Searched refs:__msg (Results 76 - 100 of 114) sorted by relevance
12345
/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | rbtree_fail.c | 32 __failure __msg("bpf_spin_lock at off=16 must be held for bpf_rb_root") 46 __failure __msg("bpf_spin_lock at off=16 must be held for bpf_rb_root") 64 __failure __msg("bpf_spin_lock at off=16 must be held for bpf_rb_root") 72 __failure __msg("rbtree_remove node input must be non-owning ref") 108 __failure __msg("Unreleased reference id=3 alloc_insn=10") 136 __failure __msg("arg#1 expected pointer to allocated object") 155 __failure __msg("dereference of modified ptr_or_null_ ptr R2 off=16 disallowed") 181 __failure __msg("rbtree_remove node input must be non-owning ref") 205 __failure __msg("rbtree_remove node input must be non-owning ref") 283 __failure __msg("ar [all...] |
H A D | verifier_map_ptr.c | 36 __failure __msg("R1 is bpf_array invalid negative access: off=-8") 54 __failure __msg("only read from bpf_array is supported") 76 __msg("cannot access ptr member ops with moff 0 in struct bpf_map with off 1 size 4")
|
H A D | verifier_kfunc_prog_types.c | 35 __failure __msg("calling kernel function") 73 __failure __msg("calling kernel function") 109 __failure __msg("calling kernel function")
|
H A D | verifier_meta_access.c | 30 __failure __msg("invalid access to packet, off=-8") 52 __failure __msg("invalid access to packet") 72 __failure __msg("invalid access to packet") 94 __failure __msg("R3 !read_ok") 117 __failure __msg("invalid access to packet") 181 __failure __msg("invalid access to packet") 202 __failure __msg("invalid access to packet")
|
H A D | verifier_sock.c | 55 __failure __msg("invalid mem access 'sock_common_or_null'") 90 __failure __msg("invalid sock_common access") 110 __failure __msg("type=sock_common_or_null expected=sock_common") 127 __failure __msg("invalid mem access 'sock_or_null'") 268 __failure __msg("invalid sock access") 319 __failure __msg("invalid sock access") 344 __failure __msg("invalid sock access") 441 __failure __msg("invalid sock access") 466 __failure __msg("type=sock_common_or_null expected=sock_common") 483 __failure __msg("invali [all...] |
H A D | verifier_xdp_direct_packet_access.c | 10 __failure __msg("R3 pointer arithmetic on pkt_end") 31 __failure __msg("R3 pointer arithmetic on pkt_end") 72 __failure __msg("R1 offset is outside of the packet") 93 __failure __msg("R1 offset is outside of the packet") 134 __failure __msg("R1 offset is outside of the packet") 176 __failure __msg("R1 offset is outside of the packet") 198 __failure __msg("R1 offset is outside of the packet") 282 __failure __msg("R1 offset is outside of the packet") 304 __failure __msg("R1 offset is outside of the packet") 387 __failure __msg("R [all...] |
H A D | verifier_array_access.c | 153 __failure __msg("invalid access to map value, value_size=48 off=48 size=8") 178 __failure __msg("R0 min value is outside of the allowed memory range") 208 __msg("R0 unbounded memory access, make sure to bounds check any such access") 236 __failure __msg("R0 unbounded memory access") 268 __failure __msg("invalid access to map value, value_size=48 off=44 size=8") 300 __failure __msg("R0 pointer += pointer") 382 __failure __msg("write into map forbidden") 405 __failure __msg("write into map forbidden") 482 __failure __msg("read from map forbidden") 504 __failure __msg("rea [all...] |
H A D | verifier_helper_access_var_len.c | 103 __failure __msg("invalid indirect access to stack R1 off=-64 size=65") 190 __failure __msg("invalid indirect access to stack R1 off=-64 size=65") 214 __failure __msg("invalid indirect access to stack R1 off=-64 size=65") 239 __msg("R2 min value is negative, either use unsigned or 'var &= const'") 297 __failure __msg("R2 min value is negative") 350 __failure __msg("invalid access to map value, value_size=48 off=0 size=49") 417 __failure __msg("R1 min value is outside of the allowed memory range") 469 __failure __msg("R1 type=scalar expected=fp") 624 __failure __msg("R1 type=scalar expected=fp") 640 __failure __msg("R [all...] |
H A D | test_global_func6.c | 29 __failure __msg("modified ctx ptr R2")
|
H A D | test_global_func5.c | 29 __failure __msg("expects pointer to ctx")
|
H A D | refcounted_kptr_fail.c | 35 __failure __msg("Unreleased reference id=4 alloc_insn=21") 57 __failure __msg("Possibly NULL pointer passed to trusted arg0") 76 __failure __msg("Unreleased reference id=3 alloc_insn=9") 97 __failure __msg("function calls are not allowed while holding a lock")
|
H A D | jeq_infer_not_null_fail.c | 21 __failure __msg("R8 invalid mem access 'map_value_or_null")
|
H A D | verifier_direct_packet_access.c | 81 __failure __msg("invalid bpf_context access off=76") 138 __failure __msg("invalid access to packet") 160 __failure __msg("invalid access to packet") 231 __failure __msg("invalid access to packet") 366 __failure __msg("R2 invalid mem access 'scalar'") 393 __failure __msg("R3 pointer arithmetic on pkt_end") 414 __failure __msg("misaligned packet access off 2+0+15+-4 size 4") 571 __failure __msg("invalid access to packet, off=0 size=8, R5(id=3,off=0,r=0)") 652 __failure __msg("invalid access to packet") 693 __failure __msg("invali [all...] |
H A D | test_kfunc_dynptr_param.c | 38 __failure __msg("cannot pass in dynptr at an offset=-8") 48 __failure __msg("arg#0 expected pointer to stack or dynptr_ptr")
|
H A D | verifier_jeq_infer_not_null.c | 66 __failure __msg("R7 invalid mem access 'sock_or_null'") 140 __failure __msg("R7 invalid mem access 'sock_or_null'")
|
H A D | local_kptr_stash_fail.c | 43 __failure __msg("invalid kptr access, R2 type=ptr_node_data2 expected=ptr_node_data") 66 __failure __msg("R1 must have zero offset when passed to release func")
|
H A D | async_stack_depth.c | 33 __failure __msg("combined stack size of 2 calls is") 48 __failure __msg("combined stack size of 2 calls is")
|
H A D | verifier_iterating_callbacks.c | 45 __failure __msg("R1 type=scalar expected=fp") 62 __failure __msg("invalid access to map value, value_size=2 off=32 size=1") 97 __failure __msg("infinite loop detected") 125 __failure __msg("invalid access to map value, value_size=2 off=32 size=1") 140 __failure __msg("invalid access to map value, value_size=2 off=32 size=1") 155 __failure __msg("invalid access to map value, value_size=2 off=32 size=1") 182 __failure __msg("invalid access to map value, value_size=2 off=2 size=1")
|
H A D | verifier_ctx_sk_msg.c | 126 __failure __msg("invalid bpf_context access") 140 __failure __msg("invalid bpf_context access") 153 __failure __msg("invalid bpf_context access")
|
H A D | verifier_regalloc.c | 54 __failure __msg("invalid access to map value, value_size=48 off=48 size=1") 115 __failure __msg("invalid access to map value, value_size=48 off=44 size=8") 182 __failure __msg("invalid access to map value, value_size=48 off=48 size=8")
|
H A D | test_global_func3.c | 57 __failure __msg("the call stack of 8 frames")
|
H A D | verifier_cgroup_skb.c | 137 __failure __msg("invalid bpf_context access") 152 __failure __msg("invalid bpf_context access") 167 __failure __msg("invalid bpf_context access") 182 __failure __msg("invalid bpf_context access")
|
H A D | test_global_func1.c | 51 __failure __msg("combined stack size of 3 calls is")
|
H A D | crypto_basic.c | 39 __failure __msg("Unreleased reference")
|
H A D | verifier_value_ptr_arith.c | 672 __failure __msg("R0 min value is outside of the allowed memory range") 804 __failure __msg("invalid access to map value") 829 __failure __msg("invalid access to map value") 1038 __failure __msg("R1 max value is outside of the allowed memory range") 1147 __failure __msg("R0 pointer += pointer prohibited") 1171 __failure __msg("R1 tried to subtract pointer from scalar") 1196 __failure __msg("R0 min value is outside of the allowed memory range") 1247 __failure __msg("R1 tried to subtract pointer from scalar") 1273 __failure __msg("R0 min value is negative") 1330 __failure __msg("R [all...] |
Completed in 195 milliseconds
12345