WARNING: line length of 90 exceeds 80 columns #201: FILE: kernel/bpf/verifier.c:5760: + verbose(env, "write into map forbidden, value_size=%d off=%lld size=%d\n", WARNING: line length of 89 exceeds 80 columns #209: FILE: kernel/bpf/verifier.c:5766: + verbose(env, "read from map forbidden, value_size=%d off=%lld size=%d\n", WARNING: line length of 81 exceeds 80 columns #235: FILE: kernel/bpf/verifier.c:5885: + reg_type_str(env, reg->type), regno, reg->var_off.value); WARNING: line length of 88 exceeds 80 columns #246: FILE: kernel/bpf/verifier.c:5890: + verbose(env, "dereference of modified %s ptr R%d off=%lld disallowed\n", WARNING: line length of 81 exceeds 80 columns #247: FILE: kernel/bpf/verifier.c:5891: + reg_type_str(env, reg->type), regno, reg->var_off.value); WARNING: line length of 86 exceeds 80 columns #276: FILE: kernel/bpf/verifier.c:5952: + * val->bar = &v->br; // reg->var_off is still zero, but we need to retry with WARNING: line length of 87 exceeds 80 columns #279: FILE: kernel/bpf/verifier.c:5954: + * val->baz = &v->bz; // reg->var_off is non-zero, so struct needs to be walked WARNING: line length of 84 exceeds 80 columns #283: FILE: kernel/bpf/verifier.c:5957: + * In the kptr_ref case, check_func_arg_reg_off already ensures reg->var_off WARNING: line length of 87 exceeds 80 columns #290: FILE: kernel/bpf/verifier.c:5963: + if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->var_off.value, WARNING: line length of 92 exceeds 80 columns #320: FILE: kernel/bpf/verifier.c:6277: + err = check_mem_region_access(env, regno, off, size, reg->range, zero_size_allowed); WARNING: line length of 83 exceeds 80 columns #486: FILE: kernel/bpf/verifier.c:8278: + if (check_map_access_type(env, regno, 0, access_size, access_type)) WARNING: line length of 103 exceeds 80 columns #573: FILE: kernel/bpf/verifier.c:9463: + if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->var_off.value, WARNING: line length of 102 exceeds 80 columns #631: FILE: kernel/bpf/verifier.c:11059: + field = reg_find_field_offset(&caller->regs[BPF_REG_1], caller->regs[BPF_REG_1].var_off.value, WARNING: line length of 133 exceeds 80 columns #656: FILE: kernel/bpf/verifier.c:12745: + struct_same = btf_struct_ids_match(&env->log, reg_btf, reg_ref_id, reg->var_off.value, meta->btf, ref_id, strict_type_match); WARNING: line length of 85 exceeds 80 columns #716: FILE: kernel/bpf/verifier.c:14487: + ptr_limit = mask_to_left ? ptr_reg->smin_value : ptr_reg->umax_value; WARNING: line length of 82 exceeds 80 columns #735: FILE: kernel/bpf/verifier.c:14758: + dst_reg->var_off.value)) WARNING: line length of 85 exceeds 80 columns #839: FILE: kernel/bpf/verifier.c:16551: + * dst_reg->umax_value is known < MAX_PACKET_OFF, therefore it fits in a u16. WARNING: line length of 89 exceeds 80 columns #920: FILE: kernel/bpf/verifier.c:19801: + range_within(rold, rcur) && tnum_in(rold->var_off, rcur->var_off); WARNING: line length of 81 exceeds 80 columns #929: FILE: kernel/bpf/verifier.c:20414: + spi = __get_spi(iter_reg->var_off.value); CHECK: No space is necessary after a cast #946: FILE: kernel/bpf/verifier.c:20824: + if (min_index > (u64) U32_MAX * size) { WARNING: line length of 100 exceeds 80 columns #947: FILE: kernel/bpf/verifier.c:20825: + verbose(env, "the sum of R%u umin_value %llu is too big\n", regno, reg->umin_value); CHECK: No space is necessary after a cast #954: FILE: kernel/bpf/verifier.c:20828: + if (max_index > (u64) U32_MAX * size) { WARNING: line length of 100 exceeds 80 columns #955: FILE: kernel/bpf/verifier.c:20829: + verbose(env, "the sum of R%u umax_value %llu is too big\n", regno, reg->umax_value); WARNING: line length of 99 exceeds 80 columns #968: FILE: tools/testing/selftests/bpf/prog_tests/linked_list.c:90: + { "incorrect_node_var_off", "variable ptr_ access var_off=(0x0; 0x1ffffffff) disallowed" }, WARNING: line length of 100 exceeds 80 columns #974: FILE: tools/testing/selftests/bpf/prog_tests/linked_list.c:95: + { "incorrect_head_var_off2", "variable ptr_ access var_off=(0x0; 0x1ffffffff) disallowed" }, WARNING: line length of 103 exceeds 80 columns #1031: FILE: tools/testing/selftests/bpf/progs/mem_rdonly_untrusted.c:11: +__msg("r8 = *(u64 *)(r7 +0) ; R7=ptr_nameidata(imm={{[0-9]+}}) R8=rdonly_untrusted_mem(sz=0)") WARNING: line length of 91 exceeds 80 columns #1075: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:257: +__msg("15: {{.*}} R4={{[^)]*}}var_off=(0x2; 0x7fc){{.*}} R5={{[^)]*}}var_off=(0x2; 0x7fc)") WARNING: line length of 91 exceeds 80 columns #1092: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:276: +__msg("24: {{.*}} R4={{[^)]*}}var_off=(0x2; 0x7fc){{.*}} R5={{[^)]*}}var_off=(0x2; 0x7fc)") WARNING: line length of 91 exceeds 80 columns #1103: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:285: +__msg("28: {{.*}} R4={{[^)]*}}var_off=(0x2; 0x7fc){{.*}} R5={{[^)]*}}var_off=(0x2; 0x7fc)") WARNING: line length of 91 exceeds 80 columns #1112: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:292: +__msg("31: {{.*}} R4={{[^)]*}}var_off=(0x2; 0xffc){{.*}} R5={{[^)]*}}var_off=(0x2; 0xffc)") WARNING: line length of 91 exceeds 80 columns #1120: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:299: +__msg("35: {{.*}} R4={{[^)]*}}var_off=(0x2; 0xffc){{.*}} R5={{[^)]*}}var_off=(0x2; 0xffc)") WARNING: line length of 117 exceeds 80 columns #1138: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:433: +__msg("11: {{.*}} R4={{[^)]*}}var_off=(0x2; 0x7ffffffffffffffc){{.*}} R6={{[^)]*}}var_off=(0x2; 0x7ffffffffffffffc)") WARNING: line length of 97 exceeds 80 columns #1668: FILE: tools/testing/selftests/bpf/verifier/calls.c:223: + .errstr = "R1 must have zero offset when passed to release func or trusted arg to kfunc", total: 0 errors, 31 warnings, 2 checks, 1352 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 8818ffcc89b6 ("bpf: use reg->var_off instead of reg->off for pointers") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 31 warnings, 2 checks, 1352 lines checked