WARNING: line length of 86 exceeds 80 columns #34: FILE: kernel/bpf/verifier.c:5489: + struct bpf_reg_state *ptr_reg, int off, int size, WARNING: line length of 97 exceeds 80 columns #58: FILE: kernel/bpf/verifier.c:5800: +static int check_stack_range_initialized(struct bpf_verifier_env *env, struct bpf_reg_state *reg, WARNING: line length of 92 exceeds 80 columns #67: FILE: kernel/bpf/verifier.c:5824: +static int check_stack_read_var_off(struct bpf_verifier_env *env, struct bpf_reg_state *reg, WARNING: line length of 88 exceeds 80 columns #88: FILE: kernel/bpf/verifier.c:5855: + struct bpf_reg_state *reg, int ptr_regno, int off, int size, WARNING: line length of 89 exceeds 80 columns #128: FILE: kernel/bpf/verifier.c:5931: +static int check_map_access_type(struct bpf_verifier_env *env, struct bpf_reg_state *reg, WARNING: line length of 97 exceeds 80 columns #140: FILE: kernel/bpf/verifier.c:5953: +static int __check_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, WARNING: line length of 102 exceeds 80 columns #159: FILE: kernel/bpf/verifier.c:5991: +static int check_mem_region_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 95 exceeds 80 columns #192: FILE: kernel/bpf/verifier.c:6333: +static int check_map_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 95 exceeds 80 columns #205: FILE: kernel/bpf/verifier.c:6342: + err = check_mem_region_access(env, reg, regno, off, size, mem_size, zero_size_allowed); WARNING: line length of 107 exceeds 80 columns #214: FILE: kernel/bpf/verifier.c:6440: +static int check_packet_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 regno, int off, WARNING: line length of 97 exceeds 80 columns #226: FILE: kernel/bpf/verifier.c:6450: + err = check_mem_region_access(env, reg, regno, off, size, reg->range, zero_size_allowed); WARNING: line length of 109 exceeds 80 columns #235: FILE: kernel/bpf/verifier.c:6505: +static int check_ctx_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 97 exceeds 80 columns #249: FILE: kernel/bpf/verifier.c:6518: + err = check_mem_region_access(env, reg, regno, off, access_size, U16_MAX, false); WARNING: line length of 85 exceeds 80 columns #258: FILE: kernel/bpf/verifier.c:6544: + struct bpf_reg_state *reg, u32 regno, int off, int size, WARNING: line length of 89 exceeds 80 columns #270: FILE: kernel/bpf/verifier.c:7522: + struct bpf_reg_state *regs, struct bpf_reg_state *reg, WARNING: line length of 89 exceeds 80 columns #284: FILE: kernel/bpf/verifier.c:7678: + struct bpf_reg_state *regs, struct bpf_reg_state *reg, WARNING: line length of 109 exceeds 80 columns #311: FILE: kernel/bpf/verifier.c:7862: +static int check_mem_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 89 exceeds 80 columns #338: FILE: kernel/bpf/verifier.c:7900: + err = check_map_access(env, reg, regno, off, size, false, ACCESS_DIRECT); WARNING: line length of 81 exceeds 80 columns #347: FILE: kernel/bpf/verifier.c:7969: + err = check_mem_region_access(env, reg, regno, off, size, WARNING: line length of 87 exceeds 80 columns #356: FILE: kernel/bpf/verifier.c:7987: + err = check_ctx_access(env, insn_idx, reg, regno, off, size, t, &info); WARNING: line length of 86 exceeds 80 columns #365: FILE: kernel/bpf/verifier.c:8024: + err = check_stack_access_within_bounds(env, reg, regno, off, size, t); WARNING: line length of 81 exceeds 80 columns #393: FILE: kernel/bpf/verifier.c:8065: + err = check_sock_access(env, insn_idx, reg, regno, off, size, t); WARNING: line length of 82 exceeds 80 columns #402: FILE: kernel/bpf/verifier.c:8074: + err = check_ptr_to_btf_access(env, regs, reg, regno, off, size, t, WARNING: line length of 82 exceeds 80 columns #406: FILE: kernel/bpf/verifier.c:8077: + err = check_ptr_to_map_access(env, regs, reg, regno, off, size, t, WARNING: line length of 98 exceeds 80 columns #415: FILE: kernel/bpf/verifier.c:8146: + err = check_mem_access(env, env->insn_idx, regs + insn->src_reg, insn->src_reg, insn->off, WARNING: line length of 98 exceeds 80 columns #424: FILE: kernel/bpf/verifier.c:8176: + err = check_mem_access(env, env->insn_idx, regs + insn->dst_reg, insn->dst_reg, insn->off, WARNING: line length of 85 exceeds 80 columns #446: FILE: kernel/bpf/verifier.c:8254: + err = check_mem_access(env, env->insn_idx, dst_reg, insn->dst_reg, insn->off, WARNING: line length of 82 exceeds 80 columns #450: FILE: kernel/bpf/verifier.c:8257: + err = check_mem_access(env, env->insn_idx, dst_reg, insn->dst_reg, WARNING: line length of 85 exceeds 80 columns #459: FILE: kernel/bpf/verifier.c:8269: + err = check_mem_access(env, env->insn_idx, dst_reg, insn->dst_reg, insn->off, WARNING: line length of 91 exceeds 80 columns #468: FILE: kernel/bpf/verifier.c:8358: + struct bpf_verifier_env *env, struct bpf_reg_state *reg,int regno, int off, ERROR: space required after that ',' (ctx:VxV) #468: FILE: kernel/bpf/verifier.c:8358: + struct bpf_verifier_env *env, struct bpf_reg_state *reg,int regno, int off, ^ WARNING: line length of 88 exceeds 80 columns #481: FILE: kernel/bpf/verifier.c:8383: + err = check_stack_access_within_bounds(env, reg, regno, off, access_size, type); WARNING: line length of 81 exceeds 80 columns #507: FILE: kernel/bpf/verifier.c:8524: + if (check_map_access_type(env, reg, 0, access_size, access_type)) WARNING: line length of 99 exceeds 80 columns #539: FILE: kernel/bpf/verifier.c:8565: + int err = check_mem_region_access(env, reg, regno, 0, access_size, U16_MAX, WARNING: line length of 107 exceeds 80 columns #548: FILE: kernel/bpf/verifier.c:8728: +static int process_spin_lock(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, int flags) WARNING: line length of 102 exceeds 80 columns #561: FILE: kernel/bpf/verifier.c:8844: +static int check_map_field_pointer(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 97 exceeds 80 columns #574: FILE: kernel/bpf/verifier.c:8897: +static int process_timer_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, WARNING: line length of 99 exceeds 80 columns #586: FILE: kernel/bpf/verifier.c:8907: +static int process_timer_helper(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, WARNING: line length of 98 exceeds 80 columns #594: FILE: kernel/bpf/verifier.c:8913: +static int process_timer_kfunc(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, WARNING: line length of 112 exceeds 80 columns #607: FILE: kernel/bpf/verifier.c:8992: +static int process_dynptr_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, int insn_idx, WARNING: line length of 109 exceeds 80 columns #628: FILE: kernel/bpf/verifier.c:9111: +static int process_iter_arg(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, int insn_idx, WARNING: line length of 84 exceeds 80 columns #658: FILE: kernel/bpf/verifier.c:10211: + err = process_spin_lock(env, reg, regno, PROCESS_SPIN_LOCK); WARNING: line length of 82 exceeds 80 columns #681: FILE: kernel/bpf/verifier.c:10259: + err = process_dynptr_func(env, reg, regno, insn_idx, arg_type, 0); WARNING: line length of 89 exceeds 80 columns #690: FILE: kernel/bpf/verifier.c:10918: + ret = process_dynptr_func(env, reg, regno, -1, arg->arg_type, 0); WARNING: line length of 94 exceeds 80 columns #705: FILE: kernel/bpf/verifier.c:11893: + err = check_mem_access(env, insn_idx, regs + meta.regno, meta.regno, i, BPF_B, WARNING: line length of 95 exceeds 80 columns #734: FILE: kernel/bpf/verifier.c:13076: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, CHECK: Alignment should match open parenthesis #735: FILE: kernel/bpf/verifier.c:13077: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, struct bpf_kfunc_call_arg_meta *meta) WARNING: line length of 111 exceeds 80 columns #746: FILE: kernel/bpf/verifier.c:13103: + err = check_mem_access(env, env->insn_idx, reg, regno, 0, BPF_DW, BPF_WRITE, -1, false, false); WARNING: line length of 106 exceeds 80 columns #755: FILE: kernel/bpf/verifier.c:13691: + kf_arg_type = get_kfunc_ptr_arg_type(env, meta, t, ref_t, ref_tname, args, i, nargs, reg); WARNING: line length of 112 exceeds 80 columns #764: FILE: kernel/bpf/verifier.c:13856: + ret = process_dynptr_func(env, reg, regno, insn_idx, dynptr_arg_type, clone_ref_obj_id); WARNING: line length of 98 exceeds 80 columns #782: FILE: kernel/bpf/verifier.c:14058: + ret = check_map_field_pointer(env, reg, regno, BPF_WORKQUEUE, &meta->map); WARNING: line length of 98 exceeds 80 columns #800: FILE: kernel/bpf/verifier.c:14076: + ret = check_map_field_pointer(env, reg, regno, BPF_TASK_WORK, &meta->map); WARNING: line length of 86 exceeds 80 columns #836: FILE: kernel/bpf/verifier.c:15257: + if (check_map_access(env, dst_reg, dst, 0, 1, false, ACCESS_HELPER)) { WARNING: line length of 104 exceeds 80 columns #845: FILE: kernel/bpf/verifier.c:21536: + err = check_mem_access(env, env->insn_idx, cur_regs(env) + insn->dst_reg, insn->dst_reg, total: 1 errors, 52 warnings, 1 checks, 752 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 455bf23c6b62 ("bpf: Refactor to avoid redundant calculation of bpf_reg_state") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS.