Lines Matching refs:Errorf
129 return nil, fmt.Errorf("coverage is not supported (%v)", feat.Reason)
133 return nil, fmt.Errorf("sandbox=setuid is not supported (%v)", feat.Reason)
137 return nil, fmt.Errorf("sandbox=namespace is not supported (%v)", feat.Reason)
190 return fmt.Errorf("failed to run executor version: %v", err)
194 return fmt.Errorf("executor version returned bad result: %q", string(out))
197 return fmt.Errorf("mismatching target/executor arches: %v vs %v", args.target.Arch, vers[1])
200 return fmt.Errorf("mismatching fuzzer/executor git revisions: %v vs %v",
204 return fmt.Errorf("mismatching manager/fuzzer git revisions: %v vs %v",
208 return fmt.Errorf("mismatching fuzzer/executor system call descriptions: %v vs %v",
212 return fmt.Errorf("mismatching manager/fuzzer system call descriptions: %v vs %v",
222 return fmt.Errorf("failed to create ipc env: %v", err)
228 return fmt.Errorf("program execution failed: %v\n%s", err, output)
231 return fmt.Errorf("program hanged:\n%s", output)
234 return fmt.Errorf("program failed:\n%s", output)
237 return fmt.Errorf("no calls executed:\n%s", output)
240 return fmt.Errorf("simple call failed: %+v\n%s", info[0], output)
243 return fmt.Errorf("got no coverage:\n%s", output)
246 return fmt.Errorf("got no fallback coverage:\n%s", output)
257 return nil, nil, fmt.Errorf("unknown enabled syscall %v", n)
268 return nil, nil, fmt.Errorf("failed to detect host supported syscalls: %v", err)
292 return nil, nil, fmt.Errorf("all system calls are disabled")