Lines Matching refs:verbose

217 static __printf(1, 2) void verbose(const char *fmt, ...)  in verbose()  function
251 verbose(" R%d=%s", i, reg_type_str[t]); in print_verifier_state()
253 verbose("%d", env->cur_state.regs[i].imm); in print_verifier_state()
256 verbose("(ks=%d,vs=%d)", in print_verifier_state()
262 verbose(" fp%d=%s", -MAX_BPF_STACK + i, in print_verifier_state()
265 verbose("\n"); in print_verifier_state()
322 verbose("(%02x) %sr%d %s %sr%d\n", in print_bpf_insn()
329 verbose("(%02x) %sr%d %s %s%d\n", in print_bpf_insn()
337 verbose("(%02x) *(%s *)(r%d %+d) = r%d\n", in print_bpf_insn()
343 verbose("(%02x) lock *(%s *)(r%d %+d) += r%d\n", in print_bpf_insn()
349 verbose("BUG_%02x\n", insn->code); in print_bpf_insn()
352 verbose("BUG_st_%02x\n", insn->code); in print_bpf_insn()
355 verbose("(%02x) *(%s *)(r%d %+d) = %d\n", in print_bpf_insn()
362 verbose("BUG_ldx_%02x\n", insn->code); in print_bpf_insn()
365 verbose("(%02x) r%d = *(%s *)(r%d %+d)\n", in print_bpf_insn()
371 verbose("(%02x) r0 = *(%s *)skb[%d]\n", in print_bpf_insn()
376 verbose("(%02x) r0 = *(%s *)skb[r%d + %d]\n", in print_bpf_insn()
381 verbose("(%02x) r%d = 0x%x\n", in print_bpf_insn()
384 verbose("BUG_ld_%02x\n", insn->code); in print_bpf_insn()
391 verbose("(%02x) call %d\n", insn->code, insn->imm); in print_bpf_insn()
393 verbose("(%02x) goto pc%+d\n", in print_bpf_insn()
396 verbose("(%02x) exit\n", insn->code); in print_bpf_insn()
398 verbose("(%02x) if r%d %s r%d goto pc%+d\n", in print_bpf_insn()
403 verbose("(%02x) if r%d %s 0x%x goto pc%+d\n", in print_bpf_insn()
409 verbose("(%02x) %s\n", insn->code, bpf_class_string[class]); in print_bpf_insn()
448 verbose("BPF program is too complex\n"); in push_stack()
498 verbose("R%d is invalid\n", regno); in check_reg_arg()
505 verbose("R%d !read_ok\n", regno); in check_reg_arg()
511 verbose("frame pointer is read only\n"); in check_reg_arg()
565 verbose("invalid size of register spill\n"); in check_stack_write()
596 verbose("invalid size of register spill\n"); in check_stack_read()
601 verbose("corrupted spill memory\n"); in check_stack_read()
614 verbose("invalid read from stack off %d+%d size %d\n", in check_stack_read()
633 verbose("invalid access to map value, value_size=%d off=%d size=%d\n", in check_map_access()
648 verbose("invalid bpf_context access off=%d size=%d\n", off, size); in check_ctx_access()
687 verbose("misaligned access off %d size %d\n", off, size); in check_mem_access()
694 verbose("R%d leaks addr into map\n", value_regno); in check_mem_access()
704 verbose("R%d leaks addr into ctx\n", value_regno); in check_mem_access()
714 verbose("invalid stack off=%d size=%d\n", off, size); in check_mem_access()
721 verbose("attempt to corrupt spilled pointer on stack\n"); in check_mem_access()
729 verbose("R%d invalid mem access '%s'\n", in check_mem_access()
743 verbose("BPF_XADD uses reserved fields\n"); in check_xadd()
785 verbose("invalid stack type R%d off=%d access_size=%d\n", in check_stack_boundary()
792 verbose("invalid indirect read from stack off %d+%d size %d\n", in check_stack_boundary()
811 verbose("R%d !read_ok\n", regno); in check_func_arg()
817 verbose("R%d leaks addr into helper function\n", regno); in check_func_arg()
833 verbose("unsupported arg_type %d\n", arg_type); in check_func_arg()
838 verbose("R%d type=%s expected=%s\n", regno, in check_func_arg()
858 verbose("invalid map_ptr to access map->key\n"); in check_func_arg()
869 verbose("invalid map_ptr to access map->value\n"); in check_func_arg()
881 verbose("ARG_CONST_STACK_SIZE cannot be first argument\n"); in check_func_arg()
927 verbose("cannot pass map_type %d into func %d\n", in check_map_func_compatibility()
943 verbose("invalid func %d\n", func_id); in check_call()
951 verbose("unknown func %d\n", func_id); in check_call()
957 verbose("cannot call GPL only function from proprietary program\n"); in check_call()
997 verbose("kernel subsystem misconfigured verifier\n"); in check_call()
1002 verbose("unknown return type %d of func %d\n", in check_call()
1026 verbose("BPF_NEG uses reserved fields\n"); in check_alu_op()
1032 verbose("BPF_END uses reserved fields\n"); in check_alu_op()
1043 verbose("R%d pointer arithmetic prohibited\n", in check_alu_op()
1057 verbose("BPF_MOV uses reserved fields\n"); in check_alu_op()
1067 verbose("BPF_MOV uses reserved fields\n"); in check_alu_op()
1085 verbose("R%d partial copy of pointer\n", in check_alu_op()
1101 verbose("invalid BPF_ALU opcode %x\n", opcode); in check_alu_op()
1110 verbose("BPF_ALU uses reserved fields\n"); in check_alu_op()
1119 verbose("BPF_ALU uses reserved fields\n"); in check_alu_op()
1131 verbose("div by zero\n"); in check_alu_op()
1140 verbose("invalid shift %d\n", insn->imm); in check_alu_op()
1151 verbose("R%d pointer arithmetic prohibited\n", in check_alu_op()
1156 verbose("R%d pointer arithmetic prohibited\n", in check_alu_op()
1184 verbose("invalid BPF_JMP opcode %x\n", opcode); in check_cond_jmp_op()
1190 verbose("BPF_JMP uses reserved fields\n"); in check_cond_jmp_op()
1200 verbose("R%d pointer comparison prohibited\n", in check_cond_jmp_op()
1206 verbose("BPF_JMP uses reserved fields\n"); in check_cond_jmp_op()
1259 verbose("R%d pointer comparison prohibited\n", insn->dst_reg); in check_cond_jmp_op()
1298 verbose("invalid BPF_LD_IMM insn\n"); in check_ld_imm()
1302 verbose("BPF_LD_IMM64 uses reserved fields\n"); in check_ld_imm()
1357 verbose("BPF_LD_ABS|IND instructions not allowed for this program type\n"); in check_ld_abs()
1364 verbose("BPF_LD_ABS uses reserved fields\n"); in check_ld_abs()
1374 verbose("at the time of BPF_LD_ABS|IND R6 != pointer to skb\n"); in check_ld_abs()
1459 verbose("jump out of range from insn %d to %d\n", t, w); in push_insn()
1476 verbose("back-edge from insn %d to %d\n", t, w); in push_insn()
1482 verbose("insn state internal bug\n"); in push_insn()
1573 verbose("pop stack internal bug\n"); in check_cfg()
1582 verbose("unreachable insn %d\n", i); in check_cfg()
1724 verbose("invalid insn idx %d insn_cnt %d\n", in do_check()
1733 verbose("BPF program is too large. Proccessed %d insn\n", in do_check()
1745 verbose("\nfrom %d to %d: safe\n", in do_check()
1748 verbose("%d: safe\n", insn_idx); in do_check()
1754 verbose("\nfrom %d to %d:", prev_insn_idx, insn_idx); in do_check()
1760 verbose("%d: ", insn_idx); in do_check()
1816 verbose("same insn cannot be used with different pointers\n"); in do_check()
1854 verbose("same insn cannot be used with different pointers\n"); in do_check()
1861 verbose("BPF_ST uses reserved fields\n"); in do_check()
1884 verbose("BPF_CALL uses reserved fields\n"); in do_check()
1897 verbose("BPF_JA uses reserved fields\n"); in do_check()
1909 verbose("BPF_EXIT uses reserved fields\n"); in do_check()
1924 verbose("R0 leaks addr as return value\n"); in do_check()
1956 verbose("invalid BPF_LD mode\n"); in do_check()
1960 verbose("unknown insn class %d\n", class); in do_check()
1982 verbose("BPF_LDX uses reserved fields\n"); in replace_map_fd_with_map_ptr()
1989 verbose("BPF_STX uses reserved fields\n"); in replace_map_fd_with_map_ptr()
2000 verbose("invalid bpf_ld_imm64 insn\n"); in replace_map_fd_with_map_ptr()
2009 verbose("unrecognized bpf_ld_imm64 insn\n"); in replace_map_fd_with_map_ptr()
2016 verbose("fd %d is not pointing to valid bpf_map\n", in replace_map_fd_with_map_ptr()
2138 verbose("bpf verifier is misconfigured\n"); in convert_ctx_accesses()