WARNING: line length of 86 exceeds 80 columns #118: FILE: kernel/bpf/verifier.c:1779: + snprintf(buf, len, "*(R11-%u)", (arg - MAX_BPF_FUNC_REG_ARGS) * BPF_REG_SIZE); WARNING: line length of 84 exceeds 80 columns #139: FILE: kernel/bpf/verifier.c:4306: + int ptr_argno, int off, int size, int dst_regno) WARNING: line length of 88 exceeds 80 columns #157: FILE: kernel/bpf/verifier.c:4336: + struct bpf_reg_state *reg, int ptr_argno, int off, int size, WARNING: line length of 100 exceeds 80 columns #175: FILE: kernel/bpf/verifier.c:4412: +static int check_map_access_type(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 97 exceeds 80 columns #184: FILE: kernel/bpf/verifier.c:4434: +static int __check_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 97 exceeds 80 columns #194: FILE: kernel/bpf/verifier.c:4455: + verbose(env, "invalid access to packet, off=%d size=%d, %s(id=%d,off=%d,r=%d)\n", WARNING: line length of 85 exceeds 80 columns #195: FILE: kernel/bpf/verifier.c:4456: + off, size, reg_arg_name(env, argno), reg->id, off, mem_size); WARNING: line length of 102 exceeds 80 columns #204: FILE: kernel/bpf/verifier.c:4472: +static int check_mem_region_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 115 exceeds 80 columns #214: FILE: kernel/bpf/verifier.c:4492: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 85 exceeds 80 columns #224: FILE: kernel/bpf/verifier.c:4499: + verbose(env, "%s min value is outside of the allowed memory range\n", WARNING: line length of 103 exceeds 80 columns #235: FILE: kernel/bpf/verifier.c:4509: + verbose(env, "%s unbounded memory access, make sure to bounds check any such access\n", WARNING: line length of 85 exceeds 80 columns #245: FILE: kernel/bpf/verifier.c:4516: + verbose(env, "%s max value is outside of the allowed memory range\n", WARNING: line length of 100 exceeds 80 columns #266: FILE: kernel/bpf/verifier.c:4543: + reg_type_str(env, reg->type), reg_arg_name(env, argno), reg->var_off.value); WARNING: line length of 87 exceeds 80 columns #273: FILE: kernel/bpf/verifier.c:4548: + verbose(env, "dereference of modified %s ptr %s off=%lld disallowed\n", WARNING: line length of 100 exceeds 80 columns #274: FILE: kernel/bpf/verifier.c:4549: + reg_type_str(env, reg->type), reg_arg_name(env, argno), reg->var_off.value); WARNING: line length of 107 exceeds 80 columns #283: FILE: kernel/bpf/verifier.c:4922: +static int check_packet_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, int off, WARNING: line length of 95 exceeds 80 columns #290: FILE: kernel/bpf/verifier.c:4928: + verbose(env, "%s offset is outside of the packet\n", reg_arg_name(env, argno)); WARNING: line length of 97 exceeds 80 columns #295: FILE: kernel/bpf/verifier.c:4932: + err = check_mem_region_access(env, reg, argno, off, size, reg->range, zero_size_allowed); WARNING: line length of 109 exceeds 80 columns #304: FILE: kernel/bpf/verifier.c:4987: +static int check_ctx_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 97 exceeds 80 columns #313: FILE: kernel/bpf/verifier.c:5000: + err = check_mem_region_access(env, reg, argno, off, access_size, U16_MAX, false); WARNING: line length of 85 exceeds 80 columns #325: FILE: kernel/bpf/verifier.c:5026: + struct bpf_reg_state *reg, u32 argno, int off, int size, WARNING: line length of 115 exceeds 80 columns #334: FILE: kernel/bpf/verifier.c:5033: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 83 exceeds 80 columns #346: FILE: kernel/bpf/verifier.c:5063: + reg_arg_name(env, argno), reg_type_str(env, reg->type), off, size); WARNING: line length of 86 exceeds 80 columns #492: FILE: kernel/bpf/verifier.c:6263: + verbose(env, "invalid unbounded variable-offset%s stack %s\n", WARNING: line length of 91 exceeds 80 columns #504: FILE: kernel/bpf/verifier.c:6283: + err_extra, reg_arg_name(env, argno), min_off, access_size); WARNING: line length of 102 exceeds 80 columns #511: FILE: kernel/bpf/verifier.c:6288: + verbose(env, "invalid variable-offset%s stack %s var_off=%s off=%d size=%d\n", WARNING: line length of 95 exceeds 80 columns #512: FILE: kernel/bpf/verifier.c:6289: + err_extra, reg_arg_name(env, argno), tn_buf, off, access_size); WARNING: line length of 109 exceeds 80 columns #521: FILE: kernel/bpf/verifier.c:6334: +static int check_mem_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 89 exceeds 80 columns #549: FILE: kernel/bpf/verifier.c:6373: + err = check_map_access(env, reg, argno, off, size, false, ACCESS_DIRECT); WARNING: line length of 94 exceeds 80 columns #558: FILE: kernel/bpf/verifier.c:6420: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, argno), WARNING: line length of 88 exceeds 80 columns #567: FILE: kernel/bpf/verifier.c:6427: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 81 exceeds 80 columns #576: FILE: kernel/bpf/verifier.c:6442: + err = check_mem_region_access(env, reg, argno, off, size, WARNING: line length of 87 exceeds 80 columns #585: FILE: kernel/bpf/verifier.c:6460: + err = check_ctx_access(env, insn_idx, reg, argno, off, size, t, &info); WARNING: line length of 86 exceeds 80 columns #594: FILE: kernel/bpf/verifier.c:6497: + err = check_stack_access_within_bounds(env, reg, argno, off, size, t); WARNING: line length of 88 exceeds 80 columns #620: FILE: kernel/bpf/verifier.c:6535: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 81 exceeds 80 columns #624: FILE: kernel/bpf/verifier.c:6538: + err = check_sock_access(env, insn_idx, reg, argno, off, size, t); WARNING: line length of 82 exceeds 80 columns #635: FILE: kernel/bpf/verifier.c:6547: + err = check_ptr_to_btf_access(env, regs, reg, argno, off, size, t, WARNING: line length of 82 exceeds 80 columns #639: FILE: kernel/bpf/verifier.c:6550: + err = check_ptr_to_map_access(env, regs, reg, argno, off, size, t, WARNING: line length of 96 exceeds 80 columns #650: FILE: kernel/bpf/verifier.c:6560: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 86 exceeds 80 columns #668: FILE: kernel/bpf/verifier.c:6577: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, argno), WARNING: line length of 92 exceeds 80 columns #677: FILE: kernel/bpf/verifier.c:6831: + struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int off, WARNING: line length of 88 exceeds 80 columns #686: FILE: kernel/bpf/verifier.c:6856: + err = check_stack_access_within_bounds(env, reg, argno, off, access_size, type); WARNING: line length of 106 exceeds 80 columns #696: FILE: kernel/bpf/verifier.c:6873: + verbose(env, "%s variable offset stack access prohibited for !root, var_off=%s\n", WARNING: line length of 121 exceeds 80 columns #716: FILE: kernel/bpf/verifier.c:6957: + verbose(env, "reading from stack %s off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 93 exceeds 80 columns #717: FILE: kernel/bpf/verifier.c:6958: + reg_arg_name(env, argno), min_off, i - min_off, access_size); WARNING: line length of 86 exceeds 80 columns #721: FILE: kernel/bpf/verifier.c:6960: + verbose(env, "invalid read from stack %s off %d+%d size %d\n", WARNING: line length of 93 exceeds 80 columns #722: FILE: kernel/bpf/verifier.c:6961: + reg_arg_name(env, argno), min_off, i - min_off, access_size); WARNING: line length of 90 exceeds 80 columns #729: FILE: kernel/bpf/verifier.c:6966: + verbose(env, "invalid read from stack %s var_off %s+%d size %d\n", WARNING: line length of 92 exceeds 80 columns #730: FILE: kernel/bpf/verifier.c:6967: + reg_arg_name(env, argno), tn_buf, i - min_off, access_size); WARNING: line length of 102 exceeds 80 columns #739: FILE: kernel/bpf/verifier.c:6976: +static int check_helper_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 88 exceeds 80 columns #755: FILE: kernel/bpf/verifier.c:6992: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #763: FILE: kernel/bpf/verifier.c:6998: + if (check_map_access_type(env, reg, argno, 0, access_size, access_type)) WARNING: line length of 96 exceeds 80 columns #774: FILE: kernel/bpf/verifier.c:7006: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 96 exceeds 80 columns #788: FILE: kernel/bpf/verifier.c:7017: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 99 exceeds 80 columns #814: FILE: kernel/bpf/verifier.c:7039: + int err = check_mem_region_access(env, reg, argno, 0, access_size, U16_MAX, WARNING: line length of 97 exceeds 80 columns #844: FILE: kernel/bpf/verifier.c:7094: + verbose(env, "%s min value is negative, either use unsigned or 'var &= const'\n", WARNING: line length of 99 exceeds 80 columns #853: FILE: kernel/bpf/verifier.c:7101: + reg_arg_name(env, size_argno), size_reg->umin_value, size_reg->umax_value); WARNING: line length of 102 exceeds 80 columns #860: FILE: kernel/bpf/verifier.c:7106: + verbose(env, "%s unbounded memory access, use 'var &= const' or 'if (var < const)'\n", WARNING: line length of 84 exceeds 80 columns #865: FILE: kernel/bpf/verifier.c:7110: + err = check_helper_mem_access(env, mem_reg, mem_argno, size_reg->umax_value, WARNING: line length of 83 exceeds 80 columns #885: FILE: kernel/bpf/verifier.c:7138: + err = check_helper_mem_access(env, reg, argno, size, BPF_READ, true, NULL); WARNING: line length of 91 exceeds 80 columns #886: FILE: kernel/bpf/verifier.c:7139: + err = err ?: check_helper_mem_access(env, reg, argno, size, BPF_WRITE, true, NULL); WARNING: line length of 98 exceeds 80 columns #895: FILE: kernel/bpf/verifier.c:7148: + struct bpf_reg_state *size_reg, u32 mem_argno, u32 size_argno) WARNING: line length of 103 exceeds 80 columns #905: FILE: kernel/bpf/verifier.c:7162: + err = check_mem_size_reg(env, mem_reg, size_reg, mem_argno, size_argno, BPF_READ, true, &meta); WARNING: line length of 111 exceeds 80 columns #906: FILE: kernel/bpf/verifier.c:7163: + err = err ?: check_mem_size_reg(env, mem_reg, size_reg, mem_argno, size_argno, BPF_WRITE, true, &meta); WARNING: line length of 107 exceeds 80 columns #915: FILE: kernel/bpf/verifier.c:7199: +static int process_spin_lock(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int flags) WARNING: line length of 102 exceeds 80 columns #935: FILE: kernel/bpf/verifier.c:7315: +static int check_map_field_pointer(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 97 exceeds 80 columns #955: FILE: kernel/bpf/verifier.c:7368: +static int process_timer_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 99 exceeds 80 columns #967: FILE: kernel/bpf/verifier.c:7378: +static int process_timer_helper(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 98 exceeds 80 columns #975: FILE: kernel/bpf/verifier.c:7384: +static int process_timer_kfunc(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, WARNING: line length of 112 exceeds 80 columns #988: FILE: kernel/bpf/verifier.c:7452: +static int process_dynptr_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int insn_idx, WARNING: line length of 109 exceeds 80 columns #1039: FILE: kernel/bpf/verifier.c:7558: +static int process_iter_arg(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, int insn_idx, WARNING: line length of 92 exceeds 80 columns #1073: FILE: kernel/bpf/verifier.c:7590: + iter_type_str(meta->btf, btf_id), reg_arg_name(env, argno)); WARNING: line length of 92 exceeds 80 columns #1090: FILE: kernel/bpf/verifier.c:7614: + iter_type_str(meta->btf, btf_id), reg_arg_name(env, argno)); WARNING: line length of 93 exceeds 80 columns #1099: FILE: kernel/bpf/verifier.c:8034: +static int check_reg_type(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 argno, WARNING: line length of 95 exceeds 80 columns #1108: FILE: kernel/bpf/verifier.c:8069: + if (meta->func_id == BPF_FUNC_kptr_xchg && type_is_alloc(type) && argno == BPF_REG_2) { WARNING: line length of 101 exceeds 80 columns #1117: FILE: kernel/bpf/verifier.c:8083: + verbose(env, "%s type=%s expected=", reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #1129: FILE: kernel/bpf/verifier.c:8098: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 83 exceeds 80 columns #1138: FILE: kernel/bpf/verifier.c:8121: + verbose(env, "Possibly NULL pointer passed to helper %s\n", WARNING: line length of 83 exceeds 80 columns #1148: FILE: kernel/bpf/verifier.c:8135: + if (map_kptr_match_type(env, meta->kptr_field, reg, argno)) WARNING: line length of 92 exceeds 80 columns #1155: FILE: kernel/bpf/verifier.c:8140: + verbose(env, "%s has non-overwritten BPF_PTR_POISON type\n", WARNING: line length of 85 exceeds 80 columns #1170: FILE: kernel/bpf/verifier.c:8152: + verbose(env, "%s is of type %s but %s is expected\n", WARNING: line length of 83 exceeds 80 columns #1183: FILE: kernel/bpf/verifier.c:8172: + if (map_kptr_match_type(env, meta->kptr_field, reg, argno)) WARNING: line length of 118 exceeds 80 columns #1202: FILE: kernel/bpf/verifier.c:8232: + verbose(env, "%s must have zero offset when passed to release func or trusted arg to kfunc\n", WARNING: line length of 98 exceeds 80 columns #1241: FILE: kernel/bpf/verifier.c:8364: + verbose(env, "%s points to insn_array map which cannot be used as const string\n", WARNING: line length of 97 exceeds 80 columns #1248: FILE: kernel/bpf/verifier.c:8370: + verbose(env, "%s does not point to a readonly map'\n", reg_arg_name(env, argno)); WARNING: line length of 90 exceeds 80 columns #1254: FILE: kernel/bpf/verifier.c:8375: + verbose(env, "%s is not a constant address'\n", reg_arg_name(env, argno)); WARNING: line length of 95 exceeds 80 columns #1288: FILE: kernel/bpf/verifier.c:9319: + bpf_log(log, "%s is not a scalar\n", reg_arg_name(env, argno)); WARNING: line length of 86 exceeds 80 columns #1297: FILE: kernel/bpf/verifier.c:9329: + ret = check_func_arg_reg_off(env, reg, argno, ARG_PTR_TO_CTX); WARNING: line length of 84 exceeds 80 columns #1311: FILE: kernel/bpf/verifier.c:9341: + ret = check_func_arg_reg_off(env, reg, argno, ARG_DONTCARE); WARNING: line length of 89 exceeds 80 columns #1329: FILE: kernel/bpf/verifier.c:9360: + bpf_log(log, "%s is not a pointer to arena or scalar.\n", WARNING: line length of 89 exceeds 80 columns #1335: FILE: kernel/bpf/verifier.c:9365: + ret = check_func_arg_reg_off(env, reg, argno, ARG_PTR_TO_DYNPTR); WARNING: line length of 89 exceeds 80 columns #1340: FILE: kernel/bpf/verifier.c:9369: + ret = process_dynptr_func(env, reg, argno, -1, arg->arg_type, 0); WARNING: line length of 98 exceeds 80 columns #1350: FILE: kernel/bpf/verifier.c:9380: + err = check_reg_type(env, reg, argno, arg->arg_type, &arg->btf_id, &meta); WARNING: line length of 92 exceeds 80 columns #1351: FILE: kernel/bpf/verifier.c:9381: + err = err ?: check_func_arg_reg_off(env, reg, argno, arg->arg_type); WARNING: line length of 99 exceeds 80 columns #1376: FILE: kernel/bpf/verifier.c:11429: + verbose(env, "kernel function %s %s pointer type %s %s is not supported\n", WARNING: line length of 101 exceeds 80 columns #1388: FILE: kernel/bpf/verifier.c:11447: + verbose(env, "%s pointer type %s %s must point to %sscalar, or struct with scalar\n", WARNING: line length of 86 exceeds 80 columns #1390: FILE: kernel/bpf/verifier.c:11449: + btf_type_str(ref_t), ref_tname, arg_mem_size ? "void, " : ""); WARNING: line length of 111 exceeds 80 columns #1409: FILE: kernel/bpf/verifier.c:11518: + verbose(env, "kernel function %s %s expected pointer to %s %s but %s has a pointer to %s %s\n", WARNING: line length of 81 exceeds 80 columns #1411: FILE: kernel/bpf/verifier.c:11520: + btf_type_str(ref_t), ref_tname, reg_arg_name(env, argno), WARNING: line length of 95 exceeds 80 columns #1419: FILE: kernel/bpf/verifier.c:11527: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, CHECK: Alignment should match open parenthesis #1420: FILE: kernel/bpf/verifier.c:11528: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int argno, struct bpf_kfunc_call_arg_meta *meta) WARNING: line length of 81 exceeds 80 columns #1434: FILE: kernel/bpf/verifier.c:11555: + err = check_mem_access(env, env->insn_idx, reg, argno, 0, BPF_DW, WARNING: line length of 87 exceeds 80 columns #1478: FILE: kernel/bpf/verifier.c:11911: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_LIST_HEAD, WARNING: line length of 82 exceeds 80 columns #1484: FILE: kernel/bpf/verifier.c:11916: + struct bpf_reg_state *reg, u32 argno, WARNING: line length of 85 exceeds 80 columns #1488: FILE: kernel/bpf/verifier.c:11919: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_RB_ROOT, WARNING: line length of 82 exceeds 80 columns #1526: FILE: kernel/bpf/verifier.c:11998: + struct bpf_reg_state *reg, u32 argno, WARNING: line length of 95 exceeds 80 columns #1547: FILE: kernel/bpf/verifier.c:12076: + verbose(env, "%s is not a scalar\n", reg_arg_name(env, argno)); WARNING: line length of 85 exceeds 80 columns #1556: FILE: kernel/bpf/verifier.c:12086: + verbose(env, "%s must be a known constant\n", WARNING: line length of 84 exceeds 80 columns #1584: FILE: kernel/bpf/verifier.c:12130: + verbose(env, "Possibly NULL pointer passed to trusted %s\n", WARNING: line length of 95 exceeds 80 columns #1593: FILE: kernel/bpf/verifier.c:12137: + verifier_bug(env, "more than one arg with ref_obj_id %s %u %u", WARNING: line length of 87 exceeds 80 columns #1594: FILE: kernel/bpf/verifier.c:12138: + reg_arg_name(env, argno), reg->ref_obj_id, WARNING: line length of 113 exceeds 80 columns #1603: FILE: kernel/bpf/verifier.c:12150: + kf_arg_type = get_kfunc_ptr_arg_type(env, meta, t, ref_t, ref_tname, args, i, nargs, argno, reg); WARNING: line length of 81 exceeds 80 columns #1612: FILE: kernel/bpf/verifier.c:12159: + verbose(env, "pointer in %s isn't map pointer\n", WARNING: line length of 90 exceeds 80 columns #1622: FILE: kernel/bpf/verifier.c:12198: + verbose(env, "%s must be referenced or trusted\n", WARNING: line length of 82 exceeds 80 columns #1628: FILE: kernel/bpf/verifier.c:12203: + verbose(env, "%s must be a rcu pointer\n", WARNING: line length of 88 exceeds 80 columns #1647: FILE: kernel/bpf/verifier.c:12243: + verbose(env, "%s expected pointer to ctx, but got %s\n", WARNING: line length of 96 exceeds 80 columns #1648: FILE: kernel/bpf/verifier.c:12244: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #1657: FILE: kernel/bpf/verifier.c:12258: + verbose(env, "%s expected for bpf_obj_drop()\n", WARNING: line length of 95 exceeds 80 columns #1664: FILE: kernel/bpf/verifier.c:12264: + verbose(env, "%s expected for bpf_percpu_obj_drop()\n", WARNING: line length of 89 exceeds 80 columns #1670: FILE: kernel/bpf/verifier.c:12269: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 85 exceeds 80 columns #1681: FILE: kernel/bpf/verifier.c:12319: + dynptr_arg_type, clone_ref_obj_id); WARNING: line length of 102 exceeds 80 columns #1698: FILE: kernel/bpf/verifier.c:12351: + verbose(env, "%s expected pointer to map value or allocated object\n", WARNING: line length of 85 exceeds 80 columns #1707: FILE: kernel/bpf/verifier.c:12359: + ret = process_kf_arg_ptr_to_list_head(env, reg, argno, meta); WARNING: line length of 102 exceeds 80 columns #1715: FILE: kernel/bpf/verifier.c:12366: + verbose(env, "%s expected pointer to map value or allocated object\n", WARNING: line length of 87 exceeds 80 columns #1724: FILE: kernel/bpf/verifier.c:12374: + ret = process_kf_arg_ptr_to_rbtree_root(env, reg, argno, meta); WARNING: line length of 89 exceeds 80 columns #1731: FILE: kernel/bpf/verifier.c:12380: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 85 exceeds 80 columns #1740: FILE: kernel/bpf/verifier.c:12388: + ret = process_kf_arg_ptr_to_list_node(env, reg, argno, meta); WARNING: line length of 97 exceeds 80 columns #1748: FILE: kernel/bpf/verifier.c:12395: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 87 exceeds 80 columns #1758: FILE: kernel/bpf/verifier.c:12414: + ret = process_kf_arg_ptr_to_rbtree_node(env, reg, argno, meta); WARNING: line length of 83 exceeds 80 columns #1767: FILE: kernel/bpf/verifier.c:12429: + verbose(env, "%s is %s ", reg_arg_name(env, argno), WARNING: line length of 111 exceeds 80 columns #1775: FILE: kernel/bpf/verifier.c:12436: + ret = process_kf_arg_ptr_to_btf_id(env, reg, ref_t, ref_tname, ref_id, meta, i, argno); WARNING: line length of 107 exceeds 80 columns #1784: FILE: kernel/bpf/verifier.c:12443: + verbose(env, "%s reference type('%s %s') size cannot be determined: %ld\n", WARNING: line length of 86 exceeds 80 columns #1785: FILE: kernel/bpf/verifier.c:12444: + reg_arg_name(env, argno), btf_type_str(ref_t), WARNING: line length of 87 exceeds 80 columns #1802: FILE: kernel/bpf/verifier.c:12461: + ret = check_kfunc_mem_size_reg(env, buff_reg, size_reg, WARNING: line length of 82 exceeds 80 columns #1803: FILE: kernel/bpf/verifier.c:12462: + argno, next_argno); WARNING: line length of 90 exceeds 80 columns #1806: FILE: kernel/bpf/verifier.c:12464: + verbose(env, "%s and ", reg_arg_name(env, argno)); WARNING: line length of 108 exceeds 80 columns #1807: FILE: kernel/bpf/verifier.c:12465: + verbose(env, "%s memory, len pair leads to invalid memory access\n", WARNING: line length of 85 exceeds 80 columns #1817: FILE: kernel/bpf/verifier.c:12477: + verbose(env, "%s must be a known constant\n", WARNING: line length of 88 exceeds 80 columns #1836: FILE: kernel/bpf/verifier.c:12499: + verbose(env, "%s is neither owning or non-owning ref\n", WARNING: line length of 100 exceeds 80 columns #1846: FILE: kernel/bpf/verifier.c:12513: + verbose(env, "%s doesn't point to a type with bpf_refcount field\n", WARNING: line length of 84 exceeds 80 columns #1856: FILE: kernel/bpf/verifier.c:12523: + verbose(env, "%s doesn't point to a const string\n", WARNING: line length of 81 exceeds 80 columns #1868: FILE: kernel/bpf/verifier.c:12533: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 98 exceeds 80 columns #1873: FILE: kernel/bpf/verifier.c:12537: + ret = check_map_field_pointer(env, reg, argno, BPF_WORKQUEUE, &meta->map); WARNING: line length of 81 exceeds 80 columns #1880: FILE: kernel/bpf/verifier.c:12543: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 81 exceeds 80 columns #1892: FILE: kernel/bpf/verifier.c:12553: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 98 exceeds 80 columns #1897: FILE: kernel/bpf/verifier.c:12557: + ret = check_map_field_pointer(env, reg, argno, BPF_TASK_WORK, &meta->map); WARNING: line length of 90 exceeds 80 columns #1904: FILE: kernel/bpf/verifier.c:12563: + verbose(env, "%s doesn't point to an irq flag on stack\n", WARNING: line length of 99 exceeds 80 columns #1918: FILE: kernel/bpf/verifier.c:12576: + verbose(env, "%s doesn't point to map value or allocated object\n", WARNING: line length of 104 exceeds 80 columns #1956: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:14: + { "alloc_release", "kernel function bpf_ct_release R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 116 exceeds 80 columns #1957: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:15: + { "insert_insert", "kernel function bpf_ct_insert_entry R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 116 exceeds 80 columns #1958: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:16: + { "lookup_insert", "kernel function bpf_ct_insert_entry R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 126 exceeds 80 columns #1959: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:17: + { "set_timeout_after_insert", "kernel function bpf_ct_set_timeout R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 124 exceeds 80 columns #1960: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:18: + { "set_status_after_insert", "kernel function bpf_ct_set_status R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 124 exceeds 80 columns #1961: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:19: + { "change_timeout_after_alloc", "kernel function bpf_ct_change_timeout R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 122 exceeds 80 columns #1962: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:20: + { "change_status_after_alloc", "kernel function bpf_ct_change_status R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 82 exceeds 80 columns #1968: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:22: + { "lookup_null_bpf_tuple", "Possibly NULL pointer passed to trusted R2" }, WARNING: line length of 81 exceeds 80 columns #1969: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:23: + { "lookup_null_bpf_opts", "Possibly NULL pointer passed to trusted R4" }, WARNING: line length of 86 exceeds 80 columns #1970: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:24: + { "xdp_lookup_null_bpf_tuple", "Possibly NULL pointer passed to trusted R2" }, WARNING: line length of 85 exceeds 80 columns #1971: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:25: + { "xdp_lookup_null_bpf_opts", "Possibly NULL pointer passed to trusted R4" }, WARNING: line length of 108 exceeds 80 columns #1997: FILE: tools/testing/selftests/bpf/prog_tests/kfunc_call.c:71: + TC_FAIL(kfunc_call_test_pointer_arg_type_mismatch, 0, "R1 expected pointer to ctx, but got scalar"), WARNING: line length of 97 exceeds 80 columns #2766: FILE: tools/testing/selftests/bpf/progs/verifier_vfs_reject.c:31: +__failure __msg("R1 pointer type STRUCT task_struct must point to scalar, or struct with scalar") WARNING: line length of 121 exceeds 80 columns #2784: FILE: tools/testing/selftests/bpf/progs/verifier_vfs_reject.c:131: +__failure __msg("kernel function bpf_path_d_path R1 expected pointer to STRUCT path but R1 has a pointer to STRUCT file") WARNING: line length of 94 exceeds 80 columns #2819: FILE: tools/testing/selftests/bpf/verifier/calls.c:49: + .errstr = "max struct nesting depth exceeded\nR1 pointer type STRUCT prog_test_fail2", WARNING: line length of 85 exceeds 80 columns #2864: FILE: tools/testing/selftests/bpf/verifier/calls.c:155: + .errstr = "kernel function bpf_kfunc_call_memb1_release R1 expected pointer", total: 0 errors, 163 warnings, 1 checks, 2473 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit dfbedd682f50 ("bpf: Prepare verifier logs for upcoming kfunc stack arguments") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 163 warnings, 1 checks, 2473 lines checked