Home
last modified time | relevance | path

Searched refs:errstr_unpriv (Results 1 – 12 of 12) sorted by relevance

/Linux-v6.6/tools/testing/selftests/bpf/verifier/
Ddead_code.c11 .errstr_unpriv = "R9 !read_ok",
90 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
108 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
126 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
142 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
157 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
Djset.c85 .errstr_unpriv = "R9 !read_ok",
99 .errstr_unpriv = "!read_ok",
114 .errstr_unpriv = "!read_ok",
128 .errstr_unpriv = "!read_ok",
144 .errstr_unpriv = "R9 !read_ok",
166 .errstr_unpriv = "R9 !read_ok",
Datomic_cmpxchg.c142 .errstr_unpriv = "R0 leaks addr into mem",
162 .errstr_unpriv = "R0 leaks addr into mem",
183 .errstr_unpriv = "R0 leaks addr into mem",
202 .errstr_unpriv = "R0 leaks addr into mem",
223 .errstr_unpriv = "R10 partial copy of pointer",
244 .errstr_unpriv = "R10 partial copy of pointer",
Djmp32.c90 .errstr_unpriv = "R9 !read_ok",
155 .errstr_unpriv = "R9 !read_ok",
220 .errstr_unpriv = "R9 !read_ok",
289 .errstr_unpriv = "R0 invalid mem access 'scalar'",
360 .errstr_unpriv = "R0 invalid mem access 'scalar'",
431 .errstr_unpriv = "R0 invalid mem access 'scalar'",
502 .errstr_unpriv = "R0 invalid mem access 'scalar'",
573 .errstr_unpriv = "R0 invalid mem access 'scalar'",
644 .errstr_unpriv = "R0 invalid mem access 'scalar'",
715 .errstr_unpriv = "R0 invalid mem access 'scalar'",
[all …]
Dld_imm64.c13 .errstr_unpriv = "R1 pointer comparison",
27 .errstr_unpriv = "R1 pointer comparison",
Djump.c21 .errstr_unpriv = "R1 pointer comparison",
49 .errstr_unpriv = "R1 pointer comparison",
85 .errstr_unpriv = "R1 pointer comparison",
136 .errstr_unpriv = "R1 pointer comparison",
177 .errstr_unpriv = "R1 pointer comparison",
Datomic_bounds.c26 .errstr_unpriv = "back-edge",
Dctx_skb.c59 .errstr_unpriv = "R1 pointer comparison",
81 .errstr_unpriv = "R1 pointer comparison",
104 .errstr_unpriv = "R1 pointer comparison",
377 .errstr_unpriv = "R1 leaks addr",
388 .errstr_unpriv = "R1 leaks addr",
901 .errstr_unpriv = "",
923 .errstr_unpriv = "R1 leaks addr",
945 .errstr_unpriv = "",
1149 .errstr_unpriv = "R1 leaks addr",
Datomic_fetch.c23 .errstr_unpriv = "leaking pointer from stack off -8",
47 .errstr_unpriv = "leaking pointer from stack off -8",
Datomic_fetch_add.c54 .errstr_unpriv = "R10 leaks addr into mem",
Dcalls.c299 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
496 .errstr_unpriv = "back-edge from insn",
595 .errstr_unpriv = "allowed for",
626 .errstr_unpriv = "allowed for",
677 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
1344 .errstr_unpriv = "allowed for",
2240 .errstr_unpriv = "invalid indirect read from stack R2 off -8+0 size 8",
2260 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
2286 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
2311 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
[all …]
/Linux-v6.6/tools/testing/selftests/bpf/
Dtest_verifier.c136 const char *errstr_unpriv; member
1601 expected_err = unpriv && test->errstr_unpriv ? in do_test_single()
1602 test->errstr_unpriv : test->errstr; in do_test_single()