Searched refs:errstr_unpriv (Results 1 – 12 of 12) sorted by relevance
/linux-6.6.21/tools/testing/selftests/bpf/verifier/ |
D | dead_code.c | 11 .errstr_unpriv = "R9 !read_ok", 90 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 108 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 126 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 142 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 157 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for",
|
D | jset.c | 85 .errstr_unpriv = "R9 !read_ok", 99 .errstr_unpriv = "!read_ok", 114 .errstr_unpriv = "!read_ok", 128 .errstr_unpriv = "!read_ok", 144 .errstr_unpriv = "R9 !read_ok", 166 .errstr_unpriv = "R9 !read_ok",
|
D | atomic_cmpxchg.c | 131 .errstr_unpriv = "R0 leaks addr into mem", 151 .errstr_unpriv = "R0 leaks addr into mem", 172 .errstr_unpriv = "R0 leaks addr into mem", 191 .errstr_unpriv = "R0 leaks addr into mem", 212 .errstr_unpriv = "R10 partial copy of pointer", 233 .errstr_unpriv = "R10 partial copy of pointer",
|
D | jmp32.c | 90 .errstr_unpriv = "R9 !read_ok", 155 .errstr_unpriv = "R9 !read_ok", 220 .errstr_unpriv = "R9 !read_ok", 289 .errstr_unpriv = "R0 invalid mem access 'scalar'", 360 .errstr_unpriv = "R0 invalid mem access 'scalar'", 431 .errstr_unpriv = "R0 invalid mem access 'scalar'", 502 .errstr_unpriv = "R0 invalid mem access 'scalar'", 573 .errstr_unpriv = "R0 invalid mem access 'scalar'", 644 .errstr_unpriv = "R0 invalid mem access 'scalar'", 715 .errstr_unpriv = "R0 invalid mem access 'scalar'", [all …]
|
D | ld_imm64.c | 13 .errstr_unpriv = "jump into the middle of ldimm64 insn 1", 27 .errstr_unpriv = "jump into the middle of ldimm64 insn 1",
|
D | jump.c | 21 .errstr_unpriv = "R1 pointer comparison", 49 .errstr_unpriv = "R1 pointer comparison", 85 .errstr_unpriv = "R1 pointer comparison", 136 .errstr_unpriv = "R1 pointer comparison", 177 .errstr_unpriv = "R1 pointer comparison",
|
D | atomic_bounds.c | 26 .errstr_unpriv = "back-edge",
|
D | ctx_skb.c | 59 .errstr_unpriv = "R1 pointer comparison", 81 .errstr_unpriv = "R1 pointer comparison", 104 .errstr_unpriv = "R1 pointer comparison", 377 .errstr_unpriv = "R1 leaks addr", 388 .errstr_unpriv = "R1 leaks addr", 901 .errstr_unpriv = "", 923 .errstr_unpriv = "R1 leaks addr", 945 .errstr_unpriv = "", 1149 .errstr_unpriv = "R1 leaks addr",
|
D | atomic_fetch.c | 23 .errstr_unpriv = "leaking pointer from stack off -8", 47 .errstr_unpriv = "leaking pointer from stack off -8",
|
D | calls.c | 299 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 496 .errstr_unpriv = "back-edge from insn", 595 .errstr_unpriv = "allowed for", 626 .errstr_unpriv = "allowed for", 677 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 1344 .errstr_unpriv = "allowed for", 1510 .errstr_unpriv = "invalid read from stack R7 off=-16 size=8", 2242 .errstr_unpriv = "invalid indirect read from stack R2 off -8+0 size 8", 2262 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", 2288 .errstr_unpriv = "loading/calling other bpf or kernel functions are allowed for", [all …]
|
D | atomic_fetch_add.c | 54 .errstr_unpriv = "R10 leaks addr into mem",
|
/linux-6.6.21/tools/testing/selftests/bpf/ |
D | test_verifier.c | 136 const char *errstr_unpriv; member 1601 expected_err = unpriv && test->errstr_unpriv ? in do_test_single() 1602 test->errstr_unpriv : test->errstr; in do_test_single()
|