/linux-master/tools/testing/selftests/bpf/verifier/ |
H A D | basic.c | 5 .errstr = "last insn is not an exit or jmp", 13 .errstr = "R0 !read_ok", 21 .errstr = "not an exit",
|
H A D | basic_stx_ldx.c | 7 .errstr = "R15 is invalid", 16 .errstr = "R14 is invalid", 25 .errstr = "R14 is invalid", 34 .errstr = "R12 is invalid", 43 .errstr = "R11 is invalid",
|
H A D | junk_insn.c | 7 .errstr = "unknown opcode 00", 16 .errstr = "BPF_LDX uses reserved fields", 25 .errstr = "unknown opcode ff", 34 .errstr = "unknown opcode ff", 43 .errstr = "BPF_ALU uses reserved fields",
|
H A D | basic_call.c | 7 .errstr = "unknown opcode 8d", 16 .errstr = "BPF_CALL uses reserved", 25 .errstr = "invalid func unknown#1234567", 35 .errstr = "R1 !read_ok",
|
H A D | ld_imm64.c | 12 .errstr = "jump into the middle of ldimm64 insn 1", 26 .errstr = "jump into the middle of ldimm64 insn 1", 41 .errstr = "invalid bpf_ld_imm64 insn", 50 .errstr = "invalid bpf_ld_imm64 insn", 79 .errstr = "uses reserved fields", 89 .errstr = "invalid bpf_ld_imm64 insn", 99 .errstr = "invalid bpf_ld_imm64 insn", 109 .errstr = "invalid bpf_ld_imm64 insn", 120 .errstr = "not pointing to valid bpf_map", 131 .errstr [all...] |
H A D | direct_value_access.c | 71 .errstr = "R1 min value is outside of the allowed memory range", 84 .errstr = "direct value offset of 4294967295 is not allowed", 108 .errstr = "invalid access to map value pointer", 132 .errstr = "invalid access to map value pointer", 144 .errstr = "direct value offset of 536870912 is not allowed", 156 .errstr = "invalid access to map value pointer, value_size=48 off=536870911", 198 .errstr = "invalid access to map value, value_size=48 off=47 size=2", 213 .errstr = "invalid access to map value, value_size=48 off=47 size=2", 226 .errstr = "R1 min value is outside of the allowed memory range", 250 .errstr [all...] |
H A D | atomic_fetch_add.c | 55 .errstr = "frame pointer is read only", 69 .errstr = "!read_ok", 82 .errstr = "!read_ok", 105 .errstr = "only read is supported",
|
H A D | atomic_invalid.c | 12 .errstr = "R1 invalid mem access 'scalar'" \
|
H A D | ctx_skb.c | 38 .errstr = "invalid bpf_context access", 58 .errstr = "different pointers", 80 .errstr = "different pointers", 103 .errstr = "different pointers", 114 .errstr = "invalid bpf_context access", 124 .errstr = "invalid bpf_context access", 134 .errstr = "invalid bpf_context access", 144 .errstr = "invalid bpf_context access", 154 .errstr = "invalid bpf_context access", 164 .errstr [all...] |
H A D | map_kptr.c | 20 .errstr = "BPF_ST imm must be 0 when storing to kptr at off=0", 40 .errstr = "kptr access size must be BPF_DW", 70 .errstr = "kptr access cannot have variable offset", 103 .errstr = "R1 doesn't have constant offset. kptr has to be at the constant offset", 124 .errstr = "kptr access misaligned expected=0 off=7", 154 .errstr = "variable untrusted_ptr_ access var_off=(0x0; 0x7) disallowed", 179 .errstr = "invalid kptr access, R1 type=untrusted_ptr_prog_test_ref_kfunc expected=ptr_prog_test", 200 .errstr = "R0 invalid mem access 'untrusted_ptr_or_null_'", 223 .errstr = "access beyond struct prog_test_ref_kfunc at off 32 size 8", 247 .errstr [all...] |
H A D | wide_access.c | 13 .errstr = err, \ 55 .errstr = err, \
|
H A D | precise.c | 40 .errstr = 100 .errstr = 139 .errstr = "!read_ok", 156 .errstr = "mark_precise: frame0: last_idx 5 first_idx 5\ 185 .errstr = "mark_precise: frame0: last_idx 7 first_idx 7\ 226 .errstr = "invalid access to memory, mem_size=1 off=42 size=8", 263 .errstr = "register with unbounded min value is not allowed",
|
H A D | ctx_sk_lookup.c | 271 .errstr = "invalid bpf_context access", 284 .errstr = "invalid bpf_context access", 298 .errstr = "invalid bpf_context access", 311 .errstr = "invalid bpf_context access", 325 .errstr = "invalid bpf_context access", 339 .errstr = "invalid bpf_context access", 352 .errstr = "invalid bpf_context access", 366 .errstr = "invalid bpf_context access", 380 .errstr = "invalid bpf_context access", 395 .errstr [all...] |
H A D | calls.c | 10 .errstr = "invalid kernel function call not eliminated in verifier pass", 34 .errstr = "arg#0 pointer type STRUCT prog_test_fail1 must point to scalar", 49 .errstr = "max struct nesting depth exceeded\narg#0 pointer type STRUCT prog_test_fail2", 64 .errstr = "arg#0 pointer type STRUCT prog_test_fail3 must point to scalar", 79 .errstr = "R1 must have zero offset when passed to release func or trusted arg to kfunc", 94 .errstr = "arg#0 pointer type UNKNOWN must point to scalar", 112 .errstr = "Possibly NULL pointer passed to trusted arg0", 135 .errstr = "R1 must have zero offset when passed to release func", 155 .errstr = "kernel function bpf_kfunc_call_memb1_release args#0 expected pointer", 188 .errstr [all...] |
H A D | jset.c | 101 .errstr = "!read_ok", 116 .errstr = "!read_ok", 130 .errstr = "!read_ok",
|
H A D | ld_abs.c | 10 .errstr = "R1 !read_ok", 22 .errstr = "R2 !read_ok", 34 .errstr = "R3 !read_ok", 46 .errstr = "R4 !read_ok", 58 .errstr = "R5 !read_ok", 105 .errstr = "unknown opcode", 117 .errstr = "unknown opcode",
|
H A D | atomic_cmpxchg.c | 84 .errstr = "!read_ok", 190 .errstr = "invalid size of register fill", 232 .errstr = "R0 invalid mem access",
|
H A D | sleepable.c | 88 .errstr = "Only fentry/fexit/fmod_ret, lsm, iter, uprobe, and struct_ops programs can be sleepable",
|
H A D | bpf_st_mem.c | 96 .errstr = "0: (7a) *(u64 *)(r10 -8) = -44 ; R10=fp0 fp-8_w=-44\
|
/linux-master/fs/bcachefs/ |
H A D | errcode.c | 24 const char *errstr; local 31 errstr = bch2_errcode_strs[err - BCH_ERR_START]; 33 errstr = errname(err); 35 errstr = "(No error)"; 36 return errstr ?: "(Invalid error)";
|
/linux-master/fs/btrfs/ |
H A D | messages.c | 75 char *errstr = "unknown"; local 79 errstr = "No such entry"; 82 errstr = "IO failure"; 85 errstr = "Out of memory"; 88 errstr = "Object already exists"; 91 errstr = "No space left"; 94 errstr = "Readonly filesystem"; 97 errstr = "Operation not supported"; 100 errstr = "Filesystem corrupted"; 103 errstr 121 const char *errstr; local 292 const char *errstr; local [all...] |
/linux-master/drivers/s390/cio/ |
H A D | vfio_ccw_trace.h | 107 TP_PROTO(int fctl, struct subchannel_id schid, int errno, char *errstr), 108 TP_ARGS(fctl, schid, errno, errstr), 116 __field(char*, errstr) 125 __entry->errstr = errstr; 134 __entry->errstr)
|
H A D | vfio_ccw_fsm.c | 249 char *errstr = "request"; local 265 errstr = "transport mode"; 275 errstr = "cp init"; 286 errstr = "cp prefetch"; 299 errstr = "cp fsm_io_helper"; 325 io_region->ret_code, errstr);
|
/linux-master/net/9p/ |
H A D | error.c | 199 * @errstr: error string 204 int p9_errstr2errno(char *errstr, int len) argument 212 bucket = jhash(errstr, len, 0) % ERRHASHSZ; 214 if (c->namelen == len && !memcmp(c->name, errstr, len)) { 222 errstr[len] = 0; 224 __func__, errstr);
|
/linux-master/tools/lib/bpf/ |
H A D | skel_internal.h | 66 const char *errstr; member in struct:bpf_load_and_run_opts 318 opts->errstr = "failed to create loader map"; 325 opts->errstr = "failed to update loader map"; 343 opts->errstr = "failed to load loader prog"; 354 opts->errstr = "failed to execute loader prog";
|