sw_flow_id *, const struct nlattr *, bool log); 54 const struct sw_flow_key *key, bool log); 59 struct sw_flow_actions **sfa, bool log); 61 void *data, int len, bool log);
|
D | conntrack.c | 1347 const struct sw_flow_key *key, bool log) in ovs_ct_add_helper() argument 1356 OVS_NLERR(log, "Unknown helper \"%s\"", name); in ovs_ct_add_helper() 1372 OVS_NLERR(log, "Failed to load \"%s\" NAT helper, error: %d", in ovs_ct_add_helper() 1385 struct ovs_conntrack_info *info, bool log) in parse_nat() argument 1410 OVS_NLERR(log, "Unknown NAT attribute (type=%d, max=%d)", in parse_nat() 1416 OVS_NLERR(log, "NAT attribute type %d has unexpected length (%d != %d)", in parse_nat() 1426 OVS_NLERR(log, "Only one type of NAT may be specified"); in parse_nat() 1471 OVS_NLERR(log, "Unknown nat attribute (%d)", type); in parse_nat() 1477 OVS_NLERR(log, "NAT attribute has %d unknown bytes", rem); in parse_nat() 1483 OVS_NLERR(log, in parse_nat() [all …]
|
D | datapath.c | 581 bool log = !a[OVS_PACKET_ATTR_PROBE]; in ovs_packet_cmd_execute() local 619 packet, &flow->key, log); in ovs_packet_cmd_execute() 624 &flow->key, &acts, log); in ovs_packet_cmd_execute() 954 bool log = !a[OVS_FLOW_ATTR_PROBE]; in ovs_flow_cmd_new() local 959 OVS_NLERR(log, "Flow key attr not present in new flow."); in ovs_flow_cmd_new() 963 OVS_NLERR(log, "Flow actions attr not present in new flow."); in ovs_flow_cmd_new() 985 a[OVS_FLOW_ATTR_MASK], log); in ovs_flow_cmd_new() 993 key, log); in ovs_flow_cmd_new() 999 &new_flow->key, &acts, log); in ovs_flow_cmd_new() 1001 OVS_NLERR(log, "Flow actions may not be safe on all matching packets."); in ovs_flow_cmd_new() [all …]
|
D | conntrack.h | 21 bool log); 52 struct sw_flow_actions **acts, bool log) in ovs_ct_copy_action() argument
|
D | flow.c | 932 struct sw_flow_key *key, bool log) in ovs_flow_key_extract_userspace() argument 938 err = parse_flow_nlattrs(attr, a, &attrs, log); in ovs_flow_key_extract_userspace() 943 err = ovs_nla_get_flow_metadata(net, a, attrs, key, log); in ovs_flow_key_extract_userspace()
|
D | flow.h | 282 struct sw_flow_key *key, bool log);
|
/net/netfilter/ |
D | nfnetlink_log.c | 105 __instance_lookup(struct nfnl_log_net *log, u_int16_t group_num) in __instance_lookup() argument 110 head = &log->instance_table[instance_hashfn(group_num)]; in __instance_lookup() 125 instance_lookup_get(struct nfnl_log_net *log, u_int16_t group_num) in instance_lookup_get() argument 130 inst = __instance_lookup(log, group_num); in instance_lookup_get() 162 struct nfnl_log_net *log = nfnl_log_pernet(net); in instance_create() local 165 spin_lock_bh(&log->instances_lock); in instance_create() 166 if (__instance_lookup(log, group_num)) { in instance_create() 202 &log->instance_table[instance_hashfn(group_num)]); in instance_create() 205 spin_unlock_bh(&log->instances_lock); in instance_create() 210 spin_unlock_bh(&log->instances_lock); in instance_create() [all …]
|
D | nft_log.c | 111 priv->loginfo.u.log.level == NFT_LOGLEVEL_AUDIT) { in nft_log_eval() 177 li->u.log.level = in nft_log_init() 180 li->u.log.level = NFT_LOGLEVEL_WARNING; in nft_log_init() 182 if (li->u.log.level > NFT_LOGLEVEL_AUDIT) { in nft_log_init() 188 li->u.log.logflags = in nft_log_init() 190 if (li->u.log.logflags & ~NF_LOG_MASK) { in nft_log_init() 210 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_init() 238 if (li->u.log.level == NFT_LOGLEVEL_AUDIT) in nft_log_destroy() 254 if (nla_put_be32(skb, NFTA_LOG_LEVEL, htonl(li->u.log.level))) in nft_log_dump() 257 if (li->u.log.logflags) { in nft_log_dump() [all …]
|
D | nf_log.c | 30 struct nf_logger *log; in __find_logger() local 37 log = nft_log_dereference(loggers[pf][i]); in __find_logger() 38 if (!strncasecmp(str_logger, log->name, strlen(log->name))) in __find_logger() 39 return log; in __find_logger() 47 const struct nf_logger *log; in nf_log_set() local 53 log = nft_log_dereference(net->nf.nf_loggers[pf]); in nf_log_set() 54 if (log == NULL) in nf_log_set() 66 const struct nf_logger *log; in nf_log_unset() local 70 log = nft_log_dereference(net->nf.nf_loggers[i]); in nf_log_unset() 71 if (log == logger) in nf_log_unset() [all …]
|
D | xt_LOG.c | 36 li.u.log.level = loginfo->level; in log_tg() 37 li.u.log.logflags = loginfo->logflags; in log_tg()
|
D | nf_log_syslog.c | 29 .log = { 71 logflags = info->u.log.logflags; in dump_arp_packet() 114 '0' + loginfo->u.log.level, prefix, in nf_log_dump_packet_common() 302 logflags = info->u.log.logflags; in dump_ipv4_packet() 541 logflags = info->u.log.logflags; in dump_ipv6_packet() 777 logflags = info->u.log.logflags; in dump_ipv4_mac_header() 852 logflags = info->u.log.logflags; in dump_ipv6_mac_header()
|
D | Kconfig | 522 tristate "Netfilter nf_tables log module" 524 This option adds the "log" expression that you can use to log 1090 will log every rule which match the packets as those traverse 1530 This option allows `quota2' to log ONCE when a quota limit
|
/net/ceph/ |
D | ceph_common.c | 379 struct p_log *log) in get_secret() argument 393 error_plog(log, "Failed due to key not found: %s", in get_secret() 397 error_plog(log, "Failed due to expired key: %s", in get_secret() 401 error_plog(log, "Failed due to revoked key: %s", in get_secret() 405 error_plog(log, "Failed due to key error %d: %s", in get_secret() 427 struct p_log log = {.prefix = "libceph", .log = l}; in ceph_parse_mon_ips() local 434 error_plog(&log, "Failed to parse monitor IPs: %d", ret); in ceph_parse_mon_ips() 447 struct p_log log = {.prefix = "libceph", .log = l}; in ceph_parse_param() local 449 token = __fs_parse(&log, ceph_parameters, param, &result); in ceph_parse_param() 461 error_plog(&log, "Failed to parse ip: %d", err); in ceph_parse_param() [all …]
|
/net/ipv4/ |
D | bpf_tcp_ca.c | 101 static int bpf_tcp_ca_btf_struct_access(struct bpf_verifier_log *log, in bpf_tcp_ca_btf_struct_access() argument 110 return btf_struct_access(log, btf, t, off, size, atype, next_btf_id); in bpf_tcp_ca_btf_struct_access() 113 bpf_log(log, "only read is supported\n"); in bpf_tcp_ca_btf_struct_access() 138 bpf_log(log, "no write support to tcp_sock at off %d\n", off); in bpf_tcp_ca_btf_struct_access() 143 bpf_log(log, in bpf_tcp_ca_btf_struct_access()
|
D | udp.c | 136 struct sock *sk, unsigned int log) in udp_lib_lport_inuse() argument 157 __set_bit(udp_sk(sk2)->udp_port_hash >> log, in udp_lib_lport_inuse() 260 udptable->log); in udp_lib_get_port() 270 !test_bit(snum >> udptable->log, bitmap) && in udp_lib_get_port() 3246 &table->log, in udp_table_init()
|
/net/bridge/netfilter/ |
D | ebt_log.c | 87 '0' + loginfo->u.log.level, prefix, in ebt_log_packet() 93 bitmask = loginfo->u.log.logflags; in ebt_log_packet() 186 li.u.log.level = info->loglevel; in ebt_log_tg() 187 li.u.log.logflags = info->bitmask; in ebt_log_tg()
|
D | Kconfig | 221 tristate "ebt: log support" 223 This option adds the log watcher, that you can use in any rule
|
/net/sched/ |
D | sch_fq.c | 747 static int fq_resize(struct Qdisc *sch, u32 log) in fq_resize() argument 754 if (q->fq_root && log == q->fq_trees_log) in fq_resize() 758 array = kvmalloc_node(sizeof(struct rb_root) << log, GFP_KERNEL | __GFP_RETRY_MAYFAIL, in fq_resize() 763 for (idx = 0; idx < (1U << log); idx++) in fq_resize() 770 fq_rehash(q, old_fq_root, q->fq_trees_log, array, log); in fq_resize() 773 q->fq_trees_log = log; in fq_resize()
|
/net/batman-adv/ |
D | Makefile | 20 batman-adv-$(CONFIG_BATMAN_ADV_DEBUG) += log.o
|
/net/9p/ |
D | Kconfig | 43 Say Y if you want the 9P subsystem to log debug information.
|
/net/smc/ |
D | smc_llc.h | 85 void smc_llc_link_clear(struct smc_link *link, bool log);
|
D | smc_core.h | 454 void smcr_link_clear(struct smc_link *lnk, bool log);
|
/net/tls/ |
D | tls_device.c | 707 resync_async->log[resync_async->loglen++] = *seq; in tls_device_rx_resync_async() 718 if (req_seq == resync_async->log[i] && in tls_device_rx_resync_async()
|
/net/mac80211/ |
D | Kconfig | 94 printing them into the kernel log.
|