/linux-6.1.9/tools/testing/selftests/bpf/verifier/ |
D | direct_value_access.c | 71 .errstr = "R1 min value is outside of the allowed memory range", 84 .errstr = "direct value offset of 4294967295 is not allowed", 108 .errstr = "invalid access to map value pointer", 132 .errstr = "invalid access to map value pointer", 144 .errstr = "direct value offset of 536870912 is not allowed", 156 .errstr = "invalid access to map value pointer, value_size=48 off=536870911", 198 .errstr = "invalid access to map value, value_size=48 off=47 size=2", 213 .errstr = "invalid access to map value, value_size=48 off=47 size=2", 226 .errstr = "R1 min value is outside of the allowed memory range", 250 .errstr = "invalid access to map value pointer", [all …]
|
D | ld_imm64.c | 12 .errstr = "invalid BPF_LD_IMM insn", 26 .errstr = "invalid BPF_LD_IMM insn", 41 .errstr = "invalid bpf_ld_imm64 insn", 50 .errstr = "invalid bpf_ld_imm64 insn", 79 .errstr = "uses reserved fields", 89 .errstr = "invalid bpf_ld_imm64 insn", 99 .errstr = "invalid bpf_ld_imm64 insn", 109 .errstr = "invalid bpf_ld_imm64 insn", 120 .errstr = "not pointing to valid bpf_map", 131 .errstr = "invalid bpf_ld_imm64 insn", [all …]
|
D | cfg.c | 7 .errstr = "unreachable", 17 .errstr = "unreachable", 26 .errstr = "jump out of range", 35 .errstr = "jump out of range", 44 .errstr = "unreachable insn 1", 57 .errstr = "unreachable insn 4", 70 .errstr = "infinite loop detected",
|
D | helper_restricted.c | 8 .errstr = "unknown func bpf_ktime_get_coarse_ns", 19 .errstr = "unknown func bpf_ktime_get_coarse_ns", 30 .errstr = "unknown func bpf_ktime_get_coarse_ns", 41 .errstr = "unknown func bpf_ktime_get_coarse_ns", 61 .errstr = "tracing progs cannot use bpf_timer yet", 81 .errstr = "tracing progs cannot use bpf_timer yet", 101 .errstr = "tracing progs cannot use bpf_timer yet", 121 .errstr = "tracing progs cannot use bpf_timer yet", 139 .errstr = "tracing progs cannot use bpf_spin_lock yet", 157 .errstr = "tracing progs cannot use bpf_spin_lock yet", [all …]
|
D | cgroup_storage.c | 29 .errstr = "cannot pass map_type 1 into func bpf_get_local_storage", 42 .errstr = "fd 1 is not pointing to valid bpf_map", 58 .errstr = "invalid access to map value, value_size=64 off=256 size=4", 74 .errstr = "invalid access to map value, value_size=64 off=-2 size=4", 91 .errstr = "get_local_storage() doesn't support non-zero flags", 107 .errstr = "get_local_storage() doesn't support non-zero flags", 139 .errstr = "cannot pass map_type 1 into func bpf_get_local_storage", 152 .errstr = "fd 1 is not pointing to valid bpf_map", 168 .errstr = "invalid access to map value, value_size=64 off=256 size=4", 184 .errstr = "invalid access to map value, value_size=64 off=-2 size=4", [all …]
|
D | junk_insn.c | 7 .errstr = "unknown opcode 00", 16 .errstr = "BPF_LDX uses reserved fields", 25 .errstr = "unknown opcode ff", 34 .errstr = "unknown opcode ff", 43 .errstr = "BPF_ALU uses reserved fields",
|
D | bounds_deduction.c | 10 .errstr = "R0 tried to subtract pointer from scalar", 38 .errstr = "R0 tried to subtract pointer from scalar", 66 .errstr = "R0 tried to subtract pointer from scalar", 79 .errstr = "R0 tried to subtract pointer from scalar", 93 .errstr = "dereference of modified ctx ptr", 108 .errstr = "negative offset ctx ptr R1 off=-1 disallowed", 121 .errstr = "R0 tried to subtract pointer from scalar", 134 .errstr = "math between ctx pointer and register with unbounded min value is not allowed",
|
D | ref_tracking.c | 9 .errstr = "Unreleased reference", 20 .errstr = "Unreleased reference", 34 .errstr = "Unreleased reference", 49 .errstr = "Unreleased reference", 60 .errstr = "Unreleased reference", 71 .errstr = "Unreleased reference", 84 .errstr = "Unreleased reference", 145 .errstr = "arg#0 pointer type STRUCT bpf_key must point to scalar, or struct with scalar", 166 .errstr = "arg#0 pointer type STRUCT bpf_key must point to scalar, or struct with scalar", 185 .errstr = "arg#0 pointer type STRUCT bpf_key must point to scalar, or struct with scalar", [all …]
|
D | ctx_skb.c | 38 .errstr = "invalid bpf_context access", 58 .errstr = "different pointers", 80 .errstr = "different pointers", 103 .errstr = "different pointers", 114 .errstr = "invalid bpf_context access", 124 .errstr = "invalid bpf_context access", 134 .errstr = "invalid bpf_context access", 144 .errstr = "invalid bpf_context access", 154 .errstr = "invalid bpf_context access", 164 .errstr = "invalid bpf_context access", [all …]
|
D | ctx.c | 8 .errstr = "BPF_ST stores into R1 ctx is not allowed", 19 .errstr = "BPF_ATOMIC stores into R1 ctx is not allowed", 33 .errstr = "dereference of modified ctx ptr", 61 .errstr = "negative offset ctx ptr R1 off=-612 disallowed", 75 .errstr = "negative offset ctx ptr R1 off=-612 disallowed", 91 .errstr = "variable ctx access var_off=(0x0; 0x4)", 130 .errstr = "R1 type=scalar expected=ctx", 144 .errstr = "negative offset ctx ptr R1 off=-612 disallowed", 196 .errstr = "R1 type=scalar expected=ctx",
|
D | basic_stx_ldx.c | 7 .errstr = "R15 is invalid", 16 .errstr = "R14 is invalid", 25 .errstr = "R14 is invalid", 34 .errstr = "R12 is invalid", 43 .errstr = "R11 is invalid",
|
D | stack_ptr.c | 23 .errstr = "misaligned stack access off (0x0; 0x0)+-8+2 size 8", 35 .errstr = "misaligned stack access off (0x0; 0x0)+-10+8 size 8", 47 .errstr = "invalid write to stack R1 off=-79992 size=8", 60 .errstr = "invalid write to stack R1 off=0 size=8", 109 .errstr = "invalid write to stack R1 off=0 size=1", 123 .errstr = "invalid write to stack R1", 136 .errstr = "invalid write to stack", 150 .errstr = "fp pointer offset", 188 .errstr = "invalid write to stack R1 off=-513 size=1", 201 .errstr = "math between fp pointer", [all …]
|
D | basic_stack.c | 7 .errstr = "invalid write to stack", 20 .errstr = "invalid indirect read from stack", 30 .errstr = "invalid read from stack", 43 .errstr = "R1 subtraction from stack pointer", 62 .errstr = "misaligned stack access",
|
D | map_kptr.c | 20 .errstr = "BPF_ST imm must be 0 when storing to kptr at off=0", 40 .errstr = "kptr access size must be BPF_DW", 70 .errstr = "kptr access cannot have variable offset", 102 .errstr = "R1 doesn't have constant offset. kptr has to be at the constant offset", 123 .errstr = "kptr access misaligned expected=0 off=7", 152 .errstr = "variable untrusted_ptr_ access var_off=(0x0; 0x7) disallowed", 177 .errstr = "invalid kptr access, R1 type=untrusted_ptr_prog_test_ref_kfunc expected=ptr_prog_test", 198 .errstr = "R0 invalid mem access 'untrusted_ptr_or_null_'", 221 .errstr = "access beyond struct prog_test_ref_kfunc at off 32 size 8", 245 .errstr = "R1 type=untrusted_ptr_ expected=percpu_ptr_", [all …]
|
D | cgroup_inv_retcode.c | 7 .errstr = "R0 has value (0x0; 0xffffffff)", 28 .errstr = "R0 has value (0x0; 0x3)", 47 .errstr = "R0 has value (0x2; 0x0)", 57 .errstr = "R0 is not a known value (ctx)", 69 .errstr = "R0 has unknown scalar value",
|
D | ctx_sk_lookup.c | 271 .errstr = "invalid bpf_context access", 284 .errstr = "invalid bpf_context access", 298 .errstr = "invalid bpf_context access", 311 .errstr = "invalid bpf_context access", 325 .errstr = "invalid bpf_context access", 339 .errstr = "invalid bpf_context access", 352 .errstr = "invalid bpf_context access", 366 .errstr = "invalid bpf_context access", 380 .errstr = "invalid bpf_context access", 395 .errstr = "invalid bpf_context access", [all …]
|
D | ld_ind.c | 10 .errstr = "R1 !read_ok", 22 .errstr = "R2 !read_ok", 34 .errstr = "R3 !read_ok", 46 .errstr = "R4 !read_ok", 58 .errstr = "R5 !read_ok",
|
D | calls.c | 10 .errstr = "invalid kernel function call not eliminated in verifier pass", 34 .errstr = "arg#0 pointer type STRUCT prog_test_fail1 must point to scalar", 49 .errstr = "max struct nesting depth exceeded\narg#0 pointer type STRUCT prog_test_fail2", 64 .errstr = "arg#0 pointer type STRUCT prog_test_fail3 must point to scalar", 79 .errstr = "arg#0 expected pointer to ctx, but got PTR", 94 .errstr = "arg#0 pointer type UNKNOWN must point to scalar", 112 .errstr = "arg#0 pointer type STRUCT prog_test_ref_kfunc must point", 135 .errstr = "R1 must have zero offset when passed to release func", 155 .errstr = "kernel function bpf_kfunc_call_memb1_release args#0 expected pointer", 184 .errstr = "negative offset ptr_ ptr R1 off=-4 disallowed", [all …]
|
D | uninit.c | 7 .errstr = "R2 !read_ok", 16 .errstr = "R15 is invalid", 25 .errstr = "R0 !read_ok", 36 .errstr = "R0 !read_ok",
|
D | raw_stack.c | 14 .errstr = "invalid read from stack R6 off=-8 size=8", 30 .errstr = "R4 min value is negative", 46 .errstr = "R4 min value is negative", 62 .errstr = "invalid zero-sized read", 135 .errstr = "R0 invalid mem access 'scalar'", 165 .errstr = "R3 invalid mem access 'scalar'", 208 .errstr = "invalid indirect access to stack R3 off=-513 size=8", 224 .errstr = "invalid indirect access to stack R3 off=-1 size=8", 240 .errstr = "R4 min value is negative", 256 .errstr = "R4 unbounded memory access, use 'var &= const' or 'if (var < const)'", [all …]
|
D | var_off.c | 16 .errstr = "variable ctx access var_off=(0x0; 0x4)", 62 .errstr = "invalid variable-offset read from stack R2", 134 .errstr = "R2 invalid mem access 'scalar'", 161 .errstr = "invalid unbounded variable-offset indirect access to stack R4", 186 .errstr = "invalid variable-offset indirect access to stack R2", 211 .errstr = "invalid variable-offset indirect access to stack R2", 236 .errstr = "invalid indirect read from stack R2 var_off", 261 .errstr = "invalid indirect read from stack R2 var_off", 315 .errstr = "invalid indirect read from stack R4 var_off",
|
D | basic_call.c | 7 .errstr = "unknown opcode 8d", 16 .errstr = "BPF_CALL uses reserved", 25 .errstr = "invalid func unknown#1234567", 35 .errstr = "R1 !read_ok",
|
D | value_illegal_alu.c | 15 .errstr = "R0 bitwise operator &= on pointer", 32 .errstr = "R0 32-bit pointer arithmetic prohibited", 49 .errstr = "R0 pointer arithmetic with /= operator", 67 .errstr = "invalid mem access 'scalar'", 92 .errstr = "R0 invalid mem access 'scalar'",
|
D | sock.c | 11 .errstr = "invalid mem access 'sock_common_or_null'", 40 .errstr = "invalid sock_common access", 52 .errstr = "type=sock_common_or_null expected=sock_common", 68 .errstr = "invalid mem access 'sock_or_null'", 176 .errstr = "invalid sock access", 214 .errstr = "invalid sock access", 233 .errstr = "invalid sock access", 306 .errstr = "invalid sock access", 318 .errstr = "type=sock_common_or_null expected=sock_common", 334 .errstr = "invalid mem access 'tcp_sock_or_null'", [all …]
|
/linux-6.1.9/drivers/s390/cio/ |
D | vfio_ccw_trace.h | 107 TP_PROTO(int fctl, struct subchannel_id schid, int errno, char *errstr), 108 TP_ARGS(fctl, schid, errno, errstr), 116 __field(char*, errstr) 125 __entry->errstr = errstr; 134 __entry->errstr)
|