/linux-master/tools/testing/selftests/bpf/progs/ |
H A D | verifier_arena.c | 129 __failure __msg("expected pointer to STRUCT bpf_map") 139 __failure __msg("untrusted_ptr_bpf_map")
|
H A D | verifier_spill_fill.c | 87 __failure __msg("R0 pointer arithmetic on ringbuf_mem_or_null prohibited") 123 __failure __msg("R0 invalid mem access 'scalar'") 252 __failure __msg("math between pkt pointer and register with unbounded min value is not allowed") 278 __failure __msg("invalid access to packet") 310 __failure __msg("invalid access to packet") 387 __failure __msg("math between ctx pointer and 4294967295 is not allowed") 427 __failure __msg("dereference of modified ctx ptr R6 off=65535 disallowed") 467 __msg("fp-8=0m??scalar()") 468 __msg("fp-16=00mm??scalar()") 469 __msg("f [all...] |
H A D | verifier_spin_lock.c | 55 __failure __msg("cannot be accessed directly") 88 __failure __msg("cannot be accessed directly") 122 __failure __msg("cannot be accessed directly") 156 __failure __msg("calls are not allowed") 190 __failure __msg("unlock is missing") 224 __failure __msg("without taking a lock") 258 __failure __msg("calls are not allowed") 294 __failure __msg("unlock of different lock") 376 __failure __msg("inside bpf_spin_lock") 409 __failure __msg("bpf_spin_unloc [all...] |
H A D | verifier_iterating_callbacks.c | 45 __failure __msg("R1 type=scalar expected=fp") 62 __failure __msg("invalid access to map value, value_size=2 off=32 size=1") 97 __failure __msg("infinite loop detected") 125 __failure __msg("invalid access to map value, value_size=2 off=32 size=1") 140 __failure __msg("invalid access to map value, value_size=2 off=32 size=1") 155 __failure __msg("invalid access to map value, value_size=2 off=32 size=1") 182 __failure __msg("invalid access to map value, value_size=2 off=2 size=1")
|
H A D | verifier_loops1.c | 126 __failure __msg("program is too large") 142 __msg("the call stack of 8 frames is too deep !") 167 __failure __msg("loop detected") 180 __failure __msg("loop detected")
|
H A D | verifier_direct_packet_access.c | 81 __failure __msg("invalid bpf_context access off=76") 138 __failure __msg("invalid access to packet") 160 __failure __msg("invalid access to packet") 231 __failure __msg("invalid access to packet") 366 __failure __msg("R2 invalid mem access 'scalar'") 393 __failure __msg("R3 pointer arithmetic on pkt_end") 414 __failure __msg("misaligned packet access off 2+0+15+-4 size 4") 571 __failure __msg("invalid access to packet, off=0 size=8, R5(id=3,off=0,r=0)") 652 __failure __msg("invalid access to packet") 693 __failure __msg("invali [all...] |
H A D | verifier_global_ptr_args.c | 29 __msg("Validating subprog_trusted_task_nullable() func#1...") 30 __msg(": R1=trusted_ptr_or_null_task_struct(") 66 __msg("R1 type=scalar expected=ptr_, trusted_ptr_, rcu_ptr_") 67 __msg("Caller passes invalid args into func#1 ('subprog_trusted_task_nonnull')") 75 __msg("R1 type=ptr_or_null_ expected=ptr_, trusted_ptr_, rcu_ptr_") 76 __msg("Caller passes invalid args into func#1 ('subprog_trusted_task_nonnull')") 96 __msg("Validating subprog_trusted_task_nonnull() func#1...") 97 __msg(": R1=trusted_ptr_task_struct(") 120 __msg("Validating subprog_nullable_task_flavor() func#1...") 121 __msg(" [all...] |
H A D | verifier_global_subprogs.c | 43 __msg("('global_calls_good_only') is global and assumed valid.") 45 __msg("Validating global_good() func") 46 __msg("('global_good') is safe for any args that match its prototype") 59 __msg("('global_calls_bad') is global and assumed valid.") 61 __msg("Validating global_bad() func") 62 __msg("math between map_value pointer and register") /* BOOM */ 91 __msg("Func#1 ('global_unsupp') is global and assumed valid.") 92 __msg("Validating global_unsupp() func#1...") 93 __msg("value is outside of the allowed memory range") 110 __msg("invali [all...] |
H A D | test_global_func1.c | 51 __failure __msg("combined stack size of 3 calls is")
|
H A D | iters.c | 32 __failure __msg("math between map_value pointer and register with unbounded min value is not allowed") 52 __failure __msg("unbounded memory access") 536 __failure __msg("invalid mem access 'scalar'") 558 __failure __msg("invalid mem access 'map_value_or_null'") 580 __failure __msg("invalid mem access 'map_value_or_null'") 729 __msg("R1 type=scalar expected=fp") 800 __msg("math between fp pointer and register with unbounded") 879 __msg("math between fp pointer and register with unbounded") 1004 __msg("math between fp pointer and register with unbounded")
|
H A D | bpf_misc.h | 10 * - __success, __failure, __msg imply privileged mode; 23 * __msg Message expected to be found in the verifier log. 24 * Multiple __msg attributes could be specified. 25 * __msg_unpriv Same as __msg but for unprivileged mode. 61 #define __msg(msg) __attribute__((btf_decl_tag("comment:test_expect_msg=" msg))) macro
|
H A D | async_stack_depth.c | 33 __failure __msg("combined stack size of 2 calls is") 48 __failure __msg("combined stack size of 2 calls is")
|
H A D | verifier_value_illegal_alu.c | 24 __failure __msg("R0 bitwise operator &= on pointer") 48 __failure __msg("R0 32-bit pointer arithmetic prohibited") 72 __failure __msg("R0 pointer arithmetic with /= operator") 96 __failure __msg("invalid mem access 'scalar'") 121 __failure __msg("R0 invalid mem access 'scalar'") 151 __failure __msg("R7 pointer arithmetic on flow_keys prohibited")
|
H A D | verifier_subprog_precision.c | 43 __msg("7: (0f) r1 += r0") 44 __msg("mark_precise: frame0: regs=r0 stack= before 6: (bf) r1 = r7") 45 __msg("mark_precise: frame0: regs=r0 stack= before 5: (27) r0 *= 4") 46 __msg("mark_precise: frame0: regs=r0 stack= before 11: (95) exit") 47 __msg("mark_precise: frame1: regs=r0 stack= before 10: (bf) r0 = r1") 48 __msg("mark_precise: frame1: regs=r1 stack= before 4: (85) call pc+5") 49 __msg("mark_precise: frame0: regs=r1 stack= before 3: (bf) r1 = r6") 50 __msg("mark_precise: frame0: regs=r6 stack= before 2: (b7) r6 = 3") 81 __msg("9: (0f) r1 += r0") 82 __msg("mark_precis [all...] |
H A D | verifier_var_off.c | 17 __failure __msg("variable ctx access var_off=(0x0; 0x4)") 91 __log_level(4) __msg("stack depth 16") 131 __log_level(4) __msg("stack depth 16") 165 __msg("R2 invalid mem access 'scalar'") 206 __failure __msg("invalid unbounded variable-offset indirect access to stack R4") 239 __failure __msg("invalid variable-offset indirect access to stack R2") 272 __failure __msg("invalid variable-offset indirect access to stack R1") 297 __failure __msg("invalid variable-offset indirect access to stack R2")
|
H A D | verifier_stack_ptr.c | 40 __failure __msg("misaligned stack access off 0+-8+2 size 8") 56 __failure __msg("misaligned stack access off 0+-10+8 size 8") 72 __failure __msg("invalid write to stack R1 off=-79992 size=8") 88 __failure __msg("invalid write to stack R1 off=0 size=8") 150 __failure __msg("invalid write to stack R1 off=0 size=1") 166 __failure __msg("invalid write to stack R1") 184 __failure __msg("invalid write to stack") 203 __failure __msg("fp pointer offset") 255 __failure __msg("invalid write to stack R1 off=-513 size=1") 271 __failure __msg("mat [all...] |
H A D | verifier_int_ptr.c | 71 __failure __msg("misaligned stack access off 0+-20+0 size 8") 102 __failure __msg("invalid indirect access to stack R4 off=-4 size=8")
|
H A D | verifier_raw_stack.c | 28 __failure __msg("R4 min value is negative") 47 __failure __msg("R4 min value is negative") 67 __failure __msg("R4 invalid zero-sized read: u64=[0,0]") 153 __failure __msg("R0 invalid mem access 'scalar'") 176 __failure __msg("R3 invalid mem access 'scalar'") 239 __failure __msg("invalid indirect access to stack R3 off=-513 size=8") 258 __failure __msg("invalid indirect access to stack R3 off=-1 size=8") 277 __failure __msg("R4 min value is negative") 297 __msg("R4 unbounded memory access, use 'var &= const' or 'if (var < const)'") 317 __msg("R [all...] |
H A D | verifier_netfilter_retcode.c | 9 __failure __msg("R0 is not a known value") 42 __failure __msg("R0 has smin=2 smax=2 should have been in [0, 1]")
|
H A D | verifier_helper_value_access.c | 99 __failure __msg("R2 invalid zero-sized read: u64=[0,0]") 126 __failure __msg("R2 invalid zero-sized read: u64=[0,4]") 155 __failure __msg("invalid access to map value, value_size=48 off=0 size=56") 181 __failure __msg("R2 min value is negative") 261 __failure __msg("R2 invalid zero-sized read") 287 __failure __msg("invalid access to map value, value_size=48 off=4 size=52") 315 __failure __msg("R2 min value is negative") 342 __failure __msg("R2 min value is negative") 426 __failure __msg("R2 invalid zero-sized read") 452 __failure __msg("invali [all...] |
/linux-master/tools/perf/trace/beauty/include/linux/ |
H A D | socket.h | 165 static inline struct cmsghdr * cmsg_nxthdr (struct msghdr *__msg, struct cmsghdr *__cmsg) argument 167 return __cmsg_nxthdr(__msg->msg_control, __msg->msg_controllen, __cmsg);
|
/linux-master/include/linux/ |
H A D | socket.h | 165 static inline struct cmsghdr * cmsg_nxthdr (struct msghdr *__msg, struct cmsghdr *__cmsg) argument 167 return __cmsg_nxthdr(__msg->msg_control, __msg->msg_controllen, __cmsg);
|
H A D | netlink.h | 99 static const char __msg[] = msg; \ 102 do_trace_netlink_extack(__msg); \ 105 __extack->_msg = __msg; \ 153 static const char __msg[] = msg; \ 156 do_trace_netlink_extack(__msg); \ 159 __extack->_msg = __msg; \
|
/linux-master/drivers/scsi/bfa/ |
H A D | bfa_fcpim.h | 379 #define bfa_iocfc_map_msg_to_qid(__msg, __qid) \ 380 *(__qid) = (u8)((__msg) & (BFI_IOC_MAX_CQS - 1));
|
/linux-master/sound/soc/intel/avs/ |
H A D | messages.h | 256 union avs_reply_msg __msg = AVS_MSG(hdr); \ 257 __msg.msg_direction == AVS_MSG_REPLY && \ 258 __msg.global_msg_type != AVS_GLB_NOTIFICATION; \
|