Lines Matching refs:verbose
216 static void verbose(const char *fmt, ...) in verbose() function
250 verbose(" R%d=%s", i, reg_type_str[t]); in print_verifier_state()
252 verbose("%d", env->cur_state.regs[i].imm); in print_verifier_state()
255 verbose("(ks=%d,vs=%d)", in print_verifier_state()
261 verbose(" fp%d=%s", -MAX_BPF_STACK + i, in print_verifier_state()
264 verbose("\n"); in print_verifier_state()
321 verbose("(%02x) %sr%d %s %sr%d\n", in print_bpf_insn()
328 verbose("(%02x) %sr%d %s %s%d\n", in print_bpf_insn()
336 verbose("(%02x) *(%s *)(r%d %+d) = r%d\n", in print_bpf_insn()
342 verbose("(%02x) lock *(%s *)(r%d %+d) += r%d\n", in print_bpf_insn()
348 verbose("BUG_%02x\n", insn->code); in print_bpf_insn()
351 verbose("BUG_st_%02x\n", insn->code); in print_bpf_insn()
354 verbose("(%02x) *(%s *)(r%d %+d) = %d\n", in print_bpf_insn()
361 verbose("BUG_ldx_%02x\n", insn->code); in print_bpf_insn()
364 verbose("(%02x) r%d = *(%s *)(r%d %+d)\n", in print_bpf_insn()
370 verbose("(%02x) r0 = *(%s *)skb[%d]\n", in print_bpf_insn()
375 verbose("(%02x) r0 = *(%s *)skb[r%d + %d]\n", in print_bpf_insn()
380 verbose("(%02x) r%d = 0x%x\n", in print_bpf_insn()
383 verbose("BUG_ld_%02x\n", insn->code); in print_bpf_insn()
390 verbose("(%02x) call %d\n", insn->code, insn->imm); in print_bpf_insn()
392 verbose("(%02x) goto pc%+d\n", in print_bpf_insn()
395 verbose("(%02x) exit\n", insn->code); in print_bpf_insn()
397 verbose("(%02x) if r%d %s r%d goto pc%+d\n", in print_bpf_insn()
402 verbose("(%02x) if r%d %s 0x%x goto pc%+d\n", in print_bpf_insn()
408 verbose("(%02x) %s\n", insn->code, bpf_class_string[class]); in print_bpf_insn()
447 verbose("BPF program is too complex\n"); in push_stack()
497 verbose("R%d is invalid\n", regno); in check_reg_arg()
504 verbose("R%d !read_ok\n", regno); in check_reg_arg()
510 verbose("frame pointer is read only\n"); in check_reg_arg()
551 verbose("invalid size of register spill\n"); in check_stack_write()
582 verbose("invalid size of register spill\n"); in check_stack_read()
587 verbose("corrupted spill memory\n"); in check_stack_read()
600 verbose("invalid read from stack off %d+%d size %d\n", in check_stack_read()
619 verbose("invalid access to map value, value_size=%d off=%d size=%d\n", in check_map_access()
634 verbose("invalid bpf_context access off=%d size=%d\n", off, size); in check_ctx_access()
656 verbose("misaligned access off %d size %d\n", off, size); in check_mem_access()
672 verbose("invalid stack off=%d size=%d\n", off, size); in check_mem_access()
680 verbose("R%d invalid mem access '%s'\n", in check_mem_access()
694 verbose("BPF_XADD uses reserved fields\n"); in check_xadd()
736 verbose("invalid stack type R%d off=%d access_size=%d\n", in check_stack_boundary()
743 verbose("invalid indirect read from stack off %d+%d size %d\n", in check_stack_boundary()
762 verbose("R%d !read_ok\n", regno); in check_func_arg()
779 verbose("unsupported arg_type %d\n", arg_type); in check_func_arg()
784 verbose("R%d type=%s expected=%s\n", regno, in check_func_arg()
804 verbose("invalid map_ptr to access map->key\n"); in check_func_arg()
815 verbose("invalid map_ptr to access map->value\n"); in check_func_arg()
827 verbose("ARG_CONST_STACK_SIZE cannot be first argument\n"); in check_func_arg()
847 verbose("invalid func %d\n", func_id); in check_call()
855 verbose("unknown func %d\n", func_id); in check_call()
861 verbose("cannot call GPL only function from proprietary program\n"); in check_call()
901 verbose("kernel subsystem misconfigured verifier\n"); in check_call()
906 verbose("unknown return type %d of func %d\n", in check_call()
924 verbose("BPF_NEG uses reserved fields\n"); in check_alu_op()
930 verbose("BPF_END uses reserved fields\n"); in check_alu_op()
949 verbose("BPF_MOV uses reserved fields\n"); in check_alu_op()
959 verbose("BPF_MOV uses reserved fields\n"); in check_alu_op()
988 verbose("invalid BPF_ALU opcode %x\n", opcode); in check_alu_op()
997 verbose("BPF_ALU uses reserved fields\n"); in check_alu_op()
1006 verbose("BPF_ALU uses reserved fields\n"); in check_alu_op()
1018 verbose("div by zero\n"); in check_alu_op()
1027 verbose("invalid shift %d\n", insn->imm); in check_alu_op()
1061 verbose("invalid BPF_JMP opcode %x\n", opcode); in check_cond_jmp_op()
1067 verbose("BPF_JMP uses reserved fields\n"); in check_cond_jmp_op()
1077 verbose("BPF_JMP uses reserved fields\n"); in check_cond_jmp_op()
1166 verbose("invalid BPF_LD_IMM insn\n"); in check_ld_imm()
1170 verbose("BPF_LD_IMM64 uses reserved fields\n"); in check_ld_imm()
1225 verbose("BPF_LD_ABS|IND instructions not allowed for this program type\n"); in check_ld_abs()
1231 verbose("BPF_LD_ABS uses reserved fields\n"); in check_ld_abs()
1241 verbose("at the time of BPF_LD_ABS|IND R6 != pointer to skb\n"); in check_ld_abs()
1326 verbose("jump out of range from insn %d to %d\n", t, w); in push_insn()
1343 verbose("back-edge from insn %d to %d\n", t, w); in push_insn()
1349 verbose("insn state internal bug\n"); in push_insn()
1440 verbose("pop stack internal bug\n"); in check_cfg()
1449 verbose("unreachable insn %d\n", i); in check_cfg()
1591 verbose("invalid insn idx %d insn_cnt %d\n", in do_check()
1600 verbose("BPF program is too large. Proccessed %d insn\n", in do_check()
1612 verbose("\nfrom %d to %d: safe\n", in do_check()
1615 verbose("%d: safe\n", insn_idx); in do_check()
1621 verbose("\nfrom %d to %d:", prev_insn_idx, insn_idx); in do_check()
1627 verbose("%d: ", insn_idx); in do_check()
1683 verbose("same insn cannot be used with different pointers\n"); in do_check()
1698 verbose("BPF_STX uses reserved fields\n"); in do_check()
1720 verbose("BPF_ST uses reserved fields\n"); in do_check()
1743 verbose("BPF_CALL uses reserved fields\n"); in do_check()
1756 verbose("BPF_JA uses reserved fields\n"); in do_check()
1768 verbose("BPF_EXIT uses reserved fields\n"); in do_check()
1810 verbose("invalid BPF_LD mode\n"); in do_check()
1814 verbose("unknown insn class %d\n", class); in do_check()
1837 verbose("BPF_LDX uses reserved fields\n"); in replace_map_fd_with_map_ptr()
1848 verbose("invalid bpf_ld_imm64 insn\n"); in replace_map_fd_with_map_ptr()
1857 verbose("unrecognized bpf_ld_imm64 insn\n"); in replace_map_fd_with_map_ptr()
1865 verbose("fd %d is not pointing to valid bpf_map\n", in replace_map_fd_with_map_ptr()
1981 verbose("bpf verifier is misconfigured\n"); in convert_ctx_accesses()