Skip to content

Commit af8380d

Browse files
mykyta5anakryiko
authored andcommitted
libbpf: Stringify errno in log messages in btf*.c
Convert numeric error codes into the string representations in log messages in btf.c and btf_dump.c. Signed-off-by: Mykyta Yatsenko <[email protected]> Signed-off-by: Andrii Nakryiko <[email protected]> Link: https://lore.kernel.org/bpf/[email protected]
1 parent 271abf0 commit af8380d

File tree

2 files changed

+16
-13
lines changed

2 files changed

+16
-13
lines changed

tools/lib/bpf/btf.c

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@
2222
#include "libbpf_internal.h"
2323
#include "hashmap.h"
2424
#include "strset.h"
25+
#include "str_error.h"
2526

2627
#define BTF_MAX_NR_TYPES 0x7fffffffU
2728
#define BTF_MAX_STR_OFFSET 0x7fffffffU
@@ -1179,7 +1180,7 @@ static struct btf *btf_parse_elf(const char *path, struct btf *base_btf,
11791180
fd = open(path, O_RDONLY | O_CLOEXEC);
11801181
if (fd < 0) {
11811182
err = -errno;
1182-
pr_warn("failed to open %s: %s\n", path, strerror(errno));
1183+
pr_warn("failed to open %s: %s\n", path, errstr(err));
11831184
return ERR_PTR(err);
11841185
}
11851186

@@ -1445,7 +1446,7 @@ int btf_load_into_kernel(struct btf *btf,
14451446
goto retry_load;
14461447

14471448
err = -errno;
1448-
pr_warn("BTF loading error: %d\n", err);
1449+
pr_warn("BTF loading error: %s\n", errstr(err));
14491450
/* don't print out contents of custom log_buf */
14501451
if (!log_buf && buf[0])
14511452
pr_warn("-- BEGIN BTF LOAD LOG ---\n%s\n-- END BTF LOAD LOG --\n", buf);
@@ -3464,42 +3465,42 @@ int btf__dedup(struct btf *btf, const struct btf_dedup_opts *opts)
34643465

34653466
err = btf_dedup_prep(d);
34663467
if (err) {
3467-
pr_debug("btf_dedup_prep failed:%d\n", err);
3468+
pr_debug("btf_dedup_prep failed: %s\n", errstr(err));
34683469
goto done;
34693470
}
34703471
err = btf_dedup_strings(d);
34713472
if (err < 0) {
3472-
pr_debug("btf_dedup_strings failed:%d\n", err);
3473+
pr_debug("btf_dedup_strings failed: %s\n", errstr(err));
34733474
goto done;
34743475
}
34753476
err = btf_dedup_prim_types(d);
34763477
if (err < 0) {
3477-
pr_debug("btf_dedup_prim_types failed:%d\n", err);
3478+
pr_debug("btf_dedup_prim_types failed: %s\n", errstr(err));
34783479
goto done;
34793480
}
34803481
err = btf_dedup_struct_types(d);
34813482
if (err < 0) {
3482-
pr_debug("btf_dedup_struct_types failed:%d\n", err);
3483+
pr_debug("btf_dedup_struct_types failed: %s\n", errstr(err));
34833484
goto done;
34843485
}
34853486
err = btf_dedup_resolve_fwds(d);
34863487
if (err < 0) {
3487-
pr_debug("btf_dedup_resolve_fwds failed:%d\n", err);
3488+
pr_debug("btf_dedup_resolve_fwds failed: %s\n", errstr(err));
34883489
goto done;
34893490
}
34903491
err = btf_dedup_ref_types(d);
34913492
if (err < 0) {
3492-
pr_debug("btf_dedup_ref_types failed:%d\n", err);
3493+
pr_debug("btf_dedup_ref_types failed: %s\n", errstr(err));
34933494
goto done;
34943495
}
34953496
err = btf_dedup_compact_types(d);
34963497
if (err < 0) {
3497-
pr_debug("btf_dedup_compact_types failed:%d\n", err);
3498+
pr_debug("btf_dedup_compact_types failed: %s\n", errstr(err));
34983499
goto done;
34993500
}
35003501
err = btf_dedup_remap_types(d);
35013502
if (err < 0) {
3502-
pr_debug("btf_dedup_remap_types failed:%d\n", err);
3503+
pr_debug("btf_dedup_remap_types failed: %s\n", errstr(err));
35033504
goto done;
35043505
}
35053506

@@ -5218,7 +5219,8 @@ struct btf *btf__load_vmlinux_btf(void)
52185219
btf = btf__parse(sysfs_btf_path, NULL);
52195220
if (!btf) {
52205221
err = -errno;
5221-
pr_warn("failed to read kernel BTF from '%s': %d\n", sysfs_btf_path, err);
5222+
pr_warn("failed to read kernel BTF from '%s': %s\n",
5223+
sysfs_btf_path, errstr(err));
52225224
return libbpf_err_ptr(err);
52235225
}
52245226
pr_debug("loaded kernel BTF from '%s'\n", sysfs_btf_path);
@@ -5235,7 +5237,7 @@ struct btf *btf__load_vmlinux_btf(void)
52355237

52365238
btf = btf__parse(path, NULL);
52375239
err = libbpf_get_error(btf);
5238-
pr_debug("loading kernel BTF '%s': %d\n", path, err);
5240+
pr_debug("loading kernel BTF '%s': %s\n", path, errstr(err));
52395241
if (err)
52405242
continue;
52415243

tools/lib/bpf/btf_dump.c

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,7 @@
2121
#include "hashmap.h"
2222
#include "libbpf.h"
2323
#include "libbpf_internal.h"
24+
#include "str_error.h"
2425

2526
static const char PREFIXES[] = "\t\t\t\t\t\t\t\t\t\t\t\t\t";
2627
static const size_t PREFIX_CNT = sizeof(PREFIXES) - 1;
@@ -1304,7 +1305,7 @@ static void btf_dump_emit_type_decl(struct btf_dump *d, __u32 id,
13041305
* chain, restore stack, emit warning, and try to
13051306
* proceed nevertheless
13061307
*/
1307-
pr_warn("not enough memory for decl stack: %d\n", err);
1308+
pr_warn("not enough memory for decl stack: %s\n", errstr(err));
13081309
d->decl_stack_cnt = stack_start;
13091310
return;
13101311
}

0 commit comments

Comments
 (0)