Lines Matching refs:errstr
32 const char *errstr; member
63 .errstr = "unreachable",
73 .errstr = "unreachable",
82 .errstr = "jump out of range",
91 .errstr = "jump out of range",
105 .errstr = "invalid BPF_LD_IMM insn",
119 .errstr = "invalid BPF_LD_IMM insn",
134 .errstr = "invalid bpf_ld_imm64 insn",
143 .errstr = "invalid bpf_ld_imm64 insn",
151 .errstr = "invalid bpf_ld_imm64 insn",
159 .errstr = "jump out of range",
168 .errstr = "back-edge",
180 .errstr = "back-edge",
192 .errstr = "back-edge",
201 .errstr = "R2 !read_ok",
210 .errstr = "R15 is invalid",
219 .errstr = "R0 !read_ok",
230 .errstr = "R0 !read_ok",
240 .errstr = "invalid stack",
249 .errstr = "BPF_CALL uses reserved",
258 .errstr = "BPF_CALL uses reserved",
267 .errstr = "invalid func 1234567",
280 .errstr = "invalid indirect read from stack",
290 .errstr = "invalid read from stack",
326 .errstr = "corrupted spill",
335 .errstr = "R15 is invalid",
344 .errstr = "R14 is invalid",
353 .errstr = "R14 is invalid",
362 .errstr = "R12 is invalid",
371 .errstr = "R11 is invalid",
380 .errstr = "invalid BPF_LD_IMM",
389 .errstr = "BPF_LDX uses reserved fields",
398 .errstr = "invalid BPF_ALU opcode f0",
407 .errstr = "invalid BPF_ALU opcode f0",
416 .errstr = "BPF_ALU uses reserved fields",
426 .errstr = "misaligned access",
439 .errstr = "fd 0 is not pointing to valid bpf_map",
454 .errstr = "R0 invalid mem access 'map_value_or_null'",
470 .errstr = "misaligned access",
488 .errstr = "R0 invalid mem access",
705 .errstr = "invalid bpf_context access",
725 .errstr = "different pointers",
747 .errstr = "different pointers",
770 .errstr = "different pointers",
781 .errstr = "invalid bpf_context access",
792 .errstr = "invalid bpf_context access",
803 .errstr = "invalid bpf_context access",
814 .errstr = "invalid bpf_context access",
881 .errstr = "misaligned access off -6 size 8",
893 .errstr = "misaligned access off -2 size 8",
905 .errstr = "invalid stack off=-79992 size=8",
917 .errstr = "invalid stack off=0 size=8",
1030 .errstr = "invalid indirect read from stack off -8+0 size 8",
1065 .errstr = "invalid size",
1077 .errstr = "invalid bpf_context access",
1143 .errstr = "frame pointer is read only",
1265 expected_errstr = tests[i].errstr; in test()