WARNING: line length of 84 exceeds 80 columns #104: FILE: include/linux/bpf.h:1670: + u16 stack_arg_depth; /* both incoming and max outgoing of stack arguments */ WARNING: line length of 84 exceeds 80 columns #117: FILE: include/linux/bpf_verifier.h:272: + struct bpf_reg_state spilled_ptr; /* for spilled scalar/pointer semantics */ WARNING: line length of 87 exceeds 80 columns #129: FILE: include/linux/bpf_verifier.h:328: + u16 stack_arg_depth; /* Size of incoming + max outgoing stack args in bytes. */ WARNING: line length of 81 exceeds 80 columns #130: FILE: include/linux/bpf_verifier.h:329: + u16 incoming_stack_arg_depth; /* Size of incoming stack args in bytes. */ WARNING: line length of 87 exceeds 80 columns #168: FILE: kernel/bpf/btf.c:7896: + bpf_log(log, "Global function %s() with %d > %d args not supported.\n", WARNING: line length of 95 exceeds 80 columns #173: FILE: kernel/bpf/btf.c:7901: + sub->incoming_stack_arg_depth = (nargs - MAX_BPF_FUNC_REG_ARGS) * BPF_REG_SIZE; WARNING: line length of 96 exceeds 80 columns #190: FILE: kernel/bpf/verifier.c:1495: + dst->stack_arg_slots = copy_array(dst->stack_arg_slots, src->stack_arg_slots, n, WARNING: line length of 85 exceeds 80 columns #191: FILE: kernel/bpf/verifier.c:1496: + sizeof(struct bpf_stack_arg_state), WARNING: line length of 83 exceeds 80 columns #217: FILE: kernel/bpf/verifier.c:1556: + sizeof(struct bpf_stack_arg_state)); WARNING: line length of 92 exceeds 80 columns #275: FILE: kernel/bpf/verifier.c:5919: +static int check_stack_arg_write(struct bpf_verifier_env *env, struct bpf_func_state *state, WARNING: line length of 82 exceeds 80 columns #292: FILE: kernel/bpf/verifier.c:5936: + type = is_spillable_regtype(reg->type) ? STACK_SPILL : STACK_MISC; WARNING: line length of 81 exceeds 80 columns #299: FILE: kernel/bpf/verifier.c:5943: + __mark_reg_known(reg, (u32)env->prog->insnsi[env->insn_idx].imm); WARNING: line length of 91 exceeds 80 columns #311: FILE: kernel/bpf/verifier.c:5955: +static int check_stack_arg_read(struct bpf_verifier_env *env, struct bpf_func_state *state, WARNING: line length of 82 exceeds 80 columns #356: FILE: kernel/bpf/verifier.c:8167: + return check_stack_arg_read(env, state, insn->off, insn->dst_reg); WARNING: line length of 83 exceeds 80 columns #380: FILE: kernel/bpf/verifier.c:8212: + return check_stack_arg_write(env, state, insn->off, insn->src_reg); WARNING: line length of 85 exceeds 80 columns #428: FILE: kernel/bpf/verifier.c:11226: + * Transfer stack args from caller's outgoing area to callee's incoming area. WARNING: line length of 91 exceeds 80 columns #429: FILE: kernel/bpf/verifier.c:11227: + * Caller wrote outgoing args at offsets '-(incoming + 8)', '-(incoming + 16)', ... WARNING: line length of 92 exceeds 80 columns #434: FILE: kernel/bpf/verifier.c:11232: + int caller_incoming_slots = caller->incoming_stack_arg_depth / BPF_REG_SIZE; WARNING: line length of 97 exceeds 80 columns #435: FILE: kernel/bpf/verifier.c:11233: + int callee_incoming_slots = callee_info->incoming_stack_arg_depth / BPF_REG_SIZE; WARNING: line length of 89 exceeds 80 columns #437: FILE: kernel/bpf/verifier.c:11235: + callee->incoming_stack_arg_depth = callee_info->incoming_stack_arg_depth; WARNING: line length of 95 exceeds 80 columns #438: FILE: kernel/bpf/verifier.c:11236: + err = grow_stack_arg_slots(env, callee, callee_info->incoming_stack_arg_depth); WARNING: line length of 81 exceeds 80 columns #445: FILE: kernel/bpf/verifier.c:11243: + if (!is_stack_arg_slot_initialized(caller, caller_spi)) { WARNING: line length of 87 exceeds 80 columns #446: FILE: kernel/bpf/verifier.c:11244: + verbose(env, "stack arg#%d not properly initialized\n", WARNING: line length of 89 exceeds 80 columns #450: FILE: kernel/bpf/verifier.c:11248: + callee->stack_arg_slots[i] = caller->stack_arg_slots[caller_spi]; WARNING: line length of 87 exceeds 80 columns #469: FILE: kernel/bpf/verifier.c:21462: + struct bpf_func_state *state = vstate->frame[vstate->curframe]; WARNING: line length of 81 exceeds 80 columns #495: FILE: kernel/bpf/verifier.c:21479: + err = check_mem_access(env, env->insn_idx, insn->dst_reg, WARNING: line length of 87 exceeds 80 columns #515: FILE: kernel/bpf/verifier.c:23186: + * Even without subprogs, kfunc calls with >5 args need stack arg space WARNING: line length of 91 exceeds 80 columns #518: FILE: kernel/bpf/verifier.c:23189: + prog->aux->stack_arg_depth = env->subprog_info[0].outgoing_stack_arg_depth; WARNING: line length of 103 exceeds 80 columns #528: FILE: kernel/bpf/verifier.c:23281: + func[i]->aux->incoming_stack_arg_depth = env->subprog_info[i].incoming_stack_arg_depth; WARNING: line length of 95 exceeds 80 columns #529: FILE: kernel/bpf/verifier.c:23282: + func[i]->aux->stack_arg_depth = env->subprog_info[i].incoming_stack_arg_depth + WARNING: line length of 94 exceeds 80 columns #530: FILE: kernel/bpf/verifier.c:23283: + env->subprog_info[i].outgoing_stack_arg_depth; total: 0 errors, 31 warnings, 0 checks, 406 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 45f88fbabd49 ("bpf: Support stack arguments for bpf functions") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 31 warnings, 0 checks, 406 lines checked