WARNING: do not add new typedefs #83: FILE: kernel/bpf/verifier.c:264: +typedef struct argno { WARNING: line length of 94 exceeds 80 columns #122: FILE: kernel/bpf/verifier.c:1777: + snprintf(buf, len, "*(R11-%u)", (arg - MAX_BPF_FUNC_REG_ARGS) * BPF_REG_SIZE); WARNING: line length of 81 exceeds 80 columns #139: FILE: kernel/bpf/verifier.c:4285: + argno_t argno, int off, int access_size, WARNING: line length of 88 exceeds 80 columns #148: FILE: kernel/bpf/verifier.c:4309: + argno_t ptr_argno, int off, int size, int dst_regno) WARNING: line length of 92 exceeds 80 columns #166: FILE: kernel/bpf/verifier.c:4339: + struct bpf_reg_state *reg, argno_t ptr_argno, int off, int size, WARNING: line length of 101 exceeds 80 columns #184: FILE: kernel/bpf/verifier.c:4437: +static int __check_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 97 exceeds 80 columns #194: FILE: kernel/bpf/verifier.c:4458: + verbose(env, "invalid access to packet, off=%d size=%d, %s(id=%d,off=%d,r=%d)\n", WARNING: line length of 85 exceeds 80 columns #195: FILE: kernel/bpf/verifier.c:4459: + off, size, reg_arg_name(env, argno), reg->id, off, mem_size); WARNING: line length of 106 exceeds 80 columns #204: FILE: kernel/bpf/verifier.c:4475: +static int check_mem_region_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 115 exceeds 80 columns #214: FILE: kernel/bpf/verifier.c:4495: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 85 exceeds 80 columns #224: FILE: kernel/bpf/verifier.c:4502: + verbose(env, "%s min value is outside of the allowed memory range\n", WARNING: line length of 103 exceeds 80 columns #235: FILE: kernel/bpf/verifier.c:4512: + verbose(env, "%s unbounded memory access, make sure to bounds check any such access\n", WARNING: line length of 85 exceeds 80 columns #245: FILE: kernel/bpf/verifier.c:4519: + verbose(env, "%s max value is outside of the allowed memory range\n", WARNING: line length of 100 exceeds 80 columns #266: FILE: kernel/bpf/verifier.c:4546: + reg_type_str(env, reg->type), reg_arg_name(env, argno), reg->var_off.value); WARNING: line length of 87 exceeds 80 columns #273: FILE: kernel/bpf/verifier.c:4551: + verbose(env, "dereference of modified %s ptr %s off=%lld disallowed\n", WARNING: line length of 100 exceeds 80 columns #274: FILE: kernel/bpf/verifier.c:4552: + reg_type_str(env, reg->type), reg_arg_name(env, argno), reg->var_off.value); WARNING: line length of 99 exceeds 80 columns #301: FILE: kernel/bpf/verifier.c:4820: +static int check_map_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 95 exceeds 80 columns #310: FILE: kernel/bpf/verifier.c:4829: + err = check_mem_region_access(env, reg, argno, off, size, mem_size, zero_size_allowed); WARNING: line length of 111 exceeds 80 columns #319: FILE: kernel/bpf/verifier.c:4925: +static int check_packet_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int off, WARNING: line length of 95 exceeds 80 columns #326: FILE: kernel/bpf/verifier.c:4931: + verbose(env, "%s offset is outside of the packet\n", reg_arg_name(env, argno)); WARNING: line length of 97 exceeds 80 columns #331: FILE: kernel/bpf/verifier.c:4935: + err = check_mem_region_access(env, reg, argno, off, size, reg->range, zero_size_allowed); WARNING: line length of 113 exceeds 80 columns #340: FILE: kernel/bpf/verifier.c:4990: +static int check_ctx_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 97 exceeds 80 columns #349: FILE: kernel/bpf/verifier.c:5003: + err = check_mem_region_access(env, reg, argno, off, access_size, U16_MAX, false); WARNING: line length of 89 exceeds 80 columns #361: FILE: kernel/bpf/verifier.c:5029: + struct bpf_reg_state *reg, argno_t argno, int off, int size, WARNING: line length of 115 exceeds 80 columns #370: FILE: kernel/bpf/verifier.c:5036: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 83 exceeds 80 columns #382: FILE: kernel/bpf/verifier.c:5066: + reg_arg_name(env, argno), reg_type_str(env, reg->type), off, size); WARNING: line length of 86 exceeds 80 columns #528: FILE: kernel/bpf/verifier.c:6266: + verbose(env, "invalid unbounded variable-offset%s stack %s\n", WARNING: line length of 91 exceeds 80 columns #540: FILE: kernel/bpf/verifier.c:6286: + err_extra, reg_arg_name(env, argno), min_off, access_size); WARNING: line length of 102 exceeds 80 columns #547: FILE: kernel/bpf/verifier.c:6291: + verbose(env, "invalid variable-offset%s stack %s var_off=%s off=%d size=%d\n", WARNING: line length of 95 exceeds 80 columns #548: FILE: kernel/bpf/verifier.c:6292: + err_extra, reg_arg_name(env, argno), tn_buf, off, access_size); WARNING: line length of 113 exceeds 80 columns #557: FILE: kernel/bpf/verifier.c:6337: +static int check_mem_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 89 exceeds 80 columns #581: FILE: kernel/bpf/verifier.c:6376: + err = check_map_access(env, reg, argno, off, size, false, ACCESS_DIRECT); WARNING: line length of 94 exceeds 80 columns #590: FILE: kernel/bpf/verifier.c:6423: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, argno), WARNING: line length of 88 exceeds 80 columns #599: FILE: kernel/bpf/verifier.c:6430: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 81 exceeds 80 columns #608: FILE: kernel/bpf/verifier.c:6445: + err = check_mem_region_access(env, reg, argno, off, size, WARNING: line length of 87 exceeds 80 columns #617: FILE: kernel/bpf/verifier.c:6463: + err = check_ctx_access(env, insn_idx, reg, argno, off, size, t, &info); WARNING: line length of 86 exceeds 80 columns #626: FILE: kernel/bpf/verifier.c:6500: + err = check_stack_access_within_bounds(env, reg, argno, off, size, t); WARNING: line length of 88 exceeds 80 columns #652: FILE: kernel/bpf/verifier.c:6538: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 81 exceeds 80 columns #656: FILE: kernel/bpf/verifier.c:6541: + err = check_sock_access(env, insn_idx, reg, argno, off, size, t); WARNING: line length of 82 exceeds 80 columns #667: FILE: kernel/bpf/verifier.c:6550: + err = check_ptr_to_btf_access(env, regs, reg, argno, off, size, t, WARNING: line length of 82 exceeds 80 columns #671: FILE: kernel/bpf/verifier.c:6553: + err = check_ptr_to_map_access(env, regs, reg, argno, off, size, t, WARNING: line length of 96 exceeds 80 columns #682: FILE: kernel/bpf/verifier.c:6563: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 86 exceeds 80 columns #700: FILE: kernel/bpf/verifier.c:6580: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, argno), WARNING: line length of 114 exceeds 80 columns #709: FILE: kernel/bpf/verifier.c:6622: + err = check_mem_access(env, env->insn_idx, regs + insn->src_reg, argno_from_reg(insn->src_reg), insn->off, WARNING: line length of 114 exceeds 80 columns #718: FILE: kernel/bpf/verifier.c:6652: + err = check_mem_access(env, env->insn_idx, regs + insn->dst_reg, argno_from_reg(insn->dst_reg), insn->off, WARNING: line length of 101 exceeds 80 columns #727: FILE: kernel/bpf/verifier.c:6730: + err = check_mem_access(env, env->insn_idx, dst_reg, argno_from_reg(insn->dst_reg), insn->off, WARNING: line length of 98 exceeds 80 columns #731: FILE: kernel/bpf/verifier.c:6733: + err = check_mem_access(env, env->insn_idx, dst_reg, argno_from_reg(insn->dst_reg), WARNING: line length of 101 exceeds 80 columns #740: FILE: kernel/bpf/verifier.c:6745: + err = check_mem_access(env, env->insn_idx, dst_reg, argno_from_reg(insn->dst_reg), insn->off, WARNING: line length of 96 exceeds 80 columns #749: FILE: kernel/bpf/verifier.c:6834: + struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int off, WARNING: line length of 88 exceeds 80 columns #758: FILE: kernel/bpf/verifier.c:6859: + err = check_stack_access_within_bounds(env, reg, argno, off, access_size, type); WARNING: line length of 106 exceeds 80 columns #768: FILE: kernel/bpf/verifier.c:6876: + verbose(env, "%s variable offset stack access prohibited for !root, var_off=%s\n", WARNING: line length of 121 exceeds 80 columns #788: FILE: kernel/bpf/verifier.c:6960: + verbose(env, "reading from stack %s off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 93 exceeds 80 columns #789: FILE: kernel/bpf/verifier.c:6961: + reg_arg_name(env, argno), min_off, i - min_off, access_size); WARNING: line length of 86 exceeds 80 columns #793: FILE: kernel/bpf/verifier.c:6963: + verbose(env, "invalid read from stack %s off %d+%d size %d\n", WARNING: line length of 93 exceeds 80 columns #794: FILE: kernel/bpf/verifier.c:6964: + reg_arg_name(env, argno), min_off, i - min_off, access_size); WARNING: line length of 90 exceeds 80 columns #801: FILE: kernel/bpf/verifier.c:6969: + verbose(env, "invalid read from stack %s var_off %s+%d size %d\n", WARNING: line length of 92 exceeds 80 columns #802: FILE: kernel/bpf/verifier.c:6970: + reg_arg_name(env, argno), tn_buf, i - min_off, access_size); WARNING: line length of 106 exceeds 80 columns #811: FILE: kernel/bpf/verifier.c:6979: +static int check_helper_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 88 exceeds 80 columns #827: FILE: kernel/bpf/verifier.c:6995: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 96 exceeds 80 columns #845: FILE: kernel/bpf/verifier.c:7009: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 96 exceeds 80 columns #859: FILE: kernel/bpf/verifier.c:7020: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 99 exceeds 80 columns #885: FILE: kernel/bpf/verifier.c:7042: + int err = check_mem_region_access(env, reg, argno, 0, access_size, U16_MAX, WARNING: line length of 83 exceeds 80 columns #905: FILE: kernel/bpf/verifier.c:7072: + argno_t size_argno, enum bpf_access_type access_type, WARNING: line length of 97 exceeds 80 columns #915: FILE: kernel/bpf/verifier.c:7097: + verbose(env, "%s min value is negative, either use unsigned or 'var &= const'\n", WARNING: line length of 99 exceeds 80 columns #924: FILE: kernel/bpf/verifier.c:7104: + reg_arg_name(env, size_argno), size_reg->umin_value, size_reg->umax_value); WARNING: line length of 102 exceeds 80 columns #931: FILE: kernel/bpf/verifier.c:7109: + verbose(env, "%s unbounded memory access, use 'var &= const' or 'if (var < const)'\n", WARNING: line length of 84 exceeds 80 columns #936: FILE: kernel/bpf/verifier.c:7113: + err = check_helper_mem_access(env, mem_reg, mem_argno, size_reg->umax_value, WARNING: line length of 83 exceeds 80 columns #956: FILE: kernel/bpf/verifier.c:7141: + err = check_helper_mem_access(env, reg, argno, size, BPF_READ, true, NULL); WARNING: line length of 91 exceeds 80 columns #957: FILE: kernel/bpf/verifier.c:7142: + err = err ?: check_helper_mem_access(env, reg, argno, size, BPF_WRITE, true, NULL); WARNING: line length of 106 exceeds 80 columns #966: FILE: kernel/bpf/verifier.c:7151: + struct bpf_reg_state *size_reg, argno_t mem_argno, argno_t size_argno) WARNING: line length of 103 exceeds 80 columns #976: FILE: kernel/bpf/verifier.c:7165: + err = check_mem_size_reg(env, mem_reg, size_reg, mem_argno, size_argno, BPF_READ, true, &meta); WARNING: line length of 111 exceeds 80 columns #977: FILE: kernel/bpf/verifier.c:7166: + err = err ?: check_mem_size_reg(env, mem_reg, size_reg, mem_argno, size_argno, BPF_WRITE, true, &meta); WARNING: line length of 111 exceeds 80 columns #986: FILE: kernel/bpf/verifier.c:7202: +static int process_spin_lock(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int flags) WARNING: line length of 106 exceeds 80 columns #1006: FILE: kernel/bpf/verifier.c:7318: +static int check_map_field_pointer(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 101 exceeds 80 columns #1026: FILE: kernel/bpf/verifier.c:7371: +static int process_timer_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 103 exceeds 80 columns #1038: FILE: kernel/bpf/verifier.c:7381: +static int process_timer_helper(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 102 exceeds 80 columns #1046: FILE: kernel/bpf/verifier.c:7387: +static int process_timer_kfunc(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 116 exceeds 80 columns #1059: FILE: kernel/bpf/verifier.c:7455: +static int process_dynptr_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int insn_idx, WARNING: line length of 113 exceeds 80 columns #1110: FILE: kernel/bpf/verifier.c:7561: +static int process_iter_arg(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int insn_idx, WARNING: line length of 92 exceeds 80 columns #1144: FILE: kernel/bpf/verifier.c:7593: + iter_type_str(meta->btf, btf_id), reg_arg_name(env, argno)); WARNING: line length of 92 exceeds 80 columns #1161: FILE: kernel/bpf/verifier.c:7617: + iter_type_str(meta->btf, btf_id), reg_arg_name(env, argno)); WARNING: line length of 97 exceeds 80 columns #1170: FILE: kernel/bpf/verifier.c:8037: +static int check_reg_type(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 111 exceeds 80 columns #1179: FILE: kernel/bpf/verifier.c:8072: + if (meta->func_id == BPF_FUNC_kptr_xchg && type_is_alloc(type) && reg_from_argno(argno) == BPF_REG_2) { WARNING: line length of 101 exceeds 80 columns #1188: FILE: kernel/bpf/verifier.c:8086: + verbose(env, "%s type=%s expected=", reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #1200: FILE: kernel/bpf/verifier.c:8101: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 83 exceeds 80 columns #1209: FILE: kernel/bpf/verifier.c:8124: + verbose(env, "Possibly NULL pointer passed to helper %s\n", WARNING: line length of 99 exceeds 80 columns #1219: FILE: kernel/bpf/verifier.c:8138: + if (map_kptr_match_type(env, meta->kptr_field, reg, reg_from_argno(argno))) WARNING: line length of 92 exceeds 80 columns #1226: FILE: kernel/bpf/verifier.c:8143: + verbose(env, "%s has non-overwritten BPF_PTR_POISON type\n", WARNING: line length of 85 exceeds 80 columns #1241: FILE: kernel/bpf/verifier.c:8155: + verbose(env, "%s is of type %s but %s is expected\n", WARNING: line length of 83 exceeds 80 columns #1257: FILE: kernel/bpf/verifier.c:8178: + map_kptr_match_type(env, meta->kptr_field, reg, regno)) WARNING: line length of 81 exceeds 80 columns #1266: FILE: kernel/bpf/verifier.c:8212: + const struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 118 exceeds 80 columns #1276: FILE: kernel/bpf/verifier.c:8238: + verbose(env, "%s must have zero offset when passed to release func or trusted arg to kfunc\n", WARNING: line length of 98 exceeds 80 columns #1315: FILE: kernel/bpf/verifier.c:8370: + verbose(env, "%s points to insn_array map which cannot be used as const string\n", WARNING: line length of 97 exceeds 80 columns #1322: FILE: kernel/bpf/verifier.c:8376: + verbose(env, "%s does not point to a readonly map'\n", reg_arg_name(env, argno)); WARNING: line length of 90 exceeds 80 columns #1328: FILE: kernel/bpf/verifier.c:8381: + verbose(env, "%s is not a constant address'\n", reg_arg_name(env, argno)); WARNING: line length of 90 exceeds 80 columns #1346: FILE: kernel/bpf/verifier.c:8526: + err = check_reg_type(env, reg, argno_from_reg(regno), arg_type, arg_btf_id, meta); WARNING: line length of 112 exceeds 80 columns #1360: FILE: kernel/bpf/verifier.c:8619: + err = check_helper_mem_access(env, reg, argno_from_reg(regno), key_size, BPF_READ, false, NULL); WARNING: line length of 105 exceeds 80 columns #1369: FILE: kernel/bpf/verifier.c:8646: + err = check_helper_mem_access(env, reg, argno_from_reg(regno), meta->map.ptr->value_size, WARNING: line length of 100 exceeds 80 columns #1378: FILE: kernel/bpf/verifier.c:8664: + err = process_spin_lock(env, reg, argno_from_reg(regno), PROCESS_SPIN_LOCK); WARNING: line length of 84 exceeds 80 columns #1383: FILE: kernel/bpf/verifier.c:8668: + err = process_spin_lock(env, reg, argno_from_reg(regno), 0); WARNING: line length of 82 exceeds 80 columns #1392: FILE: kernel/bpf/verifier.c:8677: + err = process_timer_helper(env, reg, argno_from_reg(regno), meta); WARNING: line length of 105 exceeds 80 columns #1401: FILE: kernel/bpf/verifier.c:8690: + err = check_helper_mem_access(env, reg, argno_from_reg(regno), fn->arg_size[arg], WARNING: line length of 104 exceeds 80 columns #1410: FILE: kernel/bpf/verifier.c:8700: + err = check_mem_size_reg(env, reg_state(env, regno - 1), reg, argno_from_reg(regno - 1), WARNING: line length of 104 exceeds 80 columns #1418: FILE: kernel/bpf/verifier.c:8707: + err = check_mem_size_reg(env, reg_state(env, regno - 1), reg, argno_from_reg(regno - 1), WARNING: line length of 98 exceeds 80 columns #1426: FILE: kernel/bpf/verifier.c:8714: + err = process_dynptr_func(env, reg, argno_from_reg(regno), insn_idx, arg_type, 0); WARNING: line length of 95 exceeds 80 columns #1451: FILE: kernel/bpf/verifier.c:9327: + bpf_log(log, "%s is not a scalar\n", reg_arg_name(env, argno)); WARNING: line length of 86 exceeds 80 columns #1460: FILE: kernel/bpf/verifier.c:9337: + ret = check_func_arg_reg_off(env, reg, argno, ARG_PTR_TO_CTX); WARNING: line length of 84 exceeds 80 columns #1474: FILE: kernel/bpf/verifier.c:9349: + ret = check_func_arg_reg_off(env, reg, argno, ARG_DONTCARE); WARNING: line length of 89 exceeds 80 columns #1492: FILE: kernel/bpf/verifier.c:9368: + bpf_log(log, "%s is not a pointer to arena or scalar.\n", WARNING: line length of 89 exceeds 80 columns #1498: FILE: kernel/bpf/verifier.c:9373: + ret = check_func_arg_reg_off(env, reg, argno, ARG_PTR_TO_DYNPTR); WARNING: line length of 89 exceeds 80 columns #1503: FILE: kernel/bpf/verifier.c:9377: + ret = process_dynptr_func(env, reg, argno, -1, arg->arg_type, 0); WARNING: line length of 98 exceeds 80 columns #1513: FILE: kernel/bpf/verifier.c:9388: + err = check_reg_type(env, reg, argno, arg->arg_type, &arg->btf_id, &meta); WARNING: line length of 92 exceeds 80 columns #1514: FILE: kernel/bpf/verifier.c:9389: + err = err ?: check_func_arg_reg_off(env, reg, argno, arg->arg_type); WARNING: line length of 110 exceeds 80 columns #1529: FILE: kernel/bpf/verifier.c:10353: + err = check_mem_access(env, insn_idx, regs + meta.regno, argno_from_reg(meta.regno), i, BPF_B, WARNING: line length of 84 exceeds 80 columns #1538: FILE: kernel/bpf/verifier.c:11362: + int arg, int nargs, argno_t argno, struct bpf_reg_state *reg) WARNING: line length of 99 exceeds 80 columns #1548: FILE: kernel/bpf/verifier.c:11437: + verbose(env, "kernel function %s %s pointer type %s %s is not supported\n", WARNING: line length of 101 exceeds 80 columns #1560: FILE: kernel/bpf/verifier.c:11455: + verbose(env, "%s pointer type %s %s must point to %sscalar, or struct with scalar\n", WARNING: line length of 86 exceeds 80 columns #1562: FILE: kernel/bpf/verifier.c:11457: + btf_type_str(ref_t), ref_tname, arg_mem_size ? "void, " : ""); WARNING: line length of 111 exceeds 80 columns #1581: FILE: kernel/bpf/verifier.c:11526: + verbose(env, "kernel function %s %s expected pointer to %s %s but %s has a pointer to %s %s\n", WARNING: line length of 81 exceeds 80 columns #1583: FILE: kernel/bpf/verifier.c:11528: + btf_type_str(ref_t), ref_tname, reg_arg_name(env, argno), WARNING: line length of 99 exceeds 80 columns #1591: FILE: kernel/bpf/verifier.c:11535: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, CHECK: Alignment should match open parenthesis #1592: FILE: kernel/bpf/verifier.c:11536: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, struct bpf_kfunc_call_arg_meta *meta) WARNING: line length of 81 exceeds 80 columns #1606: FILE: kernel/bpf/verifier.c:11563: + err = check_mem_access(env, env->insn_idx, reg, argno, 0, BPF_DW, WARNING: line length of 84 exceeds 80 columns #1646: FILE: kernel/bpf/verifier.c:11916: + struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 87 exceeds 80 columns #1650: FILE: kernel/bpf/verifier.c:11919: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_LIST_HEAD, WARNING: line length of 86 exceeds 80 columns #1656: FILE: kernel/bpf/verifier.c:11924: + struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 85 exceeds 80 columns #1660: FILE: kernel/bpf/verifier.c:11927: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_RB_ROOT, WARNING: line length of 84 exceeds 80 columns #1687: FILE: kernel/bpf/verifier.c:11997: + struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 86 exceeds 80 columns #1698: FILE: kernel/bpf/verifier.c:12006: + struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 95 exceeds 80 columns #1719: FILE: kernel/bpf/verifier.c:12084: + verbose(env, "%s is not a scalar\n", reg_arg_name(env, argno)); WARNING: line length of 85 exceeds 80 columns #1728: FILE: kernel/bpf/verifier.c:12094: + verbose(env, "%s must be a known constant\n", WARNING: line length of 84 exceeds 80 columns #1756: FILE: kernel/bpf/verifier.c:12138: + verbose(env, "Possibly NULL pointer passed to trusted %s\n", WARNING: line length of 95 exceeds 80 columns #1765: FILE: kernel/bpf/verifier.c:12145: + verifier_bug(env, "more than one arg with ref_obj_id %s %u %u", WARNING: line length of 87 exceeds 80 columns #1766: FILE: kernel/bpf/verifier.c:12146: + reg_arg_name(env, argno), reg->ref_obj_id, WARNING: line length of 113 exceeds 80 columns #1775: FILE: kernel/bpf/verifier.c:12158: + kf_arg_type = get_kfunc_ptr_arg_type(env, meta, t, ref_t, ref_tname, args, i, nargs, argno, reg); WARNING: line length of 81 exceeds 80 columns #1784: FILE: kernel/bpf/verifier.c:12167: + verbose(env, "pointer in %s isn't map pointer\n", WARNING: line length of 90 exceeds 80 columns #1794: FILE: kernel/bpf/verifier.c:12206: + verbose(env, "%s must be referenced or trusted\n", WARNING: line length of 82 exceeds 80 columns #1800: FILE: kernel/bpf/verifier.c:12211: + verbose(env, "%s must be a rcu pointer\n", WARNING: line length of 88 exceeds 80 columns #1819: FILE: kernel/bpf/verifier.c:12251: + verbose(env, "%s expected pointer to ctx, but got %s\n", WARNING: line length of 96 exceeds 80 columns #1820: FILE: kernel/bpf/verifier.c:12252: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #1829: FILE: kernel/bpf/verifier.c:12266: + verbose(env, "%s expected for bpf_obj_drop()\n", WARNING: line length of 95 exceeds 80 columns #1836: FILE: kernel/bpf/verifier.c:12272: + verbose(env, "%s expected for bpf_percpu_obj_drop()\n", WARNING: line length of 89 exceeds 80 columns #1842: FILE: kernel/bpf/verifier.c:12277: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 85 exceeds 80 columns #1853: FILE: kernel/bpf/verifier.c:12327: + dynptr_arg_type, clone_ref_obj_id); WARNING: line length of 102 exceeds 80 columns #1870: FILE: kernel/bpf/verifier.c:12359: + verbose(env, "%s expected pointer to map value or allocated object\n", WARNING: line length of 85 exceeds 80 columns #1879: FILE: kernel/bpf/verifier.c:12367: + ret = process_kf_arg_ptr_to_list_head(env, reg, argno, meta); WARNING: line length of 102 exceeds 80 columns #1887: FILE: kernel/bpf/verifier.c:12374: + verbose(env, "%s expected pointer to map value or allocated object\n", WARNING: line length of 87 exceeds 80 columns #1896: FILE: kernel/bpf/verifier.c:12382: + ret = process_kf_arg_ptr_to_rbtree_root(env, reg, argno, meta); WARNING: line length of 89 exceeds 80 columns #1903: FILE: kernel/bpf/verifier.c:12388: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 85 exceeds 80 columns #1912: FILE: kernel/bpf/verifier.c:12396: + ret = process_kf_arg_ptr_to_list_node(env, reg, argno, meta); WARNING: line length of 97 exceeds 80 columns #1920: FILE: kernel/bpf/verifier.c:12403: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 87 exceeds 80 columns #1930: FILE: kernel/bpf/verifier.c:12422: + ret = process_kf_arg_ptr_to_rbtree_node(env, reg, argno, meta); WARNING: line length of 83 exceeds 80 columns #1939: FILE: kernel/bpf/verifier.c:12437: + verbose(env, "%s is %s ", reg_arg_name(env, argno), WARNING: line length of 111 exceeds 80 columns #1947: FILE: kernel/bpf/verifier.c:12444: + ret = process_kf_arg_ptr_to_btf_id(env, reg, ref_t, ref_tname, ref_id, meta, i, argno); WARNING: line length of 107 exceeds 80 columns #1956: FILE: kernel/bpf/verifier.c:12451: + verbose(env, "%s reference type('%s %s') size cannot be determined: %ld\n", WARNING: line length of 86 exceeds 80 columns #1957: FILE: kernel/bpf/verifier.c:12452: + reg_arg_name(env, argno), btf_type_str(ref_t), WARNING: line length of 87 exceeds 80 columns #1974: FILE: kernel/bpf/verifier.c:12469: + ret = check_kfunc_mem_size_reg(env, buff_reg, size_reg, WARNING: line length of 82 exceeds 80 columns #1975: FILE: kernel/bpf/verifier.c:12470: + argno, next_argno); WARNING: line length of 90 exceeds 80 columns #1978: FILE: kernel/bpf/verifier.c:12472: + verbose(env, "%s and ", reg_arg_name(env, argno)); WARNING: line length of 108 exceeds 80 columns #1979: FILE: kernel/bpf/verifier.c:12473: + verbose(env, "%s memory, len pair leads to invalid memory access\n", WARNING: line length of 85 exceeds 80 columns #1989: FILE: kernel/bpf/verifier.c:12485: + verbose(env, "%s must be a known constant\n", WARNING: line length of 104 exceeds 80 columns #1999: FILE: kernel/bpf/verifier.c:12499: + verbose(env, "%s expected pointer to func\n", reg_arg_name(env, argno)); WARNING: line length of 88 exceeds 80 columns #2007: FILE: kernel/bpf/verifier.c:12506: + verbose(env, "%s is neither owning or non-owning ref\n", WARNING: line length of 100 exceeds 80 columns #2017: FILE: kernel/bpf/verifier.c:12520: + verbose(env, "%s doesn't point to a type with bpf_refcount field\n", WARNING: line length of 84 exceeds 80 columns #2027: FILE: kernel/bpf/verifier.c:12530: + verbose(env, "%s doesn't point to a const string\n", WARNING: line length of 81 exceeds 80 columns #2039: FILE: kernel/bpf/verifier.c:12540: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 98 exceeds 80 columns #2044: FILE: kernel/bpf/verifier.c:12544: + ret = check_map_field_pointer(env, reg, argno, BPF_WORKQUEUE, &meta->map); WARNING: line length of 81 exceeds 80 columns #2051: FILE: kernel/bpf/verifier.c:12550: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 81 exceeds 80 columns #2063: FILE: kernel/bpf/verifier.c:12560: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 98 exceeds 80 columns #2068: FILE: kernel/bpf/verifier.c:12564: + ret = check_map_field_pointer(env, reg, argno, BPF_TASK_WORK, &meta->map); WARNING: line length of 90 exceeds 80 columns #2075: FILE: kernel/bpf/verifier.c:12570: + verbose(env, "%s doesn't point to an irq flag on stack\n", WARNING: line length of 99 exceeds 80 columns #2089: FILE: kernel/bpf/verifier.c:12583: + verbose(env, "%s doesn't point to map value or allocated object\n", WARNING: line length of 102 exceeds 80 columns #2108: FILE: kernel/bpf/verifier.c:13747: + if (check_map_access(env, dst_reg, argno_from_reg(dst), 0, 1, false, ACCESS_HELPER)) { WARNING: line length of 91 exceeds 80 columns #2117: FILE: kernel/bpf/verifier.c:16929: + return __check_ptr_off_reg(env, reg, argno_from_reg(regno), false); WARNING: line length of 120 exceeds 80 columns #2126: FILE: kernel/bpf/verifier.c:17633: + err = check_mem_access(env, env->insn_idx, cur_regs(env) + insn->dst_reg, argno_from_reg(insn->dst_reg), WARNING: line length of 104 exceeds 80 columns #2154: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:14: + { "alloc_release", "kernel function bpf_ct_release R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 116 exceeds 80 columns #2155: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:15: + { "insert_insert", "kernel function bpf_ct_insert_entry R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 116 exceeds 80 columns #2156: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:16: + { "lookup_insert", "kernel function bpf_ct_insert_entry R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 126 exceeds 80 columns #2157: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:17: + { "set_timeout_after_insert", "kernel function bpf_ct_set_timeout R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 124 exceeds 80 columns #2158: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:18: + { "set_status_after_insert", "kernel function bpf_ct_set_status R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 124 exceeds 80 columns #2159: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:19: + { "change_timeout_after_alloc", "kernel function bpf_ct_change_timeout R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 122 exceeds 80 columns #2160: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:20: + { "change_status_after_alloc", "kernel function bpf_ct_change_status R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 82 exceeds 80 columns #2166: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:22: + { "lookup_null_bpf_tuple", "Possibly NULL pointer passed to trusted R2" }, WARNING: line length of 81 exceeds 80 columns #2167: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:23: + { "lookup_null_bpf_opts", "Possibly NULL pointer passed to trusted R4" }, WARNING: line length of 86 exceeds 80 columns #2168: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:24: + { "xdp_lookup_null_bpf_tuple", "Possibly NULL pointer passed to trusted R2" }, WARNING: line length of 85 exceeds 80 columns #2169: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:25: + { "xdp_lookup_null_bpf_opts", "Possibly NULL pointer passed to trusted R4" }, WARNING: line length of 108 exceeds 80 columns #2195: FILE: tools/testing/selftests/bpf/prog_tests/kfunc_call.c:71: + TC_FAIL(kfunc_call_test_pointer_arg_type_mismatch, 0, "R1 expected pointer to ctx, but got scalar"), WARNING: line length of 97 exceeds 80 columns #2964: FILE: tools/testing/selftests/bpf/progs/verifier_vfs_reject.c:31: +__failure __msg("R1 pointer type STRUCT task_struct must point to scalar, or struct with scalar") WARNING: line length of 121 exceeds 80 columns #2982: FILE: tools/testing/selftests/bpf/progs/verifier_vfs_reject.c:131: +__failure __msg("kernel function bpf_path_d_path R1 expected pointer to STRUCT path but R1 has a pointer to STRUCT file") WARNING: line length of 94 exceeds 80 columns #3017: FILE: tools/testing/selftests/bpf/verifier/calls.c:49: + .errstr = "max struct nesting depth exceeded\nR1 pointer type STRUCT prog_test_fail2", WARNING: line length of 85 exceeds 80 columns #3062: FILE: tools/testing/selftests/bpf/verifier/calls.c:155: + .errstr = "kernel function bpf_kfunc_call_memb1_release R1 expected pointer", total: 0 errors, 190 warnings, 1 checks, 2653 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit db1fd529328c ("bpf: Prepare verifier logs for upcoming kfunc stack arguments") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 190 warnings, 1 checks, 2653 lines checked