Lines Matching refs:verbose

270 __printf(2, 3) static void verbose(void *private_data, const char *fmt, ...)  in verbose()  function
312 verbose(env, "%s\n", in verbose_linfo()
416 verbose(env, "_"); in print_liveness()
418 verbose(env, "r"); in print_liveness()
420 verbose(env, "w"); in print_liveness()
422 verbose(env, "D"); in print_liveness()
441 verbose(env, " frame%d:", state->frameno); in print_verifier_state()
447 verbose(env, " R%d", i); in print_verifier_state()
449 verbose(env, "=%s", reg_type_str[t]); in print_verifier_state()
451 verbose(env, "P"); in print_verifier_state()
455 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
457 verbose(env, "(id=%d", reg->id); in print_verifier_state()
459 verbose(env, ",ref_obj_id=%d", reg->ref_obj_id); in print_verifier_state()
461 verbose(env, ",off=%d", reg->off); in print_verifier_state()
463 verbose(env, ",r=%d", reg->range); in print_verifier_state()
467 verbose(env, ",ks=%d,vs=%d", in print_verifier_state()
475 verbose(env, ",imm=%llx", reg->var_off.value); in print_verifier_state()
479 verbose(env, ",smin_value=%lld", in print_verifier_state()
483 verbose(env, ",smax_value=%lld", in print_verifier_state()
486 verbose(env, ",umin_value=%llu", in print_verifier_state()
489 verbose(env, ",umax_value=%llu", in print_verifier_state()
495 verbose(env, ",var_off=%s", tn_buf); in print_verifier_state()
498 verbose(env, ")"); in print_verifier_state()
515 verbose(env, " fp%d", (-i - 1) * BPF_REG_SIZE); in print_verifier_state()
520 verbose(env, "=%s", reg_type_str[t]); in print_verifier_state()
522 verbose(env, "P"); in print_verifier_state()
524 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
526 verbose(env, "=%s", types_buf); in print_verifier_state()
530 verbose(env, " refs=%d", state->refs[0].id); in print_verifier_state()
533 verbose(env, ",%d", state->refs[i].id); in print_verifier_state()
535 verbose(env, "\n"); in print_verifier_state()
825 verbose(env, "The sequence of %d jumps is too complex.\n", in push_stack()
890 verbose(env, "mark_reg_known_zero(regs, %u)\n", regno); in mark_reg_known_zero()
1008 verbose(env, "mark_reg_unknown(regs, %u)\n", regno); in mark_reg_unknown()
1031 verbose(env, "mark_reg_not_init(regs, %u)\n", regno); in mark_reg_not_init()
1105 verbose(env, "call to invalid destination\n"); in add_subprog()
1112 verbose(env, "too many subprograms\n"); in add_subprog()
1140 verbose(env, "function calls to other bpf functions are allowed for root only\n"); in check_subprogs()
1155 verbose(env, "func#%d @%d\n", i, subprog[i].start); in check_subprogs()
1169 verbose(env, "jump out of range from insn %d to %d\n", i, off); in check_subprogs()
1180 verbose(env, "last insn is not an exit or jmp\n"); in check_subprogs()
1207 verbose(env, "verifier BUG type %s var_off %lld off %d\n", in mark_reg_read()
1368 verbose(env, "R%d is invalid\n", regno); in check_reg_arg()
1377 verbose(env, "R%d !read_ok\n", regno); in check_reg_arg()
1392 verbose(env, "frame pointer is read only\n"); in check_reg_arg()
1446 .cb_print = verbose, in backtrack_insn()
1460 verbose(env, "regs=%x stack=%llx before ", *reg_mask, *stack_mask); in backtrack_insn()
1461 verbose(env, "%d: ", idx); in backtrack_insn()
1518 verbose(env, "BUG spi %d\n", spi); in backtrack_insn()
1537 verbose(env, "BUG spi %d\n", spi); in backtrack_insn()
1556 verbose(env, "BUG regs %x\n", *reg_mask); in backtrack_insn()
1719 verbose(env, "last_idx %d first_idx %d\n", last_idx, first_idx); in __mark_chain_precision()
1749 verbose(env, "BUG backtracking idx %d\n", i); in __mark_chain_precision()
1807 verbose(env, "parent %s regs=%x stack=%llx marks\n", in __mark_chain_precision()
1903 verbose(env, "attempt to corrupt spilled pointer on stack\n"); in check_stack_write()
1929 verbose(env, "invalid size of register spill\n"); in check_stack_write()
1934 verbose(env, "cannot spill pointers to stack into stack frame of the caller\n"); in check_stack_write()
1965 verbose(env, in check_stack_write()
2023 verbose(env, "invalid read from stack off %d+0 size %d\n", in check_stack_read()
2034 verbose(env, "invalid size of register fill\n"); in check_stack_read()
2046 verbose(env, "corrupted spill memory\n"); in check_stack_read()
2071 verbose(env, "invalid read from stack off %d+%d size %d\n", in check_stack_read()
2115 verbose(env, "variable stack access var_off=%s off=%d size=%d\n", in check_stack_access()
2121 verbose(env, "invalid stack off=%d size=%d\n", off, size); in check_stack_access()
2136 verbose(env, "write into map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
2142 verbose(env, "read from map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
2159 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", in __check_map_access()
2192verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_map_access()
2199 verbose(env, "R%d min value is outside of the array range\n", in check_map_access()
2209verbose(env, "R%d unbounded memory access, make sure to bounds check any array access into a map\n… in check_map_access()
2216 verbose(env, "R%d max value is outside of the array range\n", in check_map_access()
2229 verbose(env, "bpf_spin_lock cannot be accessed directly by load/store\n"); in check_map_access()
2286 verbose(env, "invalid access to packet, off=%d size=%d, R%d(id=%d,off=%d,r=%d)\n", in __check_packet_access()
2309verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_packet_access()
2315 verbose(env, "R%d offset is outside of the packet\n", regno); in check_packet_access()
2358 verbose(env, "invalid bpf_context access off=%d size=%d\n", off, size); in check_ctx_access()
2367 verbose(env, "invalid access to flow keys off=%d size=%d\n", in check_flow_keys_access()
2384verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_sock_access()
2413 verbose(env, "R%d invalid %s access off=%d size=%d\n", in check_sock_access()
2493 verbose(env, in check_pkt_ptr_alignment()
2518 verbose(env, "misaligned %saccess off %s+%d+%d size %d\n", in check_generic_ptr_alignment()
2610 verbose(env, "combined stack size of %d calls is %d. Too large\n", in check_max_stack_depth()
2635 verbose(env, "the call stack of %d frames is too deep !\n", in check_max_stack_depth()
2677 verbose(env, "dereference of modified ctx ptr R%d off=%d disallowed\n", in check_ctx_reg()
2686 verbose(env, "variable ctx access var_off=%s disallowed\n", tn_buf); in check_ctx_reg()
2698 verbose(env, in check_tp_buffer_access()
2707 verbose(env, in check_tp_buffer_access()
2772 verbose(env, "R%d leaks addr into map\n", value_regno); in check_mem_access()
2787 verbose(env, "R%d leaks addr into ctx\n", value_regno); in check_mem_access()
2837 verbose(env, "cannot write into packet\n"); in check_mem_access()
2842 verbose(env, "R%d leaks addr into packet\n", in check_mem_access()
2852 verbose(env, "R%d leaks addr into flow keys\n", in check_mem_access()
2862 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
2874 verbose(env, "R%d invalid mem access '%s'\n", regno, in check_mem_access()
2893 verbose(env, "BPF_XADD uses reserved fields\n"); in check_xadd()
2908 verbose(env, "R%d leaks addr into mem\n", insn->src_reg); in check_xadd()
2916 verbose(env, "BPF_XADD stores into R%d %s is not allowed\n", in check_xadd()
2942 verbose(env, "invalid stack type R%d off=%d access_size=%d\n", in __check_stack_boundary()
2948 verbose(env, "invalid stack type R%d var_off=%s access_size=%d\n", in __check_stack_boundary()
2976 verbose(env, "R%d type=%s expected=%s\n", regno, in check_stack_boundary()
2998 verbose(env, "R%d indirect variable offset stack access prohibited for !root, var_off=%s\n", in check_stack_boundary()
3013 verbose(env, "R%d unbounded indirect variable offset stack access\n", in check_stack_boundary()
3022 verbose(env, "R%d min value is outside of stack bound\n", in check_stack_boundary()
3029 verbose(env, "R%d max value is outside of stack bound\n", in check_stack_boundary()
3066 verbose(env, "invalid indirect read from stack off %d+%d size %d\n", in check_stack_boundary()
3072 verbose(env, "invalid indirect read from stack var_off %s+%d size %d\n", in check_stack_boundary()
3140 verbose(env, "R%d is not a pointer to map_value\n", regno); in process_spin_lock()
3144 verbose(env, in process_spin_lock()
3150 verbose(env, in process_spin_lock()
3157 verbose(env, in process_spin_lock()
3161 verbose(env, in process_spin_lock()
3165 verbose(env, in process_spin_lock()
3171 verbose(env, "off %lld doesn't point to 'struct bpf_spin_lock'\n", in process_spin_lock()
3177 verbose(env, in process_spin_lock()
3184 verbose(env, "bpf_spin_unlock without taking a lock\n"); in process_spin_lock()
3188 verbose(env, "bpf_spin_unlock of different lock\n"); in process_spin_lock()
3242 verbose(env, "R%d leaks addr into helper function\n", in check_func_arg()
3251 verbose(env, "helper access to the packet is not allowed\n"); in check_func_arg()
3290 verbose(env, "verifier internal error: more than one arg with ref_obj_id R%d %u %u\n", in check_func_arg()
3309 verbose(env, "verifier internal error\n"); in check_func_arg()
3333 verbose(env, "unsupported arg_type %d\n", arg_type); in check_func_arg()
3351 verbose(env, "invalid map_ptr to access map->key\n"); in check_func_arg()
3366 verbose(env, "invalid map_ptr to access map->value\n"); in check_func_arg()
3394 verbose(env, "R%d min value is negative, either use unsigned or 'var &= const'\n", in check_func_arg()
3408 verbose(env, "R%d unbounded memory access, use 'var &= const' or 'if (var < const)'\n", in check_func_arg()
3428 verbose(env, "R%d type=%s expected=%s\n", regno, in check_func_arg()
3528 verbose(env, "tail_calls are not allowed in programs with bpf-to-bpf calls\n"); in check_map_func_compatibility()
3593 verbose(env, "cannot pass map_type %d into func %s#%d\n", in check_map_func_compatibility()
3758 verbose(env, "the call stack of %d frames is too deep\n", in check_func_call()
3766 verbose(env, "verifier bug. No program starts at insn %d\n", in check_func_call()
3773 verbose(env, "verifier bug. Frame %d already allocated\n", in check_func_call()
3817 verbose(env, "caller:\n"); in check_func_call()
3819 verbose(env, "callee:\n"); in check_func_call()
3841 verbose(env, "cannot return stack pointer to the caller\n"); in prepare_func_exit()
3857 verbose(env, "returning from callee:\n"); in prepare_func_exit()
3859 verbose(env, "to caller at %d:\n", *insn_idx); in prepare_func_exit()
3902 verbose(env, "kernel subsystem misconfigured verifier\n"); in record_func_map()
3915 verbose(env, "write into map forbidden\n"); in record_func_map()
3934 verbose(env, "Unreleased reference id=%d alloc_insn=%d\n", in check_reference_leak()
3950 verbose(env, "invalid func %s#%d\n", func_id_name(func_id), in check_helper_call()
3958 verbose(env, "unknown func %s#%d\n", func_id_name(func_id), in check_helper_call()
3965 verbose(env, "cannot call GPL-restricted function from non-GPL compatible program\n"); in check_helper_call()
3972 verbose(env, "kernel subsystem misconfigured func %s#%d: r1 != ctx\n", in check_helper_call()
3982 verbose(env, "kernel subsystem misconfigured func %s#%d\n", in check_helper_call()
4022 verbose(env, "tail_call would lead to reference leak\n"); in check_helper_call()
4028 verbose(env, "func %s#%d reference has not been acquired before\n", in check_helper_call()
4041 verbose(env, "get_local_storage() doesn't support non-zero flags\n"); in check_helper_call()
4069 verbose(env, in check_helper_call()
4095 verbose(env, "unknown return type %d of func %s#%d\n", in check_helper_call()
4131 verbose(env, err_str, func_id_name(func_id), func_id); in check_helper_call()
4172 verbose(env, "math between %s pointer and %lld is not allowed\n", in check_reg_sane_offset()
4178 verbose(env, "%s pointer offset %d is not allowed\n", in check_reg_sane_offset()
4184 verbose(env, "math between %s pointer and register with unbounded min value is not allowed\n", in check_reg_sane_offset()
4190 verbose(env, "value %lld makes %s pointer be out of bounds\n", in check_reg_sane_offset()
4355 verbose(env, in adjust_ptr_min_max_vals()
4363 verbose(env, "R%d pointer arithmetic on %s prohibited, null-check it first\n", in adjust_ptr_min_max_vals()
4375 verbose(env, "R%d pointer arithmetic on %s prohibited\n", in adjust_ptr_min_max_vals()
4380verbose(env, "R%d has unknown scalar with mixed signed bounds, pointer arithmetic with it prohibit… in adjust_ptr_min_max_vals()
4403 verbose(env, "R%d tried to add from different maps or paths\n", dst); in adjust_ptr_min_max_vals()
4458 verbose(env, "R%d tried to sub from different maps or paths\n", dst); in adjust_ptr_min_max_vals()
4463 verbose(env, "R%d tried to subtract pointer from scalar\n", in adjust_ptr_min_max_vals()
4472 verbose(env, "R%d subtraction from stack pointer prohibited\n", in adjust_ptr_min_max_vals()
4524 verbose(env, "R%d bitwise operator %s on pointer prohibited\n", in adjust_ptr_min_max_vals()
4529 verbose(env, "R%d pointer arithmetic with %s operator prohibited\n", in adjust_ptr_min_max_vals()
4547 verbose(env, "R%d pointer arithmetic of map value goes out of range, " in adjust_ptr_min_max_vals()
4553 verbose(env, "R%d stack pointer arithmetic goes out of range, " in adjust_ptr_min_max_vals()
4615 verbose(env, "R%d tried to add from different pointers or scalars\n", dst); in adjust_scalar_min_max_vals()
4639 verbose(env, "R%d tried to sub from different pointers or scalars\n", dst); in adjust_scalar_min_max_vals()
4870 verbose(env, "R%d pointer %s pointer prohibited\n", in adjust_reg_min_max_vals()
4908 verbose(env, "verifier internal error: unexpected ptr_reg\n"); in adjust_reg_min_max_vals()
4913 verbose(env, "verifier internal error: no src_reg\n"); in adjust_reg_min_max_vals()
4931 verbose(env, "BPF_NEG uses reserved fields\n"); in check_alu_op()
4938 verbose(env, "BPF_END uses reserved fields\n"); in check_alu_op()
4949 verbose(env, "R%d pointer arithmetic prohibited\n", in check_alu_op()
4963 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
4973 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
4997 verbose(env, in check_alu_op()
5028 verbose(env, "invalid BPF_ALU opcode %x\n", opcode); in check_alu_op()
5035 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
5044 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
5056 verbose(env, "div by zero\n"); in check_alu_op()
5065 verbose(env, "invalid shift %d\n", insn->imm); in check_alu_op()
5803 verbose(env, "invalid BPF_JMP/JMP32 opcode %x\n", opcode); in check_cond_jmp_op()
5809 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
5819 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
5826 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
5935 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
5953 verbose(env, "invalid BPF_LD_IMM insn\n"); in check_ld_imm()
5957 verbose(env, "BPF_LD_IMM64 uses reserved fields\n"); in check_ld_imm()
5985 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_imm()
6026 verbose(env, "BPF_LD_[ABS|IND] instructions not allowed for this program type\n"); in check_ld_abs()
6031 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_abs()
6043 verbose(env, "BPF_LD_[ABS|IND] instructions cannot be mixed with bpf-to-bpf calls\n"); in check_ld_abs()
6050 verbose(env, "BPF_LD_[ABS|IND] uses reserved fields\n"); in check_ld_abs()
6065 verbose(env, "BPF_LD_[ABS|IND] cannot be mixed with socket references\n"); in check_ld_abs()
6070 verbose(env, "BPF_LD_[ABS|IND] cannot be used inside bpf_spin_lock-ed region\n"); in check_ld_abs()
6075 verbose(env, in check_ld_abs()
6133 verbose(env, "At program exit the register R0 is not a known value (%s)\n", in check_return_code()
6141 verbose(env, "At program exit the register R0 "); in check_return_code()
6144 verbose(env, "has value %s", tn_buf); in check_return_code()
6146 verbose(env, "has unknown scalar value"); in check_return_code()
6149 verbose(env, " should have been in %s\n", tn_buf); in check_return_code()
6238 verbose(env, "jump out of range from insn %d to %d\n", t, w); in push_insn()
6259 verbose(env, "back-edge from insn %d to %d\n", t, w); in push_insn()
6265 verbose(env, "insn state internal bug\n"); in push_insn()
6375 verbose(env, "pop stack internal bug\n"); in check_cfg()
6384 verbose(env, "unreachable insn %d\n", i); in check_cfg()
6421 verbose(env, "number of funcs in func_info doesn't match number of subprogs\n"); in check_btf_func()
6429 verbose(env, "invalid func info rec size %u\n", urec_size); in check_btf_func()
6447 verbose(env, "nonzero tailing record in func info"); in check_btf_func()
6465 verbose(env, in check_btf_func()
6472 verbose(env, in check_btf_func()
6480 verbose(env, "func_info BTF section doesn't match subprog layout in BPF program\n"); in check_btf_func()
6488 verbose(env, "invalid type id %d in func info", in check_btf_func()
6564 verbose(env, "nonzero tailing record in line_info"); in check_btf_line()
6590 verbose(env, "Invalid line_info[%u].insn_off:%u (prev_offset:%u prog->len:%u)\n", in check_btf_line()
6598 verbose(env, in check_btf_line()
6607 verbose(env, "Invalid line_info[%u].line_off or .file_name_off\n", i); in check_btf_line()
6617 verbose(env, "missing bpf_line_info for func#%u\n", s); in check_btf_line()
6628 verbose(env, "missing bpf_line_info for %u funcs starting from func#%u\n", in check_btf_line()
7183 verbose(env, "propagating r%d\n", i); in propagate_precision()
7197 verbose(env, "propagating fp%d\n", in propagate_precision()
7265 verbose(env, "infinite loop detected at insn %d\n", insn_idx); in is_state_visited()
7502 verbose(env, "invalid insn idx %d insn_cnt %d\n", in do_check()
7511 verbose(env, in do_check()
7524 verbose(env, "\nfrom %d to %d%s: safe\n", in do_check()
7529 verbose(env, "%d: safe\n", env->insn_idx); in do_check()
7543 verbose(env, "%d:", env->insn_idx); in do_check()
7545 verbose(env, "\nfrom %d to %d%s:", in do_check()
7555 .cb_print = verbose, in do_check()
7560 verbose(env, "%d: ", env->insn_idx); in do_check()
7622 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
7660 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
7667 verbose(env, "BPF_ST uses reserved fields\n"); in do_check()
7676 verbose(env, "BPF_ST stores into R%d %s is not allowed\n", in do_check()
7700 verbose(env, "BPF_CALL uses reserved fields\n"); in do_check()
7707 verbose(env, "function calls are not allowed while holding a lock\n"); in do_check()
7723 verbose(env, "BPF_JA uses reserved fields\n"); in do_check()
7736 verbose(env, "BPF_EXIT uses reserved fields\n"); in do_check()
7741 verbose(env, "bpf_spin_unlock is missing\n"); in do_check()
7769 verbose(env, "R0 leaks addr as return value\n"); in do_check()
7809 verbose(env, "invalid BPF_LD mode\n"); in do_check()
7813 verbose(env, "unknown insn class %d\n", class); in do_check()
7857 verbose(env, "perf_event programs can only use preallocated hash map\n"); in check_map_prog_compatibility()
7862 verbose(env, "perf_event programs can only use preallocated inner hash map\n"); in check_map_prog_compatibility()
7870 verbose(env, "tracing progs cannot use bpf_spin_lock yet\n"); in check_map_prog_compatibility()
7876 verbose(env, "offload device mismatch between prog and map\n"); in check_map_prog_compatibility()
7905 verbose(env, "BPF_LDX uses reserved fields\n"); in replace_map_fd_with_map_ptr()
7912 verbose(env, "BPF_STX uses reserved fields\n"); in replace_map_fd_with_map_ptr()
7925 verbose(env, "invalid bpf_ld_imm64 insn\n"); in replace_map_fd_with_map_ptr()
7940 verbose(env, in replace_map_fd_with_map_ptr()
7948 verbose(env, "fd %d is not pointing to valid bpf_map\n", in replace_map_fd_with_map_ptr()
7966 verbose(env, "direct value offset of %u is not allowed\n", off); in replace_map_fd_with_map_ptr()
7972 verbose(env, "no direct value access support for this map type\n"); in replace_map_fd_with_map_ptr()
7979 verbose(env, "invalid access to map value pointer, value_size=%u off=%u\n", in replace_map_fd_with_map_ptr()
8022 verbose(env, "only one cgroup storage of each type is allowed\n"); in replace_map_fd_with_map_ptr()
8036 verbose(env, "unknown opcode %02x\n", insn->code); in replace_map_fd_with_map_ptr()
8136 verbose(env, in bpf_patch_insn_data()
8501 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
8507 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
8603 verbose(env, "bpf verifier narrow ctx access misconfigured\n"); in convert_ctx_accesses()
8622 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
8781 verbose(env, "JIT doesn't support bpf-to-bpf calls\n"); in jit_subprogs()
8930 verbose(env, "bpf verifier is misconfigured\n"); in fixup_bpf_calls()
9036 verbose(env, "tail_call abusing map_ptr\n"); in fixup_bpf_calls()
9080 verbose(env, "bpf verifier is misconfigured\n"); in fixup_bpf_calls()
9146 verbose(env, in fixup_bpf_calls()
9192 verbose(env, "verification time %lld usec\n", in print_verification_stats()
9194 verbose(env, "stack depth "); in print_verification_stats()
9198 verbose(env, "%d", depth); in print_verification_stats()
9200 verbose(env, "+"); in print_verification_stats()
9202 verbose(env, "\n"); in print_verification_stats()
9204 verbose(env, "processed %d insns (limit %d) max_states_per_insn %d " in print_verification_stats()