WARNING: line length of 90 exceeds 80 columns #128: FILE: kernel/bpf/verifier.c:1799: + snprintf(buf, len, "*(R11-%u)", (idx - MAX_BPF_FUNC_REG_ARGS + 1) * BPF_REG_SIZE); WARNING: line length of 84 exceeds 80 columns #149: FILE: kernel/bpf/verifier.c:4321: + int ptr_argno, int off, int size, int dst_regno) WARNING: line length of 88 exceeds 80 columns #167: FILE: kernel/bpf/verifier.c:4351: + struct bpf_reg_state *reg, int ptr_argno, int off, int size, WARNING: line length of 100 exceeds 80 columns #185: FILE: kernel/bpf/verifier.c:4427: +static int check_map_access_type(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 97 exceeds 80 columns #194: FILE: kernel/bpf/verifier.c:4449: +static int __check_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 97 exceeds 80 columns #204: FILE: kernel/bpf/verifier.c:4470: + verbose(env, "invalid access to packet, off=%d size=%d, %s(id=%d,off=%d,r=%d)\n", WARNING: line length of 85 exceeds 80 columns #205: FILE: kernel/bpf/verifier.c:4471: + off, size, reg_arg_name(env, argno), reg->id, off, mem_size); WARNING: line length of 102 exceeds 80 columns #214: FILE: kernel/bpf/verifier.c:4487: +static int check_mem_region_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 115 exceeds 80 columns #224: FILE: kernel/bpf/verifier.c:4507: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 85 exceeds 80 columns #234: FILE: kernel/bpf/verifier.c:4514: + verbose(env, "%s min value is outside of the allowed memory range\n", WARNING: line length of 103 exceeds 80 columns #245: FILE: kernel/bpf/verifier.c:4524: + verbose(env, "%s unbounded memory access, make sure to bounds check any such access\n", WARNING: line length of 85 exceeds 80 columns #255: FILE: kernel/bpf/verifier.c:4531: + verbose(env, "%s max value is outside of the allowed memory range\n", WARNING: line length of 100 exceeds 80 columns #276: FILE: kernel/bpf/verifier.c:4558: + reg_type_str(env, reg->type), reg_arg_name(env, argno), reg->var_off.value); WARNING: line length of 87 exceeds 80 columns #283: FILE: kernel/bpf/verifier.c:4563: + verbose(env, "dereference of modified %s ptr %s off=%lld disallowed\n", WARNING: line length of 100 exceeds 80 columns #284: FILE: kernel/bpf/verifier.c:4564: + reg_type_str(env, reg->type), reg_arg_name(env, argno), reg->var_off.value); WARNING: line length of 107 exceeds 80 columns #293: FILE: kernel/bpf/verifier.c:4934: +static int check_packet_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, int off, WARNING: line length of 95 exceeds 80 columns #300: FILE: kernel/bpf/verifier.c:4940: + verbose(env, "%s offset is outside of the packet\n", reg_arg_name(env, argno)); WARNING: line length of 97 exceeds 80 columns #305: FILE: kernel/bpf/verifier.c:4944: + err = check_mem_region_access(env, reg, argno, off, size, reg->range, zero_size_allowed); WARNING: line length of 109 exceeds 80 columns #314: FILE: kernel/bpf/verifier.c:4999: +static int check_ctx_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 97 exceeds 80 columns #323: FILE: kernel/bpf/verifier.c:5012: + err = check_mem_region_access(env, reg, argno, off, access_size, U16_MAX, false); WARNING: line length of 85 exceeds 80 columns #335: FILE: kernel/bpf/verifier.c:5038: + struct bpf_reg_state *reg, u32 argno, int off, int size, WARNING: line length of 115 exceeds 80 columns #344: FILE: kernel/bpf/verifier.c:5045: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 83 exceeds 80 columns #356: FILE: kernel/bpf/verifier.c:5075: + reg_arg_name(env, argno), reg_type_str(env, reg->type), off, size); WARNING: line length of 86 exceeds 80 columns #502: FILE: kernel/bpf/verifier.c:6272: + verbose(env, "invalid unbounded variable-offset%s stack %s\n", WARNING: line length of 91 exceeds 80 columns #514: FILE: kernel/bpf/verifier.c:6292: + err_extra, reg_arg_name(env, argno), min_off, access_size); WARNING: line length of 102 exceeds 80 columns #521: FILE: kernel/bpf/verifier.c:6297: + verbose(env, "invalid variable-offset%s stack %s var_off=%s off=%d size=%d\n", WARNING: line length of 95 exceeds 80 columns #522: FILE: kernel/bpf/verifier.c:6298: + err_extra, reg_arg_name(env, argno), tn_buf, off, access_size); WARNING: line length of 109 exceeds 80 columns #531: FILE: kernel/bpf/verifier.c:6343: +static int check_mem_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 89 exceeds 80 columns #559: FILE: kernel/bpf/verifier.c:6382: + err = check_map_access(env, reg, argno, off, size, false, ACCESS_DIRECT); WARNING: line length of 94 exceeds 80 columns #568: FILE: kernel/bpf/verifier.c:6429: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, argno), WARNING: line length of 88 exceeds 80 columns #577: FILE: kernel/bpf/verifier.c:6436: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 81 exceeds 80 columns #586: FILE: kernel/bpf/verifier.c:6451: + err = check_mem_region_access(env, reg, argno, off, size, WARNING: line length of 87 exceeds 80 columns #595: FILE: kernel/bpf/verifier.c:6469: + err = check_ctx_access(env, insn_idx, reg, argno, off, size, t, &info); WARNING: line length of 86 exceeds 80 columns #604: FILE: kernel/bpf/verifier.c:6506: + err = check_stack_access_within_bounds(env, reg, argno, off, size, t); WARNING: line length of 88 exceeds 80 columns #630: FILE: kernel/bpf/verifier.c:6544: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 81 exceeds 80 columns #634: FILE: kernel/bpf/verifier.c:6547: + err = check_sock_access(env, insn_idx, reg, argno, off, size, t); WARNING: line length of 82 exceeds 80 columns #645: FILE: kernel/bpf/verifier.c:6556: + err = check_ptr_to_btf_access(env, regs, reg, argno, off, size, t, WARNING: line length of 82 exceeds 80 columns #649: FILE: kernel/bpf/verifier.c:6559: + err = check_ptr_to_map_access(env, regs, reg, argno, off, size, t, WARNING: line length of 96 exceeds 80 columns #660: FILE: kernel/bpf/verifier.c:6569: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 86 exceeds 80 columns #678: FILE: kernel/bpf/verifier.c:6586: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, argno), WARNING: line length of 92 exceeds 80 columns #687: FILE: kernel/bpf/verifier.c:6840: + struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int off, WARNING: line length of 88 exceeds 80 columns #696: FILE: kernel/bpf/verifier.c:6865: + err = check_stack_access_within_bounds(env, reg, argno, off, access_size, type); WARNING: line length of 106 exceeds 80 columns #706: FILE: kernel/bpf/verifier.c:6882: + verbose(env, "%s variable offset stack access prohibited for !root, var_off=%s\n", WARNING: line length of 121 exceeds 80 columns #726: FILE: kernel/bpf/verifier.c:6966: + verbose(env, "reading from stack %s off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 93 exceeds 80 columns #727: FILE: kernel/bpf/verifier.c:6967: + reg_arg_name(env, argno), min_off, i - min_off, access_size); WARNING: line length of 86 exceeds 80 columns #731: FILE: kernel/bpf/verifier.c:6969: + verbose(env, "invalid read from stack %s off %d+%d size %d\n", WARNING: line length of 93 exceeds 80 columns #732: FILE: kernel/bpf/verifier.c:6970: + reg_arg_name(env, argno), min_off, i - min_off, access_size); WARNING: line length of 90 exceeds 80 columns #739: FILE: kernel/bpf/verifier.c:6975: + verbose(env, "invalid read from stack %s var_off %s+%d size %d\n", WARNING: line length of 92 exceeds 80 columns #740: FILE: kernel/bpf/verifier.c:6976: + reg_arg_name(env, argno), tn_buf, i - min_off, access_size); WARNING: line length of 102 exceeds 80 columns #749: FILE: kernel/bpf/verifier.c:6985: +static int check_helper_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 88 exceeds 80 columns #765: FILE: kernel/bpf/verifier.c:7001: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #773: FILE: kernel/bpf/verifier.c:7007: + if (check_map_access_type(env, reg, argno, 0, access_size, access_type)) WARNING: line length of 96 exceeds 80 columns #784: FILE: kernel/bpf/verifier.c:7015: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 96 exceeds 80 columns #798: FILE: kernel/bpf/verifier.c:7026: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 99 exceeds 80 columns #824: FILE: kernel/bpf/verifier.c:7048: + int err = check_mem_region_access(env, reg, argno, 0, access_size, U16_MAX, WARNING: line length of 97 exceeds 80 columns #858: FILE: kernel/bpf/verifier.c:7105: + verbose(env, "%s min value is negative, either use unsigned or 'var &= const'\n", WARNING: line length of 99 exceeds 80 columns #867: FILE: kernel/bpf/verifier.c:7112: + reg_arg_name(env, size_argno), size_reg->umin_value, size_reg->umax_value); WARNING: line length of 102 exceeds 80 columns #874: FILE: kernel/bpf/verifier.c:7117: + verbose(env, "%s unbounded memory access, use 'var &= const' or 'if (var < const)'\n", WARNING: line length of 84 exceeds 80 columns #879: FILE: kernel/bpf/verifier.c:7121: + err = check_helper_mem_access(env, mem_reg, mem_argno, size_reg->umax_value, WARNING: line length of 83 exceeds 80 columns #900: FILE: kernel/bpf/verifier.c:7149: + err = check_helper_mem_access(env, reg, argno, size, BPF_READ, true, NULL); WARNING: line length of 91 exceeds 80 columns #901: FILE: kernel/bpf/verifier.c:7150: + err = err ?: check_helper_mem_access(env, reg, argno, size, BPF_WRITE, true, NULL); WARNING: line length of 82 exceeds 80 columns #910: FILE: kernel/bpf/verifier.c:7159: + struct bpf_reg_state *size_reg, u32 mem_argno) WARNING: line length of 87 exceeds 80 columns #929: FILE: kernel/bpf/verifier.c:7176: + err = check_mem_size_reg(env, mem_reg, size_reg, argno, BPF_READ, true, &meta); WARNING: line length of 95 exceeds 80 columns #930: FILE: kernel/bpf/verifier.c:7177: + err = err ?: check_mem_size_reg(env, mem_reg, size_reg, argno, BPF_WRITE, true, &meta); WARNING: line length of 107 exceeds 80 columns #939: FILE: kernel/bpf/verifier.c:7213: +static int process_spin_lock(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int flags) WARNING: line length of 102 exceeds 80 columns #959: FILE: kernel/bpf/verifier.c:7329: +static int check_map_field_pointer(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 97 exceeds 80 columns #979: FILE: kernel/bpf/verifier.c:7382: +static int process_timer_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 99 exceeds 80 columns #991: FILE: kernel/bpf/verifier.c:7392: +static int process_timer_helper(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 98 exceeds 80 columns #999: FILE: kernel/bpf/verifier.c:7398: +static int process_timer_kfunc(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 112 exceeds 80 columns #1012: FILE: kernel/bpf/verifier.c:7477: +static int process_dynptr_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int insn_idx, WARNING: line length of 109 exceeds 80 columns #1063: FILE: kernel/bpf/verifier.c:7591: +static int process_iter_arg(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int insn_idx, WARNING: line length of 92 exceeds 80 columns #1097: FILE: kernel/bpf/verifier.c:7623: + iter_type_str(meta->btf, btf_id), reg_arg_name(env, argno)); WARNING: line length of 92 exceeds 80 columns #1114: FILE: kernel/bpf/verifier.c:7647: + iter_type_str(meta->btf, btf_id), reg_arg_name(env, argno)); WARNING: line length of 93 exceeds 80 columns #1123: FILE: kernel/bpf/verifier.c:8067: +static int check_reg_type(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 101 exceeds 80 columns #1142: FILE: kernel/bpf/verifier.c:8117: + verbose(env, "%s type=%s expected=", reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #1154: FILE: kernel/bpf/verifier.c:8132: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 83 exceeds 80 columns #1163: FILE: kernel/bpf/verifier.c:8155: + verbose(env, "Possibly NULL pointer passed to helper %s\n", WARNING: line length of 83 exceeds 80 columns #1173: FILE: kernel/bpf/verifier.c:8169: + if (map_kptr_match_type(env, meta->kptr_field, reg, argno)) WARNING: line length of 92 exceeds 80 columns #1180: FILE: kernel/bpf/verifier.c:8174: + verbose(env, "%s has non-overwritten BPF_PTR_POISON type\n", WARNING: line length of 85 exceeds 80 columns #1195: FILE: kernel/bpf/verifier.c:8186: + verbose(env, "%s is of type %s but %s is expected\n", WARNING: line length of 83 exceeds 80 columns #1209: FILE: kernel/bpf/verifier.c:8207: + if (map_kptr_match_type(env, meta->kptr_field, reg, argno)) WARNING: line length of 118 exceeds 80 columns #1228: FILE: kernel/bpf/verifier.c:8267: + verbose(env, "%s must have zero offset when passed to release func or trusted arg to kfunc\n", WARNING: line length of 98 exceeds 80 columns #1267: FILE: kernel/bpf/verifier.c:8399: + verbose(env, "%s points to insn_array map which cannot be used as const string\n", WARNING: line length of 97 exceeds 80 columns #1274: FILE: kernel/bpf/verifier.c:8405: + verbose(env, "%s does not point to a readonly map'\n", reg_arg_name(env, argno)); WARNING: line length of 90 exceeds 80 columns #1280: FILE: kernel/bpf/verifier.c:8410: + verbose(env, "%s is not a constant address'\n", reg_arg_name(env, argno)); WARNING: line length of 95 exceeds 80 columns #1314: FILE: kernel/bpf/verifier.c:9354: + bpf_log(log, "%s is not a scalar\n", reg_arg_name(env, argno)); WARNING: line length of 86 exceeds 80 columns #1323: FILE: kernel/bpf/verifier.c:9364: + ret = check_func_arg_reg_off(env, reg, argno, ARG_PTR_TO_CTX); WARNING: line length of 84 exceeds 80 columns #1337: FILE: kernel/bpf/verifier.c:9376: + ret = check_func_arg_reg_off(env, reg, argno, ARG_DONTCARE); WARNING: line length of 89 exceeds 80 columns #1355: FILE: kernel/bpf/verifier.c:9395: + bpf_log(log, "%s is not a pointer to arena or scalar.\n", WARNING: line length of 89 exceeds 80 columns #1361: FILE: kernel/bpf/verifier.c:9400: + ret = check_func_arg_reg_off(env, reg, argno, ARG_PTR_TO_DYNPTR); WARNING: line length of 89 exceeds 80 columns #1366: FILE: kernel/bpf/verifier.c:9404: + ret = process_dynptr_func(env, reg, argno, -1, arg->arg_type, 0); WARNING: line length of 98 exceeds 80 columns #1376: FILE: kernel/bpf/verifier.c:9415: + err = check_reg_type(env, reg, argno, arg->arg_type, &arg->btf_id, &meta); WARNING: line length of 92 exceeds 80 columns #1377: FILE: kernel/bpf/verifier.c:9416: + err = err ?: check_func_arg_reg_off(env, reg, argno, arg->arg_type); WARNING: line length of 99 exceeds 80 columns #1393: FILE: kernel/bpf/verifier.c:11464: + verbose(env, "kernel function %s %s pointer type %s %s is not supported\n", WARNING: line length of 86 exceeds 80 columns #1394: FILE: kernel/bpf/verifier.c:11465: + meta->func_name, reg_arg_name(env, make_argno(argno)), WARNING: line length of 101 exceeds 80 columns #1405: FILE: kernel/bpf/verifier.c:11482: + verbose(env, "%s pointer type %s %s must point to %sscalar, or struct with scalar\n", WARNING: line length of 86 exceeds 80 columns #1407: FILE: kernel/bpf/verifier.c:11484: + btf_type_str(ref_t), ref_tname, arg_mem_size ? "void, " : ""); WARNING: line length of 111 exceeds 80 columns #1417: FILE: kernel/bpf/verifier.c:11553: + verbose(env, "kernel function %s %s expected pointer to %s %s but %s has a pointer to %s %s\n", WARNING: line length of 93 exceeds 80 columns #1419: FILE: kernel/bpf/verifier.c:11555: + btf_type_str(ref_t), ref_tname, reg_arg_name(env, make_argno(argno)), WARNING: line length of 95 exceeds 80 columns #1427: FILE: kernel/bpf/verifier.c:11562: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, CHECK: Alignment should match open parenthesis #1428: FILE: kernel/bpf/verifier.c:11563: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, struct bpf_kfunc_call_arg_meta *meta) WARNING: line length of 81 exceeds 80 columns #1442: FILE: kernel/bpf/verifier.c:11590: + err = check_mem_access(env, env->insn_idx, reg, argno, 0, BPF_DW, WARNING: line length of 87 exceeds 80 columns #1486: FILE: kernel/bpf/verifier.c:11946: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_LIST_HEAD, WARNING: line length of 82 exceeds 80 columns #1492: FILE: kernel/bpf/verifier.c:11951: + struct bpf_reg_state *reg, u32 argno, WARNING: line length of 85 exceeds 80 columns #1496: FILE: kernel/bpf/verifier.c:11954: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_RB_ROOT, WARNING: line length of 82 exceeds 80 columns #1534: FILE: kernel/bpf/verifier.c:12033: + struct bpf_reg_state *reg, u32 argno, WARNING: line length of 95 exceeds 80 columns #1555: FILE: kernel/bpf/verifier.c:12111: + verbose(env, "%s is not a scalar\n", reg_arg_name(env, argno)); WARNING: line length of 85 exceeds 80 columns #1564: FILE: kernel/bpf/verifier.c:12121: + verbose(env, "%s must be a known constant\n", WARNING: line length of 84 exceeds 80 columns #1592: FILE: kernel/bpf/verifier.c:12165: + verbose(env, "Possibly NULL pointer passed to trusted %s\n", WARNING: line length of 95 exceeds 80 columns #1601: FILE: kernel/bpf/verifier.c:12172: + verifier_bug(env, "more than one arg with ref_obj_id %s %u %u", WARNING: line length of 87 exceeds 80 columns #1602: FILE: kernel/bpf/verifier.c:12173: + reg_arg_name(env, argno), reg->ref_obj_id, WARNING: line length of 81 exceeds 80 columns #1611: FILE: kernel/bpf/verifier.c:12194: + verbose(env, "pointer in %s isn't map pointer\n", WARNING: line length of 90 exceeds 80 columns #1621: FILE: kernel/bpf/verifier.c:12233: + verbose(env, "%s must be referenced or trusted\n", WARNING: line length of 82 exceeds 80 columns #1627: FILE: kernel/bpf/verifier.c:12238: + verbose(env, "%s must be a rcu pointer\n", WARNING: line length of 88 exceeds 80 columns #1646: FILE: kernel/bpf/verifier.c:12278: + verbose(env, "%s expected pointer to ctx, but got %s\n", WARNING: line length of 96 exceeds 80 columns #1647: FILE: kernel/bpf/verifier.c:12279: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #1656: FILE: kernel/bpf/verifier.c:12293: + verbose(env, "%s expected for bpf_obj_drop()\n", WARNING: line length of 95 exceeds 80 columns #1663: FILE: kernel/bpf/verifier.c:12299: + verbose(env, "%s expected for bpf_percpu_obj_drop()\n", WARNING: line length of 89 exceeds 80 columns #1669: FILE: kernel/bpf/verifier.c:12304: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 85 exceeds 80 columns #1680: FILE: kernel/bpf/verifier.c:12357: + dynptr_arg_type, clone_ref_obj_id); WARNING: line length of 102 exceeds 80 columns #1697: FILE: kernel/bpf/verifier.c:12389: + verbose(env, "%s expected pointer to map value or allocated object\n", WARNING: line length of 85 exceeds 80 columns #1706: FILE: kernel/bpf/verifier.c:12397: + ret = process_kf_arg_ptr_to_list_head(env, reg, argno, meta); WARNING: line length of 102 exceeds 80 columns #1714: FILE: kernel/bpf/verifier.c:12404: + verbose(env, "%s expected pointer to map value or allocated object\n", WARNING: line length of 87 exceeds 80 columns #1723: FILE: kernel/bpf/verifier.c:12412: + ret = process_kf_arg_ptr_to_rbtree_root(env, reg, argno, meta); WARNING: line length of 89 exceeds 80 columns #1730: FILE: kernel/bpf/verifier.c:12418: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 85 exceeds 80 columns #1739: FILE: kernel/bpf/verifier.c:12426: + ret = process_kf_arg_ptr_to_list_node(env, reg, argno, meta); WARNING: line length of 97 exceeds 80 columns #1747: FILE: kernel/bpf/verifier.c:12433: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 87 exceeds 80 columns #1757: FILE: kernel/bpf/verifier.c:12452: + ret = process_kf_arg_ptr_to_rbtree_node(env, reg, argno, meta); WARNING: line length of 83 exceeds 80 columns #1766: FILE: kernel/bpf/verifier.c:12467: + verbose(env, "%s is %s ", reg_arg_name(env, argno), WARNING: line length of 107 exceeds 80 columns #1777: FILE: kernel/bpf/verifier.c:12481: + verbose(env, "%s reference type('%s %s') size cannot be determined: %ld\n", WARNING: line length of 86 exceeds 80 columns #1778: FILE: kernel/bpf/verifier.c:12482: + reg_arg_name(env, argno), btf_type_str(ref_t), WARNING: line length of 91 exceeds 80 columns #1792: FILE: kernel/bpf/verifier.c:12498: + ret = check_kfunc_mem_size_reg(env, buff_reg, size_reg, i); WARNING: line length of 90 exceeds 80 columns #1795: FILE: kernel/bpf/verifier.c:12500: + verbose(env, "%s and ", reg_arg_name(env, argno)); WARNING: line length of 108 exceeds 80 columns #1796: FILE: kernel/bpf/verifier.c:12501: + verbose(env, "%s memory, len pair leads to invalid memory access\n", WARNING: line length of 86 exceeds 80 columns #1797: FILE: kernel/bpf/verifier.c:12502: + reg_arg_name(env, next_argno(argno))); WARNING: line length of 85 exceeds 80 columns #1806: FILE: kernel/bpf/verifier.c:12513: + verbose(env, "%s must be a known constant\n", WARNING: line length of 86 exceeds 80 columns #1807: FILE: kernel/bpf/verifier.c:12514: + reg_arg_name(env, next_argno(argno))); WARNING: line length of 88 exceeds 80 columns #1825: FILE: kernel/bpf/verifier.c:12535: + verbose(env, "%s is neither owning or non-owning ref\n", WARNING: line length of 100 exceeds 80 columns #1835: FILE: kernel/bpf/verifier.c:12549: + verbose(env, "%s doesn't point to a type with bpf_refcount field\n", WARNING: line length of 84 exceeds 80 columns #1845: FILE: kernel/bpf/verifier.c:12559: + verbose(env, "%s doesn't point to a const string\n", WARNING: line length of 81 exceeds 80 columns #1857: FILE: kernel/bpf/verifier.c:12569: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 98 exceeds 80 columns #1862: FILE: kernel/bpf/verifier.c:12573: + ret = check_map_field_pointer(env, reg, argno, BPF_WORKQUEUE, &meta->map); WARNING: line length of 81 exceeds 80 columns #1869: FILE: kernel/bpf/verifier.c:12579: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 81 exceeds 80 columns #1881: FILE: kernel/bpf/verifier.c:12589: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 98 exceeds 80 columns #1886: FILE: kernel/bpf/verifier.c:12593: + ret = check_map_field_pointer(env, reg, argno, BPF_TASK_WORK, &meta->map); WARNING: line length of 90 exceeds 80 columns #1893: FILE: kernel/bpf/verifier.c:12599: + verbose(env, "%s doesn't point to an irq flag on stack\n", WARNING: line length of 99 exceeds 80 columns #1907: FILE: kernel/bpf/verifier.c:12612: + verbose(env, "%s doesn't point to map value or allocated object\n", WARNING: line length of 104 exceeds 80 columns #1945: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:14: + { "alloc_release", "kernel function bpf_ct_release R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 116 exceeds 80 columns #1946: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:15: + { "insert_insert", "kernel function bpf_ct_insert_entry R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 116 exceeds 80 columns #1947: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:16: + { "lookup_insert", "kernel function bpf_ct_insert_entry R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 126 exceeds 80 columns #1948: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:17: + { "set_timeout_after_insert", "kernel function bpf_ct_set_timeout R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 124 exceeds 80 columns #1949: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:18: + { "set_status_after_insert", "kernel function bpf_ct_set_status R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 124 exceeds 80 columns #1950: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:19: + { "change_timeout_after_alloc", "kernel function bpf_ct_change_timeout R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 122 exceeds 80 columns #1951: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:20: + { "change_status_after_alloc", "kernel function bpf_ct_change_status R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 82 exceeds 80 columns #1957: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:22: + { "lookup_null_bpf_tuple", "Possibly NULL pointer passed to trusted R2" }, WARNING: line length of 81 exceeds 80 columns #1958: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:23: + { "lookup_null_bpf_opts", "Possibly NULL pointer passed to trusted R4" }, WARNING: line length of 86 exceeds 80 columns #1959: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:24: + { "xdp_lookup_null_bpf_tuple", "Possibly NULL pointer passed to trusted R2" }, WARNING: line length of 85 exceeds 80 columns #1960: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:25: + { "xdp_lookup_null_bpf_opts", "Possibly NULL pointer passed to trusted R4" }, WARNING: line length of 108 exceeds 80 columns #1986: FILE: tools/testing/selftests/bpf/prog_tests/kfunc_call.c:71: + TC_FAIL(kfunc_call_test_pointer_arg_type_mismatch, 0, "R1 expected pointer to ctx, but got scalar"), WARNING: line length of 97 exceeds 80 columns #2755: FILE: tools/testing/selftests/bpf/progs/verifier_vfs_reject.c:31: +__failure __msg("R1 pointer type STRUCT task_struct must point to scalar, or struct with scalar") WARNING: line length of 121 exceeds 80 columns #2773: FILE: tools/testing/selftests/bpf/progs/verifier_vfs_reject.c:131: +__failure __msg("kernel function bpf_path_d_path R1 expected pointer to STRUCT path but R1 has a pointer to STRUCT file") WARNING: line length of 94 exceeds 80 columns #2808: FILE: tools/testing/selftests/bpf/verifier/calls.c:49: + .errstr = "max struct nesting depth exceeded\nR1 pointer type STRUCT prog_test_fail2", WARNING: line length of 85 exceeds 80 columns #2853: FILE: tools/testing/selftests/bpf/verifier/calls.c:155: + .errstr = "kernel function bpf_kfunc_call_memb1_release R1 expected pointer", total: 0 errors, 162 warnings, 1 checks, 2465 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 97250a51abd3 ("bpf: Prepare verifier logs for upcoming kfunc stack arguments") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 162 warnings, 1 checks, 2465 lines checked