Lines Matching refs:verbose

323 __printf(2, 3) static void verbose(void *private_data, const char *fmt, ...)  in verbose()  function
378 verbose(env, "%s\n", in verbose_linfo()
542 verbose(env, "_"); in print_liveness()
544 verbose(env, "r"); in print_liveness()
546 verbose(env, "w"); in print_liveness()
548 verbose(env, "D"); in print_liveness()
573 verbose(env, " frame%d:", state->frameno); in print_verifier_state()
579 verbose(env, " R%d", i); in print_verifier_state()
581 verbose(env, "=%s", reg_type_str[t]); in print_verifier_state()
583 verbose(env, "P"); in print_verifier_state()
587 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
592 verbose(env, "%s", kernel_type_name(reg->btf_id)); in print_verifier_state()
593 verbose(env, "(id=%d", reg->id); in print_verifier_state()
595 verbose(env, ",ref_obj_id=%d", reg->ref_obj_id); in print_verifier_state()
597 verbose(env, ",off=%d", reg->off); in print_verifier_state()
599 verbose(env, ",r=%d", reg->range); in print_verifier_state()
603 verbose(env, ",ks=%d,vs=%d", in print_verifier_state()
611 verbose(env, ",imm=%llx", reg->var_off.value); in print_verifier_state()
615 verbose(env, ",smin_value=%lld", in print_verifier_state()
619 verbose(env, ",smax_value=%lld", in print_verifier_state()
622 verbose(env, ",umin_value=%llu", in print_verifier_state()
625 verbose(env, ",umax_value=%llu", in print_verifier_state()
631 verbose(env, ",var_off=%s", tn_buf); in print_verifier_state()
635 verbose(env, ",s32_min_value=%d", in print_verifier_state()
639 verbose(env, ",s32_max_value=%d", in print_verifier_state()
643 verbose(env, ",u32_min_value=%d", in print_verifier_state()
647 verbose(env, ",u32_max_value=%d", in print_verifier_state()
650 verbose(env, ")"); in print_verifier_state()
667 verbose(env, " fp%d", (-i - 1) * BPF_REG_SIZE); in print_verifier_state()
672 verbose(env, "=%s", reg_type_str[t]); in print_verifier_state()
674 verbose(env, "P"); in print_verifier_state()
676 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
678 verbose(env, "=%s", types_buf); in print_verifier_state()
682 verbose(env, " refs=%d", state->refs[0].id); in print_verifier_state()
685 verbose(env, ",%d", state->refs[i].id); in print_verifier_state()
687 verbose(env, "\n"); in print_verifier_state()
980 verbose(env, "The sequence of %d jumps is too complex.\n", in push_stack()
1066 verbose(env, "mark_reg_known_zero(regs, %u)\n", regno); in mark_reg_known_zero()
1353 verbose(env, "mark_reg_unknown(regs, %u)\n", regno); in mark_reg_unknown()
1373 verbose(env, "mark_reg_not_init(regs, %u)\n", regno); in mark_reg_not_init()
1456 verbose(env, "call to invalid destination\n"); in add_subprog()
1463 verbose(env, "too many subprograms\n"); in add_subprog()
1491 verbose(env, in check_subprogs()
1507 verbose(env, "func#%d @%d\n", i, subprog[i].start); in check_subprogs()
1528 verbose(env, "jump out of range from insn %d to %d\n", i, off); in check_subprogs()
1539 verbose(env, "last insn is not an exit or jmp\n"); in check_subprogs()
1566 verbose(env, "verifier BUG type %s var_off %lld off %d\n", in mark_reg_read()
1727 verbose(env, "R%d is invalid\n", regno); in check_reg_arg()
1736 verbose(env, "R%d !read_ok\n", regno); in check_reg_arg()
1751 verbose(env, "frame pointer is read only\n"); in check_reg_arg()
1805 .cb_print = verbose, in backtrack_insn()
1819 verbose(env, "regs=%x stack=%llx before ", *reg_mask, *stack_mask); in backtrack_insn()
1820 verbose(env, "%d: ", idx); in backtrack_insn()
1877 verbose(env, "BUG spi %d\n", spi); in backtrack_insn()
1896 verbose(env, "BUG spi %d\n", spi); in backtrack_insn()
1915 verbose(env, "BUG regs %x\n", *reg_mask); in backtrack_insn()
2077 verbose(env, "last_idx %d first_idx %d\n", last_idx, first_idx); in __mark_chain_precision()
2107 verbose(env, "BUG backtracking idx %d\n", i); in __mark_chain_precision()
2165 verbose(env, "parent %s regs=%x stack=%llx marks\n", in __mark_chain_precision()
2291 verbose(env, "attempt to corrupt spilled pointer on stack\n"); in check_stack_write()
2317 verbose(env, "invalid size of register spill\n"); in check_stack_write()
2322 verbose(env, "cannot spill pointers to stack into stack frame of the caller\n"); in check_stack_write()
2353 verbose(env, in check_stack_write()
2411 verbose(env, "invalid read from stack off %d+0 size %d\n", in check_stack_read()
2422 verbose(env, "invalid size of register fill\n"); in check_stack_read()
2434 verbose(env, "corrupted spill memory\n"); in check_stack_read()
2454 verbose(env, "leaking pointer from stack off %d\n", in check_stack_read()
2469 verbose(env, "invalid read from stack off %d+%d size %d\n", in check_stack_read()
2513 verbose(env, "variable stack access var_off=%s off=%d size=%d\n", in check_stack_access()
2519 verbose(env, "invalid stack off=%d size=%d\n", off, size); in check_stack_access()
2534 verbose(env, "write into map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
2540 verbose(env, "read from map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
2562 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", in __check_mem_access()
2568 verbose(env, "invalid access to packet, off=%d size=%d, R%d(id=%d,off=%d,r=%d)\n", in __check_mem_access()
2573 verbose(env, "invalid access to memory, mem_size=%u off=%d size=%d\n", in __check_mem_access()
2607verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_mem_region_access()
2614 verbose(env, "R%d min value is outside of the allowed memory range\n", in check_mem_region_access()
2624 verbose(env, "R%d unbounded memory access, make sure to bounds check any such access\n", in check_mem_region_access()
2631 verbose(env, "R%d max value is outside of the allowed memory range\n", in check_mem_region_access()
2664 verbose(env, "bpf_spin_lock cannot be accessed directly by load/store\n"); in check_map_access()
2736verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_packet_access()
2743 verbose(env, "R%d offset is outside of the packet\n", regno); in check_packet_access()
2791 verbose(env, "invalid bpf_context access off=%d size=%d\n", off, size); in check_ctx_access()
2800 verbose(env, "invalid access to flow keys off=%d size=%d\n", in check_flow_keys_access()
2817verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_sock_access()
2846 verbose(env, "R%d invalid %s access off=%d size=%d\n", in check_sock_access()
2917 verbose(env, in check_pkt_ptr_alignment()
2942 verbose(env, "misaligned %saccess off %s+%d+%d size %d\n", in check_generic_ptr_alignment()
3051 verbose(env, in check_max_stack_depth()
3061 verbose(env, "combined stack size of %d calls is %d. Too large\n", in check_max_stack_depth()
3090 verbose(env, "the call stack of %d frames is too deep !\n", in check_max_stack_depth()
3141 verbose(env, "dereference of modified ctx ptr R%d off=%d disallowed\n", in check_ctx_reg()
3150 verbose(env, "variable ctx access var_off=%s disallowed\n", tn_buf); in check_ctx_reg()
3163 verbose(env, in __check_buffer_access()
3172 verbose(env, in __check_buffer_access()
3302 verbose(env, in check_ptr_to_btf_access()
3311 verbose(env, in check_ptr_to_btf_access()
3322 verbose(env, "only read is supported\n"); in check_ptr_to_btf_access()
3353 verbose(env, "map_ptr access not supported without CONFIG_DEBUG_INFO_BTF\n"); in check_ptr_to_map_access()
3358 verbose(env, "map_ptr access not supported for map type %d\n", in check_ptr_to_map_access()
3367 verbose(env, in check_ptr_to_map_access()
3374 verbose(env, "R%d is %s invalid negative access: off=%d\n", in check_ptr_to_map_access()
3380 verbose(env, "only read from %s is supported\n", tname); in check_ptr_to_map_access()
3425 verbose(env, "R%d leaks addr into map\n", value_regno); in check_mem_access()
3456 verbose(env, "R%d leaks addr into mem\n", value_regno); in check_mem_access()
3469 verbose(env, "R%d leaks addr into ctx\n", value_regno); in check_mem_access()
3524 verbose(env, "cannot write into packet\n"); in check_mem_access()
3529 verbose(env, "R%d leaks addr into packet\n", in check_mem_access()
3539 verbose(env, "R%d leaks addr into flow keys\n", in check_mem_access()
3549 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
3568 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
3584 verbose(env, "R%d invalid mem access '%s'\n", regno, in check_mem_access()
3603 verbose(env, "BPF_XADD uses reserved fields\n"); in check_xadd()
3618 verbose(env, "R%d leaks addr into mem\n", insn->src_reg); in check_xadd()
3626 verbose(env, "BPF_XADD stores into R%d %s is not allowed\n", in check_xadd()
3652 verbose(env, "invalid stack type R%d off=%d access_size=%d\n", in __check_stack_boundary()
3658 verbose(env, "invalid stack type R%d var_off=%s access_size=%d\n", in __check_stack_boundary()
3696 verbose(env, "R%d indirect variable offset stack access prohibited for !root, var_off=%s\n", in check_stack_boundary()
3711 verbose(env, "R%d unbounded indirect variable offset stack access\n", in check_stack_boundary()
3720 verbose(env, "R%d min value is outside of stack bound\n", in check_stack_boundary()
3727 verbose(env, "R%d max value is outside of stack bound\n", in check_stack_boundary()
3769 verbose(env, "invalid indirect read from stack off %d+%d size %d\n", in check_stack_boundary()
3775 verbose(env, "invalid indirect read from stack var_off %s+%d size %d\n", in check_stack_boundary()
3833 verbose(env, "R%d type=%s expected=%s\n", regno, in check_helper_mem_access()
3869 verbose(env, in process_spin_lock()
3875 verbose(env, in process_spin_lock()
3882 verbose(env, in process_spin_lock()
3886 verbose(env, in process_spin_lock()
3890 verbose(env, in process_spin_lock()
3896 verbose(env, "off %lld doesn't point to 'struct bpf_spin_lock'\n", in process_spin_lock()
3902 verbose(env, in process_spin_lock()
3909 verbose(env, "bpf_spin_unlock without taking a lock\n"); in process_spin_lock()
3913 verbose(env, "bpf_spin_unlock of different lock\n"); in process_spin_lock()
3961 verbose(env, "invalid map_ptr to access map->type\n"); in resolve_map_arg_type()
3971 verbose(env, "invalid arg_type for sockmap/sockhash\n"); in resolve_map_arg_type()
4088 verbose(env, "verifier internal error: unsupported arg type %d\n", arg_type); in check_reg_type()
4101 verbose(env, "R%d type=%s expected=", regno, reg_type_str[type]); in check_reg_type()
4103 verbose(env, "%s, ", reg_type_str[compatible->types[j]]); in check_reg_type()
4104 verbose(env, "%s\n", reg_type_str[compatible->types[j]]); in check_reg_type()
4111 verbose(env, "verifier internal error: missing arg compatible BTF ID\n"); in check_reg_type()
4119 verbose(env, "R%d is of type %s but %s is expected\n", in check_reg_type()
4126 verbose(env, "R%d is a pointer to in-kernel struct with non-zero offset\n", in check_reg_type()
4154 verbose(env, "R%d leaks addr into helper function\n", in check_func_arg()
4163 verbose(env, "helper access to the packet is not allowed\n"); in check_func_arg()
4194 verbose(env, "verifier internal error: more than one arg with ref_obj_id R%d %u %u\n", in check_func_arg()
4216 verbose(env, "invalid map_ptr to access map->key\n"); in check_func_arg()
4231 verbose(env, "invalid map_ptr to access map->value\n"); in check_func_arg()
4240 verbose(env, "Helper has invalid btf_id in R%d\n", regno); in check_func_arg()
4252 verbose(env, "verifier internal error\n"); in check_func_arg()
4285 verbose(env, "R%d min value is negative, either use unsigned or 'var &= const'\n", in check_func_arg()
4299 verbose(env, "R%d unbounded memory access, use 'var &= const' or 'if (var < const)'\n", in check_func_arg()
4310 verbose(env, "R%d unbounded size, use 'var &= const' or 'if (var < const)'\n", in check_func_arg()
4355 verbose(env, "cannot update sockmap in this context\n"); in may_update_sockmap()
4480 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n"); in check_map_func_compatibility()
4554 verbose(env, "cannot pass map_type %d into func %s#%d\n", in check_map_func_compatibility()
4749 verbose(env, "the call stack of %d frames is too deep\n", in check_func_call()
4757 verbose(env, "verifier bug. No program starts at insn %d\n", in check_func_call()
4764 verbose(env, "verifier bug. Frame %d already allocated\n", in check_func_call()
4777 verbose(env, "Caller passes invalid args into func#%d\n", in check_func_call()
4782 verbose(env, in check_func_call()
4830 verbose(env, "caller:\n"); in check_func_call()
4832 verbose(env, "callee:\n"); in check_func_call()
4854 verbose(env, "cannot return stack pointer to the caller\n"); in prepare_func_exit()
4870 verbose(env, "returning from callee:\n"); in prepare_func_exit()
4872 verbose(env, "to caller at %d:\n", *insn_idx); in prepare_func_exit()
4920 verbose(env, "kernel subsystem misconfigured verifier\n"); in record_func_map()
4933 verbose(env, "write into map forbidden\n"); in record_func_map()
4960 verbose(env, "kernel subsystem misconfigured verifier\n"); in record_func_key()
4991 verbose(env, "Unreleased reference id=%d alloc_insn=%d\n", in check_reference_leak()
5007 verbose(env, "invalid func %s#%d\n", func_id_name(func_id), in check_helper_call()
5015 verbose(env, "unknown func %s#%d\n", func_id_name(func_id), in check_helper_call()
5022 verbose(env, "cannot call GPL-restricted function from non-GPL compatible program\n"); in check_helper_call()
5027 verbose(env, "helper call is not allowed in probe\n"); in check_helper_call()
5034 verbose(env, "kernel subsystem misconfigured func %s#%d: r1 != ctx\n", in check_helper_call()
5044 verbose(env, "kernel subsystem misconfigured func %s#%d\n", in check_helper_call()
5078 verbose(env, "tail_call would lead to reference leak\n"); in check_helper_call()
5084 verbose(env, "func %s#%d reference has not been acquired before\n", in check_helper_call()
5097 verbose(env, "get_local_storage() doesn't support non-zero flags\n"); in check_helper_call()
5125 verbose(env, in check_helper_call()
5165 verbose(env, "unable to resolve the size of type '%s': %ld\n", in check_helper_call()
5186 verbose(env, "invalid return type %d of func %s#%d\n", in check_helper_call()
5192 verbose(env, "unknown return type %d of func %s#%d\n", in check_helper_call()
5233 verbose(env, err_str, func_id_name(func_id), func_id); in check_helper_call()
5297 verbose(env, "math between %s pointer and %lld is not allowed\n", in check_reg_sane_offset()
5303 verbose(env, "%s pointer offset %d is not allowed\n", in check_reg_sane_offset()
5309 verbose(env, "math between %s pointer and register with unbounded min value is not allowed\n", in check_reg_sane_offset()
5315 verbose(env, "value %lld makes %s pointer be out of bounds\n", in check_reg_sane_offset()
5485 verbose(env, in adjust_ptr_min_max_vals()
5493 verbose(env, "R%d pointer arithmetic on %s prohibited, null-check it first\n", in adjust_ptr_min_max_vals()
5509 verbose(env, "R%d pointer arithmetic on %s prohibited\n", in adjust_ptr_min_max_vals()
5514verbose(env, "R%d has unknown scalar with mixed signed bounds, pointer arithmetic with it prohibit… in adjust_ptr_min_max_vals()
5540 verbose(env, "R%d tried to add from different maps or paths\n", dst); in adjust_ptr_min_max_vals()
5595 verbose(env, "R%d tried to sub from different maps or paths\n", dst); in adjust_ptr_min_max_vals()
5600 verbose(env, "R%d tried to subtract pointer from scalar\n", in adjust_ptr_min_max_vals()
5609 verbose(env, "R%d subtraction from stack pointer prohibited\n", in adjust_ptr_min_max_vals()
5661 verbose(env, "R%d bitwise operator %s on pointer prohibited\n", in adjust_ptr_min_max_vals()
5666 verbose(env, "R%d pointer arithmetic with %s operator prohibited\n", in adjust_ptr_min_max_vals()
5684 verbose(env, "R%d pointer arithmetic of map value goes out of range, " in adjust_ptr_min_max_vals()
5690 verbose(env, "R%d stack pointer arithmetic goes out of range, " in adjust_ptr_min_max_vals()
6349 verbose(env, "R%d tried to add from different pointers or scalars\n", dst); in adjust_scalar_min_max_vals()
6359 verbose(env, "R%d tried to sub from different pointers or scalars\n", dst); in adjust_scalar_min_max_vals()
6474 verbose(env, "R%d pointer %s pointer prohibited\n", in adjust_reg_min_max_vals()
6512 verbose(env, "verifier internal error: unexpected ptr_reg\n"); in adjust_reg_min_max_vals()
6517 verbose(env, "verifier internal error: no src_reg\n"); in adjust_reg_min_max_vals()
6535 verbose(env, "BPF_NEG uses reserved fields\n"); in check_alu_op()
6542 verbose(env, "BPF_END uses reserved fields\n"); in check_alu_op()
6553 verbose(env, "R%d pointer arithmetic prohibited\n", in check_alu_op()
6567 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
6577 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
6607 verbose(env, in check_alu_op()
6643 verbose(env, "invalid BPF_ALU opcode %x\n", opcode); in check_alu_op()
6650 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
6659 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
6671 verbose(env, "div by zero\n"); in check_alu_op()
6680 verbose(env, "invalid shift %d\n", insn->imm); in check_alu_op()
7449 verbose(env, "invalid BPF_JMP/JMP32 opcode %x\n", opcode); in check_cond_jmp_op()
7455 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
7465 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
7472 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
7599 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
7618 verbose(env, "invalid BPF_LD_IMM insn\n"); in check_ld_imm()
7622 verbose(env, "BPF_LD_IMM64 uses reserved fields\n"); in check_ld_imm()
7652 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_imm()
7670 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_imm()
7712 verbose(env, "BPF_LD_[ABS|IND] instructions not allowed for this program type\n"); in check_ld_abs()
7717 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_abs()
7724 verbose(env, "BPF_LD_[ABS|IND] uses reserved fields\n"); in check_ld_abs()
7739 verbose(env, "BPF_LD_[ABS|IND] cannot be mixed with socket references\n"); in check_ld_abs()
7744 verbose(env, "BPF_LD_[ABS|IND] cannot be used inside bpf_spin_lock-ed region\n"); in check_ld_abs()
7749 verbose(env, in check_ld_abs()
7809 verbose(env, "R0 leaks addr as return value\n"); in check_return_code()
7816 verbose(env, "At subprogram exit the register R0 is not a scalar value (%s)\n", in check_return_code()
7877 verbose(env, "At program exit the register R0 is not a known value (%s)\n", in check_return_code()
7885 verbose(env, "At program exit the register R0 "); in check_return_code()
7888 verbose(env, "has value %s", tn_buf); in check_return_code()
7890 verbose(env, "has unknown scalar value"); in check_return_code()
7893 verbose(env, " should have been in %s\n", tn_buf); in check_return_code()
7982 verbose(env, "jump out of range from insn %d to %d\n", t, w); in push_insn()
8003 verbose(env, "back-edge from insn %d to %d\n", t, w); in push_insn()
8009 verbose(env, "insn state internal bug\n"); in push_insn()
8119 verbose(env, "pop stack internal bug\n"); in check_cfg()
8128 verbose(env, "unreachable insn %d\n", i); in check_cfg()
8148 verbose(env, "LD_ABS is not allowed in subprogs without BTF\n"); in check_abnormal_return()
8152 verbose(env, "tail_call is not allowed in subprogs without BTF\n"); in check_abnormal_return()
8187 verbose(env, "number of funcs in func_info doesn't match number of subprogs\n"); in check_btf_func()
8195 verbose(env, "invalid func info rec size %u\n", urec_size); in check_btf_func()
8216 verbose(env, "nonzero tailing record in func info"); in check_btf_func()
8235 verbose(env, in check_btf_func()
8241 verbose(env, in check_btf_func()
8248 verbose(env, "func_info BTF section doesn't match subprog layout in BPF program\n"); in check_btf_func()
8255 verbose(env, "invalid type id %d in func info", in check_btf_func()
8269 verbose(env, "LD_ABS is only allowed in functions that return 'int'.\n"); in check_btf_func()
8273 verbose(env, "tail_call is only allowed in functions that return 'int'.\n"); in check_btf_func()
8350 verbose(env, "nonzero tailing record in line_info"); in check_btf_line()
8376 verbose(env, "Invalid line_info[%u].insn_off:%u (prev_offset:%u prog->len:%u)\n", in check_btf_line()
8384 verbose(env, in check_btf_line()
8393 verbose(env, "Invalid line_info[%u].line_off or .file_name_off\n", i); in check_btf_line()
8403 verbose(env, "missing bpf_line_info for func#%u\n", s); in check_btf_line()
8414 verbose(env, "missing bpf_line_info for %u funcs starting from func#%u\n", in check_btf_line()
8972 verbose(env, "propagating r%d\n", i); in propagate_precision()
8986 verbose(env, "propagating fp%d\n", in propagate_precision()
9054 verbose(env, "infinite loop detected at insn %d\n", insn_idx); in is_state_visited()
9275 verbose(env, "invalid insn idx %d insn_cnt %d\n", in do_check()
9284 verbose(env, in do_check()
9297 verbose(env, "\nfrom %d to %d%s: safe\n", in do_check()
9302 verbose(env, "%d: safe\n", env->insn_idx); in do_check()
9316 verbose(env, "%d:", env->insn_idx); in do_check()
9318 verbose(env, "\nfrom %d to %d%s:", in do_check()
9328 .cb_print = verbose, in do_check()
9333 verbose(env, "%d: ", env->insn_idx); in do_check()
9395 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
9433 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
9440 verbose(env, "BPF_ST uses reserved fields\n"); in do_check()
9449 verbose(env, "BPF_ST stores into R%d %s is not allowed\n", in do_check()
9473 verbose(env, "BPF_CALL uses reserved fields\n"); in do_check()
9480 verbose(env, "function calls are not allowed while holding a lock\n"); in do_check()
9496 verbose(env, "BPF_JA uses reserved fields\n"); in do_check()
9509 verbose(env, "BPF_EXIT uses reserved fields\n"); in do_check()
9514 verbose(env, "bpf_spin_unlock is missing\n"); in do_check()
9567 verbose(env, "invalid BPF_LD mode\n"); in do_check()
9571 verbose(env, "unknown insn class %d\n", class); in do_check()
9597verbose(env, "kernel is missing BTF, make sure CONFIG_DEBUG_INFO_BTF=y is specified in Kconfig.\n"… in check_pseudo_btf_id()
9602 verbose(env, "reserved field (insn[1].imm) is used in pseudo_btf_id ldimm64 insn.\n"); in check_pseudo_btf_id()
9608 verbose(env, "ldimm64 insn specifies invalid btf_id %d.\n", id); in check_pseudo_btf_id()
9613 verbose(env, "pseudo btf_id %d in ldimm64 isn't KIND_VAR.\n", in check_pseudo_btf_id()
9621 verbose(env, "ldimm64 failed to find the address for kernel symbol '%s'.\n", in check_pseudo_btf_id()
9655 verbose(env, "ldimm64 unable to resolve the size of type '%s': %ld\n", in check_pseudo_btf_id()
9723 verbose(env, "perf_event programs can only use preallocated hash map\n"); in check_map_prog_compatibility()
9727 verbose(env, "trace type programs can only use preallocated hash map\n"); in check_map_prog_compatibility()
9731verbose(env, "trace type programs with run-time allocated hash maps are unsafe. Switch to prealloc… in check_map_prog_compatibility()
9737 verbose(env, "tracing progs cannot use bpf_spin_lock yet\n"); in check_map_prog_compatibility()
9743 verbose(env, "offload device mismatch between prog and map\n"); in check_map_prog_compatibility()
9748 verbose(env, "bpf_struct_ops map cannot be used in prog\n"); in check_map_prog_compatibility()
9758 verbose(env, in check_map_prog_compatibility()
9764 verbose(env, in check_map_prog_compatibility()
9798 verbose(env, "BPF_LDX uses reserved fields\n"); in resolve_pseudo_ldimm64()
9805 verbose(env, "BPF_STX uses reserved fields\n"); in resolve_pseudo_ldimm64()
9818 verbose(env, "invalid bpf_ld_imm64 insn\n"); in resolve_pseudo_ldimm64()
9841 verbose(env, in resolve_pseudo_ldimm64()
9849 verbose(env, "fd %d is not pointing to valid bpf_map\n", in resolve_pseudo_ldimm64()
9867 verbose(env, "direct value offset of %u is not allowed\n", off); in resolve_pseudo_ldimm64()
9873 verbose(env, "no direct value access support for this map type\n"); in resolve_pseudo_ldimm64()
9880 verbose(env, "invalid access to map value pointer, value_size=%u off=%u\n", in resolve_pseudo_ldimm64()
9919 verbose(env, "only one cgroup storage of each type is allowed\n"); in resolve_pseudo_ldimm64()
9933 verbose(env, "unknown opcode %02x\n", insn->code); in resolve_pseudo_ldimm64()
10035 verbose(env, in bpf_patch_insn_data()
10401 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
10407 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
10490 verbose(env, "Writes through BTF pointers are not allowed\n"); in convert_ctx_accesses()
10513 verbose(env, "bpf verifier narrow ctx access misconfigured\n"); in convert_ctx_accesses()
10532 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
10653 verbose(env, "adding tail call poke descriptor failed\n"); in jit_subprogs()
10662 verbose(env, "tracking tail call prog failed\n"); in jit_subprogs()
10739 verbose(env, "JIT doesn't support bpf-to-bpf calls\n"); in jit_subprogs()
10821 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n"); in fixup_call_args()
10903 verbose(env, "bpf verifier is misconfigured\n"); in fixup_bpf_calls()
11014 verbose(env, "adding tail call poke descriptor failed\n"); in fixup_bpf_calls()
11032 verbose(env, "tail_call abusing map_ptr\n"); in fixup_bpf_calls()
11078 verbose(env, "bpf verifier is misconfigured\n"); in fixup_bpf_calls()
11168 verbose(env, in fixup_bpf_calls()
11182 verbose(env, "bpf verifier is misconfigured\n"); in fixup_bpf_calls()
11188 verbose(env, "tracking tail call prog failed\n"); in fixup_bpf_calls()
11363 verbose(env, in do_check_subprogs()
11388 verbose(env, "verification time %lld usec\n", in print_verification_stats()
11390 verbose(env, "stack depth "); in print_verification_stats()
11394 verbose(env, "%d", depth); in print_verification_stats()
11396 verbose(env, "+"); in print_verification_stats()
11398 verbose(env, "\n"); in print_verification_stats()
11400 verbose(env, "processed %d insns (limit %d) max_states_per_insn %d " in print_verification_stats()
11419 verbose(env, "attach_btf_id %u is not a supported struct\n", in check_struct_ops_btf_id()
11427 verbose(env, "attach to invalid member idx %u of struct %s\n", in check_struct_ops_btf_id()
11437 verbose(env, "attach to invalid member %s(@idx %u) of struct %s\n", in check_struct_ops_btf_id()
11446 verbose(env, "attach to unsupported member %s of struct %s\n", in check_struct_ops_btf_id()
11746 verbose(env, "Only fentry/fexit/fmod_ret and lsm programs can be sleepable\n"); in check_attach_btf_id()
11871 verbose(env, "in-kernel BTF is malformed\n"); in bpf_check()