WARNING: line length of 89 exceeds 80 columns #95: FILE: kernel/bpf/verifier.c:5837: + int ptr_reg_or_arg, int off, int size, int dst_regno) WARNING: line length of 93 exceeds 80 columns #113: FILE: kernel/bpf/verifier.c:5867: + struct bpf_reg_state *reg, int ptr_reg_or_arg, int off, int size, WARNING: line length of 83 exceeds 80 columns #122: FILE: kernel/bpf/verifier.c:5905: + err = check_stack_read_var_off(env, reg, ptr_reg_or_arg, off, size, WARNING: line length of 102 exceeds 80 columns #131: FILE: kernel/bpf/verifier.c:5965: +static int __check_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int reg_or_arg, WARNING: line length of 97 exceeds 80 columns #141: FILE: kernel/bpf/verifier.c:5986: + verbose(env, "invalid access to packet, off=%d size=%d, %s(id=%d,off=%d,r=%d)\n", WARNING: line length of 90 exceeds 80 columns #142: FILE: kernel/bpf/verifier.c:5987: + off, size, reg_arg_name(env, reg_or_arg), reg->id, off, mem_size); WARNING: line length of 107 exceeds 80 columns #151: FILE: kernel/bpf/verifier.c:6003: +static int check_mem_region_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int reg_or_arg, WARNING: line length of 115 exceeds 80 columns #161: FILE: kernel/bpf/verifier.c:6023: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 83 exceeds 80 columns #166: FILE: kernel/bpf/verifier.c:6027: + err = __check_mem_access(env, reg, reg_or_arg, reg->smin_value + off, size, WARNING: line length of 85 exceeds 80 columns #171: FILE: kernel/bpf/verifier.c:6030: + verbose(env, "%s min value is outside of the allowed memory range\n", WARNING: line length of 103 exceeds 80 columns #182: FILE: kernel/bpf/verifier.c:6040: + verbose(env, "%s unbounded memory access, make sure to bounds check any such access\n", WARNING: line length of 83 exceeds 80 columns #187: FILE: kernel/bpf/verifier.c:6044: + err = __check_mem_access(env, reg, reg_or_arg, reg->umax_value + off, size, WARNING: line length of 85 exceeds 80 columns #192: FILE: kernel/bpf/verifier.c:6047: + verbose(env, "%s max value is outside of the allowed memory range\n", WARNING: line length of 105 exceeds 80 columns #213: FILE: kernel/bpf/verifier.c:6074: + reg_type_str(env, reg->type), reg_arg_name(env, reg_or_arg), reg->var_off.value); WARNING: line length of 87 exceeds 80 columns #220: FILE: kernel/bpf/verifier.c:6079: + verbose(env, "dereference of modified %s ptr %s off=%lld disallowed\n", WARNING: line length of 105 exceeds 80 columns #221: FILE: kernel/bpf/verifier.c:6080: + reg_type_str(env, reg->type), reg_arg_name(env, reg_or_arg), reg->var_off.value); WARNING: line length of 100 exceeds 80 columns #230: FILE: kernel/bpf/verifier.c:6345: +static int check_map_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int reg_or_arg, WARNING: line length of 100 exceeds 80 columns #239: FILE: kernel/bpf/verifier.c:6354: + err = check_mem_region_access(env, reg, reg_or_arg, off, size, mem_size, zero_size_allowed); WARNING: line length of 112 exceeds 80 columns #248: FILE: kernel/bpf/verifier.c:6452: +static int check_packet_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int reg_or_arg, int off, WARNING: line length of 100 exceeds 80 columns #255: FILE: kernel/bpf/verifier.c:6458: + verbose(env, "%s offset is outside of the packet\n", reg_arg_name(env, reg_or_arg)); WARNING: line length of 102 exceeds 80 columns #260: FILE: kernel/bpf/verifier.c:6462: + err = check_mem_region_access(env, reg, reg_or_arg, off, size, reg->range, zero_size_allowed); WARNING: line length of 114 exceeds 80 columns #269: FILE: kernel/bpf/verifier.c:6517: +static int check_ctx_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, int reg_or_arg, WARNING: line length of 102 exceeds 80 columns #278: FILE: kernel/bpf/verifier.c:6530: + err = check_mem_region_access(env, reg, reg_or_arg, off, access_size, U16_MAX, false); WARNING: line length of 90 exceeds 80 columns #290: FILE: kernel/bpf/verifier.c:6556: + struct bpf_reg_state *reg, int reg_or_arg, int off, int size, WARNING: line length of 115 exceeds 80 columns #299: FILE: kernel/bpf/verifier.c:6563: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 88 exceeds 80 columns #311: FILE: kernel/bpf/verifier.c:6593: + reg_arg_name(env, reg_or_arg), reg_type_str(env, reg->type), off, size); WARNING: line length of 83 exceeds 80 columns #352: FILE: kernel/bpf/verifier.c:7143: + err = __check_buffer_access(env, "tracepoint", reg, reg_or_arg, off, size); WARNING: line length of 86 exceeds 80 columns #457: FILE: kernel/bpf/verifier.c:7803: + verbose(env, "invalid unbounded variable-offset%s stack %s\n", WARNING: line length of 96 exceeds 80 columns #469: FILE: kernel/bpf/verifier.c:7823: + err_extra, reg_arg_name(env, reg_or_arg), min_off, access_size); WARNING: line length of 102 exceeds 80 columns #476: FILE: kernel/bpf/verifier.c:7828: + verbose(env, "invalid variable-offset%s stack %s var_off=%s off=%d size=%d\n", WARNING: line length of 100 exceeds 80 columns #477: FILE: kernel/bpf/verifier.c:7829: + err_extra, reg_arg_name(env, reg_or_arg), tn_buf, off, access_size); WARNING: line length of 114 exceeds 80 columns #486: FILE: kernel/bpf/verifier.c:7874: +static int check_mem_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, int reg_or_arg, WARNING: line length of 108 exceeds 80 columns #495: FILE: kernel/bpf/verifier.c:7891: + verbose(env, "write to change key %s not allowed\n", reg_arg_name(env, reg_or_arg)); WARNING: line length of 94 exceeds 80 columns #509: FILE: kernel/bpf/verifier.c:7912: + err = check_map_access(env, reg, reg_or_arg, off, size, false, ACCESS_DIRECT); WARNING: line length of 99 exceeds 80 columns #518: FILE: kernel/bpf/verifier.c:7959: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, reg_or_arg), WARNING: line length of 93 exceeds 80 columns #527: FILE: kernel/bpf/verifier.c:7966: + reg_arg_name(env, reg_or_arg), reg_type_str(env, reg->type)); WARNING: line length of 86 exceeds 80 columns #536: FILE: kernel/bpf/verifier.c:7981: + err = check_mem_region_access(env, reg, reg_or_arg, off, size, WARNING: line length of 92 exceeds 80 columns #545: FILE: kernel/bpf/verifier.c:7999: + err = check_ctx_access(env, insn_idx, reg, reg_or_arg, off, size, t, &info); WARNING: line length of 91 exceeds 80 columns #554: FILE: kernel/bpf/verifier.c:8036: + err = check_stack_access_within_bounds(env, reg, reg_or_arg, off, size, t); WARNING: line length of 82 exceeds 80 columns #569: FILE: kernel/bpf/verifier.c:8057: + err = check_packet_access(env, reg, reg_or_arg, off, size, false); WARNING: line length of 93 exceeds 80 columns #580: FILE: kernel/bpf/verifier.c:8074: + reg_arg_name(env, reg_or_arg), reg_type_str(env, reg->type)); WARNING: line length of 86 exceeds 80 columns #584: FILE: kernel/bpf/verifier.c:8077: + err = check_sock_access(env, insn_idx, reg, reg_or_arg, off, size, t); WARNING: line length of 87 exceeds 80 columns #595: FILE: kernel/bpf/verifier.c:8086: + err = check_ptr_to_btf_access(env, regs, reg, reg_or_arg, off, size, t, WARNING: line length of 87 exceeds 80 columns #599: FILE: kernel/bpf/verifier.c:8089: + err = check_ptr_to_map_access(env, regs, reg, reg_or_arg, off, size, t, WARNING: line length of 101 exceeds 80 columns #610: FILE: kernel/bpf/verifier.c:8099: + reg_arg_name(env, reg_or_arg), reg_type_str(env, reg->type)); WARNING: line length of 81 exceeds 80 columns #619: FILE: kernel/bpf/verifier.c:8107: + err = check_buffer_access(env, reg, reg_or_arg, off, size, false, WARNING: line length of 91 exceeds 80 columns #628: FILE: kernel/bpf/verifier.c:8116: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, reg_or_arg), WARNING: line length of 96 exceeds 80 columns #637: FILE: kernel/bpf/verifier.c:8370: + struct bpf_verifier_env *env, struct bpf_reg_state *reg,int reg_or_arg, int off, ERROR: space required after that ',' (ctx:VxV) #637: FILE: kernel/bpf/verifier.c:8370: + struct bpf_verifier_env *env, struct bpf_reg_state *reg,int reg_or_arg, int off, ^ WARNING: line length of 93 exceeds 80 columns #646: FILE: kernel/bpf/verifier.c:8395: + err = check_stack_access_within_bounds(env, reg, reg_or_arg, off, access_size, type); WARNING: line length of 106 exceeds 80 columns #656: FILE: kernel/bpf/verifier.c:8411: + verbose(env, "%s variable offset stack access prohibited for !root, var_off=%s\n", WARNING: line length of 87 exceeds 80 columns #668: FILE: kernel/bpf/verifier.c:8457: + * reg_or_arg should always be non-negative as meta->raw_mode is set in WARNING: line length of 121 exceeds 80 columns #681: FILE: kernel/bpf/verifier.c:8500: + verbose(env, "reading from stack %s off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 98 exceeds 80 columns #682: FILE: kernel/bpf/verifier.c:8501: + reg_arg_name(env, reg_or_arg), min_off, i - min_off, access_size); WARNING: line length of 86 exceeds 80 columns #686: FILE: kernel/bpf/verifier.c:8503: + verbose(env, "invalid read from stack %s off %d+%d size %d\n", WARNING: line length of 98 exceeds 80 columns #687: FILE: kernel/bpf/verifier.c:8504: + reg_arg_name(env, reg_or_arg), min_off, i - min_off, access_size); WARNING: line length of 90 exceeds 80 columns #694: FILE: kernel/bpf/verifier.c:8509: + verbose(env, "invalid read from stack %s var_off %s+%d size %d\n", WARNING: line length of 97 exceeds 80 columns #695: FILE: kernel/bpf/verifier.c:8510: + reg_arg_name(env, reg_or_arg), tn_buf, i - min_off, access_size); WARNING: line length of 107 exceeds 80 columns #704: FILE: kernel/bpf/verifier.c:8519: +static int check_helper_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int reg_or_arg, WARNING: line length of 96 exceeds 80 columns #718: FILE: kernel/bpf/verifier.c:8534: + verbose(env, "%s cannot write into %s\n", reg_arg_name(env, reg_or_arg), WARNING: line length of 84 exceeds 80 columns #723: FILE: kernel/bpf/verifier.c:8538: + return check_mem_region_access(env, reg, reg_or_arg, 0, access_size, WARNING: line length of 104 exceeds 80 columns #735: FILE: kernel/bpf/verifier.c:8548: + verbose(env, "%s cannot write into %s\n", reg_arg_name(env, reg_or_arg), WARNING: line length of 104 exceeds 80 columns #748: FILE: kernel/bpf/verifier.c:8559: + verbose(env, "%s cannot write into %s\n", reg_arg_name(env, reg_or_arg), WARNING: line length of 104 exceeds 80 columns #774: FILE: kernel/bpf/verifier.c:8582: + int err = check_mem_region_access(env, reg, reg_or_arg, 0, access_size, U16_MAX, WARNING: line length of 82 exceeds 80 columns #798: FILE: kernel/bpf/verifier.c:8617: + int size_reg_or_arg = (reg_or_arg >= 0) ? reg_or_arg + 1 : reg_or_arg - 1; WARNING: line length of 97 exceeds 80 columns #808: FILE: kernel/bpf/verifier.c:8639: + verbose(env, "%s min value is negative, either use unsigned or 'var &= const'\n", WARNING: line length of 104 exceeds 80 columns #817: FILE: kernel/bpf/verifier.c:8646: + reg_arg_name(env, size_reg_or_arg), size_reg->umin_value, size_reg->umax_value); WARNING: line length of 102 exceeds 80 columns #824: FILE: kernel/bpf/verifier.c:8651: + verbose(env, "%s unbounded memory access, use 'var &= const' or 'if (var < const)'\n", WARNING: line length of 85 exceeds 80 columns #829: FILE: kernel/bpf/verifier.c:8655: + err = check_helper_mem_access(env, mem_reg, reg_or_arg, size_reg->umax_value, WARNING: line length of 88 exceeds 80 columns #850: FILE: kernel/bpf/verifier.c:8683: + err = check_helper_mem_access(env, reg, reg_or_arg, size, BPF_READ, true, NULL); WARNING: line length of 96 exceeds 80 columns #851: FILE: kernel/bpf/verifier.c:8684: + err = err ?: check_helper_mem_access(env, reg, reg_or_arg, size, BPF_WRITE, true, NULL); WARNING: line length of 92 exceeds 80 columns #879: FILE: kernel/bpf/verifier.c:8711: + err = check_mem_size_reg(env, mem_reg, size_reg, reg_or_arg, BPF_READ, true, &meta); WARNING: line length of 100 exceeds 80 columns #880: FILE: kernel/bpf/verifier.c:8712: + err = err ?: check_mem_size_reg(env, mem_reg, size_reg, reg_or_arg, BPF_WRITE, true, &meta); WARNING: line length of 107 exceeds 80 columns #889: FILE: kernel/bpf/verifier.c:8748: +static int process_spin_lock(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int flags) WARNING: line length of 102 exceeds 80 columns #909: FILE: kernel/bpf/verifier.c:8864: +static int check_map_field_pointer(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 97 exceeds 80 columns #929: FILE: kernel/bpf/verifier.c:8917: +static int process_timer_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 99 exceeds 80 columns #941: FILE: kernel/bpf/verifier.c:8927: +static int process_timer_helper(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 98 exceeds 80 columns #949: FILE: kernel/bpf/verifier.c:8933: +static int process_timer_kfunc(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 112 exceeds 80 columns #962: FILE: kernel/bpf/verifier.c:9012: +static int process_dynptr_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int insn_idx, WARNING: line length of 86 exceeds 80 columns #998: FILE: kernel/bpf/verifier.c:9082: + dynptr_type_str(arg_to_dynptr_type(arg_type)), argno); WARNING: line length of 109 exceeds 80 columns #1007: FILE: kernel/bpf/verifier.c:9131: +static int process_iter_arg(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int insn_idx, WARNING: line length of 89 exceeds 80 columns #1015: FILE: kernel/bpf/verifier.c:9138: + verbose(env, "arg#%d expected pointer to an iterator on stack\n", argno); WARNING: line length of 92 exceeds 80 columns #1060: FILE: kernel/bpf/verifier.c:9697: + verbose(env, "Possibly NULL pointer passed to helper R%d\n", regno); WARNING: line length of 82 exceeds 80 columns #1069: FILE: kernel/bpf/verifier.c:9780: + const struct bpf_reg_state *reg, int reg_or_arg, WARNING: line length of 118 exceeds 80 columns #1079: FILE: kernel/bpf/verifier.c:9806: + verbose(env, "%s must have zero offset when passed to release func or trusted arg to kfunc\n", WARNING: line length of 130 exceeds 80 columns #1116: FILE: kernel/bpf/verifier.c:9938: + verbose(env, "%s points to insn_array map which cannot be used as const string\n", reg_arg_name(env, reg_or_arg)); WARNING: line length of 102 exceeds 80 columns #1122: FILE: kernel/bpf/verifier.c:9943: + verbose(env, "%s does not point to a readonly map'\n", reg_arg_name(env, reg_or_arg)); WARNING: line length of 95 exceeds 80 columns #1128: FILE: kernel/bpf/verifier.c:9948: + verbose(env, "%s is not a constant address'\n", reg_arg_name(env, reg_or_arg)); WARNING: line length of 97 exceeds 80 columns #1157: FILE: kernel/bpf/verifier.c:10115: + verbose(env, "arg#%d is an unacquired reference\n", arg); WARNING: line length of 99 exceeds 80 columns #1167: FILE: kernel/bpf/verifier.c:10123: + verbose(env, "arg#%d must be referenced when passed to release function\n", WARNING: line length of 86 exceeds 80 columns #1178: FILE: kernel/bpf/verifier.c:10136: + verbose(env, "more than one arg with ref_obj_id arg#%d %u %u", WARNING: line length of 83 exceeds 80 columns #1188: FILE: kernel/bpf/verifier.c:10219: + verbose(env, "Helper has invalid btf_id in arg#%d\n", arg); WARNING: line length of 82 exceeds 80 columns #1197: FILE: kernel/bpf/verifier.c:10231: + err = process_spin_lock(env, reg, arg, PROCESS_SPIN_LOCK); WARNING: line length of 97 exceeds 80 columns #1247: FILE: kernel/bpf/verifier.c:10930: + bpf_log(log, "arg#%d is not a pointer to arena or scalar.\n", i); WARNING: line length of 85 exceeds 80 columns #1256: FILE: kernel/bpf/verifier.c:10938: + ret = process_dynptr_func(env, reg, i, -1, arg->arg_type, 0); WARNING: line length of 113 exceeds 80 columns #1266: FILE: kernel/bpf/verifier.c:13088: + verbose(env, "kernel function %s args#%d expected pointer to %s %s but has a pointer to %s %s\n", WARNING: line length of 95 exceeds 80 columns #1275: FILE: kernel/bpf/verifier.c:13096: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, CHECK: Alignment should match open parenthesis #1276: FILE: kernel/bpf/verifier.c:13097: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, struct bpf_kfunc_call_arg_meta *meta) WARNING: line length of 91 exceeds 80 columns #1284: FILE: kernel/bpf/verifier.c:13119: + verbose(env, "expected uninitialized irq flag as arg#%d\n", argno); WARNING: line length of 118 exceeds 80 columns #1289: FILE: kernel/bpf/verifier.c:13123: + err = check_mem_access(env, env->insn_idx, reg, -(argno + 1), 0, BPF_DW, BPF_WRITE, -1, false, false); WARNING: line length of 92 exceeds 80 columns #1298: FILE: kernel/bpf/verifier.c:13133: + verbose(env, "expected an initialized irq flag as arg#%d\n", argno); WARNING: line length of 87 exceeds 80 columns #1331: FILE: kernel/bpf/verifier.c:13477: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_LIST_HEAD, WARNING: line length of 82 exceeds 80 columns #1337: FILE: kernel/bpf/verifier.c:13482: + struct bpf_reg_state *reg, u32 argno, WARNING: line length of 85 exceeds 80 columns #1341: FILE: kernel/bpf/verifier.c:13485: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_RB_ROOT, WARNING: line length of 82 exceeds 80 columns #1379: FILE: kernel/bpf/verifier.c:13564: + struct bpf_reg_state *reg, u32 argno, WARNING: line length of 93 exceeds 80 columns #1401: FILE: kernel/bpf/verifier.c:13651: + verbose(env, "arg#%d must be a known constant\n", i); WARNING: line length of 83 exceeds 80 columns #1410: FILE: kernel/bpf/verifier.c:13673: + verbose(env, "arg#%d is not a const\n", i); WARNING: line length of 99 exceeds 80 columns #1420: FILE: kernel/bpf/verifier.c:13698: + verifier_bug(env, "more than one arg with ref_obj_id arg#%d %u %u", WARNING: line length of 89 exceeds 80 columns #1430: FILE: kernel/bpf/verifier.c:13720: + verbose(env, "pointer in arg#%d isn't map pointer\n", i); WARNING: line length of 98 exceeds 80 columns #1439: FILE: kernel/bpf/verifier.c:13758: + verbose(env, "arg#%d must be referenced or trusted\n", i); WARNING: line length of 90 exceeds 80 columns #1444: FILE: kernel/bpf/verifier.c:13762: + verbose(env, "arg#%d must be a rcu pointer\n", i); WARNING: line length of 108 exceeds 80 columns #1462: FILE: kernel/bpf/verifier.c:13876: + ret = process_dynptr_func(env, reg, i, insn_idx, dynptr_arg_type, clone_ref_obj_id); WARNING: line length of 81 exceeds 80 columns #1480: FILE: kernel/bpf/verifier.c:13915: + ret = process_kf_arg_ptr_to_list_head(env, reg, i, meta); WARNING: line length of 83 exceeds 80 columns #1489: FILE: kernel/bpf/verifier.c:13929: + ret = process_kf_arg_ptr_to_rbtree_root(env, reg, i, meta); WARNING: line length of 81 exceeds 80 columns #1498: FILE: kernel/bpf/verifier.c:13942: + ret = process_kf_arg_ptr_to_list_node(env, reg, i, meta); WARNING: line length of 83 exceeds 80 columns #1507: FILE: kernel/bpf/verifier.c:13967: + ret = process_kf_arg_ptr_to_rbtree_node(env, reg, i, meta); WARNING: line length of 91 exceeds 80 columns #1525: FILE: kernel/bpf/verifier.c:14011: + ret = check_kfunc_mem_size_reg(env, buff_reg, size_reg, i); WARNING: line length of 97 exceeds 80 columns #1534: FILE: kernel/bpf/verifier.c:14024: + verbose(env, "arg#%d must be a known constant\n", i + 1); WARNING: line length of 94 exceeds 80 columns #1552: FILE: kernel/bpf/verifier.c:14078: + ret = check_map_field_pointer(env, reg, i, BPF_WORKQUEUE, &meta->map); WARNING: line length of 94 exceeds 80 columns #1570: FILE: kernel/bpf/verifier.c:14096: + ret = check_map_field_pointer(env, reg, i, BPF_TASK_WORK, &meta->map); WARNING: line length of 95 exceeds 80 columns #1614: FILE: tools/testing/selftests/bpf/prog_tests/linked_list.c:71: + { "obj_drop_non_zero_off", "arg#0 must have zero offset when passed to release func" }, WARNING: line length of 105 exceeds 80 columns #1774: FILE: tools/testing/selftests/bpf/progs/res_spin_lock_fail.c:206: +__failure __msg("arg#0 doesn't have constant offset. bpf_res_spin_lock has to be at the constant offset") WARNING: line length of 122 exceeds 80 columns #1950: FILE: tools/testing/selftests/bpf/progs/verifier_vfs_reject.c:131: +__failure __msg("kernel function bpf_path_d_path args#0 expected pointer to STRUCT path but has a pointer to STRUCT file") WARNING: line length of 84 exceeds 80 columns #1972: FILE: tools/testing/selftests/bpf/progs/wq_failures.c:150: +__msg("arg#0 doesn't have constant offset. bpf_wq has to be at the constant offset") WARNING: line length of 100 exceeds 80 columns #1994: FILE: tools/testing/selftests/bpf/verifier/calls.c:223: + .errstr = "arg#0 must have zero offset when passed to release func or trusted arg to kfunc", WARNING: line length of 94 exceeds 80 columns #2016: FILE: tools/testing/selftests/bpf/verifier/map_kptr.c:103: + .errstr = "arg#0 doesn't have constant offset. kptr has to be at the constant offset", WARNING: line length of 109 exceeds 80 columns #2025: FILE: tools/testing/selftests/bpf/verifier/map_kptr.c:179: + .errstr = "invalid kptr access, arg#0 type=untrusted_ptr_prog_test_ref_kfunc expected=ptr_prog_test", WARNING: line length of 106 exceeds 80 columns #2052: FILE: tools/testing/selftests/bpf/verifier/map_kptr.c:345: + .errstr = "invalid kptr access, arg#1 type=ptr_prog_test_ref_kfunc expected=ptr_prog_test_member", total: 1 errors, 126 warnings, 1 checks, 1746 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 2f56b2c67c0f ("bpf: Use argument index instead of register index in kfunc verifier logs") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS.