Lines Matching refs:verbose
270 __printf(2, 3) static void verbose(void *private_data, const char *fmt, ...) in verbose() function
312 verbose(env, "%s\n", in verbose_linfo()
416 verbose(env, "_"); in print_liveness()
418 verbose(env, "r"); in print_liveness()
420 verbose(env, "w"); in print_liveness()
422 verbose(env, "D"); in print_liveness()
441 verbose(env, " frame%d:", state->frameno); in print_verifier_state()
447 verbose(env, " R%d", i); in print_verifier_state()
449 verbose(env, "=%s", reg_type_str[t]); in print_verifier_state()
451 verbose(env, "P"); in print_verifier_state()
455 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
457 verbose(env, "(id=%d", reg->id); in print_verifier_state()
459 verbose(env, ",ref_obj_id=%d", reg->ref_obj_id); in print_verifier_state()
461 verbose(env, ",off=%d", reg->off); in print_verifier_state()
463 verbose(env, ",r=%d", reg->range); in print_verifier_state()
467 verbose(env, ",ks=%d,vs=%d", in print_verifier_state()
475 verbose(env, ",imm=%llx", reg->var_off.value); in print_verifier_state()
479 verbose(env, ",smin_value=%lld", in print_verifier_state()
483 verbose(env, ",smax_value=%lld", in print_verifier_state()
486 verbose(env, ",umin_value=%llu", in print_verifier_state()
489 verbose(env, ",umax_value=%llu", in print_verifier_state()
495 verbose(env, ",var_off=%s", tn_buf); in print_verifier_state()
498 verbose(env, ")"); in print_verifier_state()
515 verbose(env, " fp%d", (-i - 1) * BPF_REG_SIZE); in print_verifier_state()
520 verbose(env, "=%s", reg_type_str[t]); in print_verifier_state()
522 verbose(env, "P"); in print_verifier_state()
524 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
526 verbose(env, "=%s", types_buf); in print_verifier_state()
530 verbose(env, " refs=%d", state->refs[0].id); in print_verifier_state()
533 verbose(env, ",%d", state->refs[i].id); in print_verifier_state()
535 verbose(env, "\n"); in print_verifier_state()
825 verbose(env, "The sequence of %d jumps is too complex.\n", in push_stack()
891 verbose(env, "mark_reg_known_zero(regs, %u)\n", regno); in mark_reg_known_zero()
1023 verbose(env, "mark_reg_unknown(regs, %u)\n", regno); in mark_reg_unknown()
1043 verbose(env, "mark_reg_not_init(regs, %u)\n", regno); in mark_reg_not_init()
1117 verbose(env, "call to invalid destination\n"); in add_subprog()
1124 verbose(env, "too many subprograms\n"); in add_subprog()
1152 verbose(env, "function calls to other bpf functions are allowed for root only\n"); in check_subprogs()
1167 verbose(env, "func#%d @%d\n", i, subprog[i].start); in check_subprogs()
1181 verbose(env, "jump out of range from insn %d to %d\n", i, off); in check_subprogs()
1192 verbose(env, "last insn is not an exit or jmp\n"); in check_subprogs()
1219 verbose(env, "verifier BUG type %s var_off %lld off %d\n", in mark_reg_read()
1380 verbose(env, "R%d is invalid\n", regno); in check_reg_arg()
1389 verbose(env, "R%d !read_ok\n", regno); in check_reg_arg()
1404 verbose(env, "frame pointer is read only\n"); in check_reg_arg()
1458 .cb_print = verbose, in backtrack_insn()
1472 verbose(env, "regs=%x stack=%llx before ", *reg_mask, *stack_mask); in backtrack_insn()
1473 verbose(env, "%d: ", idx); in backtrack_insn()
1530 verbose(env, "BUG spi %d\n", spi); in backtrack_insn()
1549 verbose(env, "BUG spi %d\n", spi); in backtrack_insn()
1568 verbose(env, "BUG regs %x\n", *reg_mask); in backtrack_insn()
1731 verbose(env, "last_idx %d first_idx %d\n", last_idx, first_idx); in __mark_chain_precision()
1761 verbose(env, "BUG backtracking idx %d\n", i); in __mark_chain_precision()
1819 verbose(env, "parent %s regs=%x stack=%llx marks\n", in __mark_chain_precision()
1915 verbose(env, "attempt to corrupt spilled pointer on stack\n"); in check_stack_write()
1941 verbose(env, "invalid size of register spill\n"); in check_stack_write()
1946 verbose(env, "cannot spill pointers to stack into stack frame of the caller\n"); in check_stack_write()
1977 verbose(env, in check_stack_write()
2035 verbose(env, "invalid read from stack off %d+0 size %d\n", in check_stack_read()
2046 verbose(env, "invalid size of register fill\n"); in check_stack_read()
2058 verbose(env, "corrupted spill memory\n"); in check_stack_read()
2083 verbose(env, "invalid read from stack off %d+%d size %d\n", in check_stack_read()
2127 verbose(env, "variable stack access var_off=%s off=%d size=%d\n", in check_stack_access()
2133 verbose(env, "invalid stack off=%d size=%d\n", off, size); in check_stack_access()
2148 verbose(env, "write into map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
2154 verbose(env, "read from map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
2171 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", in __check_map_access()
2204 …verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_map_access()
2211 verbose(env, "R%d min value is outside of the array range\n", in check_map_access()
2221 …verbose(env, "R%d unbounded memory access, make sure to bounds check any array access into a map\n… in check_map_access()
2228 verbose(env, "R%d max value is outside of the array range\n", in check_map_access()
2241 verbose(env, "bpf_spin_lock cannot be accessed directly by load/store\n"); in check_map_access()
2298 verbose(env, "invalid access to packet, off=%d size=%d, R%d(id=%d,off=%d,r=%d)\n", in __check_packet_access()
2321 …verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_packet_access()
2327 verbose(env, "R%d offset is outside of the packet\n", regno); in check_packet_access()
2370 verbose(env, "invalid bpf_context access off=%d size=%d\n", off, size); in check_ctx_access()
2379 verbose(env, "invalid access to flow keys off=%d size=%d\n", in check_flow_keys_access()
2396 …verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_sock_access()
2425 verbose(env, "R%d invalid %s access off=%d size=%d\n", in check_sock_access()
2505 verbose(env, in check_pkt_ptr_alignment()
2530 verbose(env, "misaligned %saccess off %s+%d+%d size %d\n", in check_generic_ptr_alignment()
2622 verbose(env, "combined stack size of %d calls is %d. Too large\n", in check_max_stack_depth()
2647 verbose(env, "the call stack of %d frames is too deep !\n", in check_max_stack_depth()
2689 verbose(env, "dereference of modified ctx ptr R%d off=%d disallowed\n", in check_ctx_reg()
2698 verbose(env, "variable ctx access var_off=%s disallowed\n", tn_buf); in check_ctx_reg()
2710 verbose(env, in check_tp_buffer_access()
2719 verbose(env, in check_tp_buffer_access()
2784 verbose(env, "R%d leaks addr into map\n", value_regno); in check_mem_access()
2799 verbose(env, "R%d leaks addr into ctx\n", value_regno); in check_mem_access()
2849 verbose(env, "cannot write into packet\n"); in check_mem_access()
2854 verbose(env, "R%d leaks addr into packet\n", in check_mem_access()
2864 verbose(env, "R%d leaks addr into flow keys\n", in check_mem_access()
2874 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
2886 verbose(env, "R%d invalid mem access '%s'\n", regno, in check_mem_access()
2905 verbose(env, "BPF_XADD uses reserved fields\n"); in check_xadd()
2920 verbose(env, "R%d leaks addr into mem\n", insn->src_reg); in check_xadd()
2928 verbose(env, "BPF_XADD stores into R%d %s is not allowed\n", in check_xadd()
2954 verbose(env, "invalid stack type R%d off=%d access_size=%d\n", in __check_stack_boundary()
2960 verbose(env, "invalid stack type R%d var_off=%s access_size=%d\n", in __check_stack_boundary()
2988 verbose(env, "R%d type=%s expected=%s\n", regno, in check_stack_boundary()
3010 verbose(env, "R%d indirect variable offset stack access prohibited for !root, var_off=%s\n", in check_stack_boundary()
3025 verbose(env, "R%d unbounded indirect variable offset stack access\n", in check_stack_boundary()
3034 verbose(env, "R%d min value is outside of stack bound\n", in check_stack_boundary()
3041 verbose(env, "R%d max value is outside of stack bound\n", in check_stack_boundary()
3078 verbose(env, "invalid indirect read from stack off %d+%d size %d\n", in check_stack_boundary()
3084 verbose(env, "invalid indirect read from stack var_off %s+%d size %d\n", in check_stack_boundary()
3152 verbose(env, "R%d is not a pointer to map_value\n", regno); in process_spin_lock()
3156 verbose(env, in process_spin_lock()
3162 verbose(env, in process_spin_lock()
3169 verbose(env, in process_spin_lock()
3173 verbose(env, in process_spin_lock()
3177 verbose(env, in process_spin_lock()
3183 verbose(env, "off %lld doesn't point to 'struct bpf_spin_lock'\n", in process_spin_lock()
3189 verbose(env, in process_spin_lock()
3196 verbose(env, "bpf_spin_unlock without taking a lock\n"); in process_spin_lock()
3200 verbose(env, "bpf_spin_unlock of different lock\n"); in process_spin_lock()
3254 verbose(env, "R%d leaks addr into helper function\n", in check_func_arg()
3263 verbose(env, "helper access to the packet is not allowed\n"); in check_func_arg()
3302 verbose(env, "verifier internal error: more than one arg with ref_obj_id R%d %u %u\n", in check_func_arg()
3321 verbose(env, "verifier internal error\n"); in check_func_arg()
3345 verbose(env, "unsupported arg_type %d\n", arg_type); in check_func_arg()
3363 verbose(env, "invalid map_ptr to access map->key\n"); in check_func_arg()
3378 verbose(env, "invalid map_ptr to access map->value\n"); in check_func_arg()
3406 verbose(env, "R%d min value is negative, either use unsigned or 'var &= const'\n", in check_func_arg()
3420 verbose(env, "R%d unbounded memory access, use 'var &= const' or 'if (var < const)'\n", in check_func_arg()
3440 verbose(env, "R%d type=%s expected=%s\n", regno, in check_func_arg()
3540 verbose(env, "tail_calls are not allowed in programs with bpf-to-bpf calls\n"); in check_map_func_compatibility()
3605 verbose(env, "cannot pass map_type %d into func %s#%d\n", in check_map_func_compatibility()
3770 verbose(env, "the call stack of %d frames is too deep\n", in check_func_call()
3778 verbose(env, "verifier bug. No program starts at insn %d\n", in check_func_call()
3785 verbose(env, "verifier bug. Frame %d already allocated\n", in check_func_call()
3829 verbose(env, "caller:\n"); in check_func_call()
3831 verbose(env, "callee:\n"); in check_func_call()
3853 verbose(env, "cannot return stack pointer to the caller\n"); in prepare_func_exit()
3869 verbose(env, "returning from callee:\n"); in prepare_func_exit()
3871 verbose(env, "to caller at %d:\n", *insn_idx); in prepare_func_exit()
3914 verbose(env, "kernel subsystem misconfigured verifier\n"); in record_func_map()
3927 verbose(env, "write into map forbidden\n"); in record_func_map()
3946 verbose(env, "Unreleased reference id=%d alloc_insn=%d\n", in check_reference_leak()
3962 verbose(env, "invalid func %s#%d\n", func_id_name(func_id), in check_helper_call()
3970 verbose(env, "unknown func %s#%d\n", func_id_name(func_id), in check_helper_call()
3977 verbose(env, "cannot call GPL-restricted function from non-GPL compatible program\n"); in check_helper_call()
3984 verbose(env, "kernel subsystem misconfigured func %s#%d: r1 != ctx\n", in check_helper_call()
3994 verbose(env, "kernel subsystem misconfigured func %s#%d\n", in check_helper_call()
4034 verbose(env, "tail_call would lead to reference leak\n"); in check_helper_call()
4040 verbose(env, "func %s#%d reference has not been acquired before\n", in check_helper_call()
4053 verbose(env, "get_local_storage() doesn't support non-zero flags\n"); in check_helper_call()
4081 verbose(env, in check_helper_call()
4107 verbose(env, "unknown return type %d of func %s#%d\n", in check_helper_call()
4143 verbose(env, err_str, func_id_name(func_id), func_id); in check_helper_call()
4184 verbose(env, "math between %s pointer and %lld is not allowed\n", in check_reg_sane_offset()
4190 verbose(env, "%s pointer offset %d is not allowed\n", in check_reg_sane_offset()
4196 verbose(env, "math between %s pointer and register with unbounded min value is not allowed\n", in check_reg_sane_offset()
4202 verbose(env, "value %lld makes %s pointer be out of bounds\n", in check_reg_sane_offset()
4367 verbose(env, in adjust_ptr_min_max_vals()
4375 verbose(env, "R%d pointer arithmetic on %s prohibited, null-check it first\n", in adjust_ptr_min_max_vals()
4387 verbose(env, "R%d pointer arithmetic on %s prohibited\n", in adjust_ptr_min_max_vals()
4392 …verbose(env, "R%d has unknown scalar with mixed signed bounds, pointer arithmetic with it prohibit… in adjust_ptr_min_max_vals()
4415 verbose(env, "R%d tried to add from different maps or paths\n", dst); in adjust_ptr_min_max_vals()
4470 verbose(env, "R%d tried to sub from different maps or paths\n", dst); in adjust_ptr_min_max_vals()
4475 verbose(env, "R%d tried to subtract pointer from scalar\n", in adjust_ptr_min_max_vals()
4484 verbose(env, "R%d subtraction from stack pointer prohibited\n", in adjust_ptr_min_max_vals()
4536 verbose(env, "R%d bitwise operator %s on pointer prohibited\n", in adjust_ptr_min_max_vals()
4541 verbose(env, "R%d pointer arithmetic with %s operator prohibited\n", in adjust_ptr_min_max_vals()
4559 verbose(env, "R%d pointer arithmetic of map value goes out of range, " in adjust_ptr_min_max_vals()
4565 verbose(env, "R%d stack pointer arithmetic goes out of range, " in adjust_ptr_min_max_vals()
4627 verbose(env, "R%d tried to add from different pointers or scalars\n", dst); in adjust_scalar_min_max_vals()
4651 verbose(env, "R%d tried to sub from different pointers or scalars\n", dst); in adjust_scalar_min_max_vals()
4889 verbose(env, "R%d pointer %s pointer prohibited\n", in adjust_reg_min_max_vals()
4927 verbose(env, "verifier internal error: unexpected ptr_reg\n"); in adjust_reg_min_max_vals()
4932 verbose(env, "verifier internal error: no src_reg\n"); in adjust_reg_min_max_vals()
4950 verbose(env, "BPF_NEG uses reserved fields\n"); in check_alu_op()
4957 verbose(env, "BPF_END uses reserved fields\n"); in check_alu_op()
4968 verbose(env, "R%d pointer arithmetic prohibited\n", in check_alu_op()
4982 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
4992 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
5016 verbose(env, in check_alu_op()
5047 verbose(env, "invalid BPF_ALU opcode %x\n", opcode); in check_alu_op()
5054 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
5063 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
5075 verbose(env, "div by zero\n"); in check_alu_op()
5084 verbose(env, "invalid shift %d\n", insn->imm); in check_alu_op()
5830 verbose(env, "invalid BPF_JMP/JMP32 opcode %x\n", opcode); in check_cond_jmp_op()
5836 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
5846 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
5853 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
5962 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
5980 verbose(env, "invalid BPF_LD_IMM insn\n"); in check_ld_imm()
5984 verbose(env, "BPF_LD_IMM64 uses reserved fields\n"); in check_ld_imm()
6012 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_imm()
6054 verbose(env, "BPF_LD_[ABS|IND] instructions not allowed for this program type\n"); in check_ld_abs()
6059 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_abs()
6071 verbose(env, "BPF_LD_[ABS|IND] instructions cannot be mixed with bpf-to-bpf calls\n"); in check_ld_abs()
6078 verbose(env, "BPF_LD_[ABS|IND] uses reserved fields\n"); in check_ld_abs()
6093 verbose(env, "BPF_LD_[ABS|IND] cannot be mixed with socket references\n"); in check_ld_abs()
6098 verbose(env, "BPF_LD_[ABS|IND] cannot be used inside bpf_spin_lock-ed region\n"); in check_ld_abs()
6103 verbose(env, in check_ld_abs()
6165 verbose(env, "At program exit the register R0 is not a known value (%s)\n", in check_return_code()
6173 verbose(env, "At program exit the register R0 "); in check_return_code()
6176 verbose(env, "has value %s", tn_buf); in check_return_code()
6178 verbose(env, "has unknown scalar value"); in check_return_code()
6181 verbose(env, " should have been in %s\n", tn_buf); in check_return_code()
6270 verbose(env, "jump out of range from insn %d to %d\n", t, w); in push_insn()
6291 verbose(env, "back-edge from insn %d to %d\n", t, w); in push_insn()
6297 verbose(env, "insn state internal bug\n"); in push_insn()
6407 verbose(env, "pop stack internal bug\n"); in check_cfg()
6416 verbose(env, "unreachable insn %d\n", i); in check_cfg()
6453 verbose(env, "number of funcs in func_info doesn't match number of subprogs\n"); in check_btf_func()
6461 verbose(env, "invalid func info rec size %u\n", urec_size); in check_btf_func()
6479 verbose(env, "nonzero tailing record in func info"); in check_btf_func()
6497 verbose(env, in check_btf_func()
6504 verbose(env, in check_btf_func()
6512 verbose(env, "func_info BTF section doesn't match subprog layout in BPF program\n"); in check_btf_func()
6520 verbose(env, "invalid type id %d in func info", in check_btf_func()
6596 verbose(env, "nonzero tailing record in line_info"); in check_btf_line()
6622 verbose(env, "Invalid line_info[%u].insn_off:%u (prev_offset:%u prog->len:%u)\n", in check_btf_line()
6630 verbose(env, in check_btf_line()
6639 verbose(env, "Invalid line_info[%u].line_off or .file_name_off\n", i); in check_btf_line()
6649 verbose(env, "missing bpf_line_info for func#%u\n", s); in check_btf_line()
6660 verbose(env, "missing bpf_line_info for %u funcs starting from func#%u\n", in check_btf_line()
7215 verbose(env, "propagating r%d\n", i); in propagate_precision()
7229 verbose(env, "propagating fp%d\n", in propagate_precision()
7297 verbose(env, "infinite loop detected at insn %d\n", insn_idx); in is_state_visited()
7534 verbose(env, "invalid insn idx %d insn_cnt %d\n", in do_check()
7543 verbose(env, in do_check()
7556 verbose(env, "\nfrom %d to %d%s: safe\n", in do_check()
7561 verbose(env, "%d: safe\n", env->insn_idx); in do_check()
7575 verbose(env, "%d:", env->insn_idx); in do_check()
7577 verbose(env, "\nfrom %d to %d%s:", in do_check()
7587 .cb_print = verbose, in do_check()
7592 verbose(env, "%d: ", env->insn_idx); in do_check()
7654 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
7692 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
7699 verbose(env, "BPF_ST uses reserved fields\n"); in do_check()
7708 verbose(env, "BPF_ST stores into R%d %s is not allowed\n", in do_check()
7732 verbose(env, "BPF_CALL uses reserved fields\n"); in do_check()
7739 verbose(env, "function calls are not allowed while holding a lock\n"); in do_check()
7755 verbose(env, "BPF_JA uses reserved fields\n"); in do_check()
7768 verbose(env, "BPF_EXIT uses reserved fields\n"); in do_check()
7773 verbose(env, "bpf_spin_unlock is missing\n"); in do_check()
7801 verbose(env, "R0 leaks addr as return value\n"); in do_check()
7841 verbose(env, "invalid BPF_LD mode\n"); in do_check()
7845 verbose(env, "unknown insn class %d\n", class); in do_check()
7889 verbose(env, "perf_event programs can only use preallocated hash map\n"); in check_map_prog_compatibility()
7894 verbose(env, "perf_event programs can only use preallocated inner hash map\n"); in check_map_prog_compatibility()
7902 verbose(env, "tracing progs cannot use bpf_spin_lock yet\n"); in check_map_prog_compatibility()
7908 verbose(env, "offload device mismatch between prog and map\n"); in check_map_prog_compatibility()
7937 verbose(env, "BPF_LDX uses reserved fields\n"); in replace_map_fd_with_map_ptr()
7944 verbose(env, "BPF_STX uses reserved fields\n"); in replace_map_fd_with_map_ptr()
7957 verbose(env, "invalid bpf_ld_imm64 insn\n"); in replace_map_fd_with_map_ptr()
7972 verbose(env, in replace_map_fd_with_map_ptr()
7980 verbose(env, "fd %d is not pointing to valid bpf_map\n", in replace_map_fd_with_map_ptr()
7998 verbose(env, "direct value offset of %u is not allowed\n", off); in replace_map_fd_with_map_ptr()
8004 verbose(env, "no direct value access support for this map type\n"); in replace_map_fd_with_map_ptr()
8011 verbose(env, "invalid access to map value pointer, value_size=%u off=%u\n", in replace_map_fd_with_map_ptr()
8054 verbose(env, "only one cgroup storage of each type is allowed\n"); in replace_map_fd_with_map_ptr()
8068 verbose(env, "unknown opcode %02x\n", insn->code); in replace_map_fd_with_map_ptr()
8168 verbose(env, in bpf_patch_insn_data()
8533 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
8539 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
8635 verbose(env, "bpf verifier narrow ctx access misconfigured\n"); in convert_ctx_accesses()
8654 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
8813 verbose(env, "JIT doesn't support bpf-to-bpf calls\n"); in jit_subprogs()
8962 verbose(env, "bpf verifier is misconfigured\n"); in fixup_bpf_calls()
9068 verbose(env, "tail_call abusing map_ptr\n"); in fixup_bpf_calls()
9112 verbose(env, "bpf verifier is misconfigured\n"); in fixup_bpf_calls()
9178 verbose(env, in fixup_bpf_calls()
9224 verbose(env, "verification time %lld usec\n", in print_verification_stats()
9226 verbose(env, "stack depth "); in print_verification_stats()
9230 verbose(env, "%d", depth); in print_verification_stats()
9232 verbose(env, "+"); in print_verification_stats()
9234 verbose(env, "\n"); in print_verification_stats()
9236 verbose(env, "processed %d insns (limit %d) max_states_per_insn %d " in print_verification_stats()