For kernel logging macro, pr_warning is completely removed and
replaced by pr_warn, using pr_warn in tools lib bpf for symmetry
to kernel logging macro, then we could drop pr_warning in the
whole linux code.

Cc: Alexei Starovoitov <a...@kernel.org>
Cc: Daniel Borkmann <dan...@iogearbox.net>
Cc: Martin KaFai Lau <ka...@fb.com>
Cc: Song Liu <songliubrav...@fb.com>
Cc: Yonghong Song <y...@fb.com>
Cc: b...@vger.kernel.org
Signed-off-by: Kefeng Wang <wangkefeng.w...@huawei.com>
---
 tools/lib/bpf/btf.c             |  56 +--
 tools/lib/bpf/btf_dump.c        |  20 +-
 tools/lib/bpf/libbpf.c          | 652 ++++++++++++++++----------------
 tools/lib/bpf/libbpf_internal.h |   2 +-
 tools/lib/bpf/xsk.c             |   4 +-
 5 files changed, 363 insertions(+), 371 deletions(-)

diff --git a/tools/lib/bpf/btf.c b/tools/lib/bpf/btf.c
index 1aa189a9112a..801dac6f493d 100644
--- a/tools/lib/bpf/btf.c
+++ b/tools/lib/bpf/btf.c
@@ -390,14 +390,14 @@ struct btf *btf__parse_elf(const char *path, struct 
btf_ext **btf_ext)
        GElf_Ehdr ehdr;
 
        if (elf_version(EV_CURRENT) == EV_NONE) {
-               pr_warning("failed to init libelf for %s\n", path);
+               pr_warn("failed to init libelf for %s\n", path);
                return ERR_PTR(-LIBBPF_ERRNO__LIBELF);
        }
 
        fd = open(path, O_RDONLY);
        if (fd < 0) {
                err = -errno;
-               pr_warning("failed to open %s: %s\n", path, strerror(errno));
+               pr_warn("failed to open %s: %s\n", path, strerror(errno));
                return ERR_PTR(err);
        }
 
@@ -405,19 +405,19 @@ struct btf *btf__parse_elf(const char *path, struct 
btf_ext **btf_ext)
 
        elf = elf_begin(fd, ELF_C_READ, NULL);
        if (!elf) {
-               pr_warning("failed to open %s as ELF file\n", path);
+               pr_warn("failed to open %s as ELF file\n", path);
                goto done;
        }
        if (!gelf_getehdr(elf, &ehdr)) {
-               pr_warning("failed to get EHDR from %s\n", path);
+               pr_warn("failed to get EHDR from %s\n", path);
                goto done;
        }
        if (!btf_check_endianness(&ehdr)) {
-               pr_warning("non-native ELF endianness is not supported\n");
+               pr_warn("non-native ELF endianness is not supported\n");
                goto done;
        }
        if (!elf_rawdata(elf_getscn(elf, ehdr.e_shstrndx), NULL)) {
-               pr_warning("failed to get e_shstrndx from %s\n", path);
+               pr_warn("failed to get e_shstrndx from %s\n", path);
                goto done;
        }
 
@@ -427,29 +427,29 @@ struct btf *btf__parse_elf(const char *path, struct 
btf_ext **btf_ext)
 
                idx++;
                if (gelf_getshdr(scn, &sh) != &sh) {
-                       pr_warning("failed to get section(%d) header from %s\n",
-                                  idx, path);
+                       pr_warn("failed to get section(%d) header from %s\n",
+                               idx, path);
                        goto done;
                }
                name = elf_strptr(elf, ehdr.e_shstrndx, sh.sh_name);
                if (!name) {
-                       pr_warning("failed to get section(%d) name from %s\n",
-                                  idx, path);
+                       pr_warn("failed to get section(%d) name from %s\n",
+                               idx, path);
                        goto done;
                }
                if (strcmp(name, BTF_ELF_SEC) == 0) {
                        btf_data = elf_getdata(scn, 0);
                        if (!btf_data) {
-                               pr_warning("failed to get section(%d, %s) data 
from %s\n",
-                                          idx, name, path);
+                               pr_warn("failed to get section(%d, %s) data 
from %s\n",
+                                       idx, name, path);
                                goto done;
                        }
                        continue;
                } else if (btf_ext && strcmp(name, BTF_EXT_ELF_SEC) == 0) {
                        btf_ext_data = elf_getdata(scn, 0);
                        if (!btf_ext_data) {
-                               pr_warning("failed to get section(%d, %s) data 
from %s\n",
-                                          idx, name, path);
+                               pr_warn("failed to get section(%d, %s) data 
from %s\n",
+                                       idx, name, path);
                                goto done;
                        }
                        continue;
@@ -600,9 +600,9 @@ int btf__load(struct btf *btf)
                               log_buf, log_buf_size, false);
        if (btf->fd < 0) {
                err = -errno;
-               pr_warning("Error loading BTF: %s(%d)\n", strerror(errno), 
errno);
+               pr_warn("Error loading BTF: %s(%d)\n", strerror(errno), errno);
                if (*log_buf)
-                       pr_warning("%s\n", log_buf);
+                       pr_warn("%s\n", log_buf);
                goto done;
        }
 
@@ -707,8 +707,8 @@ int btf__get_map_kv_tids(const struct btf *btf, const char 
*map_name,
 
        if (snprintf(container_name, max_name, "____btf_map_%s", map_name) ==
            max_name) {
-               pr_warning("map:%s length of '____btf_map_%s' is too long\n",
-                          map_name, map_name);
+               pr_warn("map:%s length of '____btf_map_%s' is too long\n",
+                       map_name, map_name);
                return -EINVAL;
        }
 
@@ -721,14 +721,14 @@ int btf__get_map_kv_tids(const struct btf *btf, const 
char *map_name,
 
        container_type = btf__type_by_id(btf, container_id);
        if (!container_type) {
-               pr_warning("map:%s cannot find BTF type for container_id:%u\n",
-                          map_name, container_id);
+               pr_warn("map:%s cannot find BTF type for container_id:%u\n",
+                       map_name, container_id);
                return -EINVAL;
        }
 
        if (!btf_is_struct(container_type) || btf_vlen(container_type) < 2) {
-               pr_warning("map:%s container_name:%s is an invalid container 
struct\n",
-                          map_name, container_name);
+               pr_warn("map:%s container_name:%s is an invalid container 
struct\n",
+                       map_name, container_name);
                return -EINVAL;
        }
 
@@ -737,25 +737,25 @@ int btf__get_map_kv_tids(const struct btf *btf, const 
char *map_name,
 
        key_size = btf__resolve_size(btf, key->type);
        if (key_size < 0) {
-               pr_warning("map:%s invalid BTF key_type_size\n", map_name);
+               pr_warn("map:%s invalid BTF key_type_size\n", map_name);
                return key_size;
        }
 
        if (expected_key_size != key_size) {
-               pr_warning("map:%s btf_key_type_size:%u != 
map_def_key_size:%u\n",
-                          map_name, (__u32)key_size, expected_key_size);
+               pr_warn("map:%s btf_key_type_size:%u != map_def_key_size:%u\n",
+                       map_name, (__u32)key_size, expected_key_size);
                return -EINVAL;
        }
 
        value_size = btf__resolve_size(btf, value->type);
        if (value_size < 0) {
-               pr_warning("map:%s invalid BTF value_type_size\n", map_name);
+               pr_warn("map:%s invalid BTF value_type_size\n", map_name);
                return value_size;
        }
 
        if (expected_value_size != value_size) {
-               pr_warning("map:%s btf_value_type_size:%u != 
map_def_value_size:%u\n",
-                          map_name, (__u32)value_size, expected_value_size);
+               pr_warn("map:%s btf_value_type_size:%u != 
map_def_value_size:%u\n",
+                       map_name, (__u32)value_size, expected_value_size);
                return -EINVAL;
        }
 
diff --git a/tools/lib/bpf/btf_dump.c b/tools/lib/bpf/btf_dump.c
index 715967762312..81793ab4b6a1 100644
--- a/tools/lib/bpf/btf_dump.c
+++ b/tools/lib/bpf/btf_dump.c
@@ -347,7 +347,7 @@ static int btf_dump_order_type(struct btf_dump *d, __u32 
id, bool through_ptr)
                /* type loop, but resolvable through fwd declaration */
                if (btf_is_composite(t) && through_ptr && t->name_off != 0)
                        return 0;
-               pr_warning("unsatisfiable type cycle, id:[%u]\n", id);
+               pr_warn("unsatisfiable type cycle, id:[%u]\n", id);
                return -ELOOP;
        }
 
@@ -537,7 +537,7 @@ static void btf_dump_emit_type(struct btf_dump *d, __u32 
id, __u32 cont_id)
        kind = btf_kind(t);
 
        if (top_level_def && t->name_off == 0) {
-               pr_warning("unexpected nameless definition, id:[%u]\n", id);
+               pr_warn("unexpected nameless definition, id:[%u]\n", id);
                return;
        }
 
@@ -555,8 +555,8 @@ static void btf_dump_emit_type(struct btf_dump *d, __u32 
id, __u32 cont_id)
                        if (id == cont_id)
                                return;
                        if (t->name_off == 0) {
-                               pr_warning("anonymous struct/union loop, 
id:[%u]\n",
-                                          id);
+                               pr_warn("anonymous struct/union loop, 
id:[%u]\n",
+                                       id);
                                return;
                        }
                        btf_dump_emit_struct_fwd(d, id, t);
@@ -701,7 +701,7 @@ static int btf_align_of(const struct btf *btf, __u32 id)
                return align;
        }
        default:
-               pr_warning("unsupported BTF_KIND:%u\n", btf_kind(t));
+               pr_warn("unsupported BTF_KIND:%u\n", btf_kind(t));
                return 1;
        }
 }
@@ -969,7 +969,7 @@ static void btf_dump_emit_type_decl(struct btf_dump *d, 
__u32 id,
                         * chain, restore stack, emit warning, and try to
                         * proceed nevertheless
                         */
-                       pr_warning("not enough memory for decl stack:%d", err);
+                       pr_warn("not enough memory for decl stack:%d", err);
                        d->decl_stack_cnt = stack_start;
                        return;
                }
@@ -998,8 +998,8 @@ static void btf_dump_emit_type_decl(struct btf_dump *d, 
__u32 id,
                case BTF_KIND_TYPEDEF:
                        goto done;
                default:
-                       pr_warning("unexpected type in decl chain, kind:%u, 
id:[%u]\n",
-                                  btf_kind(t), id);
+                       pr_warn("unexpected type in decl chain, kind:%u, 
id:[%u]\n",
+                               btf_kind(t), id);
                        goto done;
                }
        }
@@ -1224,8 +1224,8 @@ static void btf_dump_emit_type_chain(struct btf_dump *d,
                        return;
                }
                default:
-                       pr_warning("unexpected type in decl chain, kind:%u, 
id:[%u]\n",
-                                  kind, id);
+                       pr_warn("unexpected type in decl chain, kind:%u, 
id:[%u]\n",
+                               kind, id);
                        return;
                }
 
diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
index e0276520171b..cfec30390603 100644
--- a/tools/lib/bpf/libbpf.c
+++ b/tools/lib/bpf/libbpf.c
@@ -310,8 +310,8 @@ void bpf_program__unload(struct bpf_program *prog)
                for (i = 0; i < prog->instances.nr; i++)
                        zclose(prog->instances.fds[i]);
        } else if (prog->instances.nr != -1) {
-               pr_warning("Internal error: instances.nr is %d\n",
-                          prog->instances.nr);
+               pr_warn("Internal error: instances.nr is %d\n",
+                       prog->instances.nr);
        }
 
        prog->instances.nr = -1;
@@ -362,8 +362,8 @@ bpf_program__init(void *data, size_t size, char 
*section_name, int idx,
        const size_t bpf_insn_sz = sizeof(struct bpf_insn);
 
        if (size == 0 || size % bpf_insn_sz) {
-               pr_warning("corrupted section '%s', size: %zu\n",
-                          section_name, size);
+               pr_warn("corrupted section '%s', size: %zu\n",
+                       section_name, size);
                return -EINVAL;
        }
 
@@ -371,22 +371,22 @@ bpf_program__init(void *data, size_t size, char 
*section_name, int idx,
 
        prog->section_name = strdup(section_name);
        if (!prog->section_name) {
-               pr_warning("failed to alloc name for prog under section(%d) 
%s\n",
-                          idx, section_name);
+               pr_warn("failed to alloc name for prog under section(%d) %s\n",
+                       idx, section_name);
                goto errout;
        }
 
        prog->pin_name = __bpf_program__pin_name(prog);
        if (!prog->pin_name) {
-               pr_warning("failed to alloc pin name for prog under section(%d) 
%s\n",
-                          idx, section_name);
+               pr_warn("failed to alloc pin name for prog under section(%d) 
%s\n",
+                       idx, section_name);
                goto errout;
        }
 
        prog->insns = malloc(size);
        if (!prog->insns) {
-               pr_warning("failed to alloc insns for prog under section %s\n",
-                          section_name);
+               pr_warn("failed to alloc insns for prog under section %s\n",
+                       section_name);
                goto errout;
        }
        prog->insns_cnt = size / bpf_insn_sz;
@@ -424,8 +424,8 @@ bpf_object__add_program(struct bpf_object *obj, void *data, 
size_t size,
                 * is still valid, so don't need special treat for
                 * bpf_close_object().
                 */
-               pr_warning("failed to alloc a new program under section '%s'\n",
-                          section_name);
+               pr_warn("failed to alloc a new program under section '%s'\n",
+                       section_name);
                bpf_program__exit(&prog);
                return -ENOMEM;
        }
@@ -465,8 +465,8 @@ bpf_object__init_prog_names(struct bpf_object *obj)
                                          obj->efile.strtabidx,
                                          sym.st_name);
                        if (!name) {
-                               pr_warning("failed to get sym name string for 
prog %s\n",
-                                          prog->section_name);
+                               pr_warn("failed to get sym name string for prog 
%s\n",
+                                       prog->section_name);
                                return -LIBBPF_ERRNO__LIBELF;
                        }
                }
@@ -475,15 +475,15 @@ bpf_object__init_prog_names(struct bpf_object *obj)
                        name = ".text";
 
                if (!name) {
-                       pr_warning("failed to find sym for prog %s\n",
-                                  prog->section_name);
+                       pr_warn("failed to find sym for prog %s\n",
+                               prog->section_name);
                        return -EINVAL;
                }
 
                prog->name = strdup(name);
                if (!prog->name) {
-                       pr_warning("failed to allocate memory for prog sym 
%s\n",
-                                  name);
+                       pr_warn("failed to allocate memory for prog sym %s\n",
+                               name);
                        return -ENOMEM;
                }
        }
@@ -500,7 +500,7 @@ static struct bpf_object *bpf_object__new(const char *path,
 
        obj = calloc(1, sizeof(struct bpf_object) + strlen(path) + 1);
        if (!obj) {
-               pr_warning("alloc memory failed for %s\n", path);
+               pr_warn("alloc memory failed for %s\n", path);
                return ERR_PTR(-ENOMEM);
        }
 
@@ -560,7 +560,7 @@ static int bpf_object__elf_init(struct bpf_object *obj)
        GElf_Ehdr *ep;
 
        if (obj_elf_valid(obj)) {
-               pr_warning("elf init: internal error\n");
+               pr_warn("elf init: internal error\n");
                return -LIBBPF_ERRNO__LIBELF;
        }
 
@@ -578,7 +578,7 @@ static int bpf_object__elf_init(struct bpf_object *obj)
 
                        err = -errno;
                        cp = libbpf_strerror_r(err, errmsg, sizeof(errmsg));
-                       pr_warning("failed to open %s: %s\n", obj->path, cp);
+                       pr_warn("failed to open %s: %s\n", obj->path, cp);
                        return err;
                }
 
@@ -587,13 +587,13 @@ static int bpf_object__elf_init(struct bpf_object *obj)
        }
 
        if (!obj->efile.elf) {
-               pr_warning("failed to open %s as ELF file\n", obj->path);
+               pr_warn("failed to open %s as ELF file\n", obj->path);
                err = -LIBBPF_ERRNO__LIBELF;
                goto errout;
        }
 
        if (!gelf_getehdr(obj->efile.elf, &obj->efile.ehdr)) {
-               pr_warning("failed to get EHDR from %s\n", obj->path);
+               pr_warn("failed to get EHDR from %s\n", obj->path);
                err = -LIBBPF_ERRNO__FORMAT;
                goto errout;
        }
@@ -602,7 +602,7 @@ static int bpf_object__elf_init(struct bpf_object *obj)
        /* Old LLVM set e_machine to EM_NONE */
        if (ep->e_type != ET_REL ||
            (ep->e_machine && ep->e_machine != EM_BPF)) {
-               pr_warning("%s is not an eBPF object file\n", obj->path);
+               pr_warn("%s is not an eBPF object file\n", obj->path);
                err = -LIBBPF_ERRNO__FORMAT;
                goto errout;
        }
@@ -624,7 +624,7 @@ static int bpf_object__check_endianness(struct bpf_object 
*obj)
 #else
 # error "Unrecognized __BYTE_ORDER__"
 #endif
-       pr_warning("endianness mismatch.\n");
+       pr_warn("endianness mismatch.\n");
        return -LIBBPF_ERRNO__ENDIAN;
 }
 
@@ -642,7 +642,7 @@ bpf_object__init_kversion(struct bpf_object *obj, void 
*data, size_t size)
        __u32 kver;
 
        if (size != sizeof(kver)) {
-               pr_warning("invalid kver section in %s\n", obj->path);
+               pr_warn("invalid kver section in %s\n", obj->path);
                return -LIBBPF_ERRNO__FORMAT;
        }
        memcpy(&kver, data, sizeof(kver));
@@ -684,15 +684,15 @@ static int bpf_object_search_section_size(const struct 
bpf_object *obj,
 
                idx++;
                if (gelf_getshdr(scn, &sh) != &sh) {
-                       pr_warning("failed to get section(%d) header from %s\n",
-                                  idx, obj->path);
+                       pr_warn("failed to get section(%d) header from %s\n",
+                               idx, obj->path);
                        return -EIO;
                }
 
                sec_name = elf_strptr(elf, ep->e_shstrndx, sh.sh_name);
                if (!sec_name) {
-                       pr_warning("failed to get section(%d) name from %s\n",
-                                  idx, obj->path);
+                       pr_warn("failed to get section(%d) name from %s\n",
+                               idx, obj->path);
                        return -EIO;
                }
 
@@ -701,8 +701,8 @@ static int bpf_object_search_section_size(const struct 
bpf_object *obj,
 
                data = elf_getdata(scn, 0);
                if (!data) {
-                       pr_warning("failed to get section(%d) data from 
%s(%s)\n",
-                                  idx, name, obj->path);
+                       pr_warn("failed to get section(%d) data from %s(%s)\n",
+                               idx, name, obj->path);
                        return -EIO;
                }
 
@@ -762,8 +762,8 @@ int bpf_object__variable_offset(const struct bpf_object 
*obj, const char *name,
                sname = elf_strptr(obj->efile.elf, obj->efile.strtabidx,
                                   sym.st_name);
                if (!sname) {
-                       pr_warning("failed to get sym name string for var %s\n",
-                                  name);
+                       pr_warn("failed to get sym name string for var %s\n",
+                               name);
                        return -EIO;
                }
                if (strcmp(name, sname) == 0) {
@@ -787,7 +787,7 @@ static struct bpf_map *bpf_object__add_map(struct 
bpf_object *obj)
        new_cap = max((size_t)4, obj->maps_cap * 3 / 2);
        new_maps = realloc(obj->maps, new_cap * sizeof(*obj->maps));
        if (!new_maps) {
-               pr_warning("alloc maps for object failed\n");
+               pr_warn("alloc maps for object failed\n");
                return ERR_PTR(-ENOMEM);
        }
 
@@ -828,7 +828,7 @@ bpf_object__init_internal_map(struct bpf_object *obj, enum 
libbpf_map_type type,
                 libbpf_type_to_btf_name[type]);
        map->name = strdup(map_name);
        if (!map->name) {
-               pr_warning("failed to alloc map name\n");
+               pr_warn("failed to alloc map name\n");
                return -ENOMEM;
        }
        pr_debug("map '%s' (global data): at sec_idx %d, offset %zu.\n",
@@ -844,7 +844,7 @@ bpf_object__init_internal_map(struct bpf_object *obj, enum 
libbpf_map_type type,
                *data_buff = malloc(data->d_size);
                if (!*data_buff) {
                        zfree(&map->name);
-                       pr_warning("failed to alloc map content buffer\n");
+                       pr_warn("failed to alloc map content buffer\n");
                        return -ENOMEM;
                }
                memcpy(*data_buff, data->d_buf, data->d_size);
@@ -906,8 +906,8 @@ static int bpf_object__init_user_maps(struct bpf_object 
*obj, bool strict)
        if (scn)
                data = elf_getdata(scn, NULL);
        if (!scn || !data) {
-               pr_warning("failed to get Elf_Data from map section %d\n",
-                          obj->efile.maps_shndx);
+               pr_warn("failed to get Elf_Data from map section %d\n",
+                       obj->efile.maps_shndx);
                return -EINVAL;
        }
 
@@ -934,9 +934,9 @@ static int bpf_object__init_user_maps(struct bpf_object 
*obj, bool strict)
 
        map_def_sz = data->d_size / nr_maps;
        if (!data->d_size || (data->d_size % nr_maps) != 0) {
-               pr_warning("unable to determine map definition size "
-                          "section %s, %d maps in %zd bytes\n",
-                          obj->path, nr_maps, data->d_size);
+               pr_warn("unable to determine map definition size "
+                       "section %s, %d maps in %zd bytes\n",
+                       obj->path, nr_maps, data->d_size);
                return -EINVAL;
        }
 
@@ -959,8 +959,8 @@ static int bpf_object__init_user_maps(struct bpf_object 
*obj, bool strict)
                map_name = elf_strptr(obj->efile.elf, obj->efile.strtabidx,
                                      sym.st_name);
                if (!map_name) {
-                       pr_warning("failed to get map #%d name sym string for 
obj %s\n",
-                                  i, obj->path);
+                       pr_warn("failed to get map #%d name sym string for obj 
%s\n",
+                               i, obj->path);
                        return -LIBBPF_ERRNO__FORMAT;
                }
 
@@ -970,14 +970,14 @@ static int bpf_object__init_user_maps(struct bpf_object 
*obj, bool strict)
                pr_debug("map '%s' (legacy): at sec_idx %d, offset %zu.\n",
                         map_name, map->sec_idx, map->sec_offset);
                if (sym.st_value + map_def_sz > data->d_size) {
-                       pr_warning("corrupted maps section in %s: last map 
\"%s\" too small\n",
-                                  obj->path, map_name);
+                       pr_warn("corrupted maps section in %s: last map \"%s\" 
too small\n",
+                               obj->path, map_name);
                        return -EINVAL;
                }
 
                map->name = strdup(map_name);
                if (!map->name) {
-                       pr_warning("failed to alloc map name\n");
+                       pr_warn("failed to alloc map name\n");
                        return -ENOMEM;
                }
                pr_debug("map %d is \"%s\"\n", i, map->name);
@@ -1001,10 +1001,10 @@ static int bpf_object__init_user_maps(struct bpf_object 
*obj, bool strict)
                        for (b = ((char *)def) + sizeof(struct bpf_map_def);
                             b < ((char *)def) + map_def_sz; b++) {
                                if (*b != 0) {
-                                       pr_warning("maps section in %s: \"%s\" "
-                                                  "has unrecognized, non-zero "
-                                                  "options\n",
-                                                  obj->path, map_name);
+                                       pr_warn("maps section in %s: \"%s\" "
+                                               "has unrecognized, non-zero "
+                                               "options\n",
+                                               obj->path, map_name);
                                        if (strict)
                                                return -EINVAL;
                                }
@@ -1048,20 +1048,20 @@ static bool get_map_field_int(const char *map_name, 
const struct btf *btf,
        const struct btf_type *arr_t;
 
        if (!btf_is_ptr(t)) {
-               pr_warning("map '%s': attr '%s': expected PTR, got %u.\n",
-                          map_name, name, btf_kind(t));
+               pr_warn("map '%s': attr '%s': expected PTR, got %u.\n",
+                       map_name, name, btf_kind(t));
                return false;
        }
 
        arr_t = btf__type_by_id(btf, t->type);
        if (!arr_t) {
-               pr_warning("map '%s': attr '%s': type [%u] not found.\n",
-                          map_name, name, t->type);
+               pr_warn("map '%s': attr '%s': type [%u] not found.\n",
+                       map_name, name, t->type);
                return false;
        }
        if (!btf_is_array(arr_t)) {
-               pr_warning("map '%s': attr '%s': expected ARRAY, got %u.\n",
-                          map_name, name, btf_kind(arr_t));
+               pr_warn("map '%s': attr '%s': expected ARRAY, got %u.\n",
+                       map_name, name, btf_kind(arr_t));
                return false;
        }
        arr_info = btf_array(arr_t);
@@ -1089,33 +1089,33 @@ static int bpf_object__init_user_btf_map(struct 
bpf_object *obj,
        vlen = btf_vlen(var);
 
        if (map_name == NULL || map_name[0] == '\0') {
-               pr_warning("map #%d: empty name.\n", var_idx);
+               pr_warn("map #%d: empty name.\n", var_idx);
                return -EINVAL;
        }
        if ((__u64)vi->offset + vi->size > data->d_size) {
-               pr_warning("map '%s' BTF data is corrupted.\n", map_name);
+               pr_warn("map '%s' BTF data is corrupted.\n", map_name);
                return -EINVAL;
        }
        if (!btf_is_var(var)) {
-               pr_warning("map '%s': unexpected var kind %u.\n",
-                          map_name, btf_kind(var));
+               pr_warn("map '%s': unexpected var kind %u.\n",
+                       map_name, btf_kind(var));
                return -EINVAL;
        }
        if (var_extra->linkage != BTF_VAR_GLOBAL_ALLOCATED &&
            var_extra->linkage != BTF_VAR_STATIC) {
-               pr_warning("map '%s': unsupported var linkage %u.\n",
-                          map_name, var_extra->linkage);
+               pr_warn("map '%s': unsupported var linkage %u.\n",
+                       map_name, var_extra->linkage);
                return -EOPNOTSUPP;
        }
 
        def = skip_mods_and_typedefs(obj->btf, var->type, NULL);
        if (!btf_is_struct(def)) {
-               pr_warning("map '%s': unexpected def kind %u.\n",
-                          map_name, btf_kind(var));
+               pr_warn("map '%s': unexpected def kind %u.\n",
+                       map_name, btf_kind(var));
                return -EINVAL;
        }
        if (def->size > vi->size) {
-               pr_warning("map '%s': invalid def size.\n", map_name);
+               pr_warn("map '%s': invalid def size.\n", map_name);
                return -EINVAL;
        }
 
@@ -1124,7 +1124,7 @@ static int bpf_object__init_user_btf_map(struct 
bpf_object *obj,
                return PTR_ERR(map);
        map->name = strdup(map_name);
        if (!map->name) {
-               pr_warning("map '%s': failed to alloc map name.\n", map_name);
+               pr_warn("map '%s': failed to alloc map name.\n", map_name);
                return -ENOMEM;
        }
        map->libbpf_type = LIBBPF_MAP_UNSPEC;
@@ -1140,8 +1140,7 @@ static int bpf_object__init_user_btf_map(struct 
bpf_object *obj,
                const char *name = btf__name_by_offset(obj->btf, m->name_off);
 
                if (!name) {
-                       pr_warning("map '%s': invalid field #%d.\n",
-                                  map_name, i);
+                       pr_warn("map '%s': invalid field #%d.\n", map_name, i);
                        return -EINVAL;
                }
                if (strcmp(name, "type") == 0) {
@@ -1171,8 +1170,8 @@ static int bpf_object__init_user_btf_map(struct 
bpf_object *obj,
                        pr_debug("map '%s': found key_size = %u.\n",
                                 map_name, sz);
                        if (map->def.key_size && map->def.key_size != sz) {
-                               pr_warning("map '%s': conflicting key size %u 
!= %u.\n",
-                                          map_name, map->def.key_size, sz);
+                               pr_warn("map '%s': conflicting key size %u != 
%u.\n",
+                                       map_name, map->def.key_size, sz);
                                return -EINVAL;
                        }
                        map->def.key_size = sz;
@@ -1181,26 +1180,26 @@ static int bpf_object__init_user_btf_map(struct 
bpf_object *obj,
 
                        t = btf__type_by_id(obj->btf, m->type);
                        if (!t) {
-                               pr_warning("map '%s': key type [%d] not 
found.\n",
-                                          map_name, m->type);
+                               pr_warn("map '%s': key type [%d] not found.\n",
+                                       map_name, m->type);
                                return -EINVAL;
                        }
                        if (!btf_is_ptr(t)) {
-                               pr_warning("map '%s': key spec is not PTR: 
%u.\n",
-                                          map_name, btf_kind(t));
+                               pr_warn("map '%s': key spec is not PTR: %u.\n",
+                                       map_name, btf_kind(t));
                                return -EINVAL;
                        }
                        sz = btf__resolve_size(obj->btf, t->type);
                        if (sz < 0) {
-                               pr_warning("map '%s': can't determine key size 
for type [%u]: %lld.\n",
-                                          map_name, t->type, sz);
+                               pr_warn("map '%s': can't determine key size for 
type [%u]: %lld.\n",
+                                       map_name, t->type, sz);
                                return sz;
                        }
                        pr_debug("map '%s': found key [%u], sz = %lld.\n",
                                 map_name, t->type, sz);
                        if (map->def.key_size && map->def.key_size != sz) {
-                               pr_warning("map '%s': conflicting key size %u 
!= %lld.\n",
-                                          map_name, map->def.key_size, sz);
+                               pr_warn("map '%s': conflicting key size %u != 
%lld.\n",
+                                       map_name, map->def.key_size, sz);
                                return -EINVAL;
                        }
                        map->def.key_size = sz;
@@ -1214,8 +1213,8 @@ static int bpf_object__init_user_btf_map(struct 
bpf_object *obj,
                        pr_debug("map '%s': found value_size = %u.\n",
                                 map_name, sz);
                        if (map->def.value_size && map->def.value_size != sz) {
-                               pr_warning("map '%s': conflicting value size %u 
!= %u.\n",
-                                          map_name, map->def.value_size, sz);
+                               pr_warn("map '%s': conflicting value size %u != 
%u.\n",
+                                       map_name, map->def.value_size, sz);
                                return -EINVAL;
                        }
                        map->def.value_size = sz;
@@ -1224,34 +1223,34 @@ static int bpf_object__init_user_btf_map(struct 
bpf_object *obj,
 
                        t = btf__type_by_id(obj->btf, m->type);
                        if (!t) {
-                               pr_warning("map '%s': value type [%d] not 
found.\n",
-                                          map_name, m->type);
+                               pr_warn("map '%s': value type [%d] not 
found.\n",
+                                       map_name, m->type);
                                return -EINVAL;
                        }
                        if (!btf_is_ptr(t)) {
-                               pr_warning("map '%s': value spec is not PTR: 
%u.\n",
+                               pr_warn("map '%s': value spec is not PTR: 
%u.\n",
                                           map_name, btf_kind(t));
                                return -EINVAL;
                        }
                        sz = btf__resolve_size(obj->btf, t->type);
                        if (sz < 0) {
-                               pr_warning("map '%s': can't determine value 
size for type [%u]: %lld.\n",
-                                          map_name, t->type, sz);
+                               pr_warn("map '%s': can't determine value size 
for type [%u]: %lld.\n",
+                                       map_name, t->type, sz);
                                return sz;
                        }
                        pr_debug("map '%s': found value [%u], sz = %lld.\n",
                                 map_name, t->type, sz);
                        if (map->def.value_size && map->def.value_size != sz) {
-                               pr_warning("map '%s': conflicting value size %u 
!= %lld.\n",
-                                          map_name, map->def.value_size, sz);
+                               pr_warn("map '%s': conflicting value size %u != 
%lld.\n",
+                                       map_name, map->def.value_size, sz);
                                return -EINVAL;
                        }
                        map->def.value_size = sz;
                        map->btf_value_type_id = t->type;
                } else {
                        if (strict) {
-                               pr_warning("map '%s': unknown field '%s'.\n",
-                                          map_name, name);
+                               pr_warn("map '%s': unknown field '%s'.\n",
+                                       map_name, name);
                                return -ENOTSUP;
                        }
                        pr_debug("map '%s': ignoring unknown field '%s'.\n",
@@ -1260,7 +1259,7 @@ static int bpf_object__init_user_btf_map(struct 
bpf_object *obj,
        }
 
        if (map->def.type == BPF_MAP_TYPE_UNSPEC) {
-               pr_warning("map '%s': map type isn't specified.\n", map_name);
+               pr_warn("map '%s': map type isn't specified.\n", map_name);
                return -EINVAL;
        }
 
@@ -1283,8 +1282,8 @@ static int bpf_object__init_user_btf_maps(struct 
bpf_object *obj, bool strict)
        if (scn)
                data = elf_getdata(scn, NULL);
        if (!scn || !data) {
-               pr_warning("failed to get Elf_Data from map section %d (%s)\n",
-                          obj->efile.maps_shndx, MAPS_ELF_SEC);
+               pr_warn("failed to get Elf_Data from map section %d (%s)\n",
+                       obj->efile.maps_shndx, MAPS_ELF_SEC);
                return -EINVAL;
        }
 
@@ -1301,7 +1300,7 @@ static int bpf_object__init_user_btf_maps(struct 
bpf_object *obj, bool strict)
        }
 
        if (!sec) {
-               pr_warning("DATASEC '%s' not found.\n", MAPS_ELF_SEC);
+               pr_warn("DATASEC '%s' not found.\n", MAPS_ELF_SEC);
                return -ENOENT;
        }
 
@@ -1445,14 +1444,13 @@ static int bpf_object__init_btf(struct bpf_object *obj,
        if (btf_data) {
                obj->btf = btf__new(btf_data->d_buf, btf_data->d_size);
                if (IS_ERR(obj->btf)) {
-                       pr_warning("Error loading ELF section %s: %d.\n",
-                                  BTF_ELF_SEC, err);
+                       pr_warn("Error loading ELF section %s: %d.\n",
+                               BTF_ELF_SEC, err);
                        goto out;
                }
                err = btf__finalize_data(obj, obj->btf);
                if (err) {
-                       pr_warning("Error finalizing %s: %d.\n",
-                                  BTF_ELF_SEC, err);
+                       pr_warn("Error finalizing %s: %d.\n", BTF_ELF_SEC, err);
                        goto out;
                }
        }
@@ -1465,8 +1463,8 @@ static int bpf_object__init_btf(struct bpf_object *obj,
                obj->btf_ext = btf_ext__new(btf_ext_data->d_buf,
                                            btf_ext_data->d_size);
                if (IS_ERR(obj->btf_ext)) {
-                       pr_warning("Error loading ELF section %s: %ld. Ignored 
and continue.\n",
-                                  BTF_EXT_ELF_SEC, PTR_ERR(obj->btf_ext));
+                       pr_warn("Error loading ELF section %s: %ld. Ignored and 
continue.\n",
+                               BTF_EXT_ELF_SEC, PTR_ERR(obj->btf_ext));
                        obj->btf_ext = NULL;
                        goto out;
                }
@@ -1482,7 +1480,7 @@ static int bpf_object__init_btf(struct bpf_object *obj,
                obj->btf = NULL;
        }
        if (btf_required && !obj->btf) {
-               pr_warning("BTF is required, but is missing or corrupted.\n");
+               pr_warn("BTF is required, but is missing or corrupted.\n");
                return err == 0 ? -ENOENT : err;
        }
        return 0;
@@ -1500,8 +1498,8 @@ static int bpf_object__sanitize_and_load_btf(struct 
bpf_object *obj)
 
        err = btf__load(obj->btf);
        if (err) {
-               pr_warning("Error loading %s into kernel: %d.\n",
-                          BTF_ELF_SEC, err);
+               pr_warn("Error loading %s into kernel: %d.\n",
+                       BTF_ELF_SEC, err);
                btf__free(obj->btf);
                obj->btf = NULL;
                /* btf_ext can't exist without btf, so free it as well */
@@ -1527,7 +1525,7 @@ static int bpf_object__elf_collect(struct bpf_object 
*obj, int flags)
 
        /* Elf is corrupted/truncated, avoid calling elf_strptr. */
        if (!elf_rawdata(elf_getscn(elf, ep->e_shstrndx), NULL)) {
-               pr_warning("failed to get e_shstrndx from %s\n", obj->path);
+               pr_warn("failed to get e_shstrndx from %s\n", obj->path);
                return -LIBBPF_ERRNO__FORMAT;
        }
 
@@ -1538,22 +1536,22 @@ static int bpf_object__elf_collect(struct bpf_object 
*obj, int flags)
 
                idx++;
                if (gelf_getshdr(scn, &sh) != &sh) {
-                       pr_warning("failed to get section(%d) header from %s\n",
-                                  idx, obj->path);
+                       pr_warn("failed to get section(%d) header from %s\n",
+                               idx, obj->path);
                        return -LIBBPF_ERRNO__FORMAT;
                }
 
                name = elf_strptr(elf, ep->e_shstrndx, sh.sh_name);
                if (!name) {
-                       pr_warning("failed to get section(%d) name from %s\n",
-                                  idx, obj->path);
+                       pr_warn("failed to get section(%d) name from %s\n",
+                               idx, obj->path);
                        return -LIBBPF_ERRNO__FORMAT;
                }
 
                data = elf_getdata(scn, 0);
                if (!data) {
-                       pr_warning("failed to get section(%d) data from 
%s(%s)\n",
-                                  idx, name, obj->path);
+                       pr_warn("failed to get section(%d) data from %s(%s)\n",
+                               idx, name, obj->path);
                        return -LIBBPF_ERRNO__FORMAT;
                }
                pr_debug("section(%d) %s, size %ld, link %d, flags %lx, 
type=%d\n",
@@ -1583,8 +1581,8 @@ static int bpf_object__elf_collect(struct bpf_object 
*obj, int flags)
                        btf_ext_data = data;
                } else if (sh.sh_type == SHT_SYMTAB) {
                        if (obj->efile.symbols) {
-                               pr_warning("bpf: multiple SYMTAB in %s\n",
-                                          obj->path);
+                               pr_warn("bpf: multiple SYMTAB in %s\n",
+                                       obj->path);
                                return -LIBBPF_ERRNO__FORMAT;
                        }
                        obj->efile.symbols = data;
@@ -1600,8 +1598,8 @@ static int bpf_object__elf_collect(struct bpf_object 
*obj, int flags)
                                        char *cp = libbpf_strerror_r(-err, 
errmsg,
                                                                     
sizeof(errmsg));
 
-                                       pr_warning("failed to alloc program %s 
(%s): %s",
-                                                  name, obj->path, cp);
+                                       pr_warn("failed to alloc program %s 
(%s): %s",
+                                               name, obj->path, cp);
                                        return err;
                                }
                        } else if (strcmp(name, ".data") == 0) {
@@ -1628,7 +1626,7 @@ static int bpf_object__elf_collect(struct bpf_object 
*obj, int flags)
                        reloc = reallocarray(reloc, nr_reloc + 1,
                                             sizeof(*obj->efile.reloc));
                        if (!reloc) {
-                               pr_warning("realloc failed\n");
+                               pr_warn("realloc failed\n");
                                return -ENOMEM;
                        }
 
@@ -1646,7 +1644,7 @@ static int bpf_object__elf_collect(struct bpf_object 
*obj, int flags)
        }
 
        if (!obj->efile.strtabidx || obj->efile.strtabidx >= idx) {
-               pr_warning("Corrupted ELF file: index of strtab invalid\n");
+               pr_warn("Corrupted ELF file: index of strtab invalid\n");
                return -LIBBPF_ERRNO__FORMAT;
        }
        err = bpf_object__init_btf(obj, btf_data, btf_ext_data);
@@ -1736,7 +1734,7 @@ bpf_program__collect_reloc(struct bpf_program *prog, 
GElf_Shdr *shdr,
 
        prog->reloc_desc = malloc(sizeof(*prog->reloc_desc) * nrels);
        if (!prog->reloc_desc) {
-               pr_warning("failed to alloc memory in relocation\n");
+               pr_warn("failed to alloc memory in relocation\n");
                return -ENOMEM;
        }
        prog->nr_reloc = nrels;
@@ -1752,13 +1750,13 @@ bpf_program__collect_reloc(struct bpf_program *prog, 
GElf_Shdr *shdr,
                GElf_Rel rel;
 
                if (!gelf_getrel(data, i, &rel)) {
-                       pr_warning("relocation: failed to get %d reloc\n", i);
+                       pr_warn("relocation: failed to get %d reloc\n", i);
                        return -LIBBPF_ERRNO__FORMAT;
                }
 
                if (!gelf_getsym(symbols, GELF_R_SYM(rel.r_info), &sym)) {
-                       pr_warning("relocation: symbol %"PRIx64" not found\n",
-                                  GELF_R_SYM(rel.r_info));
+                       pr_warn("relocation: symbol %"PRIx64" not found\n",
+                               GELF_R_SYM(rel.r_info));
                        return -LIBBPF_ERRNO__FORMAT;
                }
 
@@ -1775,20 +1773,20 @@ bpf_program__collect_reloc(struct bpf_program *prog, 
GElf_Shdr *shdr,
                         insn_idx, shdr_idx);
 
                if (shdr_idx >= SHN_LORESERVE) {
-                       pr_warning("relocation: not yet supported relo for 
non-static global \'%s\' variable in special section (0x%x) found in 
insns[%d].code 0x%x\n",
+                       pr_warn("relocation: not yet supported relo for 
non-static global \'%s\' variable in special section (0x%x) found in 
insns[%d].code 0x%x\n",
                                   name, shdr_idx, insn_idx,
                                   insns[insn_idx].code);
                        return -LIBBPF_ERRNO__RELOC;
                }
                if (!bpf_object__relo_in_known_section(obj, shdr_idx)) {
-                       pr_warning("Program '%s' contains unrecognized relo 
data pointing to section %u\n",
-                                  prog->section_name, shdr_idx);
+                       pr_warn("Program '%s' contains unrecognized relo data 
pointing to section %u\n",
+                               prog->section_name, shdr_idx);
                        return -LIBBPF_ERRNO__RELOC;
                }
 
                if (insns[insn_idx].code == (BPF_JMP | BPF_CALL)) {
                        if (insns[insn_idx].src_reg != BPF_PSEUDO_CALL) {
-                               pr_warning("incorrect bpf_call opcode\n");
+                               pr_warn("incorrect bpf_call opcode\n");
                                return -LIBBPF_ERRNO__RELOC;
                        }
                        prog->reloc_desc[i].type = RELO_CALL;
@@ -1799,8 +1797,8 @@ bpf_program__collect_reloc(struct bpf_program *prog, 
GElf_Shdr *shdr,
                }
 
                if (insns[insn_idx].code != (BPF_LD | BPF_IMM | BPF_DW)) {
-                       pr_warning("bpf: relocation: invalid relo for 
insns[%d].code 0x%x\n",
-                                  insn_idx, insns[insn_idx].code);
+                       pr_warn("bpf: relocation: invalid relo for 
insns[%d].code 0x%x\n",
+                               insn_idx, insns[insn_idx].code);
                        return -LIBBPF_ERRNO__RELOC;
                }
 
@@ -1809,13 +1807,13 @@ bpf_program__collect_reloc(struct bpf_program *prog, 
GElf_Shdr *shdr,
                        type = bpf_object__section_to_libbpf_map_type(obj, 
shdr_idx);
                        if (type != LIBBPF_MAP_UNSPEC) {
                                if (GELF_ST_BIND(sym.st_info) == STB_GLOBAL) {
-                                       pr_warning("bpf: relocation: not yet 
supported relo for non-static global \'%s\' variable found in insns[%d].code 
0x%x\n",
-                                                  name, insn_idx, 
insns[insn_idx].code);
+                                       pr_warn("bpf: relocation: not yet 
supported relo for non-static global \'%s\' variable found in insns[%d].code 
0x%x\n",
+                                               name, insn_idx, 
insns[insn_idx].code);
                                        return -LIBBPF_ERRNO__RELOC;
                                }
                                if (!obj->caps.global_data) {
-                                       pr_warning("bpf: relocation: kernel 
does not support global \'%s\' variable access in insns[%d]\n",
-                                                  name, insn_idx);
+                                       pr_warn("bpf: relocation: kernel does 
not support global \'%s\' variable access in insns[%d]\n",
+                                               name, insn_idx);
                                        return -LIBBPF_ERRNO__RELOC;
                                }
                        }
@@ -1836,8 +1834,8 @@ bpf_program__collect_reloc(struct bpf_program *prog, 
GElf_Shdr *shdr,
                        }
 
                        if (map_idx >= nr_maps) {
-                               pr_warning("bpf relocation: map_idx %d larger 
than %d\n",
-                                          (int)map_idx, (int)nr_maps - 1);
+                               pr_warn("bpf relocation: map_idx %d larger than 
%d\n",
+                                       (int)map_idx, (int)nr_maps - 1);
                                return -LIBBPF_ERRNO__RELOC;
                        }
 
@@ -1964,8 +1962,8 @@ bpf_object__probe_name(struct bpf_object *obj)
        ret = bpf_load_program_xattr(&attr, NULL, 0);
        if (ret < 0) {
                cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
-               pr_warning("Error in %s():%s(%d). Couldn't load basic 'r0 = 0' 
BPF program.\n",
-                          __func__, cp, errno);
+               pr_warn("Error in %s():%s(%d). Couldn't load basic 'r0 = 0' BPF 
program.\n",
+                       __func__, cp, errno);
                return -errno;
        }
        close(ret);
@@ -2005,8 +2003,8 @@ bpf_object__probe_global_data(struct bpf_object *obj)
        map = bpf_create_map_xattr(&map_attr);
        if (map < 0) {
                cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
-               pr_warning("Error in %s():%s(%d). Couldn't create simple array 
map.\n",
-                          __func__, cp, errno);
+               pr_warn("Error in %s():%s(%d). Couldn't create simple array 
map.\n",
+                       __func__, cp, errno);
                return -errno;
        }
 
@@ -2121,8 +2119,8 @@ bpf_object__populate_internal_map(struct bpf_object *obj, 
struct bpf_map *map)
                err = bpf_map_freeze(map->fd);
                if (err) {
                        cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
-                       pr_warning("Error freezing map(%s) as read-only: %s\n",
-                                  map->name, cp);
+                       pr_warn("Error freezing map(%s) as read-only: %s\n",
+                               map->name, cp);
                        err = 0;
                }
        }
@@ -2161,8 +2159,8 @@ bpf_object__create_maps(struct bpf_object *obj)
                        if (!nr_cpus)
                                nr_cpus = libbpf_num_possible_cpus();
                        if (nr_cpus < 0) {
-                               pr_warning("failed to determine number of 
system CPUs: %d\n",
-                                          nr_cpus);
+                               pr_warn("failed to determine number of system 
CPUs: %d\n",
+                                       nr_cpus);
                                err = nr_cpus;
                                goto err_out;
                        }
@@ -2190,8 +2188,8 @@ bpf_object__create_maps(struct bpf_object *obj)
                                 create_attr.btf_value_type_id)) {
                        err = -errno;
                        cp = libbpf_strerror_r(err, errmsg, sizeof(errmsg));
-                       pr_warning("Error in bpf_create_map_xattr(%s):%s(%d). 
Retrying without BTF.\n",
-                                  map->name, cp, err);
+                       pr_warn("Error in bpf_create_map_xattr(%s):%s(%d). 
Retrying without BTF.\n",
+                               map->name, cp, err);
                        create_attr.btf_fd = 0;
                        create_attr.btf_key_type_id = 0;
                        create_attr.btf_value_type_id = 0;
@@ -2206,8 +2204,8 @@ bpf_object__create_maps(struct bpf_object *obj)
                        err = -errno;
 err_out:
                        cp = libbpf_strerror_r(err, errmsg, sizeof(errmsg));
-                       pr_warning("failed to create map (name: '%s'): 
%s(%d)\n",
-                                  map->name, cp, err);
+                       pr_warn("failed to create map (name: '%s'): %s(%d)\n",
+                               map->name, cp, err);
                        for (j = 0; j < i; j++)
                                zclose(obj->maps[j].fd);
                        return err;
@@ -2232,8 +2230,8 @@ check_btf_ext_reloc_err(struct bpf_program *prog, int err,
                        void *btf_prog_info, const char *info_name)
 {
        if (err != -ENOENT) {
-               pr_warning("Error in loading %s for sec %s.\n",
-                          info_name, prog->section_name);
+               pr_warn("Error in loading %s for sec %s.\n",
+                       info_name, prog->section_name);
                return err;
        }
 
@@ -2244,14 +2242,14 @@ check_btf_ext_reloc_err(struct bpf_program *prog, int 
err,
                 * Some info has already been found but has problem
                 * in the last btf_ext reloc. Must have to error out.
                 */
-               pr_warning("Error in relocating %s for sec %s.\n",
-                          info_name, prog->section_name);
+               pr_warn("Error in relocating %s for sec %s.\n",
+                       info_name, prog->section_name);
                return err;
        }
 
        /* Have problem loading the very first info. Ignore the rest. */
-       pr_warning("Cannot find %s for main program sec %s. Ignore all %s.\n",
-                  info_name, prog->section_name, info_name);
+       pr_warn("Cannot find %s for main program sec %s. Ignore all %s.\n",
+               info_name, prog->section_name, info_name);
        return 0;
 }
 
@@ -2452,7 +2450,7 @@ static int bpf_core_spec_parse(const struct btf *btf,
                                return sz;
                        spec->offset += access_idx * sz;
                } else {
-                       pr_warning("relo for [%u] %s (at idx %d) captures type 
[%d] of unexpected kind %d\n",
+                       pr_warn("relo for [%u] %s (at idx %d) captures type 
[%d] of unexpected kind %d\n",
                                   type_id, spec_str, i, id, btf_kind(t));
                        return -EINVAL;
                }
@@ -2597,7 +2595,7 @@ static int bpf_core_fields_are_compat(const struct btf 
*local_btf,
                targ_id = btf_array(targ_type)->type;
                goto recur;
        default:
-               pr_warning("unexpected kind %d relocated, local [%d], target 
[%d]\n",
+               pr_warn("unexpected kind %d relocated, local [%d], target 
[%d]\n",
                           btf_kind(local_type), local_id, targ_id);
                return 0;
        }
@@ -2804,7 +2802,7 @@ static int bpf_core_reloc_insn(struct bpf_program *prog, 
int insn_off,
                         bpf_program__title(prog, false),
                         insn_idx, orig_off, new_off);
        } else {
-               pr_warning("prog '%s': trying to relocate unrecognized insn 
#%d, code:%x, src:%x, dst:%x, off:%x, imm:%x\n",
+               pr_warn("prog '%s': trying to relocate unrecognized insn #%d, 
code:%x, src:%x, dst:%x, off:%x, imm:%x\n",
                           bpf_program__title(prog, false),
                           insn_idx, insn->code, insn->src_reg, insn->dst_reg,
                           insn->off, insn->imm);
@@ -2895,7 +2893,7 @@ static struct btf *bpf_core_find_kernel_btf(void)
                return btf;
        }
 
-       pr_warning("failed to find valid kernel BTF\n");
+       pr_warn("failed to find valid kernel BTF\n");
        return ERR_PTR(-ESRCH);
 }
 
@@ -3027,8 +3025,8 @@ static int bpf_core_reloc_offset(struct bpf_program *prog,
 
        err = bpf_core_spec_parse(local_btf, local_id, spec_str, &local_spec);
        if (err) {
-               pr_warning("prog '%s': relo #%d: parsing [%d] %s + %s failed: 
%d\n",
-                          prog_name, relo_idx, local_id, local_name, spec_str,
+               pr_warn("prog '%s': relo #%d: parsing [%d] %s + %s failed: 
%d\n",
+                       prog_name, relo_idx, local_id, local_name, spec_str,
                           err);
                return -EINVAL;
        }
@@ -3040,8 +3038,8 @@ static int bpf_core_reloc_offset(struct bpf_program *prog,
        if (!hashmap__find(cand_cache, type_key, (void **)&cand_ids)) {
                cand_ids = bpf_core_find_cands(local_btf, local_id, targ_btf);
                if (IS_ERR(cand_ids)) {
-                       pr_warning("prog '%s': relo #%d: target candidate 
search failed for [%d] %s: %ld",
-                                  prog_name, relo_idx, local_id, local_name,
+                       pr_warn("prog '%s': relo #%d: target candidate search 
failed for [%d] %s: %ld",
+                               prog_name, relo_idx, local_id, local_name,
                                   PTR_ERR(cand_ids));
                        return PTR_ERR(cand_ids);
                }
@@ -3064,8 +3062,8 @@ static int bpf_core_reloc_offset(struct bpf_program *prog,
                bpf_core_dump_spec(LIBBPF_DEBUG, &cand_spec);
                libbpf_print(LIBBPF_DEBUG, ": %d\n", err);
                if (err < 0) {
-                       pr_warning("prog '%s': relo #%d: matching error: %d\n",
-                                  prog_name, relo_idx, err);
+                       pr_warn("prog '%s': relo #%d: matching error: %d\n",
+                               prog_name, relo_idx, err);
                        return err;
                }
                if (err == 0)
@@ -3077,9 +3075,9 @@ static int bpf_core_reloc_offset(struct bpf_program *prog,
                        /* if there are many candidates, they should all
                         * resolve to the same offset
                         */
-                       pr_warning("prog '%s': relo #%d: offset ambiguity: %u 
!= %u\n",
-                                  prog_name, relo_idx, cand_spec.offset,
-                                  targ_spec.offset);
+                       pr_warn("prog '%s': relo #%d: offset ambiguity: %u != 
%u\n",
+                               prog_name, relo_idx, cand_spec.offset,
+                               targ_spec.offset);
                        return -EINVAL;
                }
 
@@ -3088,16 +3086,16 @@ static int bpf_core_reloc_offset(struct bpf_program 
*prog,
 
        cand_ids->len = j;
        if (cand_ids->len == 0) {
-               pr_warning("prog '%s': relo #%d: no matching targets found for 
[%d] %s + %s\n",
-                          prog_name, relo_idx, local_id, local_name, spec_str);
+               pr_warn("prog '%s': relo #%d: no matching targets found for 
[%d] %s + %s\n",
+                       prog_name, relo_idx, local_id, local_name, spec_str);
                return -ESRCH;
        }
 
        err = bpf_core_reloc_insn(prog, relo->insn_off,
                                  local_spec.offset, targ_spec.offset);
        if (err) {
-               pr_warning("prog '%s': relo #%d: failed to patch insn at offset 
%d: %d\n",
-                          prog_name, relo_idx, relo->insn_off, err);
+               pr_warn("prog '%s': relo #%d: failed to patch insn at offset 
%d: %d\n",
+                       prog_name, relo_idx, relo->insn_off, err);
                return -EINVAL;
        }
 
@@ -3122,8 +3120,7 @@ bpf_core_reloc_offsets(struct bpf_object *obj, const char 
*targ_btf_path)
        else
                targ_btf = bpf_core_find_kernel_btf();
        if (IS_ERR(targ_btf)) {
-               pr_warning("failed to get target BTF: %ld\n",
-                          PTR_ERR(targ_btf));
+               pr_warn("failed to get target BTF: %ld\n", PTR_ERR(targ_btf));
                return PTR_ERR(targ_btf);
        }
 
@@ -3142,8 +3139,8 @@ bpf_core_reloc_offsets(struct bpf_object *obj, const char 
*targ_btf_path)
                }
                prog = bpf_object__find_program_by_title(obj, sec_name);
                if (!prog) {
-                       pr_warning("failed to find program '%s' for CO-RE 
offset relocation\n",
-                                  sec_name);
+                       pr_warn("failed to find program '%s' for CO-RE offset 
relocation\n",
+                               sec_name);
                        err = -EINVAL;
                        goto out;
                }
@@ -3155,8 +3152,8 @@ bpf_core_reloc_offsets(struct bpf_object *obj, const char 
*targ_btf_path)
                        err = bpf_core_reloc_offset(prog, rec, i, obj->btf,
                                                    targ_btf, cand_cache);
                        if (err) {
-                               pr_warning("prog '%s': relo #%d: failed to 
relocate: %d\n",
-                                          sec_name, i, err);
+                               pr_warn("prog '%s': relo #%d: failed to 
relocate: %d\n",
+                                       sec_name, i, err);
                                goto out;
                        }
                }
@@ -3197,21 +3194,21 @@ bpf_program__reloc_text(struct bpf_program *prog, 
struct bpf_object *obj,
                return -LIBBPF_ERRNO__RELOC;
 
        if (prog->idx == obj->efile.text_shndx) {
-               pr_warning("relo in .text insn %d into off %d\n",
-                          relo->insn_idx, relo->text_off);
+               pr_warn("relo in .text insn %d into off %d\n",
+                       relo->insn_idx, relo->text_off);
                return -LIBBPF_ERRNO__RELOC;
        }
 
        if (prog->main_prog_cnt == 0) {
                text = bpf_object__find_prog_by_idx(obj, obj->efile.text_shndx);
                if (!text) {
-                       pr_warning("no .text section found yet relo into text 
exist\n");
+                       pr_warn("no .text section found yet relo into text 
exist\n");
                        return -LIBBPF_ERRNO__RELOC;
                }
                new_cnt = prog->insns_cnt + text->insns_cnt;
                new_insn = reallocarray(prog->insns, new_cnt, sizeof(*insn));
                if (!new_insn) {
-                       pr_warning("oom in prog realloc\n");
+                       pr_warn("oom in prog realloc\n");
                        return -ENOMEM;
                }
 
@@ -3266,8 +3263,8 @@ bpf_program__relocate(struct bpf_program *prog, struct 
bpf_object *obj)
                        map_idx = prog->reloc_desc[i].map_idx;
 
                        if (insn_idx + 1 >= (int)prog->insns_cnt) {
-                               pr_warning("relocation out of range: '%s'\n",
-                                          prog->section_name);
+                               pr_warn("relocation out of range: '%s'\n",
+                                       prog->section_name);
                                return -LIBBPF_ERRNO__RELOC;
                        }
 
@@ -3301,8 +3298,8 @@ bpf_object__relocate(struct bpf_object *obj, const char 
*targ_btf_path)
        if (obj->btf_ext) {
                err = bpf_object__relocate_core(obj, targ_btf_path);
                if (err) {
-                       pr_warning("failed to perform CO-RE relocations: %d\n",
-                                  err);
+                       pr_warn("failed to perform CO-RE relocations: %d\n",
+                               err);
                        return err;
                }
        }
@@ -3311,8 +3308,7 @@ bpf_object__relocate(struct bpf_object *obj, const char 
*targ_btf_path)
 
                err = bpf_program__relocate(prog, obj);
                if (err) {
-                       pr_warning("failed to relocate '%s'\n",
-                                  prog->section_name);
+                       pr_warn("failed to relocate '%s'\n", 
prog->section_name);
                        return err;
                }
        }
@@ -3324,7 +3320,7 @@ static int bpf_object__collect_reloc(struct bpf_object 
*obj)
        int i, err;
 
        if (!obj_elf_valid(obj)) {
-               pr_warning("Internal error: elf object is closed\n");
+               pr_warn("Internal error: elf object is closed\n");
                return -LIBBPF_ERRNO__INTERNAL;
        }
 
@@ -3335,13 +3331,13 @@ static int bpf_object__collect_reloc(struct bpf_object 
*obj)
                struct bpf_program *prog;
 
                if (shdr->sh_type != SHT_REL) {
-                       pr_warning("internal error at %d\n", __LINE__);
+                       pr_warn("internal error at %d\n", __LINE__);
                        return -LIBBPF_ERRNO__INTERNAL;
                }
 
                prog = bpf_object__find_prog_by_idx(obj, idx);
                if (!prog) {
-                       pr_warning("relocation failed: no section(%d)\n", idx);
+                       pr_warn("relocation failed: no section(%d)\n", idx);
                        return -LIBBPF_ERRNO__RELOC;
                }
 
@@ -3393,7 +3389,7 @@ load_program(struct bpf_program *prog, struct bpf_insn 
*insns, int insns_cnt,
 retry_load:
        log_buf = malloc(log_buf_size);
        if (!log_buf)
-               pr_warning("Alloc log buffer for bpf loader error, continue 
without log\n");
+               pr_warn("Alloc log buffer for bpf loader error, continue 
without log\n");
 
        ret = bpf_load_program_xattr(&load_attr, log_buf, log_buf_size);
 
@@ -3412,16 +3408,16 @@ load_program(struct bpf_program *prog, struct bpf_insn 
*insns, int insns_cnt,
        }
        ret = -LIBBPF_ERRNO__LOAD;
        cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
-       pr_warning("load bpf program failed: %s\n", cp);
+       pr_warn("load bpf program failed: %s\n", cp);
 
        if (log_buf && log_buf[0] != '\0') {
                ret = -LIBBPF_ERRNO__VERIFY;
-               pr_warning("-- BEGIN DUMP LOG ---\n");
-               pr_warning("\n%s\n", log_buf);
-               pr_warning("-- END LOG --\n");
+               pr_warn("-- BEGIN DUMP LOG ---\n");
+               pr_warn("\n%s\n", log_buf);
+               pr_warn("-- END LOG --\n");
        } else if (load_attr.insns_cnt >= BPF_MAXINSNS) {
-               pr_warning("Program too large (%zu insns), at most %d insns\n",
-                          load_attr.insns_cnt, BPF_MAXINSNS);
+               pr_warn("Program too large (%zu insns), at most %d insns\n",
+                       load_attr.insns_cnt, BPF_MAXINSNS);
                ret = -LIBBPF_ERRNO__PROG2BIG;
        } else {
                /* Wrong program type? */
@@ -3455,14 +3451,14 @@ bpf_program__load(struct bpf_program *prog,
 
        if (prog->instances.nr < 0 || !prog->instances.fds) {
                if (prog->preprocessor) {
-                       pr_warning("Internal error: can't load program '%s'\n",
-                                  prog->section_name);
+                       pr_warn("Internal error: can't load program '%s'\n",
+                               prog->section_name);
                        return -LIBBPF_ERRNO__INTERNAL;
                }
 
                prog->instances.fds = malloc(sizeof(int));
                if (!prog->instances.fds) {
-                       pr_warning("Not enough memory for BPF fds\n");
+                       pr_warn("Not enough memory for BPF fds\n");
                        return -ENOMEM;
                }
                prog->instances.nr = 1;
@@ -3471,8 +3467,8 @@ bpf_program__load(struct bpf_program *prog,
 
        if (!prog->preprocessor) {
                if (prog->instances.nr != 1) {
-                       pr_warning("Program '%s' is inconsistent: nr(%d) != 
1\n",
-                                  prog->section_name, prog->instances.nr);
+                       pr_warn("Program '%s' is inconsistent: nr(%d) != 1\n",
+                               prog->section_name, prog->instances.nr);
                }
                err = load_program(prog, prog->insns, prog->insns_cnt,
                                   license, kern_version, &fd);
@@ -3489,8 +3485,8 @@ bpf_program__load(struct bpf_program *prog,
                err = preprocessor(prog, i, prog->insns,
                                   prog->insns_cnt, &result);
                if (err) {
-                       pr_warning("Preprocessing the %dth instance of program 
'%s' failed\n",
-                                  i, prog->section_name);
+                       pr_warn("Preprocessing the %dth instance of program 
'%s' failed\n",
+                               i, prog->section_name);
                        goto out;
                }
 
@@ -3508,8 +3504,8 @@ bpf_program__load(struct bpf_program *prog,
                                   license, kern_version, &fd);
 
                if (err) {
-                       pr_warning("Loading the %dth instance of program '%s' 
failed\n",
-                                       i, prog->section_name);
+                       pr_warn("Loading the %dth instance of program '%s' 
failed\n",
+                               i, prog->section_name);
                        goto out;
                }
 
@@ -3519,8 +3515,7 @@ bpf_program__load(struct bpf_program *prog,
        }
 out:
        if (err)
-               pr_warning("failed to load program '%s'\n",
-                          prog->section_name);
+               pr_warn("failed to load program '%s'\n", prog->section_name);
        zfree(&prog->insns);
        prog->insns_cnt = 0;
        return err;
@@ -3589,8 +3584,7 @@ static bool bpf_prog_type__needs_kver(enum bpf_prog_type 
type)
 static int bpf_object__validate(struct bpf_object *obj, bool needs_kver)
 {
        if (needs_kver && obj->kern_version == 0) {
-               pr_warning("%s doesn't provide kernel version\n",
-                          obj->path);
+               pr_warn("%s doesn't provide kernel version\n", obj->path);
                return -LIBBPF_ERRNO__KVERSION;
        }
        return 0;
@@ -3604,7 +3598,7 @@ __bpf_object__open(const char *path, void *obj_buf, 
size_t obj_buf_sz,
        int err;
 
        if (elf_version(EV_CURRENT) == EV_NONE) {
-               pr_warning("failed to init libelf for %s\n", path);
+               pr_warn("failed to init libelf for %s\n", path);
                return ERR_PTR(-LIBBPF_ERRNO__LIBELF);
        }
 
@@ -3704,7 +3698,7 @@ int bpf_object__load_xattr(struct bpf_object_load_attr 
*attr)
                return -EINVAL;
 
        if (obj->loaded) {
-               pr_warning("object should not be loaded twice\n");
+               pr_warn("object should not be loaded twice\n");
                return -EINVAL;
        }
 
@@ -3717,7 +3711,7 @@ int bpf_object__load_xattr(struct bpf_object_load_attr 
*attr)
        return 0;
 out:
        bpf_object__unload(obj);
-       pr_warning("failed to load object '%s'\n", obj->path);
+       pr_warn("failed to load object '%s'\n", obj->path);
        return err;
 }
 
@@ -3747,13 +3741,13 @@ static int check_path(const char *path)
        dir = dirname(dname);
        if (statfs(dir, &st_fs)) {
                cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
-               pr_warning("failed to statfs %s: %s\n", dir, cp);
+               pr_warn("failed to statfs %s: %s\n", dir, cp);
                err = -errno;
        }
        free(dname);
 
        if (!err && st_fs.f_type != BPF_FS_MAGIC) {
-               pr_warning("specified path %s is not on BPF FS\n", path);
+               pr_warn("specified path %s is not on BPF FS\n", path);
                err = -EINVAL;
        }
 
@@ -3771,19 +3765,19 @@ int bpf_program__pin_instance(struct bpf_program *prog, 
const char *path,
                return err;
 
        if (prog == NULL) {
-               pr_warning("invalid program pointer\n");
+               pr_warn("invalid program pointer\n");
                return -EINVAL;
        }
 
        if (instance < 0 || instance >= prog->instances.nr) {
-               pr_warning("invalid prog instance %d of prog %s (max %d)\n",
-                          instance, prog->section_name, prog->instances.nr);
+               pr_warn("invalid prog instance %d of prog %s (max %d)\n",
+                       instance, prog->section_name, prog->instances.nr);
                return -EINVAL;
        }
 
        if (bpf_obj_pin(prog->instances.fds[instance], path)) {
                cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
-               pr_warning("failed to pin program: %s\n", cp);
+               pr_warn("failed to pin program: %s\n", cp);
                return -errno;
        }
        pr_debug("pinned program '%s'\n", path);
@@ -3801,13 +3795,13 @@ int bpf_program__unpin_instance(struct bpf_program 
*prog, const char *path,
                return err;
 
        if (prog == NULL) {
-               pr_warning("invalid program pointer\n");
+               pr_warn("invalid program pointer\n");
                return -EINVAL;
        }
 
        if (instance < 0 || instance >= prog->instances.nr) {
-               pr_warning("invalid prog instance %d of prog %s (max %d)\n",
-                          instance, prog->section_name, prog->instances.nr);
+               pr_warn("invalid prog instance %d of prog %s (max %d)\n",
+                       instance, prog->section_name, prog->instances.nr);
                return -EINVAL;
        }
 
@@ -3829,7 +3823,7 @@ static int make_dir(const char *path)
 
        if (err) {
                cp = libbpf_strerror_r(-err, errmsg, sizeof(errmsg));
-               pr_warning("failed to mkdir %s: %s\n", path, cp);
+               pr_warn("failed to mkdir %s: %s\n", path, cp);
        }
        return err;
 }
@@ -3843,12 +3837,12 @@ int bpf_program__pin(struct bpf_program *prog, const 
char *path)
                return err;
 
        if (prog == NULL) {
-               pr_warning("invalid program pointer\n");
+               pr_warn("invalid program pointer\n");
                return -EINVAL;
        }
 
        if (prog->instances.nr <= 0) {
-               pr_warning("no instances of prog %s to pin\n",
+               pr_warn("no instances of prog %s to pin\n",
                           prog->section_name);
                return -EINVAL;
        }
@@ -3910,12 +3904,12 @@ int bpf_program__unpin(struct bpf_program *prog, const 
char *path)
                return err;
 
        if (prog == NULL) {
-               pr_warning("invalid program pointer\n");
+               pr_warn("invalid program pointer\n");
                return -EINVAL;
        }
 
        if (prog->instances.nr <= 0) {
-               pr_warning("no instances of prog %s to pin\n",
+               pr_warn("no instances of prog %s to pin\n",
                           prog->section_name);
                return -EINVAL;
        }
@@ -3957,13 +3951,13 @@ int bpf_map__pin(struct bpf_map *map, const char *path)
                return err;
 
        if (map == NULL) {
-               pr_warning("invalid map pointer\n");
+               pr_warn("invalid map pointer\n");
                return -EINVAL;
        }
 
        if (bpf_obj_pin(map->fd, path)) {
                cp = libbpf_strerror_r(errno, errmsg, sizeof(errmsg));
-               pr_warning("failed to pin map: %s\n", cp);
+               pr_warn("failed to pin map: %s\n", cp);
                return -errno;
        }
 
@@ -3981,7 +3975,7 @@ int bpf_map__unpin(struct bpf_map *map, const char *path)
                return err;
 
        if (map == NULL) {
-               pr_warning("invalid map pointer\n");
+               pr_warn("invalid map pointer\n");
                return -EINVAL;
        }
 
@@ -4002,7 +3996,7 @@ int bpf_object__pin_maps(struct bpf_object *obj, const 
char *path)
                return -ENOENT;
 
        if (!obj->loaded) {
-               pr_warning("object not yet loaded; load it first\n");
+               pr_warn("object not yet loaded; load it first\n");
                return -ENOENT;
        }
 
@@ -4085,7 +4079,7 @@ int bpf_object__pin_programs(struct bpf_object *obj, 
const char *path)
                return -ENOENT;
 
        if (!obj->loaded) {
-               pr_warning("object not yet loaded; load it first\n");
+               pr_warn("object not yet loaded; load it first\n");
                return -ENOENT;
        }
 
@@ -4286,7 +4280,7 @@ __bpf_program__iter(const struct bpf_program *p, const 
struct bpf_object *obj,
                        &obj->programs[nr_programs - 1];
 
        if (p->obj != obj) {
-               pr_warning("error: program handler doesn't match object\n");
+               pr_warn("error: program handler doesn't match object\n");
                return NULL;
        }
 
@@ -4349,7 +4343,7 @@ const char *bpf_program__title(const struct bpf_program 
*prog, bool needs_copy)
        if (needs_copy) {
                title = strdup(title);
                if (!title) {
-                       pr_warning("failed to strdup program title\n");
+                       pr_warn("failed to strdup program title\n");
                        return ERR_PTR(-ENOMEM);
                }
        }
@@ -4371,13 +4365,13 @@ int bpf_program__set_prep(struct bpf_program *prog, int 
nr_instances,
                return -EINVAL;
 
        if (prog->instances.nr > 0 || prog->instances.fds) {
-               pr_warning("Can't set pre-processor after loading\n");
+               pr_warn("Can't set pre-processor after loading\n");
                return -EINVAL;
        }
 
        instances_fds = malloc(sizeof(int) * nr_instances);
        if (!instances_fds) {
-               pr_warning("alloc memory failed for fds\n");
+               pr_warn("alloc memory failed for fds\n");
                return -ENOMEM;
        }
 
@@ -4398,15 +4392,15 @@ int bpf_program__nth_fd(const struct bpf_program *prog, 
int n)
                return -EINVAL;
 
        if (n >= prog->instances.nr || n < 0) {
-               pr_warning("Can't get the %dth fd from program %s: only %d 
instances\n",
-                          n, prog->section_name, prog->instances.nr);
+               pr_warn("Can't get the %dth fd from program %s: only %d 
instances\n",
+                       n, prog->section_name, prog->instances.nr);
                return -EINVAL;
        }
 
        fd = prog->instances.fds[n];
        if (fd < 0) {
-               pr_warning("%dth instance of program '%s' is invalid\n",
-                          n, prog->section_name);
+               pr_warn("%dth instance of program '%s' is invalid\n",
+                       n, prog->section_name);
                return -ENOENT;
        }
 
@@ -4593,7 +4587,7 @@ int libbpf_prog_type_by_name(const char *name, enum 
bpf_prog_type *prog_type,
                *expected_attach_type = section_names[i].expected_attach_type;
                return 0;
        }
-       pr_warning("failed to guess program type based on ELF section name 
'%s'\n", name);
+       pr_warn("failed to guess program type based on ELF section name 
'%s'\n", name);
        type_names = libbpf_get_type_names(false);
        if (type_names != NULL) {
                pr_info("supported section(type) names are:%s\n", type_names);
@@ -4620,7 +4614,7 @@ int libbpf_attach_type_by_name(const char *name,
                *attach_type = section_names[i].attach_type;
                return 0;
        }
-       pr_warning("failed to guess attach type based on ELF section name 
'%s'\n", name);
+       pr_warn("failed to guess attach type based on ELF section name '%s'\n", 
name);
        type_names = libbpf_get_type_names(true);
        if (type_names != NULL) {
                pr_info("attachable section(type) names are:%s\n", type_names);
@@ -4703,11 +4697,11 @@ void bpf_map__set_ifindex(struct bpf_map *map, __u32 
ifindex)
 int bpf_map__set_inner_map_fd(struct bpf_map *map, int fd)
 {
        if (!bpf_map_type__is_map_in_map(map->def.type)) {
-               pr_warning("error: unsupported map type\n");
+               pr_warn("error: unsupported map type\n");
                return -EINVAL;
        }
        if (map->inner_map_fd != -1) {
-               pr_warning("error: inner_map_fd already specified\n");
+               pr_warn("error: inner_map_fd already specified\n");
                return -EINVAL;
        }
        map->inner_map_fd = fd;
@@ -4727,8 +4721,8 @@ __bpf_map__iter(const struct bpf_map *m, const struct 
bpf_object *obj, int i)
        e = obj->maps + obj->nr_maps;
 
        if ((m < s) || (m >= e)) {
-               pr_warning("error in %s: map handler doesn't belong to 
object\n",
-                          __func__);
+               pr_warn("error in %s: map handler doesn't belong to object\n",
+                        __func__);
                return NULL;
        }
 
@@ -4857,7 +4851,7 @@ int bpf_prog_load_xattr(const struct bpf_prog_load_attr 
*attr,
        }
 
        if (!first_prog) {
-               pr_warning("object file doesn't contain bpf program\n");
+               pr_warn("object file doesn't contain bpf program\n");
                bpf_object__close(obj);
                return -ENOENT;
        }
@@ -4916,14 +4910,14 @@ struct bpf_link *bpf_program__attach_perf_event(struct 
bpf_program *prog,
        int prog_fd, err;
 
        if (pfd < 0) {
-               pr_warning("program '%s': invalid perf event FD %d\n",
-                          bpf_program__title(prog, false), pfd);
+               pr_warn("program '%s': invalid perf event FD %d\n",
+                       bpf_program__title(prog, false), pfd);
                return ERR_PTR(-EINVAL);
        }
        prog_fd = bpf_program__fd(prog);
        if (prog_fd < 0) {
-               pr_warning("program '%s': can't attach BPF program w/o FD (did 
you load it?)\n",
-                          bpf_program__title(prog, false));
+               pr_warn("program '%s': can't attach BPF program w/o FD (did you 
load it?)\n",
+                       bpf_program__title(prog, false));
                return ERR_PTR(-EINVAL);
        }
 
@@ -4936,16 +4930,16 @@ struct bpf_link *bpf_program__attach_perf_event(struct 
bpf_program *prog,
        if (ioctl(pfd, PERF_EVENT_IOC_SET_BPF, prog_fd) < 0) {
                err = -errno;
                free(link);
-               pr_warning("program '%s': failed to attach to pfd %d: %s\n",
-                          bpf_program__title(prog, false), pfd,
+               pr_warn("program '%s': failed to attach to pfd %d: %s\n",
+                       bpf_program__title(prog, false), pfd,
                           libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
                return ERR_PTR(err);
        }
        if (ioctl(pfd, PERF_EVENT_IOC_ENABLE, 0) < 0) {
                err = -errno;
                free(link);
-               pr_warning("program '%s': failed to enable pfd %d: %s\n",
-                          bpf_program__title(prog, false), pfd,
+               pr_warn("program '%s': failed to enable pfd %d: %s\n",
+                       bpf_program__title(prog, false), pfd,
                           libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
                return ERR_PTR(err);
        }
@@ -5020,9 +5014,9 @@ static int perf_event_open_probe(bool uprobe, bool 
retprobe, const char *name,
        type = uprobe ? determine_uprobe_perf_type()
                      : determine_kprobe_perf_type();
        if (type < 0) {
-               pr_warning("failed to determine %s perf type: %s\n",
-                          uprobe ? "uprobe" : "kprobe",
-                          libbpf_strerror_r(type, errmsg, sizeof(errmsg)));
+               pr_warn("failed to determine %s perf type: %s\n",
+                       uprobe ? "uprobe" : "kprobe",
+                       libbpf_strerror_r(type, errmsg, sizeof(errmsg)));
                return type;
        }
        if (retprobe) {
@@ -5030,10 +5024,9 @@ static int perf_event_open_probe(bool uprobe, bool 
retprobe, const char *name,
                                 : determine_kprobe_retprobe_bit();
 
                if (bit < 0) {
-                       pr_warning("failed to determine %s retprobe bit: %s\n",
-                                  uprobe ? "uprobe" : "kprobe",
-                                  libbpf_strerror_r(bit, errmsg,
-                                                    sizeof(errmsg)));
+                       pr_warn("failed to determine %s retprobe bit: %s\n",
+                               uprobe ? "uprobe" : "kprobe",
+                               libbpf_strerror_r(bit, errmsg, sizeof(errmsg)));
                        return bit;
                }
                attr.config |= 1 << bit;
@@ -5050,9 +5043,9 @@ static int perf_event_open_probe(bool uprobe, bool 
retprobe, const char *name,
                      -1 /* group_fd */, PERF_FLAG_FD_CLOEXEC);
        if (pfd < 0) {
                err = -errno;
-               pr_warning("%s perf_event_open() failed: %s\n",
-                          uprobe ? "uprobe" : "kprobe",
-                          libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+               pr_warn("%s perf_event_open() failed: %s\n",
+                       uprobe ? "uprobe" : "kprobe",
+                       libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
                return err;
        }
        return pfd;
@@ -5069,20 +5062,20 @@ struct bpf_link *bpf_program__attach_kprobe(struct 
bpf_program *prog,
        pfd = perf_event_open_probe(false /* uprobe */, retprobe, func_name,
                                    0 /* offset */, -1 /* pid */);
        if (pfd < 0) {
-               pr_warning("program '%s': failed to create %s '%s' perf event: 
%s\n",
-                          bpf_program__title(prog, false),
-                          retprobe ? "kretprobe" : "kprobe", func_name,
-                          libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
+               pr_warn("program '%s': failed to create %s '%s' perf event: 
%s\n",
+                       bpf_program__title(prog, false),
+                       retprobe ? "kretprobe" : "kprobe", func_name,
+                       libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
                return ERR_PTR(pfd);
        }
        link = bpf_program__attach_perf_event(prog, pfd);
        if (IS_ERR(link)) {
                close(pfd);
                err = PTR_ERR(link);
-               pr_warning("program '%s': failed to attach to %s '%s': %s\n",
-                          bpf_program__title(prog, false),
-                          retprobe ? "kretprobe" : "kprobe", func_name,
-                          libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+               pr_warn("program '%s': failed to attach to %s '%s': %s\n",
+                       bpf_program__title(prog, false),
+                       retprobe ? "kretprobe" : "kprobe", func_name,
+                       libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
                return link;
        }
        return link;
@@ -5100,8 +5093,8 @@ struct bpf_link *bpf_program__attach_uprobe(struct 
bpf_program *prog,
        pfd = perf_event_open_probe(true /* uprobe */, retprobe,
                                    binary_path, func_offset, pid);
        if (pfd < 0) {
-               pr_warning("program '%s': failed to create %s '%s:0x%zx' perf 
event: %s\n",
-                          bpf_program__title(prog, false),
+               pr_warn("program '%s': failed to create %s '%s:0x%zx' perf 
event: %s\n",
+                       bpf_program__title(prog, false),
                           retprobe ? "uretprobe" : "uprobe",
                           binary_path, func_offset,
                           libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
@@ -5111,11 +5104,11 @@ struct bpf_link *bpf_program__attach_uprobe(struct 
bpf_program *prog,
        if (IS_ERR(link)) {
                close(pfd);
                err = PTR_ERR(link);
-               pr_warning("program '%s': failed to attach to %s '%s:0x%zx': 
%s\n",
-                          bpf_program__title(prog, false),
-                          retprobe ? "uretprobe" : "uprobe",
-                          binary_path, func_offset,
-                          libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+               pr_warn("program '%s': failed to attach to %s '%s:0x%zx': %s\n",
+                       bpf_program__title(prog, false),
+                       retprobe ? "uretprobe" : "uprobe",
+                       binary_path, func_offset,
+                       libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
                return link;
        }
        return link;
@@ -5149,9 +5142,9 @@ static int perf_event_open_tracepoint(const char 
*tp_category,
 
        tp_id = determine_tracepoint_id(tp_category, tp_name);
        if (tp_id < 0) {
-               pr_warning("failed to determine tracepoint '%s/%s' perf event 
ID: %s\n",
-                          tp_category, tp_name,
-                          libbpf_strerror_r(tp_id, errmsg, sizeof(errmsg)));
+               pr_warn("failed to determine tracepoint '%s/%s' perf event ID: 
%s\n",
+                       tp_category, tp_name,
+                       libbpf_strerror_r(tp_id, errmsg, sizeof(errmsg)));
                return tp_id;
        }
 
@@ -5163,9 +5156,9 @@ static int perf_event_open_tracepoint(const char 
*tp_category,
                      -1 /* group_fd */, PERF_FLAG_FD_CLOEXEC);
        if (pfd < 0) {
                err = -errno;
-               pr_warning("tracepoint '%s/%s' perf_event_open() failed: %s\n",
-                          tp_category, tp_name,
-                          libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+               pr_warn("tracepoint '%s/%s' perf_event_open() failed: %s\n",
+                       tp_category, tp_name,
+                       libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
                return err;
        }
        return pfd;
@@ -5181,20 +5174,20 @@ struct bpf_link *bpf_program__attach_tracepoint(struct 
bpf_program *prog,
 
        pfd = perf_event_open_tracepoint(tp_category, tp_name);
        if (pfd < 0) {
-               pr_warning("program '%s': failed to create tracepoint '%s/%s' 
perf event: %s\n",
-                          bpf_program__title(prog, false),
-                          tp_category, tp_name,
-                          libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
+               pr_warn("program '%s': failed to create tracepoint '%s/%s' perf 
event: %s\n",
+                       bpf_program__title(prog, false),
+                       tp_category, tp_name,
+                       libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
                return ERR_PTR(pfd);
        }
        link = bpf_program__attach_perf_event(prog, pfd);
        if (IS_ERR(link)) {
                close(pfd);
                err = PTR_ERR(link);
-               pr_warning("program '%s': failed to attach to tracepoint 
'%s/%s': %s\n",
-                          bpf_program__title(prog, false),
-                          tp_category, tp_name,
-                          libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
+               pr_warn("program '%s': failed to attach to tracepoint '%s/%s': 
%s\n",
+                       bpf_program__title(prog, false),
+                       tp_category, tp_name,
+                       libbpf_strerror_r(err, errmsg, sizeof(errmsg)));
                return link;
        }
        return link;
@@ -5216,8 +5209,8 @@ struct bpf_link 
*bpf_program__attach_raw_tracepoint(struct bpf_program *prog,
 
        prog_fd = bpf_program__fd(prog);
        if (prog_fd < 0) {
-               pr_warning("program '%s': can't attach before loaded\n",
-                          bpf_program__title(prog, false));
+               pr_warn("program '%s': can't attach before loaded\n",
+                       bpf_program__title(prog, false));
                return ERR_PTR(-EINVAL);
        }
 
@@ -5230,9 +5223,9 @@ struct bpf_link 
*bpf_program__attach_raw_tracepoint(struct bpf_program *prog,
        if (pfd < 0) {
                pfd = -errno;
                free(link);
-               pr_warning("program '%s': failed to attach to raw tracepoint 
'%s': %s\n",
-                          bpf_program__title(prog, false), tp_name,
-                          libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
+               pr_warn("program '%s': failed to attach to raw tracepoint '%s': 
%s\n",
+                       bpf_program__title(prog, false), tp_name,
+                       libbpf_strerror_r(pfd, errmsg, sizeof(errmsg)));
                return ERR_PTR(pfd);
        }
        link->fd = pfd;
@@ -5334,7 +5327,7 @@ static void perf_buffer__free_cpu_buf(struct perf_buffer 
*pb,
                return;
        if (cpu_buf->base &&
            munmap(cpu_buf->base, pb->mmap_size + pb->page_size))
-               pr_warning("failed to munmap cpu_buf #%d\n", cpu_buf->cpu);
+               pr_warn("failed to munmap cpu_buf #%d\n", cpu_buf->cpu);
        if (cpu_buf->fd >= 0) {
                ioctl(cpu_buf->fd, PERF_EVENT_IOC_DISABLE, 0);
                close(cpu_buf->fd);
@@ -5384,8 +5377,8 @@ perf_buffer__open_cpu_buf(struct perf_buffer *pb, struct 
perf_event_attr *attr,
                              -1, PERF_FLAG_FD_CLOEXEC);
        if (cpu_buf->fd < 0) {
                err = -errno;
-               pr_warning("failed to open perf buffer event on cpu #%d: %s\n",
-                          cpu, libbpf_strerror_r(err, msg, sizeof(msg)));
+               pr_warn("failed to open perf buffer event on cpu #%d: %s\n",
+                       cpu, libbpf_strerror_r(err, msg, sizeof(msg)));
                goto error;
        }
 
@@ -5395,15 +5388,15 @@ perf_buffer__open_cpu_buf(struct perf_buffer *pb, 
struct perf_event_attr *attr,
        if (cpu_buf->base == MAP_FAILED) {
                cpu_buf->base = NULL;
                err = -errno;
-               pr_warning("failed to mmap perf buffer on cpu #%d: %s\n",
-                          cpu, libbpf_strerror_r(err, msg, sizeof(msg)));
+               pr_warn("failed to mmap perf buffer on cpu #%d: %s\n",
+                       cpu, libbpf_strerror_r(err, msg, sizeof(msg)));
                goto error;
        }
 
        if (ioctl(cpu_buf->fd, PERF_EVENT_IOC_ENABLE, 0) < 0) {
                err = -errno;
-               pr_warning("failed to enable perf buffer event on cpu #%d: 
%s\n",
-                          cpu, libbpf_strerror_r(err, msg, sizeof(msg)));
+               pr_warn("failed to enable perf buffer event on cpu #%d: %s\n",
+                       cpu, libbpf_strerror_r(err, msg, sizeof(msg)));
                goto error;
        }
 
@@ -5463,8 +5456,8 @@ static struct perf_buffer *__perf_buffer__new(int map_fd, 
size_t page_cnt,
        int err, i;
 
        if (page_cnt & (page_cnt - 1)) {
-               pr_warning("page count should be power of two, but is %zu\n",
-                          page_cnt);
+               pr_warn("page count should be power of two, but is %zu\n",
+                       page_cnt);
                return ERR_PTR(-EINVAL);
        }
 
@@ -5472,14 +5465,14 @@ static struct perf_buffer *__perf_buffer__new(int 
map_fd, size_t page_cnt,
        err = bpf_obj_get_info_by_fd(map_fd, &map, &map_info_len);
        if (err) {
                err = -errno;
-               pr_warning("failed to get map info for map FD %d: %s\n",
-                          map_fd, libbpf_strerror_r(err, msg, sizeof(msg)));
+               pr_warn("failed to get map info for map FD %d: %s\n",
+                       map_fd, libbpf_strerror_r(err, msg, sizeof(msg)));
                return ERR_PTR(err);
        }
 
        if (map.type != BPF_MAP_TYPE_PERF_EVENT_ARRAY) {
-               pr_warning("map '%s' should be BPF_MAP_TYPE_PERF_EVENT_ARRAY\n",
-                          map.name);
+               pr_warn("map '%s' should be BPF_MAP_TYPE_PERF_EVENT_ARRAY\n",
+                       map.name);
                return ERR_PTR(-EINVAL);
        }
 
@@ -5499,8 +5492,8 @@ static struct perf_buffer *__perf_buffer__new(int map_fd, 
size_t page_cnt,
        pb->epoll_fd = epoll_create1(EPOLL_CLOEXEC);
        if (pb->epoll_fd < 0) {
                err = -errno;
-               pr_warning("failed to create epoll instance: %s\n",
-                          libbpf_strerror_r(err, msg, sizeof(msg)));
+               pr_warn("failed to create epoll instance: %s\n",
+                       libbpf_strerror_r(err, msg, sizeof(msg)));
                goto error;
        }
 
@@ -5519,13 +5512,13 @@ static struct perf_buffer *__perf_buffer__new(int 
map_fd, size_t page_cnt,
        pb->events = calloc(pb->cpu_cnt, sizeof(*pb->events));
        if (!pb->events) {
                err = -ENOMEM;
-               pr_warning("failed to allocate events: out of memory\n");
+               pr_warn("failed to allocate events: out of memory\n");
                goto error;
        }
        pb->cpu_bufs = calloc(pb->cpu_cnt, sizeof(*pb->cpu_bufs));
        if (!pb->cpu_bufs) {
                err = -ENOMEM;
-               pr_warning("failed to allocate buffers: out of memory\n");
+               pr_warn("failed to allocate buffers: out of memory\n");
                goto error;
        }
 
@@ -5548,9 +5541,9 @@ static struct perf_buffer *__perf_buffer__new(int map_fd, 
size_t page_cnt,
                                          &cpu_buf->fd, 0);
                if (err) {
                        err = -errno;
-                       pr_warning("failed to set cpu #%d, key %d -> perf FD 
%d: %s\n",
-                                  cpu, map_key, cpu_buf->fd,
-                                  libbpf_strerror_r(err, msg, sizeof(msg)));
+                       pr_warn("failed to set cpu #%d, key %d -> perf FD %d: 
%s\n",
+                               cpu, map_key, cpu_buf->fd,
+                               libbpf_strerror_r(err, msg, sizeof(msg)));
                        goto error;
                }
 
@@ -5559,9 +5552,9 @@ static struct perf_buffer *__perf_buffer__new(int map_fd, 
size_t page_cnt,
                if (epoll_ctl(pb->epoll_fd, EPOLL_CTL_ADD, cpu_buf->fd,
                              &pb->events[i]) < 0) {
                        err = -errno;
-                       pr_warning("failed to epoll_ctl cpu #%d perf FD %d: 
%s\n",
-                                  cpu, cpu_buf->fd,
-                                  libbpf_strerror_r(err, msg, sizeof(msg)));
+                       pr_warn("failed to epoll_ctl cpu #%d perf FD %d: %s\n",
+                               cpu, cpu_buf->fd,
+                               libbpf_strerror_r(err, msg, sizeof(msg)));
                        goto error;
                }
        }
@@ -5614,7 +5607,7 @@ perf_buffer__process_record(struct perf_event_header *e, 
void *ctx)
                break;
        }
        default:
-               pr_warning("unknown perf sample type %d\n", e->type);
+               pr_warn("unknown perf sample type %d\n", e->type);
                return LIBBPF_PERF_EVENT_ERROR;
        }
        return LIBBPF_PERF_EVENT_CONT;
@@ -5644,7 +5637,7 @@ int perf_buffer__poll(struct perf_buffer *pb, int 
timeout_ms)
 
                err = perf_buffer__process_records(pb, cpu_buf);
                if (err) {
-                       pr_warning("error while processing records: %d\n", err);
+                       pr_warn("error while processing records: %d\n", err);
                        return err;
                }
        }
@@ -5841,13 +5834,13 @@ bpf_program__get_prog_info_linear(int fd, __u64 arrays)
                v2 = bpf_prog_info_read_offset_u32(&info_linear->info,
                                                   desc->count_offset);
                if (v1 != v2)
-                       pr_warning("%s: mismatch in element count\n", __func__);
+                       pr_warn("%s: mismatch in element count\n", __func__);
 
                v1 = bpf_prog_info_read_offset_u32(&info, desc->size_offset);
                v2 = bpf_prog_info_read_offset_u32(&info_linear->info,
                                                   desc->size_offset);
                if (v1 != v2)
-                       pr_warning("%s: mismatch in rec size\n", __func__);
+                       pr_warn("%s: mismatch in rec size\n", __func__);
        }
 
        /* step 7: update info_len and data_len */
@@ -5915,20 +5908,19 @@ int libbpf_num_possible_cpus(void)
        fd = open(fcpu, O_RDONLY);
        if (fd < 0) {
                error = errno;
-               pr_warning("Failed to open file %s: %s\n",
-                          fcpu, strerror(error));
+               pr_warn("Failed to open file %s: %s\n", fcpu, strerror(error));
                return -error;
        }
        len = read(fd, buf, sizeof(buf));
        close(fd);
        if (len <= 0) {
                error = len ? errno : EINVAL;
-               pr_warning("Failed to read # of possible cpus from %s: %s\n",
-                          fcpu, strerror(error));
+               pr_warn("Failed to read # of possible cpus from %s: %s\n",
+                       fcpu, strerror(error));
                return -error;
        }
        if (len == sizeof(buf)) {
-               pr_warning("File %s size overflow\n", fcpu);
+               pr_warn("File %s size overflow\n", fcpu);
                return -EOVERFLOW;
        }
        buf[len] = '\0';
@@ -5939,8 +5931,8 @@ int libbpf_num_possible_cpus(void)
                        buf[ir] = '\0';
                        n = sscanf(&buf[il], "%u-%u", &start, &end);
                        if (n <= 0) {
-                               pr_warning("Failed to get # CPUs from %s\n",
-                                          &buf[il]);
+                               pr_warn("Failed to get # CPUs from %s\n",
+                                       &buf[il]);
                                return -EINVAL;
                        } else if (n == 1) {
                                end = start;
@@ -5950,7 +5942,7 @@ int libbpf_num_possible_cpus(void)
                }
        }
        if (tmp_cpus <= 0) {
-               pr_warning("Invalid #CPUs %d from %s\n", tmp_cpus, fcpu);
+               pr_warn("Invalid #CPUs %d from %s\n", tmp_cpus, fcpu);
                return -EINVAL;
        }
 
diff --git a/tools/lib/bpf/libbpf_internal.h b/tools/lib/bpf/libbpf_internal.h
index 2e83a34f8c79..d2febc3cedc8 100644
--- a/tools/lib/bpf/libbpf_internal.h
+++ b/tools/lib/bpf/libbpf_internal.h
@@ -43,7 +43,7 @@ do {                          \
        libbpf_print(level, "libbpf: " fmt, ##__VA_ARGS__);     \
 } while (0)
 
-#define pr_warning(fmt, ...)   __pr(LIBBPF_WARN, fmt, ##__VA_ARGS__)
+#define pr_warn(fmt, ...)      __pr(LIBBPF_WARN, fmt, ##__VA_ARGS__)
 #define pr_info(fmt, ...)      __pr(LIBBPF_INFO, fmt, ##__VA_ARGS__)
 #define pr_debug(fmt, ...)     __pr(LIBBPF_DEBUG, fmt, ##__VA_ARGS__)
 
diff --git a/tools/lib/bpf/xsk.c b/tools/lib/bpf/xsk.c
index 842c4fd55859..90bbe5c7163e 100644
--- a/tools/lib/bpf/xsk.c
+++ b/tools/lib/bpf/xsk.c
@@ -311,7 +311,7 @@ static int xsk_load_xdp_prog(struct xsk_socket *xsk)
                                   "LGPL-2.1 or BSD-2-Clause", 0, log_buf,
                                   log_buf_size);
        if (prog_fd < 0) {
-               pr_warning("BPF log buffer:\n%s", log_buf);
+               pr_warn("BPF log buffer:\n%s", log_buf);
                return prog_fd;
        }
 
@@ -500,7 +500,7 @@ int xsk_socket__create(struct xsk_socket **xsk_ptr, const 
char *ifname,
                return -EFAULT;
 
        if (umem->refcount) {
-               pr_warning("Error: shared umems not supported by libbpf.\n");
+               pr_warn("Error: shared umems not supported by libbpf.\n");
                return -EBUSY;
        }
 
-- 
2.20.1

Reply via email to