Lines Matching refs:errstr

27 	const char *errstr;  member
55 .errstr = "unreachable",
65 .errstr = "unreachable",
74 .errstr = "jump out of range",
83 .errstr = "jump out of range",
97 .errstr = "invalid BPF_LD_IMM insn",
110 .errstr = "invalid BPF_LD_IMM insn",
124 .errstr = "invalid bpf_ld_imm64 insn",
133 .errstr = "invalid bpf_ld_imm64 insn",
141 .errstr = "invalid bpf_ld_imm64 insn",
149 .errstr = "jump out of range",
158 .errstr = "back-edge",
170 .errstr = "back-edge",
182 .errstr = "back-edge",
191 .errstr = "R2 !read_ok",
200 .errstr = "R15 is invalid",
209 .errstr = "R0 !read_ok",
220 .errstr = "R0 !read_ok",
229 .errstr = "invalid stack",
238 .errstr = "BPF_CALL uses reserved",
247 .errstr = "BPF_CALL uses reserved",
256 .errstr = "invalid func 1234567",
269 .errstr = "invalid indirect read from stack",
279 .errstr = "invalid read from stack",
312 .errstr = "corrupted spill",
321 .errstr = "R15 is invalid",
330 .errstr = "R14 is invalid",
339 .errstr = "R14 is invalid",
348 .errstr = "R12 is invalid",
357 .errstr = "R11 is invalid",
366 .errstr = "invalid BPF_LD_IMM",
375 .errstr = "BPF_LDX uses reserved fields",
384 .errstr = "invalid BPF_ALU opcode f0",
393 .errstr = "invalid BPF_ALU opcode f0",
402 .errstr = "BPF_ALU uses reserved fields",
412 .errstr = "misaligned access",
425 .errstr = "fd 0 is not pointing to valid bpf_map",
440 .errstr = "R0 invalid mem access 'map_value_or_null'",
456 .errstr = "misaligned access",
474 .errstr = "R0 invalid mem access",
680 .errstr = "invalid bpf_context access",
700 .errstr = "different pointers",
721 .errstr = "different pointers",
743 .errstr = "different pointers",
811 if (strstr(bpf_log_buf, tests[i].errstr) == 0) { in test()