Lines Matching refs:allowed

1471             verbose(env, "function calls to other bpf functions are allowed for CAP_BPF and CAP_SYS_ADMIN\n");

2840 verbose(env, "R%d min value is outside of the allowed memory range\n", regno);
2854 verbose(env, "R%d max value is outside of the allowed memory range\n", regno);
3101 /* Byte size accesses are always allowed. */
3133 /* Byte size accesses are always allowed. */
3251 verbose(env, "tail_calls are not allowed when call stack of previous frames is %d bytes. Too large\n",
3353 * is only allowed in its original, unmodified form.
3572 verbose(env, "%s access is allowed only to CAP_PERFMON and CAP_SYS_ADMIN\n", tname);
3923 verbose(env, "BPF_XADD stores into R%d %s is not allowed\n", insn->dst_reg,
3997 /* Only initialized buffer on stack is allowed to be accessed
4133 * Since only one bpf_spin_lock is allowed the checks are simpler than
4171 verbose(env, "Locking two bpf_spin_locks are not allowed\n");
4436 verbose(env, "helper access to the packet is not allowed\n");
4461 /* Pointer types where reg offset is explicitly allowed: */
4564 * int type and negative retvals are allowed.
4774 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n");
5336 if (fn->allowed && !fn->allowed(env->prog)) {
5337 verbose(env, "helper call is not allowed in probe\n");
5605 verbose(env, "math between %s pointer and %lld is not allowed\n", reg_type_str(env, type), val);
5610 verbose(env, "%s pointer offset %d is not allowed\n", reg_type_str(env, type), reg->off);
5615 verbose(env, "math between %s pointer and register with unbounded min value is not allowed\n",
8090 verbose(env, "BPF_LD_[ABS|IND] instructions not allowed for this program type\n");
8537 verbose(env, "LD_ABS is not allowed in subprogs without BTF\n");
8541 verbose(env, "tail_call is not allowed in subprogs without BTF\n");
8654 verbose(env, "LD_ABS is only allowed in functions that return 'int'.\n");
8658 verbose(env, "tail_call is only allowed in functions that return 'int'.\n");
9026 * pointer leaks because scalars are allowed to leak
9840 verbose(env, "BPF_ST stores into R%d %s is not allowed\n", insn->dst_reg,
9864 verbose(env, "function calls are not allowed while holding a lock\n");
10088 * !RT kernels it is allowed for backwards compatibility reasons for
10231 verbose(env, "direct value offset of %u is not allowed\n", off);
10281 verbose(env, "only one cgroup storage of each type is allowed\n");
10885 verbose(env, "Writes through BTF pointers are not allowed\n");
11201 verbose(env, "tail_calls are not allowed in non-JITed programs with bpf-to-bpf calls\n");
11527 /* all functions that have prototype and verifier allowed
11909 * allowed. If extending of fentry/fexit was allowed it
11913 * allowed.