Lines Matching defs:verbose
334 __printf(2, 3) static void verbose(void *private_data, const char *fmt, ...)
391 verbose(env, "%s\n", ltrim(btf_name_by_offset(env->prog->aux->btf, linfo->line_off)));
478 * Note that reg_type_str() can not appear more than once in a single verbose()
535 verbose(env, "_");
538 verbose(env, "r");
541 verbose(env, "w");
544 verbose(env, "D");
567 verbose(env, " frame%d:", state->frameno);
575 verbose(env, " R%d", i);
577 verbose(env, "=%s", reg_type_str(env, t));
579 verbose(env, "P");
583 verbose(env, "%lld", reg->var_off.value + reg->off);
586 verbose(env, "%s", kernel_type_name(reg->btf_id));
588 verbose(env, "(id=%d", reg->id);
590 verbose(env, ",ref_obj_id=%d", reg->ref_obj_id);
593 verbose(env, ",off=%d", reg->off);
596 verbose(env, ",r=%d", reg->range);
598 verbose(env, ",ks=%d,vs=%d", reg->map_ptr->key_size, reg->map_ptr->value_size);
605 verbose(env, ",imm=%llx", reg->var_off.value);
608 verbose(env, ",smin_value=%lld", (long long)reg->smin_value);
611 verbose(env, ",smax_value=%lld", (long long)reg->smax_value);
614 verbose(env, ",umin_value=%llu", (unsigned long long)reg->umin_value);
617 verbose(env, ",umax_value=%llu", (unsigned long long)reg->umax_value);
623 verbose(env, ",var_off=%s", tn_buf);
626 verbose(env, ",s32_min_value=%d", (int)(reg->s32_min_value));
629 verbose(env, ",s32_max_value=%d", (int)(reg->s32_max_value));
632 verbose(env, ",u32_min_value=%d", (int)(reg->u32_min_value));
635 verbose(env, ",u32_max_value=%d", (int)(reg->u32_max_value));
638 verbose(env, ")");
656 verbose(env, " fp%d", (-i - 1) * BPF_REG_SIZE);
661 verbose(env, "=%s", reg_type_str(env, t));
663 verbose(env, "P");
666 verbose(env, "%lld", reg->var_off.value + reg->off);
669 verbose(env, "=%s", types_buf);
673 verbose(env, " refs=%d", state->refs[0].id);
676 verbose(env, ",%d", state->refs[i].id);
680 verbose(env, "\n");
976 verbose(env, "The sequence of %d jumps is too complex.\n", env->stack_size);
1058 verbose(env, "mark_reg_known_zero(regs, %u)\n", regno);
1335 verbose(env, "mark_reg_unknown(regs, %u)\n", regno);
1354 verbose(env, "mark_reg_not_init(regs, %u)\n", regno);
1433 verbose(env, "call to invalid destination\n");
1441 verbose(env, "too many subprograms\n");
1471 verbose(env, "function calls to other bpf functions are allowed for CAP_BPF and CAP_SYS_ADMIN\n");
1487 verbose(env, "func#%d @%d\n", i, subprog[i].start);
1511 verbose(env, "jump out of range from insn %d to %d\n", i, off);
1521 verbose(env, "last insn is not an exit or jmp\n");
1549 verbose(env, "verifier BUG type %s var_off %lld off %d\n", reg_type_str(env, parent->type),
1720 verbose(env, "R%d is invalid\n", regno);
1729 verbose(env, "R%d !read_ok\n", regno);
1745 verbose(env, "frame pointer is read only\n");
1798 .cb_print = verbose,
1813 verbose(env, "regs=%x stack=%llx before ", *reg_mask, *stack_mask);
1814 verbose(env, "%d: ", idx);
1876 verbose(env, "BUG spi %d\n", spi);
1898 verbose(env, "BUG spi %d\n", spi);
1920 verbose(env, "BUG regs %x\n", *reg_mask);
2091 verbose(env, "last_idx %d first_idx %d\n", last_idx, first_idx);
2124 verbose(env, "BUG backtracking idx %d\n", i);
2187 verbose(env, "parent %s regs=%x stack=%llx marks\n", new_marks ? "didn't have" : "already had", reg_mask,
2303 verbose(env, "attempt to corrupt spilled pointer on stack\n");
2344 verbose(env, "invalid size of register spill\n");
2348 verbose(env, "cannot spill pointers to stack into stack frame of the caller\n");
2460 verbose(env, "spilled ptr in range of var-offset stack write; insn %d, ptr off: %d", insn_idx, i);
2482 verbose(env, "uninit stack in range of var-offset write prohibited for !root; insn %d, off: %d", insn_idx,
2574 verbose(env, "invalid size of register fill\n");
2586 verbose(env, "corrupted spill memory\n");
2606 verbose(env, "leaking pointer from stack off %d\n", off);
2621 verbose(env, "invalid read from stack off %d+%d size %d\n", off, i, size);
2704 verbose(env, "variable offset stack pointer cannot be passed into helper function; var_off=%s off=%d size=%d\n",
2716 verbose(env, "R%d variable offset stack access prohibited for !root, var_off=%s\n", ptr_regno, tn_buf);
2768 verbose(env, "write into map forbidden, value_size=%d off=%d size=%d\n", map->value_size, off, size);
2772 verbose(env, "read from map forbidden, value_size=%d off=%d size=%d\n", map->value_size, off, size);
2793 verbose(env, "invalid access to map value, value_size=%d off=%d size=%d\n", mem_size, off, size);
2798 verbose(env, "invalid access to packet, off=%d size=%d, R%d(id=%d,off=%d,r=%d)\n", off, size, regno,
2803 verbose(env, "invalid access to memory, mem_size=%u off=%d size=%d\n", mem_size, off, size);
2835 verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n", regno);
2840 verbose(env, "R%d min value is outside of the allowed memory range\n", regno);
2849 verbose(env, "R%d unbounded memory access, make sure to bounds check any such access\n", regno);
2854 verbose(env, "R%d max value is outside of the allowed memory range\n", regno);
2884 verbose(env, "bpf_spin_lock cannot be accessed directly by load/store\n");
2957 verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n", regno);
2962 verbose(env, "R%d offset is outside of the packet\n", regno);
3008 verbose(env, "invalid bpf_context access off=%d size=%d\n", off, size);
3015 verbose(env, "invalid access to flow keys off=%d size=%d\n", off, size);
3030 verbose(env, "R%d min value is negative, either use unsigned index or do a if (index >=0) check.\n", regno);
3056 verbose(env, "R%d invalid %s access off=%d size=%d\n", regno, reg_type_str(env, reg->type), off, size);
3121 verbose(env, "misaligned packet access off %d+%s+%d+%d size %d\n", ip_align, tn_buf, reg->off, off, size);
3143 verbose(env, "misaligned %saccess off %s+%d+%d size %d\n", pointer_desc, tn_buf, reg->off, off, size);
3251 verbose(env, "tail_calls are not allowed when call stack of previous frames is %d bytes. Too large\n",
3260 verbose(env, "combined stack size of %d calls is %d. Too large\n", frame + 1, depth);
3292 verbose(env, "the call stack of %d frames is too deep !\n", frame);
3357 verbose(env, "dereference of modified %s ptr R%d off=%d disallowed\n", reg_type_str(env, reg->type), regno,
3366 verbose(env, "variable %s access var_off=%s disallowed\n", reg_type_str(env, reg->type), tn_buf);
3382 verbose(env, "R%d invalid %s buffer access: off=%d, size=%d\n", regno, buf_info, off, size);
3389 verbose(env, "R%d invalid variable buffer offset: off=%d, var_off=%s\n", regno, off, tn_buf);
3515 verbose(env, "R%d is ptr_%s invalid negative access: off=%d\n", regno, tname, off);
3522 verbose(env, "R%d is ptr_%s invalid variable offset: off=%d, var_off=%s\n", regno, tname, off, tn_buf);
3530 verbose(env, "only read is supported\n");
3559 verbose(env, "map_ptr access not supported without CONFIG_DEBUG_INFO_BTF\n");
3564 verbose(env, "map_ptr access not supported for map type %d\n", map->map_type);
3572 verbose(env, "%s access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN\n", tname);
3577 verbose(env, "R%d is %s invalid negative access: off=%d\n", regno, tname, off);
3582 verbose(env, "only read from %s is supported\n", tname);
3653 verbose(env, "invalid unbounded variable-offset%s stack R%d\n", err_extra, regno);
3671 verbose(env, "invalid%s stack R%d off=%d size=%d\n", err_extra, regno, off, access_size);
3676 verbose(env, "invalid variable-offset%s stack R%d var_off=%s size=%d\n", err_extra, regno, tn_buf,
3713 verbose(env, "R%d leaks addr into map\n", value_regno);
3744 verbose(env, "R%d invalid mem access '%s'\n", regno, reg_type_str(env, reg->type));
3749 verbose(env, "R%d cannot write into %s\n", regno, reg_type_str(env, reg->type));
3754 verbose(env, "R%d leaks addr into mem\n", value_regno);
3767 verbose(env, "R%d leaks addr into ctx\n", value_regno);
3823 verbose(env, "cannot write into packet\n");
3827 verbose(env, "R%d leaks addr into packet\n", value_regno);
3836 verbose(env, "R%d leaks addr into flow keys\n", value_regno);
3846 verbose(env, "R%d cannot write into %s\n", regno, reg_type_str(env, reg->type));
3869 verbose(env, "R%d cannot write into %s\n", regno, reg_type_str(env, reg->type));
3884 verbose(env, "R%d invalid mem access '%s'\n", regno, reg_type_str(env, reg->type));
3900 verbose(env, "BPF_XADD uses reserved fields\n");
3917 verbose(env, "R%d leaks addr into mem\n", insn->src_reg);
3923 verbose(env, "BPF_XADD stores into R%d %s is not allowed\n", insn->dst_reg,
3962 verbose(env, "invalid zero-sized read\n");
3993 verbose(env, "R%d%s variable offset stack access prohibited for !root, var_off=%s\n", regno, err_extra,
4054 verbose(env, "invalid%s read from stack R%d off %d+%d size %d\n", err_extra, regno, min_off, i - min_off,
4060 verbose(env, "invalid%s read from stack R%d var_off %s+%d size %d\n", err_extra, regno, tn_buf, i - min_off,
4114 verbose(env, "R%d type=%s ", regno, reg_type_str(env, reg->type));
4115 verbose(env, "expected=%s\n", reg_type_str(env, PTR_TO_STACK));
4148 verbose(env, "R%d doesn't have constant offset. bpf_spin_lock has to be at the constant offset\n", regno);
4152 verbose(env, "map '%s' has to have BTF in order to use bpf_spin_lock\n", map->name);
4157 verbose(env, "map '%s' has more than one 'struct bpf_spin_lock'\n", map->name);
4159 verbose(env, "map '%s' doesn't have 'struct bpf_spin_lock'\n", map->name);
4161 verbose(env, "map '%s' is not a struct type or bpf_spin_lock is mangled\n", map->name);
4166 verbose(env, "off %lld doesn't point to 'struct bpf_spin_lock'\n", val + reg->off);
4171 verbose(env, "Locking two bpf_spin_locks are not allowed\n");
4177 verbose(env, "bpf_spin_unlock without taking a lock\n");
4181 verbose(env, "bpf_spin_unlock of different lock\n");
4225 verbose(env, "invalid map_ptr to access map->type\n");
4235 verbose(env, "invalid arg_type for sockmap/sockhash\n");
4350 verbose(env, "verifier internal error: unsupported arg type %d\n", arg_type);
4382 verbose(env, "R%d type=%s expected=", regno, reg_type_str(env, reg->type));
4384 verbose(env, "%s, ", reg_type_str(env, compatible->types[j]));
4386 verbose(env, "%s\n", reg_type_str(env, compatible->types[j]));
4393 verbose(env, "verifier internal error: missing arg compatible BTF ID\n");
4400 verbose(env, "R%d is of type %s but %s is expected\n", regno, kernel_type_name(reg->btf_id),
4429 verbose(env, "R%d leaks addr into helper function\n", regno);
4436 verbose(env, "helper access to the packet is not allowed\n");
4491 verbose(env, "verifier internal error: more than one arg with ref_obj_id R%d %u %u\n", regno,
4512 verbose(env, "invalid map_ptr to access map->key\n");
4526 verbose(env, "invalid map_ptr to access map->value\n");
4533 verbose(env, "Helper has invalid btf_id in R%d\n", regno);
4547 verbose(env, "verifier internal error\n");
4581 verbose(env, "R%d min value is negative, either use unsigned or 'var &= const'\n", regno);
4593 verbose(env, "R%d unbounded memory access, use 'var &= const' or 'if (var < const)'\n", regno);
4602 verbose(env, "R%d unbounded size, use 'var &= const' or 'if (var < const)'\n", regno);
4649 verbose(env, "cannot update sockmap in this context\n");
4774 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n");
4861 verbose(env, "cannot pass map_type %d into func %s#%d\n", map->map_type, func_id_name(func_id), func_id);
5071 verbose(env, "the call stack of %d frames is too deep\n", state->curframe + 2);
5078 verbose(env, "verifier bug. No program starts at insn %d\n", target_insn + 1);
5084 verbose(env, "verifier bug. Frame %d already allocated\n", state->curframe + 1);
5098 verbose(env, "Caller passes invalid args into func#%d\n", subprog);
5102 verbose(env, "Func#%d is global and valid. Skipping.\n", subprog);
5152 verbose(env, "caller:\n");
5154 verbose(env, "callee:\n");
5176 verbose(env, "cannot return stack pointer to the caller\n");
5193 verbose(env, "returning from callee:\n");
5195 verbose(env, "to caller at %d:\n", *insn_idx);
5234 verbose(env, "kernel subsystem misconfigured verifier\n");
5245 verbose(env, "write into map forbidden\n");
5269 verbose(env, "kernel subsystem misconfigured verifier\n");
5301 verbose(env, "Unreleased reference id=%d alloc_insn=%d\n", state->refs[i].id, state->refs[i].insn_idx);
5318 verbose(env, "invalid func %s#%d\n", func_id_name(func_id), func_id);
5326 verbose(env, "unknown func %s#%d\n", func_id_name(func_id), func_id);
5332 verbose(env, "cannot call GPL-restricted function from non-GPL compatible program\n");
5337 verbose(env, "helper call is not allowed in probe\n");
5344 verbose(env, "kernel subsystem misconfigured func %s#%d: r1 != ctx\n", func_id_name(func_id), func_id);
5353 verbose(env, "kernel subsystem misconfigured func %s#%d\n", func_id_name(func_id), func_id);
5389 verbose(env, "tail_call would lead to reference leak\n");
5395 verbose(env, "func %s#%d reference has not been acquired before\n", func_id_name(func_id), func_id);
5405 verbose(env, "get_local_storage() doesn't support non-zero flags\n");
5434 verbose(env, "kernel subsystem misconfigured verifier\n");
5469 verbose(env, "unable to resolve the size of type '%s': %ld\n", tname, PTR_ERR(ret));
5492 verbose(env, "invalid return type %u of func %s#%d\n", base_type(ret_type), func_id_name(func_id), func_id);
5497 verbose(env, "unknown return type %u of func %s#%d\n", base_type(ret_type), func_id_name(func_id), func_id);
5537 verbose(env, err_str, func_id_name(func_id), func_id);
5605 verbose(env, "math between %s pointer and %lld is not allowed\n", reg_type_str(env, type), val);
5610 verbose(env, "%s pointer offset %d is not allowed\n", reg_type_str(env, type), reg->off);
5615 verbose(env, "math between %s pointer and register with unbounded min value is not allowed\n",
5621 verbose(env, "value %lld makes %s pointer be out of bounds\n", smin, reg_type_str(env, type));
5849 verbose(env, "R%d has unknown scalar with mixed signed bounds, %s\n", off_reg == dst_reg ? dst : src, err);
5852 verbose(env, "R%d has pointer with unsupported alu operation, %s\n", off_reg == dst_reg ? src : dst, err);
5855 verbose(env, "R%d tried to %s from different maps, paths or scalars, %s\n", dst, op, err);
5858 verbose(env, "R%d tried to %s beyond pointer bounds, %s\n", dst, op, err);
5861 verbose(env, "R%d could not be pushed for speculative verification, %s\n", dst, err);
5864 verbose(env, "verifier internal error: unknown reason (%d)\n", reason);
5888 verbose(env, "R%d variable stack access prohibited for !root, var_off=%s off=%d\n", regno, tn_buf, off);
5893 verbose(env,
5923 verbose(env,
5975 verbose(env, "R%d 32-bit pointer arithmetic prohibited\n", dst);
5980 verbose(env, "R%d pointer arithmetic on %s prohibited, null-check it first\n", dst,
5998 verbose(env, "R%d pointer arithmetic on %s prohibited\n", dst, reg_type_str(env, ptr_reg->type));
6078 verbose(env, "R%d tried to subtract pointer from scalar\n", dst);
6086 verbose(env, "R%d subtraction from stack pointer prohibited\n", dst);
6136 verbose(env, "R%d bitwise operator %s on pointer prohibited\n", dst, bpf_alu_string[opcode >> 0x4]);
6140 verbose(env, "R%d pointer arithmetic with %s operator prohibited\n", dst, bpf_alu_string[opcode >> 0x4]);
6905 verbose(env, "R%d pointer %s pointer prohibited\n", insn->dst_reg,
6942 verbose(env, "verifier internal error: unexpected ptr_reg\n");
6947 verbose(env, "verifier internal error: no src_reg\n");
6963 verbose(env, "BPF_NEG uses reserved fields\n");
6970 verbose(env, "BPF_END uses reserved fields\n");
6982 verbose(env, "R%d pointer arithmetic prohibited\n", insn->dst_reg);
6994 verbose(env, "BPF_MOV uses reserved fields\n");
7004 verbose(env, "BPF_MOV uses reserved fields\n");
7036 verbose(env, "R%d partial copy of pointer\n", insn->src_reg);
7068 verbose(env, "invalid BPF_ALU opcode %x\n", opcode);
7073 verbose(env, "BPF_ALU uses reserved fields\n");
7083 verbose(env, "BPF_ALU uses reserved fields\n");
7095 verbose(env, "div by zero\n");
7102 verbose(env, "invalid shift %d\n", insn->imm);
7835 verbose(env, "invalid BPF_JMP/JMP32 opcode %x\n", opcode);
7841 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n");
7852 verbose(env, "R%d pointer comparison prohibited\n", insn->src_reg);
7858 verbose(env, "BPF_JMP/JMP32 uses reserved fields\n");
7972 verbose(env, "R%d pointer comparison prohibited\n", insn->dst_reg);
7991 verbose(env, "invalid BPF_LD_IMM insn\n");
7995 verbose(env, "BPF_LD_IMM64 uses reserved fields\n");
8030 verbose(env, "bpf verifier is misconfigured\n");
8048 verbose(env, "bpf verifier is misconfigured\n");
8090 verbose(env, "BPF_LD_[ABS|IND] instructions not allowed for this program type\n");
8095 verbose(env, "bpf verifier is misconfigured\n");
8101 verbose(env, "BPF_LD_[ABS|IND] uses reserved fields\n");
8117 verbose(env, "BPF_LD_[ABS|IND] cannot be mixed with socket references\n");
8122 verbose(env, "BPF_LD_[ABS|IND] cannot be used inside bpf_spin_lock-ed region\n");
8127 verbose(env, "at the time of BPF_LD_ABS|IND R6 != pointer to skb\n");
8188 verbose(env, "R0 leaks addr as return value\n");
8195 verbose(env, "At subprogram exit the register R0 is not a scalar value (%s)\n",
8258 verbose(env, "At program exit the register R0 is not a known value (%s)\n", reg_type_str(env, reg->type));
8265 verbose(env, "At program exit the register R0 ");
8268 verbose(env, "has value %s", tn_buf);
8270 verbose(env, "has unknown scalar value");
8273 verbose(env, " should have been in %s\n", tn_buf);
8361 verbose(env, "jump out of range from insn %d to %d\n", t, w);
8385 verbose(env, "back-edge from insn %d to %d\n", t, w);
8391 verbose(env, "insn state internal bug\n");
8507 verbose(env, "pop stack internal bug\n");
8517 verbose(env, "unreachable insn %d\n", i);
8537 verbose(env, "LD_ABS is not allowed in subprogs without BTF\n");
8541 verbose(env, "tail_call is not allowed in subprogs without BTF\n");
8575 verbose(env, "number of funcs in func_info doesn't match number of subprogs\n");
8581 verbose(env, "invalid func info rec size %u\n", urec_size);
8604 verbose(env, "nonzero tailing record in func info");
8624 verbose(env, "nonzero insn_off %u for the first func info record", krecord[i].insn_off);
8628 verbose(env, "same or smaller insn offset (%u) than previous func info record (%u)", krecord[i].insn_off,
8634 verbose(env, "func_info BTF section doesn't match subprog layout in BPF program\n");
8641 verbose(env, "invalid type id %d in func info", krecord[i].type_id);
8654 verbose(env, "LD_ABS is only allowed in functions that return 'int'.\n");
8658 verbose(env, "tail_call is only allowed in functions that return 'int'.\n");
8738 verbose(env, "nonzero tailing record in line_info");
8763 verbose(env, "Invalid line_info[%u].insn_off:%u (prev_offset:%u prog->len:%u)\n", i, linfo[i].insn_off,
8770 verbose(env, "Invalid insn code at line_info[%u].insn_off\n", i);
8776 verbose(env, "Invalid line_info[%u].line_off or .file_name_off\n", i);
8786 verbose(env, "missing bpf_line_info for func#%u\n", s);
8797 verbose(env, "missing bpf_line_info for %u funcs starting from func#%u\n", env->subprog_cnt - s, s);
9361 verbose(env, "propagating r%d\n", i);
9378 verbose(env, "propagating fp%d\n", (-i - 1) * BPF_REG_SIZE);
9448 verbose(env, "infinite loop detected at insn %d\n", insn_idx);
9669 verbose(env, "invalid insn idx %d insn_cnt %d\n", env->insn_idx, insn_cnt);
9677 verbose(env, "BPF program is too large. Processed %d insn\n", env->insn_processed);
9689 verbose(env, "\nfrom %d to %d%s: safe\n", env->prev_insn_idx, env->insn_idx,
9692 verbose(env, "%d: safe\n", env->insn_idx);
9708 verbose(env, "%d:", env->insn_idx);
9710 verbose(env, "\nfrom %d to %d%s:", env->prev_insn_idx, env->insn_idx,
9719 .cb_print = verbose,
9724 verbose(env, "%d: ", env->insn_idx);
9787 verbose(env, "same insn cannot be used with different pointers\n");
9826 verbose(env, "same insn cannot be used with different pointers\n");
9831 verbose(env, "BPF_ST uses reserved fields\n");
9840 verbose(env, "BPF_ST stores into R%d %s is not allowed\n", insn->dst_reg,
9858 verbose(env, "BPF_CALL uses reserved fields\n");
9864 verbose(env, "function calls are not allowed while holding a lock\n");
9878 verbose(env, "BPF_JA uses reserved fields\n");
9886 verbose(env, "BPF_EXIT uses reserved fields\n");
9890 verbose(env, "bpf_spin_unlock is missing\n");
9945 verbose(env, "invalid BPF_LD mode\n");
9949 verbose(env, "unknown insn class %d\n", class);
9972 verbose(env, "kernel is missing BTF, make sure CONFIG_DEBUG_INFO_BTF=y is specified in Kconfig.\n");
9977 verbose(env, "reserved field (insn[1].imm) is used in pseudo_btf_id ldimm64 insn.\n");
9983 verbose(env, "ldimm64 insn specifies invalid btf_id %d.\n", id);
9988 verbose(env, "pseudo btf_id %d in ldimm64 isn't KIND_VAR.\n", id);
9995 verbose(env, "ldimm64 failed to find the address for kernel symbol '%s'.\n", sym_name);
10028 verbose(env, "ldimm64 unable to resolve the size of type '%s': %ld\n", tname, PTR_ERR(ret));
10094 verbose(env, "perf_event programs can only use preallocated hash map\n");
10098 verbose(env, "trace type programs can only use preallocated hash map\n");
10102 verbose(
10108 verbose(env, "tracing progs cannot use bpf_spin_lock yet\n");
10113 verbose(env, "offload device mismatch between prog and map\n");
10118 verbose(env, "bpf_struct_ops map cannot be used in prog\n");
10128 verbose(env, "Sleepable programs can only use preallocated hash maps\n");
10133 verbose(env, "Sleepable programs can only use array and hash maps\n");
10166 verbose(env, "BPF_LDX uses reserved fields\n");
10172 verbose(env, "BPF_STX uses reserved fields\n");
10184 verbose(env, "invalid bpf_ld_imm64 insn\n");
10207 verbose(env, "unrecognized bpf_ld_imm64 insn\n");
10214 verbose(env, "fd %d is not pointing to valid bpf_map\n", insn[0].imm);
10231 verbose(env, "direct value offset of %u is not allowed\n", off);
10237 verbose(env, "no direct value access support for this map type\n");
10244 verbose(env, "invalid access to map value pointer, value_size=%u off=%u\n", map->value_size, off);
10281 verbose(env, "only one cgroup storage of each type is allowed\n");
10295 verbose(env, "unknown opcode %02x\n", insn->code);
10409 verbose(env, "insn %d cannot be patched due to 16-bit range\n", env->insn_aux_data[off].orig_idx);
10799 verbose(env, "bpf verifier is misconfigured\n");
10804 verbose(env, "bpf verifier is misconfigured\n");
10885 verbose(env, "Writes through BTF pointers are not allowed\n");
10908 verbose(env, "bpf verifier narrow ctx access misconfigured\n");
10926 verbose(env, "bpf verifier is misconfigured\n");
10933 verbose(env, "bpf verifier narrow ctx load misconfigured\n");
11109 verbose(env, "JIT doesn't support bpf-to-bpf calls\n");
11201 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n");
11276 verbose(env, "bpf verifier is misconfigured\n");
11394 verbose(env, "adding tail call poke descriptor failed\n");
11413 verbose(env, "tail_call abusing map_ptr\n");
11454 verbose(env, "bpf verifier is misconfigured\n");
11531 verbose(env, "kernel subsystem misconfigured func %s#%d\n", func_id_name(insn->imm), insn->imm);
11541 verbose(env, "bpf verifier is misconfigured\n");
11547 verbose(env, "tracking tail call prog failed\n");
11698 verbose(env, "Func#%d is safe for any args that match its prototype\n", i);
11721 verbose(env, "verification time %lld usec\n", div_u64(env->verification_time, VERIFIER_ONETHOUSAND));
11722 verbose(env, "stack depth ");
11726 verbose(env, "%d", depth);
11728 verbose(env, "+");
11731 verbose(env, "\n");
11733 verbose(env,
11750 verbose(env, "struct ops programs must have a GPL compatible license\n");
11757 verbose(env, "attach_btf_id %u is not a supported struct\n", btf_id);
11764 verbose(env, "attach to invalid member idx %u of struct %s\n", member_idx, st_ops->name);
11772 verbose(env, "attach to invalid member %s(@idx %u) of struct %s\n", mname, member_idx, st_ops->name);
11779 verbose(env, "attach to unsupported member %s of struct %s\n", mname, st_ops->name);
12073 verbose(env, "Only fentry/fexit/fmod_ret and lsm programs can be sleepable\n");
12190 /* user requested verbose verifier output
12206 verbose(env, "in-kernel BTF is malformed\n");