Lines Matching refs:verbose
349 __printf(2, 3) static void verbose(void *private_data, const char *fmt, ...) in verbose() function
405 verbose(env, "%s\n", in verbose_linfo()
419 verbose(env, "At %s the register %s ", ctx, reg_name); in verbose_invalid_scalar()
422 verbose(env, "has value %s", tn_buf); in verbose_invalid_scalar()
424 verbose(env, "has unknown scalar value"); in verbose_invalid_scalar()
427 verbose(env, " should have been in %s\n", tn_buf); in verbose_invalid_scalar()
613 verbose(env, "_"); in print_liveness()
615 verbose(env, "r"); in print_liveness()
617 verbose(env, "w"); in print_liveness()
619 verbose(env, "D"); in print_liveness()
854 verbose(env, " frame%d:", state->frameno); in print_verifier_state()
862 verbose(env, " R%d", i); in print_verifier_state()
864 verbose(env, "="); in print_verifier_state()
866 verbose(env, "P"); in print_verifier_state()
870 verbose(env, "%s", t == SCALAR_VALUE ? "" : reg_type_str(env, t)); in print_verifier_state()
871 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
875 verbose(env, "%s", reg_type_str(env, t)); in print_verifier_state()
877 verbose(env, "%s", kernel_type_name(reg->btf, reg->btf_id)); in print_verifier_state()
878 verbose(env, "("); in print_verifier_state()
883 #define verbose_a(fmt, ...) ({ verbose(env, "%s" fmt, sep, __VA_ARGS__); sep = ","; }) in print_verifier_state()
937 verbose(env, ")"); in print_verifier_state()
956 verbose(env, " fp%d", (-i - 1) * BPF_REG_SIZE); in print_verifier_state()
961 verbose(env, "=%s", t == SCALAR_VALUE ? "" : reg_type_str(env, t)); in print_verifier_state()
963 verbose(env, "P"); in print_verifier_state()
965 verbose(env, "%lld", reg->var_off.value + reg->off); in print_verifier_state()
967 verbose(env, "=%s", types_buf); in print_verifier_state()
971 verbose(env, " refs=%d", state->refs[0].id); in print_verifier_state()
974 verbose(env, ",%d", state->refs[i].id); in print_verifier_state()
977 verbose(env, " cb"); in print_verifier_state()
979 verbose(env, " async_cb"); in print_verifier_state()
980 verbose(env, "\n"); in print_verifier_state()
997 verbose(env, "%*c;", vlog_alignment(env->prev_insn_print_len), ' '); in print_insn_state()
999 verbose(env, "%d:", env->insn_idx); in print_insn_state()
1311 verbose(env, "The sequence of %d jumps is too complex.\n", in push_stack()
1397 verbose(env, "mark_reg_known_zero(regs, %u)\n", regno); in mark_reg_known_zero()
1714 verbose(env, "mark_reg_unknown(regs, %u)\n", regno); in mark_reg_unknown()
1734 verbose(env, "mark_reg_not_init(regs, %u)\n", regno); in mark_reg_not_init()
1811 verbose(env, in push_async_cb()
1870 verbose(env, "call to invalid destination\n"); in add_subprog()
1877 verbose(env, "too many subprograms\n"); in add_subprog()
1959 verbose(env, "too many different module BTFs\n"); in __find_kfunc_desc_btf()
1964 verbose(env, "kfunc offset > 0 without fd_array is invalid\n"); in __find_kfunc_desc_btf()
1975 verbose(env, "invalid module BTF fd specified\n"); in __find_kfunc_desc_btf()
1980 verbose(env, "BTF fd for kfunc is not a module BTF\n"); in __find_kfunc_desc_btf()
2021 verbose(env, "negative offset disallowed for kernel module function call\n"); in find_kfunc_desc_btf()
2048 verbose(env, "calling kernel function is not supported without CONFIG_DEBUG_INFO_BTF\n"); in add_kfunc_call()
2053 verbose(env, "JIT is required for calling kernel function\n"); in add_kfunc_call()
2058 verbose(env, "JIT does not support calling kernel function\n"); in add_kfunc_call()
2063 verbose(env, "cannot call kernel function from non-GPL compatible program\n"); in add_kfunc_call()
2091 verbose(env, "failed to find BTF for kernel function\n"); in add_kfunc_call()
2099 verbose(env, "too many different kernel function calls\n"); in add_kfunc_call()
2105 verbose(env, "kernel btf_id %u is not a function\n", in add_kfunc_call()
2111 verbose(env, "kernel function btf_id %u does not have a valid func_proto\n", in add_kfunc_call()
2119 verbose(env, "cannot find address for kernel function %s\n", in add_kfunc_call()
2127 verbose(env, "address of kernel function %s is out of range\n", in add_kfunc_call()
2208 …verbose(env, "loading/calling other bpf or kernel functions are allowed for CAP_BPF and CAP_SYS_AD… in add_subprog_and_kfunc()
2228 verbose(env, "func#%d @%d\n", i, subprog[i].start); in add_subprog_and_kfunc()
2259 verbose(env, "jump out of range from insn %d to %d\n", i, off); in check_subprogs()
2270 verbose(env, "last insn is not an exit or jmp\n"); in check_subprogs()
2297 verbose(env, "verifier BUG type %s var_off %lld off %d\n", in mark_reg_read()
2478 verbose(env, "R%d is invalid\n", regno); in check_reg_arg()
2489 verbose(env, "R%d !read_ok\n", regno); in check_reg_arg()
2504 verbose(env, "frame pointer is read only\n"); in check_reg_arg()
2594 .cb_print = verbose, in backtrack_insn()
2608 verbose(env, "regs=%x stack=%llx before ", *reg_mask, *stack_mask); in backtrack_insn()
2609 verbose(env, "%d: ", idx); in backtrack_insn()
2669 verbose(env, "BUG spi %d\n", spi); in backtrack_insn()
2686 verbose(env, "BUG spi %d\n", spi); in backtrack_insn()
2716 verbose(env, "BUG regs %x\n", *reg_mask); in backtrack_insn()
3006 verbose(env, "last_idx %d first_idx %d\n", last_idx, first_idx); in __mark_chain_precision()
3030 verbose(env, "BUG backtracing func entry subprog %d reg_mask %x stack_mask %llx\n", in __mark_chain_precision()
3065 verbose(env, "BUG backtracking idx %d\n", i); in __mark_chain_precision()
3122 verbose(env, "parent %s regs=%x stack=%llx marks:", in __mark_chain_precision()
3272 verbose(env, "attempt to corrupt spilled pointer on stack\n"); in check_stack_write_fixed_off()
3324 verbose(env, "invalid size of register spill\n"); in check_stack_write_fixed_off()
3328 verbose(env, "cannot spill pointers to stack into stack frame of the caller\n"); in check_stack_write_fixed_off()
3442 verbose(env, "spilled ptr in range of var-offset stack write; insn %d, ptr off: %d", in check_stack_write_var_off()
3465 verbose(env, "uninit stack in range of var-offset write prohibited for !root; insn %d, off: %d", in check_stack_write_var_off()
3562 verbose(env, "invalid size of register fill\n"); in check_stack_read_fixed_off()
3585 verbose(env, "invalid read from stack off %d+%d size %d\n", in check_stack_read_fixed_off()
3610 verbose(env, "leaking pointer from stack off %d\n", in check_stack_read_fixed_off()
3622 verbose(env, "invalid read from stack off %d+%d size %d\n", in check_stack_read_fixed_off()
3711 …verbose(env, "variable offset stack pointer cannot be passed into helper function; var_off=%s off=… in check_stack_read()
3781 verbose(env, "write into map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
3787 verbose(env, "read from map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
3809 verbose(env, "invalid access to map key, key_size=%d off=%d size=%d\n", in __check_mem_access()
3813 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", in __check_mem_access()
3819 verbose(env, "invalid access to packet, off=%d size=%d, R%d(id=%d,off=%d,r=%d)\n", in __check_mem_access()
3824 verbose(env, "invalid access to memory, mem_size=%u off=%d size=%d\n", in __check_mem_access()
3855 …verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_mem_region_access()
3862 verbose(env, "R%d min value is outside of the allowed memory range\n", in check_mem_region_access()
3872 verbose(env, "R%d unbounded memory access, make sure to bounds check any such access\n", in check_mem_region_access()
3879 verbose(env, "R%d max value is outside of the allowed memory range\n", in check_mem_region_access()
3896 verbose(env, "negative offset %s ptr R%d off=%d disallowed\n", in __check_ptr_off_reg()
3902 verbose(env, "dereference of modified %s ptr R%d off=%d disallowed\n", in __check_ptr_off_reg()
3911 verbose(env, "variable %s access var_off=%s disallowed\n", in __check_ptr_off_reg()
3941 verbose(env, "R%d must point to kernel BTF\n", regno); in map_kptr_match_type()
3986 verbose(env, "invalid kptr access, R%d type=%s%s ", regno, in map_kptr_match_type()
3988 verbose(env, "expected=%s%s", reg_type_str(env, PTR_TO_BTF_ID), targ_name); in map_kptr_match_type()
3990 verbose(env, " or %s%s\n", reg_type_str(env, PTR_TO_BTF_ID | PTR_UNTRUSTED), in map_kptr_match_type()
3993 verbose(env, "\n"); in map_kptr_match_type()
4013 verbose(env, "kptr in map can only be accessed using BPF_MEM instruction mode\n"); in check_map_kptr_access()
4021 verbose(env, "store to referenced kptr disallowed\n"); in check_map_kptr_access()
4041 verbose(env, "BPF_ST imm must be 0 when storing to kptr at off=%u\n", in check_map_kptr_access()
4046 verbose(env, "kptr in map can only be accessed using BPF_LDX/BPF_STX/BPF_ST\n"); in check_map_kptr_access()
4078 verbose(env, "bpf_spin_lock cannot be accessed directly by load/store\n"); in check_map_access()
4087 verbose(env, "bpf_timer cannot be accessed directly by load/store\n"); in check_map_access()
4101 verbose(env, "kptr cannot be accessed indirectly by helper\n"); in check_map_access()
4105 verbose(env, "kptr access cannot have variable offset\n"); in check_map_access()
4109 verbose(env, "kptr access misaligned expected=%u off=%llu\n", in check_map_access()
4114 verbose(env, "kptr access size must be BPF_DW\n"); in check_map_access()
4184 …verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_packet_access()
4193 verbose(env, "R%d offset is outside of the packet\n", regno); in check_packet_access()
4243 verbose(env, "invalid bpf_context access off=%d size=%d\n", off, size); in check_ctx_access()
4252 verbose(env, "invalid access to flow keys off=%d size=%d\n", in check_flow_keys_access()
4269 …verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_sock_access()
4298 verbose(env, "R%d invalid %s access off=%d size=%d\n", in check_sock_access()
4364 verbose(env, in check_pkt_ptr_alignment()
4389 verbose(env, "misaligned %saccess off %s+%d+%d size %d\n", in check_generic_ptr_alignment()
4502 verbose(env, in check_max_stack_depth_subprog()
4512 verbose(env, "combined stack size of %d calls is %d. Too large\n", in check_max_stack_depth_subprog()
4537 verbose(env, "verifier bug. subprog has tail_call and async cb\n"); in check_max_stack_depth_subprog()
4552 verbose(env, "the call stack of %d frames is too deep !\n", in check_max_stack_depth_subprog()
4619 verbose(env, in __check_buffer_access()
4628 verbose(env, in __check_buffer_access()
4774 verbose(env, in check_ptr_to_btf_access()
4783 verbose(env, in check_ptr_to_btf_access()
4790 verbose(env, in check_ptr_to_btf_access()
4797 verbose(env, in check_ptr_to_btf_access()
4808 verbose(env, "only read is supported\n"); in check_ptr_to_btf_access()
4846 verbose(env, "map_ptr access not supported without CONFIG_DEBUG_INFO_BTF\n"); in check_ptr_to_map_access()
4851 verbose(env, "map_ptr access not supported for map type %d\n", in check_ptr_to_map_access()
4860 verbose(env, in check_ptr_to_map_access()
4867 verbose(env, "R%d is %s invalid negative access: off=%d\n", in check_ptr_to_map_access()
4873 verbose(env, "only read from %s is supported\n", tname); in check_ptr_to_map_access()
4940 verbose(env, "invalid unbounded variable-offset%s stack R%d\n", in check_stack_access_within_bounds()
4954 verbose(env, "invalid%s stack R%d off=%d size=%d\n", in check_stack_access_within_bounds()
4960 verbose(env, "invalid variable-offset%s stack R%d var_off=%s size=%d\n", in check_stack_access_within_bounds()
4996 verbose(env, "write to change key R%d not allowed\n", regno); in check_mem_access()
5011 verbose(env, "R%d leaks addr into map\n", value_regno); in check_mem_access()
5051 verbose(env, "R%d invalid mem access '%s'\n", regno, in check_mem_access()
5057 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
5064 verbose(env, "R%d leaks addr into mem\n", value_regno); in check_mem_access()
5079 verbose(env, "R%d leaks addr into ctx\n", value_regno); in check_mem_access()
5136 verbose(env, "cannot write into packet\n"); in check_mem_access()
5141 verbose(env, "R%d leaks addr into packet\n", in check_mem_access()
5151 verbose(env, "R%d leaks addr into flow keys\n", in check_mem_access()
5161 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
5185 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
5200 verbose(env, "R%d invalid mem access '%s'\n", regno, in check_mem_access()
5231 verbose(env, "BPF_ATOMIC uses invalid atomic opcode %02x\n", insn->imm); in check_atomic()
5236 verbose(env, "invalid atomic operand size\n"); in check_atomic()
5259 verbose(env, "R%d leaks addr into mem\n", aux_reg); in check_atomic()
5265 verbose(env, "R%d leaks addr into mem\n", insn->src_reg); in check_atomic()
5273 verbose(env, "BPF_ATOMIC stores into R%d %s is not allowed\n", in check_atomic()
5342 verbose(env, "invalid zero-sized read\n"); in check_stack_range_initialized()
5374 verbose(env, "R%d%s variable offset stack access prohibited for !root, var_off=%s\n", in check_stack_range_initialized()
5428 verbose(env, "invalid%s read from stack R%d off %d+%d size %d\n", in check_stack_range_initialized()
5434 verbose(env, "invalid%s read from stack R%d var_off %s+%d size %d\n", in check_stack_range_initialized()
5468 verbose(env, "R%d cannot write into %s\n", regno, in check_helper_mem_access()
5484 verbose(env, "R%d cannot write into %s\n", regno, in check_helper_mem_access()
5495 verbose(env, "R%d cannot write into %s\n", regno, in check_helper_mem_access()
5537 verbose(env, "R%d type=%s ", regno, in check_helper_mem_access()
5539 verbose(env, "expected=%s\n", reg_type_str(env, PTR_TO_STACK)); in check_helper_mem_access()
5573 verbose(env, "R%d min value is negative, either use unsigned or 'var &= const'\n", in check_mem_size_reg()
5587 verbose(env, "R%d unbounded memory access, use 'var &= const' or 'if (var < const)'\n", in check_mem_size_reg()
5688 verbose(env, in process_spin_lock()
5694 verbose(env, in process_spin_lock()
5701 verbose(env, in process_spin_lock()
5705 verbose(env, in process_spin_lock()
5709 verbose(env, in process_spin_lock()
5715 verbose(env, "off %lld doesn't point to 'struct bpf_spin_lock'\n", in process_spin_lock()
5721 verbose(env, in process_spin_lock()
5728 verbose(env, "bpf_spin_unlock without taking a lock\n"); in process_spin_lock()
5732 verbose(env, "bpf_spin_unlock of different lock\n"); in process_spin_lock()
5749 verbose(env, in process_timer_func()
5755 verbose(env, "map '%s' has to have BTF in order to use bpf_timer\n", in process_timer_func()
5761 verbose(env, in process_timer_func()
5765 verbose(env, in process_timer_func()
5769 verbose(env, in process_timer_func()
5775 verbose(env, "off %lld doesn't point to 'struct bpf_timer' that is at %d\n", in process_timer_func()
5780 verbose(env, "verifier bug. Two map pointers in a timer helper\n"); in process_timer_func()
5798 verbose(env, in process_kptr_func()
5804 verbose(env, "map '%s' has to have BTF in order to use bpf_kptr_xchg\n", in process_kptr_func()
5811 verbose(env, "map '%s' has more than %d kptr\n", map_ptr->name, in process_kptr_func()
5814 verbose(env, "map '%s' has repeating kptr BTF tags\n", map_ptr->name); in process_kptr_func()
5816 verbose(env, "map '%s' has no valid kptr\n", map_ptr->name); in process_kptr_func()
5824 verbose(env, "off=%d doesn't point to kptr\n", kptr_off); in process_kptr_func()
5828 verbose(env, "off=%d kptr isn't referenced kptr\n", kptr_off); in process_kptr_func()
5867 verbose(env, "invalid map_ptr to access map->type\n"); in resolve_map_arg_type()
5877 verbose(env, "invalid arg_type for sockmap/sockhash\n"); in resolve_map_arg_type()
6011 verbose(env, "verifier internal error: unsupported arg type %d\n", arg_type); in check_reg_type()
6039 verbose(env, "R%d type=%s expected=", regno, reg_type_str(env, reg->type)); in check_reg_type()
6041 verbose(env, "%s, ", reg_type_str(env, compatible->types[j])); in check_reg_type()
6042 verbose(env, "%s\n", reg_type_str(env, compatible->types[j])); in check_reg_type()
6056 verbose(env, "verifier internal error: missing arg compatible BTF ID\n"); in check_reg_type()
6067 verbose(env, "verifier internal error:"); in check_reg_type()
6068 verbose(env, "R%d has non-overwritten BPF_PTR_POISON type\n", in check_reg_type()
6076 verbose(env, "R%d is of type %s but %s is expected\n", in check_reg_type()
6098 verbose(env, "cannot pass in dynptr at an offset\n"); in check_func_arg_reg_off()
6127 verbose(env, "R%d must have zero offset when passed to release func\n", in check_func_arg_reg_off()
6171 verbose(env, "R%d leaks addr into helper function\n", in check_func_arg()
6180 verbose(env, "helper access to the packet is not allowed\n"); in check_func_arg()
6216 verbose(env, "arg %d is an unacquired reference\n", regno); in check_func_arg()
6220 verbose(env, "R%d must be referenced when passed to release function\n", in check_func_arg()
6225 verbose(env, "verifier internal error: more than one release argument\n"); in check_func_arg()
6233 verbose(env, "verifier internal error: more than one arg with ref_obj_id R%d %u %u\n", in check_func_arg()
6259 verbose(env, in check_func_arg()
6279 verbose(env, "invalid map_ptr to access map->key\n"); in check_func_arg()
6295 verbose(env, "invalid map_ptr to access map->value\n"); in check_func_arg()
6305 verbose(env, "Helper has invalid btf_id in R%d\n", regno); in check_func_arg()
6319 verbose(env, "verifier internal error\n"); in check_func_arg()
6357 verbose(env, "Dynptr has to be an uninitialized dynptr\n"); in check_func_arg()
6365 verbose(env, "verifier internal error: multiple uninitialized dynptr args\n"); in check_func_arg()
6371 verbose(env, in check_func_arg()
6389 verbose(env, in check_func_arg()
6397 verbose(env, "R%d is not a known constant'\n", in check_func_arg()
6425 verbose(env, "R%d does not point to a readonly map'\n", regno); in check_func_arg()
6430 verbose(env, "R%d is not a constant address'\n", regno); in check_func_arg()
6435 verbose(env, "no direct value access support for this map type\n"); in check_func_arg()
6448 verbose(env, "direct value access on string failed\n"); in check_func_arg()
6454 verbose(env, "string is not zero-terminated\n"); in check_func_arg()
6496 verbose(env, "cannot update sockmap in this context\n"); in may_update_sockmap()
6637 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n"); in check_map_func_compatibility()
6740 verbose(env, "cannot pass map_type %d into func %s#%d\n", in check_map_func_compatibility()
6923 verbose(env, "the call stack of %d frames is too deep\n", in __check_func_call()
6930 verbose(env, "verifier bug. Frame %d already allocated\n", in __check_func_call()
6943 verbose(env, "Caller passes invalid args into func#%d\n", in __check_func_call()
6948 verbose(env, in __check_func_call()
6967 verbose(env, "verifier bug: helper %s#%d is not marked as callback-calling\n", in __check_func_call()
7031 verbose(env, "caller:\n"); in __check_func_call()
7033 verbose(env, "callee:\n"); in __check_func_call()
7093 verbose(env, "verifier bug. No program starts at insn %d\n", in check_func_call()
7111 verbose(env, "tail_call abusing map_ptr\n"); in set_map_elem_callback_state()
7118 verbose(env, "callback function not allowed for map\n"); in set_map_elem_callback_state()
7251 verbose(env, "cannot return stack pointer to the caller\n"); in prepare_func_exit()
7261 verbose(env, "R0 not a scalar value\n"); in prepare_func_exit()
7294 verbose(env, "returning from callee:\n"); in prepare_func_exit()
7296 verbose(env, "to caller at %d:\n", *insn_idx); in prepare_func_exit()
7346 verbose(env, "kernel subsystem misconfigured verifier\n"); in record_func_map()
7359 verbose(env, "write into map forbidden\n"); in record_func_map()
7385 verbose(env, "kernel subsystem misconfigured verifier\n"); in record_func_key()
7421 verbose(env, "Unreleased reference id=%d alloc_insn=%d\n", in check_reference_leak()
7451 verbose(env, "verifier bug\n"); in check_bpf_snprintf_call()
7461 verbose(env, "Invalid format string\n"); in check_bpf_snprintf_call()
7473 verbose(env, "func %s#%d supported only for fentry/fexit/fmod_ret programs\n", in check_get_func_ip()
7482 verbose(env, "func %s#%d not supported for program type %d\n", in check_get_func_ip()
7538 verbose(env, "invalid func %s#%d\n", func_id_name(func_id), in check_helper_call()
7546 verbose(env, "unknown func %s#%d\n", func_id_name(func_id), in check_helper_call()
7553 verbose(env, "cannot call GPL-restricted function from non-GPL compatible program\n"); in check_helper_call()
7558 verbose(env, "helper call is not allowed in probe\n"); in check_helper_call()
7565 verbose(env, "kernel subsystem misconfigured func %s#%d: r1 != ctx\n", in check_helper_call()
7575 verbose(env, "kernel subsystem misconfigured func %s#%d\n", in check_helper_call()
7636 verbose(env, "func %s#%d reference has not been acquired before\n", in check_helper_call()
7646 verbose(env, "tail_call would lead to reference leak\n"); in check_helper_call()
7655 verbose(env, "get_local_storage() doesn't support non-zero flags\n"); in check_helper_call()
7681 verbose(env, "Unsupported reg type %s for bpf_dynptr_from_mem data\n", in check_helper_call()
7693 verbose(env, "BPF_LSM_CGROUP that attach to void LSM hooks can't modify return value!\n"); in check_helper_call()
7704 verbose(env, "verifier internal error: meta.ref_obj_id already set\n"); in check_helper_call()
7717 verbose(env, "verifier internal error: no dynptr in bpf_dynptr_data()\n"); in check_helper_call()
7759 verbose(env, in check_helper_call()
7803 verbose(env, "unable to resolve the size of type '%s': %ld\n", in check_helper_call()
7835 verbose(env, "verifier internal error:"); in check_helper_call()
7836 verbose(env, "func %s has non-overwritten BPF_PTR_POISON return type\n", in check_helper_call()
7844 verbose(env, "invalid return type %u of func %s#%d\n", in check_helper_call()
7854 verbose(env, "unknown return type %u of func %s#%d\n", in check_helper_call()
7863 verbose(env, "verifier internal error: func %s#%d sets ref_obj_id more than once\n", in check_helper_call()
7901 verbose(env, err_str, func_id_name(func_id), func_id); in check_helper_call()
7975 verbose(env, "calling kernel function %s is not allowed\n", in check_kfunc_call()
7980 verbose(env, "destructive kfunc calls require CAP_SYS_BOOT capabilities\n"); in check_kfunc_call()
7998 verbose(env, "kfunc %s#%d reference has not been acquired before\n", in check_kfunc_call()
8011 verbose(env, "acquire kernel function does not return PTR_TO_BTF_ID\n"); in check_kfunc_call()
8025 verbose(env, in check_kfunc_call()
8130 verbose(env, "math between %s pointer and %lld is not allowed\n", in check_reg_sane_offset()
8136 verbose(env, "%s pointer offset %d is not allowed\n", in check_reg_sane_offset()
8142 verbose(env, "math between %s pointer and register with unbounded min value is not allowed\n", in check_reg_sane_offset()
8148 verbose(env, "value %lld makes %s pointer be out of bounds\n", in check_reg_sane_offset()
8380 verbose(env, "R%d has unknown scalar with mixed signed bounds, %s\n", in sanitize_err()
8384 verbose(env, "R%d has pointer with unsupported alu operation, %s\n", in sanitize_err()
8388 verbose(env, "R%d tried to %s from different maps, paths or scalars, %s\n", in sanitize_err()
8392 verbose(env, "R%d tried to %s beyond pointer bounds, %s\n", in sanitize_err()
8396 verbose(env, "R%d could not be pushed for speculative verification, %s\n", in sanitize_err()
8400 verbose(env, "verifier internal error: unknown reason (%d)\n", in sanitize_err()
8428 verbose(env, "R%d variable stack access prohibited for !root, var_off=%s off=%d\n", in check_stack_access_for_ptr_arithmetic()
8434 verbose(env, "R%d stack pointer arithmetic goes out of range, " in check_stack_access_for_ptr_arithmetic()
8462 verbose(env, "R%d pointer arithmetic of map value goes out of range, " in sanitize_check_bounds()
8515 verbose(env, in adjust_ptr_min_max_vals()
8522 verbose(env, "R%d pointer arithmetic on %s prohibited, null-check it first\n", in adjust_ptr_min_max_vals()
8542 verbose(env, "R%d pointer arithmetic on %s prohibited\n", in adjust_ptr_min_max_vals()
8623 verbose(env, "R%d tried to subtract pointer from scalar\n", in adjust_ptr_min_max_vals()
8632 verbose(env, "R%d subtraction from stack pointer prohibited\n", in adjust_ptr_min_max_vals()
8684 verbose(env, "R%d bitwise operator %s on pointer prohibited\n", in adjust_ptr_min_max_vals()
8689 verbose(env, "R%d pointer arithmetic with %s operator prohibited\n", in adjust_ptr_min_max_vals()
9472 verbose(env, "R%d pointer %s pointer prohibited\n", in adjust_reg_min_max_vals()
9515 verbose(env, "verifier internal error: unexpected ptr_reg\n"); in adjust_reg_min_max_vals()
9520 verbose(env, "verifier internal error: no src_reg\n"); in adjust_reg_min_max_vals()
9538 verbose(env, "BPF_NEG uses reserved fields\n"); in check_alu_op()
9545 verbose(env, "BPF_END uses reserved fields\n"); in check_alu_op()
9556 verbose(env, "R%d pointer arithmetic prohibited\n", in check_alu_op()
9570 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
9580 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
9610 verbose(env, in check_alu_op()
9647 verbose(env, "invalid BPF_ALU opcode %x\n", opcode); in check_alu_op()
9654 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
9663 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
9675 verbose(env, "div by zero\n"); in check_alu_op()
9684 verbose(env, "invalid shift %d\n", insn->imm); in check_alu_op()
10429 verbose(env, "invalid BPF_JMP/JMP32 opcode %x\n", opcode); in check_cond_jmp_op()
10441 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
10453 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
10459 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
10603 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
10622 verbose(env, "invalid BPF_LD_IMM insn\n"); in check_ld_imm()
10626 verbose(env, "BPF_LD_IMM64 uses reserved fields\n"); in check_ld_imm()
10660 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_imm()
10672 verbose(env, "missing btf func_info\n"); in check_ld_imm()
10676 verbose(env, "callback function not static\n"); in check_ld_imm()
10698 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_imm()
10740 verbose(env, "BPF_LD_[ABS|IND] instructions not allowed for this program type\n"); in check_ld_abs()
10745 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_abs()
10752 verbose(env, "BPF_LD_[ABS|IND] uses reserved fields\n"); in check_ld_abs()
10767 verbose(env, "BPF_LD_[ABS|IND] cannot be mixed with socket references\n"); in check_ld_abs()
10772 verbose(env, "BPF_LD_[ABS|IND] cannot be used inside bpf_spin_lock-ed region\n"); in check_ld_abs()
10777 verbose(env, in check_ld_abs()
10848 verbose(env, "R0 leaks addr as return value\n"); in check_return_code()
10857 verbose(env, "In async callback the register R0 is not a known value (%s)\n", in check_return_code()
10871 verbose(env, "At subprogram exit the register R0 is not a scalar value (%s)\n", in check_return_code()
10951 verbose(env, "At program exit the register R0 is not a known value (%s)\n", in check_return_code()
10961 verbose(env, "Note, BPF_LSM_CGROUP that attach to void LSM hooks can't modify return value!\n"); in check_return_code()
11055 verbose(env, "jump out of range from insn %d to %d\n", t, w); in push_insn()
11076 verbose(env, "back-edge from insn %d to %d\n", t, w); in push_insn()
11082 verbose(env, "insn state internal bug\n"); in push_insn()
11217 verbose(env, "visit_insn internal bug\n"); in check_cfg()
11225 verbose(env, "pop stack internal bug\n"); in check_cfg()
11232 verbose(env, "unreachable insn %d\n", i); in check_cfg()
11252 verbose(env, "LD_ABS is not allowed in subprogs without BTF\n"); in check_abnormal_return()
11256 verbose(env, "tail_call is not allowed in subprogs without BTF\n"); in check_abnormal_return()
11291 verbose(env, "number of funcs in func_info doesn't match number of subprogs\n"); in check_btf_func()
11299 verbose(env, "invalid func info rec size %u\n", urec_size); in check_btf_func()
11320 verbose(env, "nonzero tailing record in func info"); in check_btf_func()
11341 verbose(env, in check_btf_func()
11347 verbose(env, in check_btf_func()
11354 verbose(env, "func_info BTF section doesn't match subprog layout in BPF program\n"); in check_btf_func()
11361 verbose(env, "invalid type id %d in func info", in check_btf_func()
11375 verbose(env, "LD_ABS is only allowed in functions that return 'int'.\n"); in check_btf_func()
11379 verbose(env, "tail_call is only allowed in functions that return 'int'.\n"); in check_btf_func()
11457 verbose(env, "nonzero tailing record in line_info"); in check_btf_line()
11484 verbose(env, "Invalid line_info[%u].insn_off:%u (prev_offset:%u prog->len:%u)\n", in check_btf_line()
11492 verbose(env, in check_btf_line()
11501 verbose(env, "Invalid line_info[%u].line_off or .file_name_off\n", i); in check_btf_line()
11511 verbose(env, "missing bpf_line_info for func#%u\n", s); in check_btf_line()
11522 verbose(env, "missing bpf_line_info for %u funcs starting from func#%u\n", in check_btf_line()
11580 verbose(env, "nonzero tailing record in core_relo"); in check_core_relo()
11595 verbose(env, "Invalid core_relo[%u].insn_off:%u prog->len:%u\n", in check_core_relo()
12151 verbose(env, "frame %d: propagating r%d\n", fr, i); in propagate_precision()
12166 verbose(env, "frame %d: propagating fp%d\n", in propagate_precision()
12251 verbose(env, "infinite loop detected at insn %d\n", insn_idx); in is_state_visited()
12472 verbose(env, "invalid insn idx %d insn_cnt %d\n", in do_check()
12481 verbose(env, in do_check()
12494 verbose(env, "\nfrom %d to %d%s: safe\n", in do_check()
12499 verbose(env, "%d: safe\n", env->insn_idx); in do_check()
12511 verbose(env, "\nfrom %d to %d%s:", in do_check()
12522 .cb_print = verbose, in do_check()
12531 verbose(env, "%d: ", env->insn_idx); in do_check()
12595 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
12611 verbose(env, "BPF_STX uses reserved fields\n"); in do_check()
12638 verbose(env, "same insn cannot be used with different pointers\n"); in do_check()
12645 verbose(env, "BPF_ST uses reserved fields\n"); in do_check()
12654 verbose(env, "BPF_ST stores into R%d %s is not allowed\n", in do_check()
12680 verbose(env, "BPF_CALL uses reserved fields\n"); in do_check()
12687 verbose(env, "function calls are not allowed while holding a lock\n"); in do_check()
12704 verbose(env, "BPF_JA uses reserved fields\n"); in do_check()
12717 verbose(env, "BPF_EXIT uses reserved fields\n"); in do_check()
12722 verbose(env, "bpf_spin_unlock is missing\n"); in do_check()
12782 verbose(env, "invalid BPF_LD mode\n"); in do_check()
12786 verbose(env, "unknown insn class %d\n", class); in do_check()
12847 verbose(env, "invalid module BTF object FD specified.\n"); in check_pseudo_btf_id()
12852 …verbose(env, "kernel is missing BTF, make sure CONFIG_DEBUG_INFO_BTF=y is specified in Kconfig.\n"… in check_pseudo_btf_id()
12861 verbose(env, "ldimm64 insn specifies invalid btf_id %d.\n", id); in check_pseudo_btf_id()
12867 verbose(env, "pseudo btf_id %d in ldimm64 isn't KIND_VAR.\n", id); in check_pseudo_btf_id()
12875 verbose(env, "ldimm64 failed to find the address for kernel symbol '%s'.\n", in check_pseudo_btf_id()
12910 verbose(env, "ldimm64 unable to resolve the size of type '%s': %ld\n", in check_pseudo_btf_id()
12980 verbose(env, "socket filter progs cannot use bpf_spin_lock yet\n"); in check_map_prog_compatibility()
12985 verbose(env, "tracing progs cannot use bpf_spin_lock yet\n"); in check_map_prog_compatibility()
12990 verbose(env, "sleepable progs cannot use bpf_spin_lock yet\n"); in check_map_prog_compatibility()
12997 verbose(env, "tracing progs cannot use bpf_timer yet\n"); in check_map_prog_compatibility()
13004 verbose(env, "offload device mismatch between prog and map\n"); in check_map_prog_compatibility()
13009 verbose(env, "bpf_struct_ops map cannot be used in prog\n"); in check_map_prog_compatibility()
13030 verbose(env, in check_map_prog_compatibility()
13064 verbose(env, "BPF_LDX uses reserved fields\n"); in resolve_pseudo_ldimm64()
13078 verbose(env, "invalid bpf_ld_imm64 insn\n"); in resolve_pseudo_ldimm64()
13113 verbose(env, "unrecognized bpf_ld_imm64 insn\n"); in resolve_pseudo_ldimm64()
13121 verbose(env, "fd_idx without fd_array is invalid\n"); in resolve_pseudo_ldimm64()
13137 verbose(env, "fd %d is not pointing to valid bpf_map\n", in resolve_pseudo_ldimm64()
13156 verbose(env, "direct value offset of %u is not allowed\n", off); in resolve_pseudo_ldimm64()
13162 verbose(env, "no direct value access support for this map type\n"); in resolve_pseudo_ldimm64()
13169 verbose(env, "invalid access to map value pointer, value_size=%u off=%u\n", in resolve_pseudo_ldimm64()
13208 verbose(env, "only one cgroup storage of each type is allowed\n"); in resolve_pseudo_ldimm64()
13222 verbose(env, "unknown opcode %02x\n", insn->code); in resolve_pseudo_ldimm64()
13344 verbose(env, in bpf_patch_insn_data()
13692 verbose(env, "verifier bug. zext_dst is set, but no reg is defined\n"); in opt_subreg_zext_lo32_rnd_hi32()
13732 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
13738 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
13843 verbose(env, "bpf verifier narrow ctx access misconfigured\n"); in convert_ctx_accesses()
13862 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
13870 verbose(env, "bpf verifier narrow ctx load misconfigured\n"); in convert_ctx_accesses()
14058 verbose(env, "JIT doesn't support bpf-to-bpf calls\n"); in jit_subprogs()
14155 verbose(env, "calling kernel functions are not allowed in non-JITed programs\n"); in fixup_call_args()
14162 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n"); in fixup_call_args()
14170 verbose(env, "callbacks are not allowed in non-JITed programs\n"); in fixup_call_args()
14192 verbose(env, "invalid kernel function call not eliminated in verifier pass\n"); in fixup_kfunc_call()
14201 verbose(env, "verifier internal error: kernel function descriptor not found for func_id %u\n", in fixup_kfunc_call()
14277 verbose(env, "bpf verifier is misconfigured\n"); in do_misc_fixups()
14395 verbose(env, "adding tail call poke descriptor failed\n"); in do_misc_fixups()
14413 verbose(env, "tail_call abusing map_ptr\n"); in do_misc_fixups()
14515 verbose(env, "bpf verifier is misconfigured\n"); in do_misc_fixups()
14702 verbose(env, in do_misc_fixups()
14716 verbose(env, "bpf verifier is misconfigured\n"); in do_misc_fixups()
14722 verbose(env, "tracking tail call prog failed\n"); in do_misc_fixups()
15013 verbose(env, in do_check_subprogs()
15038 verbose(env, "verification time %lld usec\n", in print_verification_stats()
15040 verbose(env, "stack depth "); in print_verification_stats()
15044 verbose(env, "%d", depth); in print_verification_stats()
15046 verbose(env, "+"); in print_verification_stats()
15048 verbose(env, "\n"); in print_verification_stats()
15050 verbose(env, "processed %d insns (limit %d) max_states_per_insn %d " in print_verification_stats()
15067 verbose(env, "struct ops programs must have a GPL compatible license\n"); in check_struct_ops_btf_id()
15074 verbose(env, "attach_btf_id %u is not a supported struct\n", in check_struct_ops_btf_id()
15082 verbose(env, "attach to invalid member idx %u of struct %s\n", in check_struct_ops_btf_id()
15092 verbose(env, "attach to invalid member %s(@idx %u) of struct %s\n", in check_struct_ops_btf_id()
15101 verbose(env, "attach to unsupported member %s of struct %s\n", in check_struct_ops_btf_id()
15405 verbose(env, "Syscall programs can only be sleepable\n"); in BTF_SET_START()
15411 verbose(env, "Only fentry/fexit/fmod_ret, lsm, and kprobe/uprobe programs can be sleepable\n"); in BTF_SET_START()
15544 verbose(env, "in-kernel BTF is malformed\n"); in bpf_check()