WARNING: line length of 92 exceeds 80 columns #57: FILE: net/bpf/test_run.c:572: +noinline int bpf_fentry_test11_pptr_nullable(struct bpf_fentry_test_pptr_t **pptr__nullable) WARNING: Use of volatile is usually wrong: see Documentation/process/volatile-considered-harmful.rst #81: FILE: net/bpf/test_run.c:596: +noinline void ***bpf_fentry_test14_ppptr(void **volatile *const ppptr) WARNING: Missing a blank line after declarations #228: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:13: + int err, prog_fd; + LIBBPF_OPTS(bpf_test_run_opts, topts); WARNING: line length of 83 exceeds 80 columns #231: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:16: + if (!ASSERT_OK_PTR(skel, "fentry_fexit_pptr_nullable_test__open_and_load")) WARNING: line length of 85 exceeds 80 columns #246: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:31: + ASSERT_EQ(skel->bss->fentry_ptr_field_value, 1979, "fentry_ptr_field_value"); WARNING: line length of 83 exceeds 80 columns #250: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:35: + ASSERT_EQ(skel->bss->fexit_ptr_field_value, 1979, "fexit_ptr_field_value"); WARNING: Missing a blank line after declarations #261: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:46: + int err, prog_fd, i; + LIBBPF_OPTS(bpf_test_run_opts, topts); CHECK: Alignment should match open parenthesis #290: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:75: + ASSERT_TRUE(skel->bss->telemetry[i].id == 0 || + skel->bss->telemetry[i].id == 1, "id"); WARNING: line length of 93 exceeds 80 columns #293: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:78: + ASSERT_EQ(skel->bss->telemetry[i].fentry_called, 1, "fentry_called"); WARNING: line length of 93 exceeds 80 columns #294: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:79: + ASSERT_EQ(skel->bss->telemetry[i].fentry_ptr, (u64)29, "fentry_ptr"); WARNING: line length of 86 exceeds 80 columns #296: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:81: + /* Verify fexit captured correct values and return address. */ WARNING: line length of 91 exceeds 80 columns #297: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:82: + ASSERT_EQ(skel->bss->telemetry[i].fexit_called, 1, "fexit_called"); WARNING: line length of 83 exceeds 80 columns #299: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:84: + skel->bss->telemetry[i].fentry_pptr, "fexit_pptr"); CHECK: Alignment should match open parenthesis #299: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:84: + ASSERT_EQ(skel->bss->telemetry[i].fexit_pptr, + skel->bss->telemetry[i].fentry_pptr, "fexit_pptr"); WARNING: line length of 91 exceeds 80 columns #300: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:85: + ASSERT_EQ(skel->bss->telemetry[i].fexit_ptr, (u64)29, "fexit_ptr"); WARNING: line length of 87 exceeds 80 columns #302: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:87: + skel->bss->telemetry[i].fentry_pptr, "fexit_ret_pptr"); CHECK: Alignment should match open parenthesis #302: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:87: + ASSERT_EQ(skel->bss->telemetry[i].fexit_ret_pptr, + skel->bss->telemetry[i].fentry_pptr, "fexit_ret_pptr"); WARNING: line length of 99 exceeds 80 columns #303: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:88: + ASSERT_EQ(skel->bss->telemetry[i].fexit_ret_ptr, (u64)29, "fexit_ret_ptr"); WARNING: line length of 93 exceeds 80 columns #306: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:91: + ASSERT_EQ(skel->bss->telemetry[i].fentry_called, 1, "fentry_called"); WARNING: line length of 90 exceeds 80 columns #307: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:92: + ASSERT_EQ(skel->bss->telemetry[i].fentry_pptr, 17, "fentry_pptr"); WARNING: line length of 83 exceeds 80 columns #310: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:95: + * Verify fexit captured correct values and return address, WARNING: line length of 82 exceeds 80 columns #311: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:96: + * fentry_ptr value depends on kernel address space layout WARNING: line length of 91 exceeds 80 columns #314: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:99: + ASSERT_EQ(skel->bss->telemetry[i].fexit_called, 1, "fexit_called"); WARNING: line length of 88 exceeds 80 columns #315: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:100: + ASSERT_EQ(skel->bss->telemetry[i].fexit_pptr, 17, "fexit_pptr"); WARNING: line length of 81 exceeds 80 columns #317: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:102: + skel->bss->telemetry[i].fentry_ptr, "fexit_ptr"); CHECK: Alignment should match open parenthesis #317: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:102: + ASSERT_EQ(skel->bss->telemetry[i].fexit_ptr, + skel->bss->telemetry[i].fentry_ptr, "fexit_ptr"); WARNING: line length of 96 exceeds 80 columns #318: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:103: + ASSERT_EQ(skel->bss->telemetry[i].fexit_ret_pptr, 17, "fexit_ret_pptr"); WARNING: line length of 85 exceeds 80 columns #320: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:105: + skel->bss->telemetry[i].fentry_ptr, "fexit_ret_ptr"); CHECK: Alignment should match open parenthesis #320: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:105: + ASSERT_EQ(skel->bss->telemetry[i].fexit_ret_ptr, + skel->bss->telemetry[i].fentry_ptr, "fexit_ret_ptr"); WARNING: Missing a blank line after declarations #332: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:117: + int err, prog_fd, i; + LIBBPF_OPTS(bpf_test_run_opts, topts); WARNING: line length of 85 exceeds 80 columns #356: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:141: + ASSERT_EQ(skel->bss->telemetry[i].fentry_called, 1, "fentry_called"); WARNING: line length of 83 exceeds 80 columns #357: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:142: + ASSERT_EQ(skel->bss->telemetry[i].fexit_called, 1, "fexit_called"); WARNING: line length of 98 exceeds 80 columns #358: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:143: + ASSERT_EQ(skel->bss->telemetry[i].fentry_pptr, skel->bss->telemetry[i].fexit_pptr, CHECK: Alignment should match open parenthesis #359: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:144: + ASSERT_EQ(skel->bss->telemetry[i].fentry_pptr, skel->bss->telemetry[i].fexit_pptr, + "fentry_pptr == fexit_pptr"); WARNING: line length of 96 exceeds 80 columns #360: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:145: + ASSERT_EQ(skel->bss->telemetry[i].fexit_ptr, skel->bss->telemetry[i].fentry_ptr, CHECK: Alignment should match open parenthesis #361: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:146: + ASSERT_EQ(skel->bss->telemetry[i].fexit_ptr, skel->bss->telemetry[i].fentry_ptr, + "fexit_ptr"); WARNING: line length of 96 exceeds 80 columns #363: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:148: + skel->bss->telemetry[i].fexit_pptr_addr_valid, "fexit_pptr_addr_valid"); CHECK: Alignment should match open parenthesis #363: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:148: + ASSERT_EQ(skel->bss->telemetry[i].fentry_pptr_addr_valid, + skel->bss->telemetry[i].fexit_pptr_addr_valid, "fexit_pptr_addr_valid"); WARNING: line length of 108 exceeds 80 columns #365: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:150: + /* Should be set to 0 by kernel address boundaries check or an exception handler. */ WARNING: line length of 87 exceeds 80 columns #366: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:151: + ASSERT_EQ(skel->bss->telemetry[i].fentry_ptr, 0, "fentry_ptr"); WARNING: line length of 85 exceeds 80 columns #367: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:152: + ASSERT_EQ(skel->bss->telemetry[i].fexit_ptr, 0, "fexit_ptr"); WARNING: Missing a blank line after declarations #378: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:163: + int err, prog_fd; + LIBBPF_OPTS(bpf_test_run_opts, topts); WARNING: line length of 82 exceeds 80 columns #403: FILE: tools/testing/selftests/bpf/prog_tests/fentry_fexit_multi_level_ptr.c:188: + ASSERT_EQ(skel->bss->fexit_retval, (u64)ERR_PTR(-ENOMEM), "fexit_retval"); WARNING: line length of 87 exceeds 80 columns #436: FILE: tools/testing/selftests/bpf/prog_tests/verifier.c:263: +void test_verifier_ctx_multilevel_ptr(void) { RUN(verifier_ctx_multilevel_ptr); } WARNING: line length of 87 exceeds 80 columns #465: FILE: tools/testing/selftests/bpf/progs/fentry_fexit_pptr_nullable_test.c:20: +int BPF_PROG(test_fentry_pptr_nullable, struct bpf_fentry_test_pptr_t **pptr__nullable) WARNING: line length of 100 exceeds 80 columns #477: FILE: tools/testing/selftests/bpf/progs/fentry_fexit_pptr_nullable_test.c:32: + bpf_probe_read_kernel(&fentry_ptr_field_value, sizeof(fentry_ptr_field_value), &ptr->value); WARNING: line length of 95 exceeds 80 columns #482: FILE: tools/testing/selftests/bpf/progs/fentry_fexit_pptr_nullable_test.c:37: +int BPF_PROG(test_fexit_pptr_nullable, struct bpf_fentry_test_pptr_t **pptr__nullable, int ret) WARNING: line length of 98 exceeds 80 columns #495: FILE: tools/testing/selftests/bpf/progs/fentry_fexit_pptr_nullable_test.c:50: + bpf_probe_read_kernel(&fexit_ptr_field_value, sizeof(fexit_ptr_field_value), &ptr->value); WARNING: Use of volatile is usually wrong: see Documentation/process/volatile-considered-harmful.rst #526: FILE: tools/testing/selftests/bpf/progs/fentry_fexit_pptr_test.c:23: +volatile unsigned int current_index = 0; WARNING: do not add new typedefs #583: FILE: tools/testing/selftests/bpf/progs/fentry_fexit_void_ppptr_test.c:14: +typedef void **volatile *const ppvpc_t; WARNING: Use of volatile is usually wrong: see Documentation/process/volatile-considered-harmful.rst #583: FILE: tools/testing/selftests/bpf/progs/fentry_fexit_void_ppptr_test.c:14: +typedef void **volatile *const ppvpc_t; WARNING: line length of 85 exceeds 80 columns #589: FILE: tools/testing/selftests/bpf/progs/fentry_fexit_void_ppptr_test.c:20: + /* Invalid memory access is fixed by boundaries check or exception handler */ WARNING: Use of volatile is usually wrong: see Documentation/process/volatile-considered-harmful.rst #628: FILE: tools/testing/selftests/bpf/progs/fentry_fexit_void_pptr_test.c:22: +volatile unsigned int current_index = 0; WARNING: line length of 97 exceeds 80 columns #689: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:13: +__description("fentry/double pointer parameter (rdonly, untrusted, nullable) - valid ctx access") WARNING: Avoid line continuations in quoted strings #693: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:17: + asm volatile (" \ WARNING: line length of 99 exceeds 80 columns #694: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:18: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 106 exceeds 80 columns #702: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:26: +__description("fentry/double pointer parameter (rdonly, untrusted, nullable) - invalid load without null") WARNING: Avoid line continuations in quoted strings #706: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:30: + asm volatile (" \ WARNING: line length of 93 exceeds 80 columns #707: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:31: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 94 exceeds 80 columns #720: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:44: +__description("fentry/double pointer parameter (rdonly, untrusted) - valid load without null") WARNING: Avoid line continuations in quoted strings #724: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:48: + asm volatile (" \ WARNING: line length of 98 exceeds 80 columns #727: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:51: + /* valid dereference without check for NULL as the parameter is not marked as nullable */\ WARNING: line length of 101 exceeds 80 columns #735: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:59: +__description("fentry/double pointer parameter (rdonly, untrusted, nullable) - valid load with null") WARNING: Avoid line continuations in quoted strings #739: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:63: + asm volatile (" \ WARNING: line length of 93 exceeds 80 columns #740: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:64: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 103 exceeds 80 columns #751: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:75: +__description("fentry/double pointer parameter (rdonly, untrusted) - valid load with arbitrary offset") WARNING: Avoid line continuations in quoted strings #755: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:79: + asm volatile (" \ WARNING: line length of 129 exceeds 80 columns #768: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:92: +__description("fentry/double pointer parameter (rdonly, untrusted, nullable) - invalid load with double dereference with offset") WARNING: Avoid line continuations in quoted strings #772: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:96: + asm volatile (" \ WARNING: line length of 100 exceeds 80 columns #785: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:109: +__description("fentry/double pointer parameter (rdonly, untrusted, nullable) - invalid narrow load") WARNING: Avoid line continuations in quoted strings #789: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:113: + asm volatile (" \ WARNING: line length of 114 exceeds 80 columns #797: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:121: +__description("fentry/double pointer parameter (rdonly, untrusted, nullable) - invalid store to read only memory") WARNING: Avoid line continuations in quoted strings #801: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:125: + asm volatile (" \ WARNING: line length of 93 exceeds 80 columns #802: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:126: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 106 exceeds 80 columns #813: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:137: +__description("fentry/double pointer parameter (rdonly, untrusted, nullable) - invalid store with offset") WARNING: Avoid line continuations in quoted strings #817: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:141: + asm volatile (" \ WARNING: line length of 93 exceeds 80 columns #818: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:142: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 119 exceeds 80 columns #829: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:153: +__description("fentry/double pointer parameter (rdonly, untrusted, nullable) - invalid store with offset, scalar type") WARNING: Avoid line continuations in quoted strings #833: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:157: + asm volatile (" \ WARNING: line length of 93 exceeds 80 columns #834: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:158: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 114 exceeds 80 columns #846: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:170: +__description("fentry/triple pointer parameter (rdonly, untrusted, nullable) - invalid store to read only memory") WARNING: Avoid line continuations in quoted strings #850: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:174: + asm volatile (" \ WARNING: line length of 93 exceeds 80 columns #851: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:175: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 108 exceeds 80 columns #862: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:186: +__description("fentry/triple pointer parameter (rdonly, untrusted, nullable) - invalid mem access (scalar)") WARNING: Avoid line continuations in quoted strings #866: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:190: + asm volatile (" \ WARNING: line length of 93 exceeds 80 columns #867: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:191: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 97 exceeds 80 columns #879: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:203: +__description("lsm/double pointer parameter (rdonly, trusted) - invalid load outside boundaries") WARNING: Avoid line continuations in quoted strings #883: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:207: + asm volatile (" \ WARNING: line length of 86 exceeds 80 columns #884: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:208: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY, PTR_UNTRUSTED is not set */\ WARNING: line length of 88 exceeds 80 columns #896: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:220: +__description("lsm/double pointer parameter (rdonly, trusted) - load within boundaries") WARNING: Avoid line continuations in quoted strings #900: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:224: + asm volatile (" \ WARNING: line length of 87 exceeds 80 columns #901: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:225: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY , PTR_UNTRUSTED is not set */\ WARNING: line length of 81 exceeds 80 columns #905: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:229: + * should pass as for a trusted parameter verifier checks boundaries \ WARNING: line length of 107 exceeds 80 columns #916: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:240: +__description("lsm/double pointer parameter (rdonly, trusted) - load within boundaries, no check for null") WARNING: line length of 81 exceeds 80 columns #918: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:242: +__naked void sb_eat_lsm_opts_trusted_offset_within_boundaries_no_null_check(void) WARNING: Avoid line continuations in quoted strings #920: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:244: + asm volatile (" \ WARNING: line length of 87 exceeds 80 columns #921: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:245: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY , PTR_UNTRUSTED is not set */\ WARNING: line length of 81 exceeds 80 columns #924: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:248: + * should pass as for a trusted parameter verifier checks boundaries \ WARNING: line length of 114 exceeds 80 columns #934: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:258: +__description("lsm/double pointer parameter (rdonly, trusted) - invalid store within boundaries to read only mem") WARNING: Avoid line continuations in quoted strings #938: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:262: + asm volatile (" \ WARNING: line length of 97 exceeds 80 columns #939: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:263: + /* load double pointer - should be PTR_TO_MEM | MEM_RDONLY , PTR_UNTRUSTED is not set */\ WARNING: line length of 115 exceeds 80 columns #950: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:274: +__description("lsm/double pointer parameter (rdonly, trusted) - invalid store outside boundaries to read only mem") WARNING: Avoid line continuations in quoted strings #954: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:278: + asm volatile (" \ WARNING: line length of 87 exceeds 80 columns #955: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:279: + /* load double pointer - PTR_TO_MEM | MEM_RDONLY , PTR_UNTRUSTED is not set */\ WARNING: line length of 87 exceeds 80 columns #966: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:290: +__description("fexit/double pointer return (rdonly, untrusted, nullable) - valid load") WARNING: Avoid line continuations in quoted strings #970: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:294: + asm volatile (" \ WARNING: line length of 106 exceeds 80 columns #971: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:295: + /* load double pointer return value - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 99 exceeds 80 columns #982: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:306: +__description("fexit/double pointer return (rdonly, untrusted, nullable) - valid load with offset") WARNING: Avoid line continuations in quoted strings #986: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:310: + asm volatile (" \ WARNING: line length of 106 exceeds 80 columns #987: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:311: + /* load double pointer return value - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 91 exceeds 80 columns #990: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:314: + /* verifier doesn't check boundaries for access protect by an exception handler */\ WARNING: line length of 113 exceeds 80 columns #999: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:323: +__description("fexit/double pointer return (rdonly, untrusted, nullable) - invalid load with double dereference") WARNING: Avoid line continuations in quoted strings #1003: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:327: + asm volatile (" \ WARNING: line length of 106 exceeds 80 columns #1004: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:328: + /* load double pointer return value - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 110 exceeds 80 columns #1016: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:340: +__description("fexit/double pointer return (rdonly, untrusted, nullable) - invalid store to read only memory") WARNING: Avoid line continuations in quoted strings #1020: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:344: + asm volatile (" \ WARNING: line length of 106 exceeds 80 columns #1021: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:345: + /* load double pointer return value - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 89 exceeds 80 columns #1024: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:348: + *(u64 *)(r2 + 0) = 1; /* R2 contains read only memory address */ \ WARNING: line length of 134 exceeds 80 columns #1032: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:356: +__description("fexit/double pointer return (rdonly, untrusted, nullable) - invalid store to read only memory with double dereference") WARNING: Avoid line continuations in quoted strings #1036: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:360: + asm volatile (" \ WARNING: line length of 106 exceeds 80 columns #1037: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:361: + /* load double pointer return value - PTR_TO_MEM | MEM_RDONLY | PTR_UNTRUSTED | PTR_MAYBE_NULL */\ WARNING: line length of 106 exceeds 80 columns #1051: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:375: +__description("fexit/double pointer return (rdonly, untrusted, nullable) - bpf helpers with nullable var") CHECK: Alignment should match open parenthesis #1054: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:378: +int BPF_PROG(ctx_double_ptr_nulable_var_access_bpf_helpers, + struct bpf_fentry_test_pptr_t **pptr__nullable) WARNING: line length of 87 exceeds 80 columns #1056: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:380: + /* Check compatibility with BPF helpers; NULL checks should not be required. */ WARNING: line length of 104 exceeds 80 columns #1064: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:388: +__description("fexit/double pointer return (rdonly, untrusted, nullable) - bpf helpers with return val") CHECK: Alignment should match open parenthesis #1067: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:391: +int BPF_PROG(ctx_double_ptr_return_access_bpf_helpers, __u32 id, + __u32 **pptr, __u32 **ret) WARNING: line length of 87 exceeds 80 columns #1069: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:393: + /* Check compatibility with BPF helpers; NULL checks should not be required. */ WARNING: line length of 126 exceeds 80 columns #1078: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:402: +__description("fexit/double pointer return (rdonly, untrusted, nullable) - bpf helpers with nullable var, direct ctx pointer") CHECK: Alignment should match open parenthesis #1081: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:405: +int BPF_PROG(ctx_double_ptr_nulable_var_access_bpf_helpers_ctx, + struct bpf_fentry_test_pptr_t **pptr__nullable) WARNING: line length of 87 exceeds 80 columns #1083: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:407: + /* Check compatibility with BPF helpers; NULL checks should not be required. */ WARNING: line length of 124 exceeds 80 columns #1091: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:415: +__description("fexit/double pointer return (rdonly, untrusted, nullable) - bpf helpers with return val, direct ctx pointer") CHECK: Alignment should match open parenthesis #1094: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:418: +int BPF_PROG(ctx_double_ptr_return_access_bpf_helpers_ctx, __u32 id, + __u32 **pptr, __u32 **ret) WARNING: line length of 87 exceeds 80 columns #1096: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:420: + /* Check compatibility with BPF helpers; NULL checks should not be required. */ CHECK: Please don't use multiple blank lines #1104: FILE: tools/testing/selftests/bpf/progs/verifier_ctx_multilevel_ptr.c:428: + + total: 0 errors, 121 warnings, 13 checks, 1020 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 52741e33b4a2 ("selftests/bpf: Add trampolines multi-level pointer params test coverage") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 121 warnings, 13 checks, 1020 lines checked