WARNING: line length of 90 exceeds 80 columns #197: FILE: kernel/bpf/verifier.c:5760: + verbose(env, "write into map forbidden, value_size=%d off=%lld size=%d\n", WARNING: line length of 89 exceeds 80 columns #205: FILE: kernel/bpf/verifier.c:5766: + verbose(env, "read from map forbidden, value_size=%d off=%lld size=%d\n", WARNING: line length of 81 exceeds 80 columns #231: FILE: kernel/bpf/verifier.c:5885: + reg_type_str(env, reg->type), regno, reg->var_off.value); WARNING: line length of 88 exceeds 80 columns #242: FILE: kernel/bpf/verifier.c:5890: + verbose(env, "dereference of modified %s ptr R%d off=%lld disallowed\n", WARNING: line length of 81 exceeds 80 columns #243: FILE: kernel/bpf/verifier.c:5891: + reg_type_str(env, reg->type), regno, reg->var_off.value); WARNING: line length of 86 exceeds 80 columns #272: FILE: kernel/bpf/verifier.c:5952: + * val->bar = &v->br; // reg->var_off is still zero, but we need to retry with WARNING: line length of 87 exceeds 80 columns #275: FILE: kernel/bpf/verifier.c:5954: + * val->baz = &v->bz; // reg->var_off is non-zero, so struct needs to be walked WARNING: line length of 84 exceeds 80 columns #279: FILE: kernel/bpf/verifier.c:5957: + * In the kptr_ref case, check_func_arg_reg_off already ensures reg->var_off WARNING: line length of 87 exceeds 80 columns #286: FILE: kernel/bpf/verifier.c:5963: + if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, reg->var_off.value, WARNING: line length of 92 exceeds 80 columns #316: FILE: kernel/bpf/verifier.c:6277: + err = check_mem_region_access(env, regno, off, size, reg->range, zero_size_allowed); WARNING: line length of 83 exceeds 80 columns #482: FILE: kernel/bpf/verifier.c:8278: + if (check_map_access_type(env, regno, 0, access_size, access_type)) WARNING: line length of 83 exceeds 80 columns #570: FILE: kernel/bpf/verifier.c:9463: + if (!btf_struct_ids_match(&env->log, reg->btf, reg->btf_id, WARNING: line length of 95 exceeds 80 columns #571: FILE: kernel/bpf/verifier.c:9464: + reg->var_off.value, btf_vmlinux, *arg_btf_id, WARNING: line length of 94 exceeds 80 columns #655: FILE: kernel/bpf/verifier.c:12746: + struct_same = btf_struct_ids_match(&env->log, reg_btf, reg_ref_id, reg->var_off.value, WARNING: line length of 81 exceeds 80 columns #656: FILE: kernel/bpf/verifier.c:12747: + meta->btf, ref_id, strict_type_match); WARNING: line length of 85 exceeds 80 columns #716: FILE: kernel/bpf/verifier.c:14489: + ptr_limit = mask_to_left ? ptr_reg->smin_value : ptr_reg->umax_value; WARNING: line length of 82 exceeds 80 columns #735: FILE: kernel/bpf/verifier.c:14760: + dst_reg->var_off.value)) WARNING: line length of 85 exceeds 80 columns #839: FILE: kernel/bpf/verifier.c:16553: + * dst_reg->umax_value is known < MAX_PACKET_OFF, therefore it fits in a u16. WARNING: line length of 89 exceeds 80 columns #926: FILE: kernel/bpf/verifier.c:19814: + range_within(rold, rcur) && tnum_in(rold->var_off, rcur->var_off); WARNING: line length of 81 exceeds 80 columns #935: FILE: kernel/bpf/verifier.c:20427: + spi = __get_spi(iter_reg->var_off.value); CHECK: No space is necessary after a cast #952: FILE: kernel/bpf/verifier.c:20837: + if (min_index > (u64) U32_MAX * size) { WARNING: line length of 100 exceeds 80 columns #953: FILE: kernel/bpf/verifier.c:20838: + verbose(env, "the sum of R%u umin_value %llu is too big\n", regno, reg->umin_value); CHECK: No space is necessary after a cast #960: FILE: kernel/bpf/verifier.c:20841: + if (max_index > (u64) U32_MAX * size) { WARNING: line length of 100 exceeds 80 columns #961: FILE: kernel/bpf/verifier.c:20842: + verbose(env, "the sum of R%u umax_value %llu is too big\n", regno, reg->umax_value); WARNING: line length of 99 exceeds 80 columns #974: FILE: tools/testing/selftests/bpf/prog_tests/linked_list.c:90: + { "incorrect_node_var_off", "variable ptr_ access var_off=(0x0; 0x1ffffffff) disallowed" }, WARNING: line length of 100 exceeds 80 columns #980: FILE: tools/testing/selftests/bpf/prog_tests/linked_list.c:95: + { "incorrect_head_var_off2", "variable ptr_ access var_off=(0x0; 0x1ffffffff) disallowed" }, WARNING: line length of 103 exceeds 80 columns #1037: FILE: tools/testing/selftests/bpf/progs/mem_rdonly_untrusted.c:11: +__msg("r8 = *(u64 *)(r7 +0) ; R7=ptr_nameidata(imm={{[0-9]+}}) R8=rdonly_untrusted_mem(sz=0)") WARNING: line length of 91 exceeds 80 columns #1081: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:257: +__msg("15: {{.*}} R4={{[^)]*}}var_off=(0x2; 0x7fc){{.*}} R5={{[^)]*}}var_off=(0x2; 0x7fc)") WARNING: line length of 91 exceeds 80 columns #1098: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:276: +__msg("24: {{.*}} R4={{[^)]*}}var_off=(0x2; 0x7fc){{.*}} R5={{[^)]*}}var_off=(0x2; 0x7fc)") WARNING: line length of 91 exceeds 80 columns #1109: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:285: +__msg("28: {{.*}} R4={{[^)]*}}var_off=(0x2; 0x7fc){{.*}} R5={{[^)]*}}var_off=(0x2; 0x7fc)") WARNING: line length of 91 exceeds 80 columns #1118: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:292: +__msg("31: {{.*}} R4={{[^)]*}}var_off=(0x2; 0xffc){{.*}} R5={{[^)]*}}var_off=(0x2; 0xffc)") WARNING: line length of 91 exceeds 80 columns #1126: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:299: +__msg("35: {{.*}} R4={{[^)]*}}var_off=(0x2; 0xffc){{.*}} R5={{[^)]*}}var_off=(0x2; 0xffc)") WARNING: line length of 117 exceeds 80 columns #1144: FILE: tools/testing/selftests/bpf/progs/verifier_align.c:433: +__msg("11: {{.*}} R4={{[^)]*}}var_off=(0x2; 0x7ffffffffffffffc){{.*}} R6={{[^)]*}}var_off=(0x2; 0x7ffffffffffffffc)") WARNING: line length of 97 exceeds 80 columns #1674: FILE: tools/testing/selftests/bpf/verifier/calls.c:223: + .errstr = "R1 must have zero offset when passed to release func or trusted arg to kfunc", total: 0 errors, 32 warnings, 2 checks, 1362 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 485c630b9529 ("bpf: use reg->var_off instead of reg->off for pointers") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 32 warnings, 2 checks, 1362 lines checked