Lines Matching refs:verbose

233 __printf(2, 3) static void verbose(void *private_data, const char *fmt, ...)  in verbose()  function
270 verbose(env, "_"); in print_liveness()
272 verbose(env, "r"); in print_liveness()
274 verbose(env, "w"); in print_liveness()
293 verbose(env, " frame%d:", state->frameno); in print_verifier_state()
299 verbose(env, " R%d", i); in print_verifier_state()
301 verbose(env, "=%s", reg_type_str[t]); in print_verifier_state()
305 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
307 verbose(env, ",call_%d", func(env, reg)->callsite); in print_verifier_state()
309 verbose(env, "(id=%d", reg->id); in print_verifier_state()
311 verbose(env, ",off=%d", reg->off); in print_verifier_state()
313 verbose(env, ",r=%d", reg->range); in print_verifier_state()
317 verbose(env, ",ks=%d,vs=%d", in print_verifier_state()
325 verbose(env, ",imm=%llx", reg->var_off.value); in print_verifier_state()
329 verbose(env, ",smin_value=%lld", in print_verifier_state()
333 verbose(env, ",smax_value=%lld", in print_verifier_state()
336 verbose(env, ",umin_value=%llu", in print_verifier_state()
339 verbose(env, ",umax_value=%llu", in print_verifier_state()
345 verbose(env, ",var_off=%s", tn_buf); in print_verifier_state()
348 verbose(env, ")"); in print_verifier_state()
353 verbose(env, " fp%d", in print_verifier_state()
356 verbose(env, "=%s", in print_verifier_state()
360 verbose(env, " fp%d=0", (-i - 1) * BPF_REG_SIZE); in print_verifier_state()
362 verbose(env, "\n"); in print_verifier_state()
532 verbose(env, "BPF program is too complex\n"); in push_stack()
583 verbose(env, "mark_reg_known_zero(regs, %u)\n", regno); in mark_reg_known_zero()
698 verbose(env, "mark_reg_unknown(regs, %u)\n", regno); in mark_reg_unknown()
717 verbose(env, "mark_reg_not_init(regs, %u)\n", regno); in mark_reg_not_init()
788 verbose(env, "call to invalid destination\n"); in add_subprog()
795 verbose(env, "too many subprograms\n"); in add_subprog()
823 verbose(env, "function calls to other bpf functions are allowed for root only\n"); in check_subprogs()
827 verbose(env, "function calls in offloaded programs are not supported yet\n"); in check_subprogs()
842 verbose(env, "func#%d @%d\n", i, subprog[i].start); in check_subprogs()
856 verbose(env, "jump out of range from insn %d to %d\n", i, off); in check_subprogs()
867 verbose(env, "last insn is not an exit or jmp\n"); in check_subprogs()
921 verbose(env, "verifier bug regno %d tmp %p\n", regno, tmp); in skip_callee()
922 verbose(env, "regno %d parent frame %d current frame %d\n", in skip_callee()
962 verbose(env, "R%d is invalid\n", regno); in check_reg_arg()
969 verbose(env, "R%d !read_ok\n", regno); in check_reg_arg()
976 verbose(env, "frame pointer is read only\n"); in check_reg_arg()
1030 verbose(env, "attempt to corrupt spilled pointer on stack\n"); in check_stack_write()
1040 verbose(env, "invalid size of register spill\n"); in check_stack_write()
1045 verbose(env, "cannot spill pointers to stack into stack frame of the caller\n"); in check_stack_write()
1071 verbose(env, in check_stack_write()
1174 verbose(env, "invalid read from stack off %d+0 size %d\n", in check_stack_read()
1182 verbose(env, "invalid size of register spill\n"); in check_stack_read()
1187 verbose(env, "corrupted spill memory\n"); in check_stack_read()
1214 verbose(env, "invalid read from stack off %d+%d size %d\n", in check_stack_read()
1245 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", in __check_map_access()
1274verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_map_access()
1281 verbose(env, "R%d min value is outside of the array range\n", in check_map_access()
1291verbose(env, "R%d unbounded memory access, make sure to bounds check any array access into a map\n… in check_map_access()
1298 verbose(env, "R%d max value is outside of the array range\n", in check_map_access()
1342 verbose(env, "invalid access to packet, off=%d size=%d, R%d(id=%d,off=%d,r=%d)\n", in __check_packet_access()
1365verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_packet_access()
1371 verbose(env, "R%d offset is outside of the packet\n", regno); in check_packet_access()
1403 verbose(env, "invalid bpf_context access off=%d size=%d\n", off, size); in check_ctx_access()
1461 verbose(env, in check_pkt_ptr_alignment()
1486 verbose(env, "misaligned %saccess off %s+%d+%d size %d\n", in check_generic_ptr_alignment()
1563 verbose(env, "combined stack size of %d calls is %d. Too large\n", in check_max_stack_depth()
1629 verbose(env, "dereference of modified ctx ptr R%d off=%d disallowed\n", in check_ctx_reg()
1638 verbose(env, "variable ctx access var_off=%s disallowed\n", tn_buf); in check_ctx_reg()
1698 verbose(env, "R%d leaks addr into map\n", value_regno); in check_mem_access()
1711 verbose(env, "R%d leaks addr into ctx\n", value_regno); in check_mem_access()
1745 verbose(env, "variable stack access var_off=%s off=%d size=%d", in check_mem_access()
1751 verbose(env, "invalid stack off=%d size=%d\n", off, in check_mem_access()
1769 verbose(env, "cannot write into packet\n"); in check_mem_access()
1774 verbose(env, "R%d leaks addr into packet\n", in check_mem_access()
1782 verbose(env, "R%d invalid mem access '%s'\n", regno, in check_mem_access()
1801 verbose(env, "BPF_XADD uses reserved fields\n"); in check_xadd()
1816 verbose(env, "R%d leaks addr into mem\n", insn->src_reg); in check_xadd()
1822 verbose(env, "BPF_XADD stores into R%d %s is not allowed\n", in check_xadd()
1859 verbose(env, "R%d type=%s expected=%s\n", regno, in check_stack_boundary()
1870 verbose(env, "invalid variable stack read R%d var_off=%s\n", in check_stack_boundary()
1877 verbose(env, "invalid stack type R%d off=%d access_size=%d\n", in check_stack_boundary()
1904 verbose(env, "invalid indirect read from stack off %d+%d size %d\n", in check_stack_boundary()
1967 verbose(env, "R%d leaks addr into helper function\n", in check_func_arg()
1976 verbose(env, "helper access to the packet is not allowed\n"); in check_func_arg()
2017 verbose(env, "unsupported arg_type %d\n", arg_type); in check_func_arg()
2035 verbose(env, "invalid map_ptr to access map->key\n"); in check_func_arg()
2047 verbose(env, "invalid map_ptr to access map->value\n"); in check_func_arg()
2074 verbose(env, "R%d min value is negative, either use unsigned or 'var &= const'\n", in check_func_arg()
2088 verbose(env, "R%d unbounded memory access, use 'var &= const' or 'if (var < const)'\n", in check_func_arg()
2099 verbose(env, "R%d type=%s expected=%s\n", regno, in check_func_arg()
2184 verbose(env, "tail_calls are not allowed in programs with bpf-to-bpf calls\n"); in check_map_func_compatibility()
2235 verbose(env, "cannot pass map_type %d into func %s#%d\n", in check_map_func_compatibility()
2334 verbose(env, "the call stack of %d frames is too deep\n", in check_func_call()
2342 verbose(env, "verifier bug. No program starts at insn %d\n", in check_func_call()
2349 verbose(env, "verifier bug. Frame %d already allocated\n", in check_func_call()
2386 verbose(env, "caller:\n"); in check_func_call()
2388 verbose(env, "callee:\n"); in check_func_call()
2409 verbose(env, "cannot return stack pointer to the caller\n"); in prepare_func_exit()
2420 verbose(env, "returning from callee:\n"); in prepare_func_exit()
2422 verbose(env, "to caller at %d:\n", *insn_idx); in prepare_func_exit()
2461 verbose(env, "kernel subsystem misconfigured verifier\n"); in record_func_map()
2484 verbose(env, "invalid func %s#%d\n", func_id_name(func_id), in check_helper_call()
2492 verbose(env, "unknown func %s#%d\n", func_id_name(func_id), in check_helper_call()
2499 verbose(env, "cannot call GPL-restricted function from non-GPL compatible program\n"); in check_helper_call()
2506 verbose(env, "kernel subsystem misconfigured func %s#%d: r1 != ctx\n", in check_helper_call()
2516 verbose(env, "kernel subsystem misconfigured func %s#%d\n", in check_helper_call()
2559 verbose(env, "get_local_storage() doesn't support non-zero flags\n"); in check_helper_call()
2589 verbose(env, in check_helper_call()
2596 verbose(env, "unknown return type %d of func %s#%d\n", in check_helper_call()
2618 verbose(env, err_str, func_id_name(func_id), func_id); in check_helper_call()
2659 verbose(env, "math between %s pointer and %lld is not allowed\n", in check_reg_sane_offset()
2665 verbose(env, "%s pointer offset %d is not allowed\n", in check_reg_sane_offset()
2671 verbose(env, "math between %s pointer and register with unbounded min value is not allowed\n", in check_reg_sane_offset()
2677 verbose(env, "value %lld makes %s pointer be out of bounds\n", in check_reg_sane_offset()
2719 verbose(env, in adjust_ptr_min_max_vals()
2726verbose(env, "R%d pointer arithmetic on PTR_TO_MAP_VALUE_OR_NULL prohibited, null-check it first\n… in adjust_ptr_min_max_vals()
2731 verbose(env, "R%d pointer arithmetic on CONST_PTR_TO_MAP prohibited\n", in adjust_ptr_min_max_vals()
2736 verbose(env, "R%d pointer arithmetic on PTR_TO_PACKET_END prohibited\n", in adjust_ptr_min_max_vals()
2804 verbose(env, "R%d tried to subtract pointer from scalar\n", in adjust_ptr_min_max_vals()
2813 verbose(env, "R%d subtraction from stack pointer prohibited\n", in adjust_ptr_min_max_vals()
2864 verbose(env, "R%d bitwise operator %s on pointer prohibited\n", in adjust_ptr_min_max_vals()
2869 verbose(env, "R%d pointer arithmetic with %s operator prohibited\n", in adjust_ptr_min_max_vals()
3178 verbose(env, "R%d pointer %s pointer prohibited\n", in adjust_reg_min_max_vals()
3210 verbose(env, "verifier internal error: unexpected ptr_reg\n"); in adjust_reg_min_max_vals()
3215 verbose(env, "verifier internal error: no src_reg\n"); in adjust_reg_min_max_vals()
3233 verbose(env, "BPF_NEG uses reserved fields\n"); in check_alu_op()
3240 verbose(env, "BPF_END uses reserved fields\n"); in check_alu_op()
3251 verbose(env, "R%d pointer arithmetic prohibited\n", in check_alu_op()
3265 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
3275 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
3295 verbose(env, in check_alu_op()
3320 verbose(env, "invalid BPF_ALU opcode %x\n", opcode); in check_alu_op()
3327 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
3336 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
3348 verbose(env, "div by zero\n"); in check_alu_op()
3353 verbose(env, "BPF_ARSH not supported for 32 bit ALU\n"); in check_alu_op()
3362 verbose(env, "invalid shift %d\n", insn->imm); in check_alu_op()
3827 verbose(env, "invalid BPF_JMP opcode %x\n", opcode); in check_cond_jmp_op()
3833 verbose(env, "BPF_JMP uses reserved fields\n"); in check_cond_jmp_op()
3843 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
3849 verbose(env, "BPF_JMP uses reserved fields\n"); in check_cond_jmp_op()
3929 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
3953 verbose(env, "invalid BPF_LD_IMM insn\n"); in check_ld_imm()
3957 verbose(env, "BPF_LD_IMM64 uses reserved fields\n"); in check_ld_imm()
4015 verbose(env, "BPF_LD_[ABS|IND] instructions not allowed for this program type\n"); in check_ld_abs()
4020 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_abs()
4032 verbose(env, "BPF_LD_[ABS|IND] instructions cannot be mixed with bpf-to-bpf calls\n"); in check_ld_abs()
4039 verbose(env, "BPF_LD_[ABS|IND] uses reserved fields\n"); in check_ld_abs()
4049 verbose(env, in check_ld_abs()
4093 verbose(env, "At program exit the register R0 is not a known value (%s)\n", in check_return_code()
4099 verbose(env, "At program exit the register R0 "); in check_return_code()
4104 verbose(env, "has value %s", tn_buf); in check_return_code()
4106 verbose(env, "has unknown scalar value"); in check_return_code()
4108 verbose(env, " should have been 0 or 1\n"); in check_return_code()
4174 verbose(env, "jump out of range from insn %d to %d\n", t, w); in push_insn()
4191 verbose(env, "back-edge from insn %d to %d\n", t, w); in push_insn()
4197 verbose(env, "insn state internal bug\n"); in push_insn()
4303 verbose(env, "pop stack internal bug\n"); in check_cfg()
4312 verbose(env, "unreachable insn %d\n", i); in check_cfg()
4763 verbose(env, "invalid insn idx %d insn_cnt %d\n", in do_check()
4772 verbose(env, in do_check()
4785 verbose(env, "\nfrom %d to %d: safe\n", in do_check()
4788 verbose(env, "%d: safe\n", insn_idx); in do_check()
4798 verbose(env, "%d:", insn_idx); in do_check()
4800 verbose(env, "\nfrom %d to %d:", in do_check()
4808 .cb_print = verbose, in do_check()
4812 verbose(env, "%d: ", insn_idx); in do_check()
4874 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
4914 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
4921 verbose(env, "BPF_ST uses reserved fields\n"); in do_check()
4930 verbose(env, "BPF_ST stores into R%d context is not allowed\n", in do_check()
4951 verbose(env, "BPF_CALL uses reserved fields\n"); in do_check()
4967 verbose(env, "BPF_JA uses reserved fields\n"); in do_check()
4979 verbose(env, "BPF_EXIT uses reserved fields\n"); in do_check()
5004 verbose(env, "R0 leaks addr as return value\n"); in do_check()
5042 verbose(env, "invalid BPF_LD mode\n"); in do_check()
5046 verbose(env, "unknown insn class %d\n", class); in do_check()
5053 verbose(env, "processed %d insns (limit %d), stack depth ", in do_check()
5058 verbose(env, "%d", depth); in do_check()
5060 verbose(env, "+"); in do_check()
5062 verbose(env, "\n"); in do_check()
5087 verbose(env, "perf_event programs can only use preallocated hash map\n"); in check_map_prog_compatibility()
5092 verbose(env, "perf_event programs can only use preallocated inner hash map\n"); in check_map_prog_compatibility()
5099 verbose(env, "offload device mismatch between prog and map\n"); in check_map_prog_compatibility()
5122 verbose(env, "BPF_LDX uses reserved fields\n"); in replace_map_fd_with_map_ptr()
5129 verbose(env, "BPF_STX uses reserved fields\n"); in replace_map_fd_with_map_ptr()
5140 verbose(env, "invalid bpf_ld_imm64 insn\n"); in replace_map_fd_with_map_ptr()
5149 verbose(env, in replace_map_fd_with_map_ptr()
5157 verbose(env, "fd %d is not pointing to valid bpf_map\n", in replace_map_fd_with_map_ptr()
5198 verbose(env, in replace_map_fd_with_map_ptr()
5213 verbose(env, "unknown opcode %02x\n", insn->code); in replace_map_fd_with_map_ptr()
5348 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
5425 verbose(env, "bpf verifier narrow ctx access misconfigured\n"); in convert_ctx_accesses()
5444 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
5574 verbose(env, "JIT doesn't support bpf-to-bpf calls\n"); in jit_subprogs()
5721 verbose(env, "bpf verifier is misconfigured\n"); in fixup_bpf_calls()
5774 verbose(env, "tail_call abusing map_ptr\n"); in fixup_bpf_calls()
5815 verbose(env, "bpf verifier is misconfigured\n"); in fixup_bpf_calls()
5861 verbose(env, in fixup_bpf_calls()