Lines Matching refs:verbose
354 __printf(2, 3) static void verbose(void *private_data, const char *fmt, ...) in verbose() function
374 verbose(env, "%s the register %s has", ctx, reg_name); in verbose_invalid_scalar()
376 verbose(env, " smin=%lld", reg->smin_value); in verbose_invalid_scalar()
380 verbose(env, " smax=%lld", reg->smax_value); in verbose_invalid_scalar()
384 verbose(env, " unknown scalar value"); in verbose_invalid_scalar()
385 verbose(env, " should have been in [%d, %d]\n", range.minval, range.maxval); in verbose_invalid_scalar()
611 verbose(env, "%s has to be at a constant offset\n", obj_kind); in stack_slot_obj_get_spi()
617 verbose(env, "cannot pass in %s at an offset=%d\n", obj_kind, off); in stack_slot_obj_get_spi()
623 verbose(env, "cannot pass in %s at an offset=%d\n", obj_kind, off); in stack_slot_obj_get_spi()
841 verbose(env, "verifier internal error: misconfigured ref_obj_id\n"); in unmark_stack_slots_dynptr()
882 verbose(env, "cannot overwrite referenced dynptr\n"); in destroy_if_dynptr_stack_slot()
1723 verbose(env, "The sequence of %d jumps is too complex.\n", in push_stack()
1812 verbose(env, "mark_reg_known_zero(regs, %u)\n", regno); in mark_reg_known_zero()
2295 verbose(env, "REG INVARIANTS VIOLATION (%s): %s u64=[%#llx, %#llx] " in reg_bounds_sanity_check()
2363 verbose(env, "mark_reg_unknown(regs, %u)\n", regno); in mark_reg_unknown()
2402 verbose(env, "mark_reg_not_init(regs, %u)\n", regno); in mark_reg_not_init()
2486 verbose(env, in push_async_cb()
2546 verbose(env, "call to invalid destination\n"); in add_subprog()
2553 verbose(env, "too many subprograms\n"); in add_subprog()
2579 verbose(env, "invalid btf id for main subprog in func_info\n"); in bpf_find_exception_callback_insn_off()
2590 verbose(env, "multiple exception callback tags for main subprog\n"); in bpf_find_exception_callback_insn_off()
2596 verbose(env, "exception callback '%s' could not be found in BTF\n", name); in bpf_find_exception_callback_insn_off()
2602 verbose(env, "exception callback '%s' must have global linkage\n", name); in bpf_find_exception_callback_insn_off()
2614 verbose(env, "invalid exception callback insn_off in func_info: 0\n"); in bpf_find_exception_callback_insn_off()
2619 verbose(env, "exception callback type id not found in func_info\n"); in bpf_find_exception_callback_insn_off()
2716 verbose(env, "too many different module BTFs\n"); in __find_kfunc_desc_btf()
2721 verbose(env, "kfunc offset > 0 without fd_array is invalid\n"); in __find_kfunc_desc_btf()
2732 verbose(env, "invalid module BTF fd specified\n"); in __find_kfunc_desc_btf()
2737 verbose(env, "BTF fd for kfunc is not a module BTF\n"); in __find_kfunc_desc_btf()
2784 verbose(env, "negative offset disallowed for kernel module function call\n"); in find_kfunc_desc_btf()
2811 verbose(env, "calling kernel function is not supported without CONFIG_DEBUG_INFO_BTF\n"); in add_kfunc_call()
2816 verbose(env, "JIT is required for calling kernel function\n"); in add_kfunc_call()
2821 verbose(env, "JIT does not support calling kernel function\n"); in add_kfunc_call()
2826 verbose(env, "cannot call kernel function from non-GPL compatible program\n"); in add_kfunc_call()
2854 verbose(env, "failed to find BTF for kernel function\n"); in add_kfunc_call()
2862 verbose(env, "too many different kernel function calls\n"); in add_kfunc_call()
2868 verbose(env, "kernel btf_id %u is not a function\n", in add_kfunc_call()
2874 verbose(env, "kernel function btf_id %u does not have a valid func_proto\n", in add_kfunc_call()
2882 verbose(env, "cannot find address for kernel function %s\n", in add_kfunc_call()
2894 verbose(env, "address of kernel function %s is out of range\n", in add_kfunc_call()
2984 …verbose(env, "loading/calling other bpf or kernel functions are allowed for CAP_BPF and CAP_SYS_AD… in add_subprog_and_kfunc()
3025 verbose(env, "func#%d @%d\n", i, subprog[i].start); in add_subprog_and_kfunc()
3061 verbose(env, "jump out of range from insn %d to %d\n", i, off); in check_subprogs()
3073 verbose(env, "last insn is not an exit or jmp\n"); in check_subprogs()
3100 verbose(env, "verifier BUG type %s var_off %lld off %d\n", in mark_reg_read()
3327 verbose(env, "R%d is invalid\n", regno); in __check_reg_arg()
3338 verbose(env, "R%d !read_ok\n", regno); in __check_reg_arg()
3353 verbose(env, "frame pointer is read only\n"); in __check_reg_arg()
3604 verbose(bt->env, "BUG subprog enter from frame %d\n", bt->frame); in bt_subprog_enter()
3615 verbose(bt->env, "BUG subprog exit from frame 0\n"); in bt_subprog_exit()
3779 .cb_print = verbose, in backtrack_insn()
3794 verbose(env, "mark_precise: frame%d: regs=%s ", in backtrack_insn()
3797 verbose(env, "stack=%s before ", env->tmp_str_buf); in backtrack_insn()
3798 verbose(env, "%d: ", idx); in backtrack_insn()
3905 verbose(env, "BUG regs %x\n", bt_reg_mask(bt)); in backtrack_insn()
3920 verbose(env, "BUG regs %x\n", bt_reg_mask(bt)); in backtrack_insn()
3928 verbose(env, "BUG stack slots %llx\n", bt_stack_mask(bt)); in backtrack_insn()
3952 verbose(env, "BUG regs %x\n", bt_reg_mask(bt)); in backtrack_insn()
3957 verbose(env, "BUG stack slots %llx\n", bt_stack_mask(bt)); in backtrack_insn()
3980 verbose(env, "BUG regs %x\n", bt_reg_mask(bt)); in backtrack_insn()
3999 verbose(env, "BUG regs %x\n", bt_reg_mask(bt)); in backtrack_insn()
4123 verbose(env, "mark_precise: frame%d: falling back to forcing all scalars precise\n", in mark_all_scalars_precise()
4142 verbose(env, "force_precise: frame%d: forcing r%d to be precise\n", in mark_all_scalars_precise()
4154 verbose(env, "force_precise: frame%d: forcing fp%d to be precise\n", in mark_all_scalars_precise()
4315 verbose(env, "mark_precise: frame%d: last_idx %d first_idx %d subseq_idx %d \n", in __mark_chain_precision()
4340 verbose(env, "BUG backtracking func entry subprog %d reg_mask %x stack_mask %llx\n", in __mark_chain_precision()
4378 verbose(env, "BUG backtracking idx %d\n", i); in __mark_chain_precision()
4405 verbose(env, "BUG backtracking (stack slot %d, total slots %d)\n", in __mark_chain_precision()
4424 verbose(env, "mark_precise: frame%d: parent state regs=%s ", in __mark_chain_precision()
4428 verbose(env, "stack=%s: ", env->tmp_str_buf); in __mark_chain_precision()
4631 verbose(env, "attempt to corrupt spilled pointer on stack\n"); in check_stack_write_fixed_off()
4683 verbose(env, "invalid size of register spill\n"); in check_stack_write_fixed_off()
4687 verbose(env, "cannot spill pointers to stack into stack frame of the caller\n"); in check_stack_write_fixed_off()
4816 verbose(env, "spilled ptr in range of var-offset stack write; insn %d, ptr off: %d", in check_stack_write_var_off()
4852 verbose(env, "uninit stack in range of var-offset write prohibited for !root; insn %d, off: %d", in check_stack_write_var_off()
4943 verbose(env, "invalid size of register fill\n"); in check_stack_read_fixed_off()
4983 verbose(env, "invalid read from stack off %d+%d size %d\n", in check_stack_read_fixed_off()
5017 verbose(env, "leaking pointer from stack off %d\n", in check_stack_read_fixed_off()
5031 verbose(env, "invalid read from stack off %d+%d size %d\n", in check_stack_read_fixed_off()
5124 …verbose(env, "variable offset stack pointer cannot be passed into helper function; var_off=%s off=… in check_stack_read()
5194 verbose(env, "write into map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
5200 verbose(env, "read from map forbidden, value_size=%d off=%d size=%d\n", in check_map_access_type()
5222 verbose(env, "invalid access to map key, key_size=%d off=%d size=%d\n", in __check_mem_access()
5226 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", in __check_mem_access()
5232 verbose(env, "invalid access to packet, off=%d size=%d, R%d(id=%d,off=%d,r=%d)\n", in __check_mem_access()
5237 verbose(env, "invalid access to memory, mem_size=%u off=%d size=%d\n", in __check_mem_access()
5268 …verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_mem_region_access()
5275 verbose(env, "R%d min value is outside of the allowed memory range\n", in check_mem_region_access()
5285 verbose(env, "R%d unbounded memory access, make sure to bounds check any such access\n", in check_mem_region_access()
5292 verbose(env, "R%d max value is outside of the allowed memory range\n", in check_mem_region_access()
5309 verbose(env, "negative offset %s ptr R%d off=%d disallowed\n", in __check_ptr_off_reg()
5315 verbose(env, "dereference of modified %s ptr R%d off=%d disallowed\n", in __check_ptr_off_reg()
5324 verbose(env, "variable %s access var_off=%s disallowed\n", in __check_ptr_off_reg()
5403 verbose(env, "invalid kptr access, R%d type=%s%s ", regno, in map_kptr_match_type()
5405 verbose(env, "expected=%s%s", reg_type_str(env, PTR_TO_BTF_ID), targ_name); in map_kptr_match_type()
5407 verbose(env, " or %s%s\n", reg_type_str(env, PTR_TO_BTF_ID | PTR_UNTRUSTED), in map_kptr_match_type()
5410 verbose(env, "\n"); in map_kptr_match_type()
5510 verbose(env, "kptr in map can only be accessed using BPF_MEM instruction mode\n"); in check_map_kptr_access()
5519 verbose(env, "store to referenced kptr disallowed\n"); in check_map_kptr_access()
5537 verbose(env, "BPF_ST imm must be 0 when storing to kptr at off=%u\n", in check_map_kptr_access()
5542 verbose(env, "kptr in map can only be accessed using BPF_LDX/BPF_STX/BPF_ST\n"); in check_map_kptr_access()
5583 verbose(env, "kptr cannot be accessed indirectly by helper\n"); in check_map_access()
5587 verbose(env, "kptr access cannot have variable offset\n"); in check_map_access()
5591 verbose(env, "kptr access misaligned expected=%u off=%llu\n", in check_map_access()
5596 verbose(env, "kptr access size must be BPF_DW\n"); in check_map_access()
5601 verbose(env, "%s cannot be accessed directly by load/store\n", in check_map_access()
5670 …verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_packet_access()
5679 verbose(env, "R%d offset is outside of the packet\n", regno); in check_packet_access()
5732 verbose(env, "invalid bpf_context access off=%d size=%d\n", off, size); in check_ctx_access()
5741 verbose(env, "invalid access to flow keys off=%d size=%d\n", in check_flow_keys_access()
5758 …verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n… in check_sock_access()
5787 verbose(env, "R%d invalid %s access off=%d size=%d\n", in check_sock_access()
5903 verbose(env, in check_pkt_ptr_alignment()
5928 verbose(env, "misaligned %saccess off %s+%d+%d size %d\n", in check_generic_ptr_alignment()
6040 verbose(env, in check_max_stack_depth_subprog()
6047 verbose(env, "combined stack size of %d calls is %d. Too large\n", in check_max_stack_depth_subprog()
6071 verbose(env, in check_max_stack_depth_subprog()
6093 verbose(env, "verifier bug. subprog has tail_call and async cb\n"); in check_max_stack_depth_subprog()
6100 verbose(env, "insn %d cannot call exception cb directly\n", i); in check_max_stack_depth_subprog()
6112 verbose(env, "the call stack of %d frames is too deep !\n", in check_max_stack_depth_subprog()
6126 verbose(env, "cannot tail call within exception cb\n"); in check_max_stack_depth_subprog()
6184 verbose(env, in __check_buffer_access()
6193 verbose(env, in __check_buffer_access()
6601 verbose(env, in check_ptr_to_btf_access()
6607 verbose(env, in check_ptr_to_btf_access()
6613 verbose(env, in check_ptr_to_btf_access()
6622 verbose(env, in check_ptr_to_btf_access()
6629 verbose(env, in check_ptr_to_btf_access()
6636 verbose(env, in check_ptr_to_btf_access()
6644 verbose(env, "verifier internal error: reg->btf must be kernel btf\n"); in check_ptr_to_btf_access()
6654 verbose(env, "only read is supported\n"); in check_ptr_to_btf_access()
6660 verbose(env, "verifier internal error: ref_obj_id for allocated object must be non-zero\n"); in check_ptr_to_btf_access()
6752 verbose(env, "map_ptr access not supported without CONFIG_DEBUG_INFO_BTF\n"); in check_ptr_to_map_access()
6757 verbose(env, "map_ptr access not supported for map type %d\n", in check_ptr_to_map_access()
6766 verbose(env, in check_ptr_to_map_access()
6773 verbose(env, "R%d is %s invalid negative access: off=%d\n", in check_ptr_to_map_access()
6779 verbose(env, "only read from %s is supported\n", tname); in check_ptr_to_map_access()
6850 verbose(env, "invalid unbounded variable-offset%s stack R%d\n", in check_stack_access_within_bounds()
6869 verbose(env, "invalid%s stack R%d off=%d size=%d\n", in check_stack_access_within_bounds()
6875 verbose(env, "invalid variable-offset%s stack R%d var_off=%s off=%d size=%d\n", in check_stack_access_within_bounds()
6926 verbose(env, "write to change key R%d not allowed\n", regno); in check_mem_access()
6941 verbose(env, "R%d leaks addr into map\n", value_regno); in check_mem_access()
6980 verbose(env, "R%d invalid mem access '%s'\n", regno, in check_mem_access()
6986 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
6993 verbose(env, "R%d leaks addr into mem\n", value_regno); in check_mem_access()
7010 verbose(env, "R%d leaks addr into ctx\n", value_regno); in check_mem_access()
7069 verbose(env, "cannot write into packet\n"); in check_mem_access()
7074 verbose(env, "R%d leaks addr into packet\n", in check_mem_access()
7084 verbose(env, "R%d leaks addr into flow keys\n", in check_mem_access()
7094 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
7118 verbose(env, "R%d cannot write into %s\n", in check_mem_access()
7136 verbose(env, "R%d invalid mem access '%s'\n", regno, in check_mem_access()
7173 verbose(env, "BPF_ATOMIC uses invalid atomic opcode %02x\n", insn->imm); in check_atomic()
7178 verbose(env, "invalid atomic operand size\n"); in check_atomic()
7201 verbose(env, "R%d leaks addr into mem\n", aux_reg); in check_atomic()
7207 verbose(env, "R%d leaks addr into mem\n", insn->src_reg); in check_atomic()
7216 verbose(env, "BPF_ATOMIC stores into R%d %s is not allowed\n", in check_atomic()
7290 verbose(env, "invalid zero-sized read\n"); in check_stack_range_initialized()
7322 verbose(env, "R%d%s variable offset stack access prohibited for !root, var_off=%s\n", in check_stack_range_initialized()
7361 verbose(env, "potential write to dynptr at off=%d disallowed\n", i); in check_stack_range_initialized()
7376 verbose(env, "verifier bug: allocated_stack too small"); in check_stack_range_initialized()
7404 verbose(env, "invalid%s read from stack R%d off %d+%d size %d\n", in check_stack_range_initialized()
7410 verbose(env, "invalid%s read from stack R%d var_off %s+%d size %d\n", in check_stack_range_initialized()
7445 verbose(env, "R%d cannot write into %s\n", regno, in check_helper_mem_access()
7459 verbose(env, "R%d cannot write into %s\n", regno, in check_helper_mem_access()
7470 verbose(env, "R%d cannot write into %s\n", regno, in check_helper_mem_access()
7514 verbose(env, "R%d type=%s ", regno, in check_helper_mem_access()
7516 verbose(env, "expected=%s\n", reg_type_str(env, PTR_TO_STACK)); in check_helper_mem_access()
7554 verbose(env, "R%d min value is negative, either use unsigned or 'var &= const'\n", in check_mem_size_reg()
7560 verbose(env, "R%d invalid zero-sized read: u64=[%lld,%lld]\n", in check_mem_size_reg()
7566 verbose(env, "R%d unbounded memory access, use 'var &= const' or 'if (var < const)'\n", in check_mem_size_reg()
7666 verbose(env, in process_spin_lock()
7674 verbose(env, in process_spin_lock()
7685 verbose(env, "%s '%s' has no valid bpf_spin_lock\n", map ? "map" : "local", in process_spin_lock()
7690 verbose(env, "off %lld doesn't point to 'struct bpf_spin_lock' that is at %d\n", in process_spin_lock()
7696 verbose(env, in process_spin_lock()
7714 verbose(env, "bpf_spin_unlock without taking a lock\n"); in process_spin_lock()
7719 verbose(env, "bpf_spin_unlock of different lock\n"); in process_spin_lock()
7740 verbose(env, in process_timer_func()
7746 verbose(env, "map '%s' has to have BTF in order to use bpf_timer\n", in process_timer_func()
7751 verbose(env, "map '%s' has no valid bpf_timer\n", map->name); in process_timer_func()
7755 verbose(env, "off %lld doesn't point to 'struct bpf_timer' that is at %d\n", in process_timer_func()
7760 verbose(env, "verifier bug. Two map pointers in a timer helper\n"); in process_timer_func()
7776 verbose(env, "off %lld doesn't point to 'struct bpf_wq' that is at %d\n", in process_wq_func()
7799 verbose(env, "map '%s' has to have BTF in order to use bpf_kptr_xchg\n", in process_kptr_func()
7808 verbose(env, in process_kptr_func()
7815 verbose(env, "R%d has no valid kptr\n", regno); in process_kptr_func()
7822 verbose(env, "off=%d doesn't point to kptr\n", kptr_off); in process_kptr_func()
7826 verbose(env, "off=%d kptr isn't referenced kptr\n", kptr_off); in process_kptr_func()
7865 verbose(env, in process_dynptr_func()
7875 verbose(env, "verifier internal error: misconfigured dynptr helper type flags\n"); in process_dynptr_func()
7898 verbose(env, "Dynptr has to be an uninitialized dynptr\n"); in process_dynptr_func()
7914 verbose(env, "cannot pass pointer to const bpf_dynptr, the helper mutates it\n"); in process_dynptr_func()
7919 verbose(env, in process_dynptr_func()
7927 verbose(env, in process_dynptr_func()
7993 verbose(env, "expected valid iter pointer as arg #%d\n", regno); in process_iter_arg()
8002 verbose(env, "expected uninitialized iter_%s as arg #%d\n", in process_iter_arg()
8026 verbose(env, "expected an initialized iter_%s as arg #%d\n", in process_iter_arg()
8030 verbose(env, "expected an RCU CS when using %s\n", meta->func_name); in process_iter_arg()
8234 verbose(env, "verifier internal error: unexpected iterator state %d (%s)\n", in process_iter_next_call()
8245 verbose(env, "bug: bad parent state for iter next call"); in process_iter_next_call()
8304 verbose(env, "invalid map_ptr to access map->type\n"); in resolve_map_arg_type()
8314 verbose(env, "invalid arg_type for sockmap/sockhash\n"); in resolve_map_arg_type()
8451 verbose(env, "verifier internal error: unsupported arg type %d\n", arg_type); in check_reg_type()
8489 verbose(env, "R%d type=%s expected=", regno, reg_type_str(env, reg->type)); in check_reg_type()
8491 verbose(env, "%s, ", reg_type_str(env, compatible->types[j])); in check_reg_type()
8492 verbose(env, "%s\n", reg_type_str(env, compatible->types[j])); in check_reg_type()
8501 verbose(env, in check_reg_type()
8527 verbose(env, "Possibly NULL pointer passed to helper arg%d\n", regno); in check_reg_type()
8533 verbose(env, "verifier internal error: missing arg compatible BTF ID\n"); in check_reg_type()
8544 verbose(env, "verifier internal error:"); in check_reg_type()
8545 verbose(env, "R%d has non-overwritten BPF_PTR_POISON type\n", in check_reg_type()
8553 verbose(env, "R%d is of type %s but %s is expected\n", in check_reg_type()
8565 verbose(env, "verifier internal error: unimplemented handling of MEM_ALLOC\n"); in check_reg_type()
8580 verbose(env, "verifier internal error: invalid PTR_TO_BTF_ID register for type match\n"); in check_reg_type()
8630 verbose(env, "R%d must have zero offset when passed to release func or trusted arg to kfunc\n", in check_func_arg_reg_off()
8684 verbose(env, "verifier internal error: multiple dynptr args\n"); in get_dynptr_arg_reg()
8691 verbose(env, "verifier internal error: no dynptr arg found\n"); in get_dynptr_arg_reg()
8733 verbose(env, "verifier internal error: invalid spi when querying dynptr type\n"); in dynptr_get_type()
8753 verbose(env, "R%d does not point to a readonly map'\n", regno); in check_reg_const_str()
8758 verbose(env, "R%d is not a constant address'\n", regno); in check_reg_const_str()
8763 verbose(env, "no direct value access support for this map type\n"); in check_reg_const_str()
8776 verbose(env, "direct value access on string failed\n"); in check_reg_const_str()
8782 verbose(env, "string is not zero-terminated\n"); in check_reg_const_str()
8809 verbose(env, "R%d leaks addr into helper function\n", in check_func_arg()
8818 verbose(env, "helper access to the packet is not allowed\n"); in check_func_arg()
8861 verbose(env, "arg %d is an unacquired reference\n", regno); in check_func_arg()
8865 verbose(env, "cannot release unowned const bpf_dynptr\n"); in check_func_arg()
8869 verbose(env, "R%d must be referenced when passed to release function\n", in check_func_arg()
8874 verbose(env, "verifier internal error: more than one release argument\n"); in check_func_arg()
8882 verbose(env, "verifier internal error: more than one arg with ref_obj_id R%d %u %u\n", in check_func_arg()
8908 verbose(env, in check_func_arg()
8928 verbose(env, "invalid map_ptr to access map->key\n"); in check_func_arg()
8943 verbose(env, "invalid map_ptr to access map->value\n"); in check_func_arg()
8953 verbose(env, "Helper has invalid btf_id in R%d\n", regno); in check_func_arg()
8961 verbose(env, "can't spin_{lock,unlock} in rbtree cb\n"); in check_func_arg()
8973 verbose(env, "verifier internal error\n"); in check_func_arg()
9019 verbose(env, "R%d is not a known constant'\n", in check_func_arg()
9079 verbose(env, "cannot update sockmap in this context\n"); in may_update_sockmap()
9227 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n"); in check_map_func_compatibility()
9335 verbose(env, "cannot pass map_type %d into func %s#%d\n", in check_map_func_compatibility()
9526 verbose(env, "the call stack of %d frames is too deep\n", in setup_func_entry()
9532 verbose(env, "verifier bug. Frame %d already allocated\n", in setup_func_entry()
9713 verbose(env, "verifier bug: kfunc %s#%d not marked as callback-calling\n", in push_callback_call()
9718 verbose(env, "verifier bug: helper %s#%d not marked as callback-calling\n", in push_callback_call()
9772 verbose(env, "verifier bug. No program starts at insn %d\n", target_insn); in check_func_call()
9785 verbose(env, "global function calls are not allowed while holding a lock,\n" in check_func_call()
9792 verbose(env, "global function calls are not allowed with preemption disabled,\n" in check_func_call()
9798 verbose(env, "Caller passes invalid args into func#%d ('%s')\n", in check_func_call()
9803 verbose(env, "Func#%d ('%s') is global and assumed valid.\n", in check_func_call()
9830 verbose(env, "caller:\n"); in check_func_call()
9832 verbose(env, "callee:\n"); in check_func_call()
9893 verbose(env, "callback function not allowed for map\n"); in set_map_elem_callback_state()
10092 verbose(env, "cannot return stack pointer to the caller\n"); in prepare_func_exit()
10099 verbose(env, "R0 not a scalar value\n"); in prepare_func_exit()
10116 verbose(env, "BUG: in callback at %d, callsite %d !calls_callback\n", in prepare_func_exit()
10148 verbose(env, "returning from callee:\n"); in prepare_func_exit()
10150 verbose(env, "to caller at %d:\n", *insn_idx); in prepare_func_exit()
10236 verbose(env, "kernel subsystem misconfigured verifier\n"); in record_func_map()
10249 verbose(env, "write into map forbidden\n"); in record_func_map()
10275 verbose(env, "kernel subsystem misconfigured verifier\n"); in record_func_key()
10311 verbose(env, "Unreleased reference id=%d alloc_insn=%d\n", in check_reference_leak()
10341 verbose(env, "verifier bug\n"); in check_bpf_snprintf_call()
10351 verbose(env, "Invalid format string\n"); in check_bpf_snprintf_call()
10363 verbose(env, "func %s#%d supported only for fentry/fexit/fmod_ret programs\n", in check_get_func_ip()
10372 verbose(env, "func %s#%d not supported for program type %d\n", in check_get_func_ip()
10443 verbose(env, "invalid func %s#%d\n", func_id_name(func_id), func_id); in check_helper_call()
10448 verbose(env, "program of this type cannot use helper %s#%d\n", in check_helper_call()
10455 verbose(env, "cannot call GPL-restricted function from non-GPL compatible program\n"); in check_helper_call()
10460 verbose(env, "helper call is not allowed in probe\n"); in check_helper_call()
10465 verbose(env, "helper call might sleep in a non-sleepable prog\n"); in check_helper_call()
10472 verbose(env, "kernel subsystem misconfigured func %s#%d: r1 != ctx\n", in check_helper_call()
10482 verbose(env, "kernel subsystem misconfigured func %s#%d\n", in check_helper_call()
10489 verbose(env, "sleepable helper %s#%d in rcu_read_lock region\n", in check_helper_call()
10500 verbose(env, "sleepable helper %s#%d in non-preemptible region\n", in check_helper_call()
10545 verbose(env, "verifier internal error: CONST_PTR_TO_DYNPTR cannot be released\n"); in check_helper_call()
10578 verbose(env, "func %s#%d reference has not been acquired before\n", in check_helper_call()
10588 verbose(env, "tail_call would lead to reference leak\n"); in check_helper_call()
10597 verbose(env, "get_local_storage() doesn't support non-zero flags\n"); in check_helper_call()
10630 verbose(env, "frame%d bpf_loop iteration limit reached\n", in check_helper_call()
10636 verbose(env, "Unsupported reg type %s for bpf_dynptr_from_mem data\n", in check_helper_call()
10648 verbose(env, "BPF_LSM_CGROUP that attach to void LSM hooks can't modify return value!\n"); in check_helper_call()
10664 verbose(env, "verifier internal error: meta.dynptr_id already set\n"); in check_helper_call()
10668 verbose(env, "verifier internal error: meta.ref_obj_id already set\n"); in check_helper_call()
10674 verbose(env, "verifier internal error: failed to obtain dynptr id\n"); in check_helper_call()
10680 verbose(env, "verifier internal error: failed to obtain dynptr ref_obj_id\n"); in check_helper_call()
10719 verbose(env, "Helper has invalid btf/btf_id in R1\n"); in check_helper_call()
10765 verbose(env, in check_helper_call()
10809 verbose(env, "unable to resolve the size of type '%s': %ld\n", in check_helper_call()
10850 verbose(env, "verifier internal error:"); in check_helper_call()
10851 verbose(env, "func %s has non-overwritten BPF_PTR_POISON return type\n", in check_helper_call()
10859 verbose(env, "invalid return type %u of func %s#%d\n", in check_helper_call()
10869 verbose(env, "unknown return type %u of func %s#%d\n", in check_helper_call()
10878 verbose(env, "verifier internal error: func %s#%d sets ref_obj_id more than once\n", in check_helper_call()
10921 verbose(env, err_str, func_id_name(func_id), func_id); in check_helper_call()
11185 verbose(env, "max struct nesting depth exceeded\n"); in __btf_type_is_scalar_struct()
11412 verbose(env, "kernel function %s args#%d pointer type %s %s is not supported\n", in get_kfunc_ptr_arg_type()
11434 verbose(env, "arg#%d pointer type %s %s must point to %sscalar, or struct with scalar\n", in get_kfunc_ptr_arg_type()
11505 …verbose(env, "kernel function %s args#%d expected pointer to %s %s but R%d has a pointer to %s %s\… in process_kf_arg_ptr_to_btf_id()
11519 verbose(env, "verifier internal error: ref_set_non_owning w/o active lock\n"); in ref_set_non_owning()
11524 verbose(env, "verifier internal error: NON_OWN_REF already set\n"); in ref_set_non_owning()
11544 verbose(env, "verifier internal error: ref_obj_id is zero for " in ref_convert_owning_non_owning()
11565 verbose(env, "verifier internal error: ref state missing for ref_obj_id\n"); in ref_convert_owning_non_owning()
11626 verbose(env, "verifier internal error: unknown reg type for lock check\n"); in check_reg_allocation_locked()
11635 verbose(env, "held lock and object are not in the same allocation\n"); in check_reg_allocation_locked()
11708 verbose(env, "verifier internal error: unexpected graph root argument type %s\n", in check_kfunc_is_graph_root_api()
11714 verbose(env, "verifier internal error: %s head arg for unknown kfunc\n", in check_kfunc_is_graph_root_api()
11735 verbose(env, "verifier internal error: unexpected graph node argument type %s\n", in check_kfunc_is_graph_node_api()
11741 verbose(env, "verifier internal error: %s node arg for unknown kfunc\n", in check_kfunc_is_graph_node_api()
11759 verbose(env, "verifier internal error: unexpected btf mismatch in kfunc call\n"); in __process_kf_arg_ptr_to_graph_root()
11768 verbose(env, in __process_kf_arg_ptr_to_graph_root()
11778 verbose(env, "%s not found at offset=%u\n", head_type_name, head_off); in __process_kf_arg_ptr_to_graph_root()
11784 verbose(env, "bpf_spin_lock at off=%d must be held for %s\n", in __process_kf_arg_ptr_to_graph_root()
11790 verbose(env, "verifier internal error: repeating %s arg\n", head_type_name); in __process_kf_arg_ptr_to_graph_root()
11827 verbose(env, "verifier internal error: unexpected btf mismatch in kfunc call\n"); in __process_kf_arg_ptr_to_graph_node()
11836 verbose(env, in __process_kf_arg_ptr_to_graph_node()
11845 verbose(env, "%s not found at offset=%u\n", node_type_name, node_off); in __process_kf_arg_ptr_to_graph_node()
11855 verbose(env, "operation on %s expects arg#1 %s at offset=%d " in __process_kf_arg_ptr_to_graph_node()
11868 verbose(env, "arg#1 offset=%d, but expected %s at offset=%d in struct %s\n", in __process_kf_arg_ptr_to_graph_node()
11931 verbose(env, "Function %s has %d > %d args\n", func_name, nargs, in check_kfunc_args()
11954 verbose(env, "R%d is not a scalar\n", regno); in check_kfunc_args()
11960 verbose(env, "verifier internal error: only one constant argument permitted\n"); in check_kfunc_args()
11964 verbose(env, "R%d must be a known constant\n", regno); in check_kfunc_args()
11981 verbose(env, "2 or more rdonly/rdwr_buf_size parameters for kfunc"); in check_kfunc_args()
11986 verbose(env, "R%d is not a const\n", regno); in check_kfunc_args()
11999 verbose(env, "Unrecognized arg#%d type %s\n", i, btf_type_str(t)); in check_kfunc_args()
12006 verbose(env, "Possibly NULL pointer passed to trusted arg%d\n", i); in check_kfunc_args()
12012 verbose(env, "verifier internal error: more than one arg with ref_obj_id R%d %u %u\n", in check_kfunc_args()
12034 verbose(env, "pointer in R%d isn't map pointer\n", regno); in check_kfunc_args()
12052 verbose(env, in check_kfunc_args()
12068 verbose(env, "R%d must be referenced or trusted\n", regno); in check_kfunc_args()
12072 verbose(env, "R%d must be a rcu pointer\n", regno); in check_kfunc_args()
12105 verbose(env, "arg#%d expected pointer to ctx, but got %s\n", in check_kfunc_args()
12120 verbose(env, "arg#%d expected for bpf_obj_drop_impl()\n", i); in check_kfunc_args()
12125 verbose(env, "arg#%d expected for bpf_percpu_obj_drop_impl()\n", i); in check_kfunc_args()
12129 verbose(env, "arg#%d expected pointer to allocated object\n", i); in check_kfunc_args()
12133 verbose(env, "allocated object must be referenced\n"); in check_kfunc_args()
12161 verbose(env, "verifier internal error: no dynptr type for parent of clone\n"); in check_kfunc_args()
12168 verbose(env, "verifier internal error: missing ref obj id for parent of clone\n"); in check_kfunc_args()
12181 verbose(env, "verifier internal error: failed to obtain dynptr id\n"); in check_kfunc_args()
12194 verbose(env, "css_task_iter is only allowed in bpf_lsm, bpf_iter and sleepable progs\n"); in check_kfunc_args()
12205 verbose(env, "arg#%d expected pointer to map value or allocated object\n", i); in check_kfunc_args()
12209 verbose(env, "allocated object must be referenced\n"); in check_kfunc_args()
12219 verbose(env, "arg#%d expected pointer to map value or allocated object\n", i); in check_kfunc_args()
12223 verbose(env, "allocated object must be referenced\n"); in check_kfunc_args()
12232 verbose(env, "arg#%d expected pointer to allocated object\n", i); in check_kfunc_args()
12236 verbose(env, "allocated object must be referenced\n"); in check_kfunc_args()
12246 verbose(env, "rbtree_remove node input must be non-owning ref\n"); in check_kfunc_args()
12250 verbose(env, "rbtree_remove not allowed in rbtree cb\n"); in check_kfunc_args()
12255 verbose(env, "arg#%d expected pointer to allocated object\n", i); in check_kfunc_args()
12259 verbose(env, "allocated object must be referenced\n"); in check_kfunc_args()
12279 verbose(env, "arg#%d is %s ", i, reg_type_str(env, reg->type)); in check_kfunc_args()
12280 verbose(env, "expected %s or socket\n", in check_kfunc_args()
12292 verbose(env, "arg#%d reference type('%s %s') size cannot be determined: %ld\n", in check_kfunc_args()
12310 verbose(env, "arg#%d arg#%d memory, len pair leads to invalid memory access\n", i, i + 1); in check_kfunc_args()
12317 verbose(env, "verifier internal error: only one constant argument permitted\n"); in check_kfunc_args()
12321 verbose(env, "R%d must be a known constant\n", regno + 1); in check_kfunc_args()
12334 verbose(env, "arg%d expected pointer to func\n", i); in check_kfunc_args()
12341 verbose(env, "arg#%d is neither owning or non-owning ref\n", i); in check_kfunc_args()
12349 verbose(env, "verifier internal error: Couldn't find btf_record\n"); in check_kfunc_args()
12354 verbose(env, "arg#%d doesn't point to a type with bpf_refcount field\n", i); in check_kfunc_args()
12363 verbose(env, "arg#%d doesn't point to a const string\n", i); in check_kfunc_args()
12372 verbose(env, "arg#%d doesn't point to a map value\n", i); in check_kfunc_args()
12383 verbose(env, "release kernel function %s expects refcounted PTR_TO_BTF_ID\n", in check_kfunc_args()
12456 verbose(env, "calling kernel function %s is not allowed\n", func_name); in check_kfunc_call()
12465 verbose(env, "destructive kfunc calls require CAP_SYS_BOOT capability\n"); in check_kfunc_call()
12471 verbose(env, "program must be sleepable to call sleepable kfunc %s\n", func_name); in check_kfunc_call()
12484 verbose(env, "kfunc %s#%d failed callback verification\n", in check_kfunc_call()
12499 verbose(env, "kfunc %s#%d failed callback verification\n", in check_kfunc_call()
12517 verbose(env, "Calling bpf_rcu_read_{lock,unlock} in unnecessary rbtree callback\n"); in check_kfunc_call()
12522 verbose(env, "nested rcu read lock (kernel function %s)\n", func_name); in check_kfunc_call()
12533 verbose(env, "kernel func %s is sleepable within rcu_read_lock region\n", func_name); in check_kfunc_call()
12539 verbose(env, "unmatched rcu read unlock (kernel function %s)\n", func_name); in check_kfunc_call()
12549 verbose(env, "kernel func %s is sleepable within non-preemptible region\n", func_name); in check_kfunc_call()
12555 verbose(env, "unmatched attempt to enable preemption (kernel function %s)\n", func_name); in check_kfunc_call()
12565 verbose(env, "kfunc %s#%d reference has not been acquired before\n", in check_kfunc_call()
12579 verbose(env, "kfunc %s#%d conversion of owning ref to non-owning failed\n", in check_kfunc_call()
12586 verbose(env, "kfunc %s#%d reference has not been acquired before\n", in check_kfunc_call()
12594 verbose(env, "JIT does not support calling kfunc %s#%d\n", in check_kfunc_call()
12622 verbose(env, "acquire kernel function does not return PTR_TO_BTF_ID\n"); in check_kfunc_call()
12644 verbose(env, "local type ID argument must be in range [0, U32_MAX]\n"); in check_kfunc_call()
12653 verbose(env, "bpf_obj_new/bpf_percpu_obj_new requires prog BTF\n"); in check_kfunc_call()
12659 verbose(env, "bpf_obj_new/bpf_percpu_obj_new type ID argument must be of a struct\n"); in check_kfunc_call()
12665 verbose(env, "bpf_percpu_obj_new type size (%d) is greater than %d\n", in check_kfunc_call()
12695 verbose(env, "bpf_percpu_obj_new type ID argument must be of a struct of scalars\n"); in check_kfunc_call()
12700 verbose(env, "bpf_percpu_obj_new type ID argument must not contain special fields\n"); in check_kfunc_call()
12741 verbose(env, in check_kfunc_call()
12757 verbose(env, "verifier internal error: bpf_dynptr_slice(_rdwr) no constant size\n"); in check_kfunc_call()
12771 verbose(env, "the prog does not allow writes to packet data\n"); in check_kfunc_call()
12777 verbose(env, "verifier internal error: no dynptr id\n"); in check_kfunc_call()
12787 verbose(env, "kernel function %s unhandled dynamic return type\n", in check_kfunc_call()
12806 verbose(env, in check_kfunc_call()
12904 verbose(env, "math between %s pointer and %lld is not allowed\n", in check_reg_sane_offset()
12910 verbose(env, "%s pointer offset %d is not allowed\n", in check_reg_sane_offset()
12916 verbose(env, "math between %s pointer and register with unbounded min value is not allowed\n", in check_reg_sane_offset()
12922 verbose(env, "value %lld makes %s pointer be out of bounds\n", in check_reg_sane_offset()
13154 verbose(env, "R%d has unknown scalar with mixed signed bounds, %s\n", in sanitize_err()
13158 verbose(env, "R%d has pointer with unsupported alu operation, %s\n", in sanitize_err()
13162 verbose(env, "R%d tried to %s from different maps, paths or scalars, %s\n", in sanitize_err()
13166 verbose(env, "R%d tried to %s beyond pointer bounds, %s\n", in sanitize_err()
13170 verbose(env, "R%d could not be pushed for speculative verification, %s\n", in sanitize_err()
13174 verbose(env, "verifier internal error: unknown reason (%d)\n", in sanitize_err()
13202 verbose(env, "R%d variable stack access prohibited for !root, var_off=%s off=%d\n", in check_stack_access_for_ptr_arithmetic()
13208 verbose(env, "R%d stack pointer arithmetic goes out of range, " in check_stack_access_for_ptr_arithmetic()
13236 verbose(env, "R%d pointer arithmetic of map value goes out of range, " in sanitize_check_bounds()
13289 verbose(env, in adjust_ptr_min_max_vals()
13296 verbose(env, "R%d pointer arithmetic on %s prohibited, null-check it first\n", in adjust_ptr_min_max_vals()
13325 verbose(env, "R%d pointer arithmetic on %s prohibited\n", in adjust_ptr_min_max_vals()
13398 verbose(env, "R%d tried to subtract pointer from scalar\n", in adjust_ptr_min_max_vals()
13407 verbose(env, "R%d subtraction from stack pointer prohibited\n", in adjust_ptr_min_max_vals()
13456 verbose(env, "R%d bitwise operator %s on pointer prohibited\n", in adjust_ptr_min_max_vals()
13461 verbose(env, "R%d pointer arithmetic with %s operator prohibited\n", in adjust_ptr_min_max_vals()
14200 verbose(env, "R%d pointer %s pointer prohibited\n", in adjust_reg_min_max_vals()
14243 verbose(env, "verifier internal error: unexpected ptr_reg\n"); in adjust_reg_min_max_vals()
14248 verbose(env, "verifier internal error: no src_reg\n"); in adjust_reg_min_max_vals()
14303 verbose(env, "BPF_NEG uses reserved fields\n"); in check_alu_op()
14311 verbose(env, "BPF_END uses reserved fields\n"); in check_alu_op()
14322 verbose(env, "R%d pointer arithmetic prohibited\n", in check_alu_op()
14338 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
14343 verbose(env, "addr_space_cast insn can only convert between address space 1 and 0\n"); in check_alu_op()
14347 … verbose(env, "addr_space_cast insn can only be used in a program that has an associated arena\n"); in check_alu_op()
14353 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
14364 verbose(env, "BPF_MOV uses reserved fields\n"); in check_alu_op()
14398 verbose(env, in check_alu_op()
14421 verbose(env, in check_alu_op()
14477 verbose(env, "invalid BPF_ALU opcode %x\n", opcode); in check_alu_op()
14485 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
14495 verbose(env, "BPF_ALU uses reserved fields\n"); in check_alu_op()
14507 verbose(env, "div by zero\n"); in check_alu_op()
14516 verbose(env, "invalid shift %d\n", insn->imm); in check_alu_op()
15366 verbose(env, "invalid BPF_JMP/JMP32 opcode %x\n", opcode); in check_cond_jmp_op()
15377 verbose(env, "invalid may_goto off %d imm %d\n", in check_cond_jmp_op()
15403 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
15415 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
15421 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n"); in check_cond_jmp_op()
15581 verbose(env, "R%d pointer comparison prohibited\n", in check_cond_jmp_op()
15600 verbose(env, "invalid BPF_LD_IMM insn\n"); in check_ld_imm()
15604 verbose(env, "BPF_LD_IMM64 uses reserved fields\n"); in check_ld_imm()
15638 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_imm()
15650 verbose(env, "missing btf func_info\n"); in check_ld_imm()
15654 verbose(env, "callback function not static\n"); in check_ld_imm()
15680 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_imm()
15722 verbose(env, "BPF_LD_[ABS|IND] instructions not allowed for this program type\n"); in check_ld_abs()
15727 verbose(env, "bpf verifier is misconfigured\n"); in check_ld_abs()
15734 verbose(env, "BPF_LD_[ABS|IND] uses reserved fields\n"); in check_ld_abs()
15749 verbose(env, "BPF_LD_[ABS|IND] cannot be mixed with socket references\n"); in check_ld_abs()
15754 verbose(env, "BPF_LD_[ABS|IND] cannot be used inside bpf_spin_lock-ed region\n"); in check_ld_abs()
15759 verbose(env, "BPF_LD_[ABS|IND] cannot be used inside bpf_rcu_read_lock-ed region\n"); in check_ld_abs()
15764 verbose(env, "BPF_LD_[ABS|IND] cannot be used inside bpf_preempt_disable-ed region\n"); in check_ld_abs()
15769 verbose(env, in check_ld_abs()
15842 verbose(env, "R%d leaks addr as return value\n", regno); in check_return_code()
15857 verbose(env, "At subprogram exit the register R%d is not a scalar value (%s)\n", in check_return_code()
15946 verbose(env, "%s the register R%d is not a known value (%s)\n", in check_return_code()
15961 verbose(env, "Note, BPF_LSM_CGROUP that attach to void LSM hooks can't modify return value!\n"); in check_return_code()
16064 verbose(env, "jump out of range from insn %d to %d\n", t, w); in push_insn()
16087 verbose(env, "back-edge from insn %d to %d\n", t, w); in push_insn()
16093 verbose(env, "insn state internal bug\n"); in push_insn()
16529 verbose(env, "visit_insn internal bug\n"); in check_cfg()
16537 verbose(env, "pop stack internal bug\n"); in check_cfg()
16556 verbose(env, "unreachable insn %d\n", i); in check_cfg()
16562 verbose(env, "jump into the middle of ldimm64 insn %d\n", i); in check_cfg()
16584 verbose(env, "LD_ABS is not allowed in subprogs without BTF\n"); in check_abnormal_return()
16588 verbose(env, "tail_call is not allowed in subprogs without BTF\n"); in check_abnormal_return()
16624 verbose(env, "invalid func info rec size %u\n", urec_size); in check_btf_func_early()
16642 verbose(env, "nonzero tailing record in func info"); in check_btf_func_early()
16663 verbose(env, in check_btf_func_early()
16669 verbose(env, in check_btf_func_early()
16678 verbose(env, "invalid type id %d in func info", in check_btf_func_early()
16722 verbose(env, "number of funcs in func_info doesn't match number of subprogs\n"); in check_btf_func()
16743 verbose(env, "func_info BTF section doesn't match subprog layout in BPF program\n"); in check_btf_func()
16757 verbose(env, "LD_ABS is only allowed in functions that return 'int'.\n"); in check_btf_func()
16761 verbose(env, "tail_call is only allowed in functions that return 'int'.\n"); in check_btf_func()
16836 verbose(env, "nonzero tailing record in line_info"); in check_btf_line()
16863 verbose(env, "Invalid line_info[%u].insn_off:%u (prev_offset:%u prog->len:%u)\n", in check_btf_line()
16871 verbose(env, in check_btf_line()
16880 verbose(env, "Invalid line_info[%u].line_off or .file_name_off\n", i); in check_btf_line()
16890 verbose(env, "missing bpf_line_info for func#%u\n", s); in check_btf_line()
16901 verbose(env, "missing bpf_line_info for %u funcs starting from func#%u\n", in check_btf_line()
16959 verbose(env, "nonzero tailing record in core_relo"); in check_core_relo()
16974 verbose(env, "Invalid core_relo[%u].insn_off:%u prog->len:%u\n", in check_core_relo()
17731 verbose(env, "frame %d: propagating r%d", fr, i); in propagate_precision()
17733 verbose(env, ",r%d", i); in propagate_precision()
17749 verbose(env, "frame %d: propagating fp%d", in propagate_precision()
17752 verbose(env, ",fp%d", (-i - 1) * BPF_REG_SIZE); in propagate_precision()
17758 verbose(env, "\n"); in propagate_precision()
18005 verbose(env, "infinite loop detected at insn %d\n", insn_idx); in is_state_visited()
18006 verbose(env, "cur state:"); in is_state_visited()
18008 verbose(env, "old state:"); in is_state_visited()
18283 verbose(env, "same insn cannot be used with different pointers\n"); in save_aux_ptr_type()
18312 verbose(env, "invalid insn idx %d insn_cnt %d\n", in do_check()
18321 verbose(env, in do_check()
18337 verbose(env, "\nfrom %d to %d%s: safe\n", in do_check()
18342 verbose(env, "%d: safe\n", env->insn_idx); in do_check()
18361 verbose(env, "\nfrom %d to %d%s:", in do_check()
18372 .cb_print = verbose, in do_check()
18381 verbose(env, "%d: ", env->insn_idx); in do_check()
18442 verbose(env, "BPF_STX uses reserved fields\n"); in do_check()
18472 verbose(env, "BPF_ST uses reserved fields\n"); in do_check()
18505 verbose(env, "BPF_CALL uses reserved fields\n"); in do_check()
18513 verbose(env, "function calls are not allowed while holding a lock\n"); in do_check()
18538 verbose(env, "BPF_JA uses reserved fields\n"); in do_check()
18554 verbose(env, "BPF_EXIT uses reserved fields\n"); in do_check()
18559 verbose(env, "bpf_spin_unlock is missing\n"); in do_check()
18564 verbose(env, "bpf_rcu_read_unlock is missing\n"); in do_check()
18569 verbose(env, "%d bpf_preempt_enable%s missing\n", in do_check()
18644 verbose(env, "invalid BPF_LD mode\n"); in do_check()
18648 verbose(env, "unknown insn class %d\n", class); in do_check()
18709 verbose(env, "invalid module BTF object FD specified.\n"); in check_pseudo_btf_id()
18714 …verbose(env, "kernel is missing BTF, make sure CONFIG_DEBUG_INFO_BTF=y is specified in Kconfig.\n"… in check_pseudo_btf_id()
18723 verbose(env, "ldimm64 insn specifies invalid btf_id %d.\n", id); in check_pseudo_btf_id()
18729 verbose(env, "pseudo btf_id %d in ldimm64 isn't KIND_VAR or KIND_FUNC\n", id); in check_pseudo_btf_id()
18737 verbose(env, "ldimm64 failed to find the address for kernel symbol '%s'.\n", in check_pseudo_btf_id()
18777 verbose(env, "ldimm64 unable to resolve the size of type '%s': %ld\n", in check_pseudo_btf_id()
18848 verbose(env, "tracing progs cannot use bpf_{list_head,rb_root} yet\n"); in check_map_prog_compatibility()
18855 verbose(env, "socket filter progs cannot use bpf_spin_lock yet\n"); in check_map_prog_compatibility()
18860 verbose(env, "tracing progs cannot use bpf_spin_lock yet\n"); in check_map_prog_compatibility()
18867 verbose(env, "tracing progs cannot use bpf_timer yet\n"); in check_map_prog_compatibility()
18874 verbose(env, "tracing progs cannot use bpf_wq yet\n"); in check_map_prog_compatibility()
18881 verbose(env, "offload device mismatch between prog and map\n"); in check_map_prog_compatibility()
18886 verbose(env, "bpf_struct_ops map cannot be used in prog\n"); in check_map_prog_compatibility()
18911 verbose(env, in check_map_prog_compatibility()
18938 verbose(env, "fd %d is not pointing to valid bpf_map\n", fd); in add_used_map_from_fd()
18951 verbose(env, "The total number of maps per program has reached the limit of %u\n", in add_used_map_from_fd()
18993 verbose(env, "BPF_LDX uses reserved fields\n"); in resolve_pseudo_ldimm64()
19008 verbose(env, "invalid bpf_ld_imm64 insn\n"); in resolve_pseudo_ldimm64()
19043 verbose(env, "unrecognized bpf_ld_imm64 insn\n"); in resolve_pseudo_ldimm64()
19051 verbose(env, "fd_idx without fd_array is invalid\n"); in resolve_pseudo_ldimm64()
19083 verbose(env, "direct value offset of %u is not allowed\n", off); in resolve_pseudo_ldimm64()
19088 verbose(env, "no direct value access support for this map type\n"); in resolve_pseudo_ldimm64()
19094 verbose(env, "invalid access to map value pointer, value_size=%u off=%u\n", in resolve_pseudo_ldimm64()
19112 verbose(env, "only one cgroup storage of each type is allowed\n"); in resolve_pseudo_ldimm64()
19117 verbose(env, "Only one arena per program\n"); in resolve_pseudo_ldimm64()
19121 verbose(env, "CAP_BPF and CAP_PERFMON are required to use arena\n"); in resolve_pseudo_ldimm64()
19125 verbose(env, "JIT is required to use arena\n"); in resolve_pseudo_ldimm64()
19129 verbose(env, "JIT doesn't support arena\n"); in resolve_pseudo_ldimm64()
19134 verbose(env, "arena's user address must be set via map_extra or mmap()\n"); in resolve_pseudo_ldimm64()
19147 verbose(env, "unknown opcode %02x\n", insn->code); in resolve_pseudo_ldimm64()
19268 verbose(env, in bpf_patch_insn_data()
19656 verbose(env, "verifier bug. zext_dst is set, but no reg is defined\n"); in opt_subreg_zext_lo32_rnd_hi32()
19702 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
19721 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
19727 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
19852 verbose(env, "sign extending loads from arena are not supported yet\n"); in convert_ctx_accesses()
19878 verbose(env, "bpf verifier narrow ctx access misconfigured\n"); in convert_ctx_accesses()
19897 verbose(env, "bpf verifier is misconfigured\n"); in convert_ctx_accesses()
19905 verbose(env, "bpf verifier narrow ctx load misconfigured\n"); in convert_ctx_accesses()
20120 verbose(env, "JIT doesn't support bpf-to-bpf calls\n"); in jit_subprogs()
20224 verbose(env, "calling kernel functions are not allowed in non-JITed programs\n"); in fixup_call_args()
20231 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n"); in fixup_call_args()
20239 verbose(env, "callbacks are not allowed in non-JITed programs\n"); in fixup_call_args()
20313 verbose(env, "invalid kernel function call not eliminated in verifier pass\n"); in fixup_kfunc_call()
20325 verbose(env, "verifier internal error: kernel function descriptor not found for func_id %u\n", in fixup_kfunc_call()
20341 verbose(env, "verifier internal error: NULL kptr_struct_meta expected at insn_idx %d\n", in fixup_kfunc_call()
20358 verbose(env, "verifier internal error: NULL kptr_struct_meta expected at insn_idx %d\n", in fixup_kfunc_call()
20365 verbose(env, "verifier internal error: kptr_struct_meta expected at insn_idx %d\n", in fixup_kfunc_call()
20388 verbose(env, "verifier internal error: kptr_struct_meta expected at insn_idx %d\n", in fixup_kfunc_call()
20419 verbose(env, "verifier internal error: only one hidden subprog supported\n"); in add_hidden_subprog()
20655 verbose(env, "bpf verifier is misconfigured\n"); in do_misc_fixups()
20810 verbose(env, "adding tail call poke descriptor failed\n"); in do_misc_fixups()
20828 verbose(env, "tail_call abusing map_ptr\n"); in do_misc_fixups()
20948 verbose(env, "bpf verifier is misconfigured\n"); in do_misc_fixups()
21232 verbose(env, in do_misc_fixups()
21258 verbose(env, "verifier bug: stack_slots supports may_goto only\n"); in do_misc_fixups()
21287 verbose(env, "bpf verifier is misconfigured\n"); in do_misc_fixups()
21293 verbose(env, "tracking tail call prog failed\n"); in do_misc_fixups()
21540 verbose(env, "Validating %s() func#%d...\n", sub_name, subprog); in do_check_common()
21552 verbose(env, "exception cb only supports single integer argument\n"); in do_check_common()
21680 verbose(env, "Func#%d ('%s') is safe for any args that match its prototype\n", in do_check_subprogs()
21718 verbose(env, "verification time %lld usec\n", in print_verification_stats()
21720 verbose(env, "stack depth "); in print_verification_stats()
21724 verbose(env, "%d", depth); in print_verification_stats()
21726 verbose(env, "+"); in print_verification_stats()
21728 verbose(env, "\n"); in print_verification_stats()
21730 verbose(env, "processed %d insns (limit %d) max_states_per_insn %d " in print_verification_stats()
21750 verbose(env, "struct ops programs must have a GPL compatible license\n"); in check_struct_ops_btf_id()
21762 verbose(env, "struct_ops module %s is not found\n", in check_struct_ops_btf_id()
21771 verbose(env, "attach_btf_id %u is not a supported struct\n", in check_struct_ops_btf_id()
21780 verbose(env, "attach to invalid member idx %u of struct %s\n", in check_struct_ops_btf_id()
21790 verbose(env, "attach to invalid member %s(@idx %u) of struct %s\n", in check_struct_ops_btf_id()
21797 verbose(env, "attach to unsupported member %s of struct %s\n", in check_struct_ops_btf_id()
21806 verbose(env, "attach to unsupported member %s of struct %s\n", in check_struct_ops_btf_id()
22219 verbose(env, "Syscall programs can only be sleepable\n"); in check_attach_btf_id()
22224 …verbose(env, "Only fentry/fexit/fmod_ret, lsm, iter, uprobe, and struct_ops programs can be sleepa… in check_attach_btf_id()
22358 verbose(env, "in-kernel BTF is malformed\n"); in bpf_check()