verifier_bug_if
if (verifier_bug_if(subprog < 0, env, "target of func call at insn %d is not a program",
if (verifier_bug_if(!can_skip_alu_sanitation(env, insn)
verifier_bug_if((int)br < 0, env, "%s:branches_to_explore=%d", __func__, br);
verifier_bug_if(new->branches != 1, env,
if (verifier_bug_if(!map, env, "R%d has an empty map pointer", insn->dst_reg))
if (verifier_bug_if(map->map_type != BPF_MAP_TYPE_INSN_ARRAY, env,
if (verifier_bug_if((BPF_CLASS(insn->code) == BPF_JMP ||
if (verifier_bug_if(load_reg == -1, env,
if (verifier_bug_if(subprog < 0, env, "No program to jit at insn %d",
verifier_bug_if((env->cur_hist_ent->flags & insn_flags) &&
verifier_bug_if(env->cur_hist_ent->linked_regs != 0, env,
verifier_bug_if(idx + 1 != subseq_idx, env,
if (verifier_bug_if(i >= func->allocated_stack / BPF_REG_SIZE,
if (verifier_bug_if(sidx < 0, env, "callee not found at insn %d", next_insn))
if (verifier_bug_if(subprog < 0, env, "get stack depth: no program at insn %d", start))