WARNING: line length of 86 exceeds 80 columns #46: FILE: kernel/bpf/verifier.c:3932: + struct bpf_reg_state *ptr_reg, int off, int size, WARNING: line length of 97 exceeds 80 columns #70: FILE: kernel/bpf/verifier.c:4243: +static int check_stack_range_initialized(struct bpf_verifier_env *env, struct bpf_reg_state *reg, WARNING: line length of 92 exceeds 80 columns #95: FILE: kernel/bpf/verifier.c:4267: +static int check_stack_read_var_off(struct bpf_verifier_env *env, struct bpf_reg_state *reg, WARNING: line length of 88 exceeds 80 columns #116: FILE: kernel/bpf/verifier.c:4298: + struct bpf_reg_state *reg, int ptr_regno, int off, int size, WARNING: line length of 89 exceeds 80 columns #164: FILE: kernel/bpf/verifier.c:4374: +static int check_map_access_type(struct bpf_verifier_env *env, struct bpf_reg_state *reg, WARNING: line length of 97 exceeds 80 columns #176: FILE: kernel/bpf/verifier.c:4396: +static int __check_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, WARNING: line length of 102 exceeds 80 columns #195: FILE: kernel/bpf/verifier.c:4434: +static int check_mem_region_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 95 exceeds 80 columns #228: FILE: kernel/bpf/verifier.c:4779: +static int check_map_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 95 exceeds 80 columns #241: FILE: kernel/bpf/verifier.c:4788: + err = check_mem_region_access(env, reg, regno, off, size, mem_size, zero_size_allowed); WARNING: line length of 107 exceeds 80 columns #250: FILE: kernel/bpf/verifier.c:4884: +static int check_packet_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 regno, int off, WARNING: line length of 97 exceeds 80 columns #262: FILE: kernel/bpf/verifier.c:4894: + err = check_mem_region_access(env, reg, regno, off, size, reg->range, zero_size_allowed); WARNING: line length of 109 exceeds 80 columns #271: FILE: kernel/bpf/verifier.c:4949: +static int check_ctx_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 97 exceeds 80 columns #285: FILE: kernel/bpf/verifier.c:4962: + err = check_mem_region_access(env, reg, regno, off, access_size, U16_MAX, false); WARNING: line length of 85 exceeds 80 columns #294: FILE: kernel/bpf/verifier.c:4988: + struct bpf_reg_state *reg, u32 regno, int off, int size, WARNING: line length of 89 exceeds 80 columns #306: FILE: kernel/bpf/verifier.c:5956: + struct bpf_reg_state *regs, struct bpf_reg_state *reg, WARNING: line length of 89 exceeds 80 columns #320: FILE: kernel/bpf/verifier.c:6112: + struct bpf_reg_state *regs, struct bpf_reg_state *reg, WARNING: line length of 109 exceeds 80 columns #347: FILE: kernel/bpf/verifier.c:6296: +static int check_mem_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 89 exceeds 80 columns #374: FILE: kernel/bpf/verifier.c:6334: + err = check_map_access(env, reg, regno, off, size, false, ACCESS_DIRECT); WARNING: line length of 81 exceeds 80 columns #383: FILE: kernel/bpf/verifier.c:6403: + err = check_mem_region_access(env, reg, regno, off, size, WARNING: line length of 87 exceeds 80 columns #392: FILE: kernel/bpf/verifier.c:6421: + err = check_ctx_access(env, insn_idx, reg, regno, off, size, t, &info); WARNING: line length of 86 exceeds 80 columns #401: FILE: kernel/bpf/verifier.c:6458: + err = check_stack_access_within_bounds(env, reg, regno, off, size, t); WARNING: line length of 81 exceeds 80 columns #429: FILE: kernel/bpf/verifier.c:6499: + err = check_sock_access(env, insn_idx, reg, regno, off, size, t); WARNING: line length of 82 exceeds 80 columns #438: FILE: kernel/bpf/verifier.c:6508: + err = check_ptr_to_btf_access(env, regs, reg, regno, off, size, t, WARNING: line length of 82 exceeds 80 columns #442: FILE: kernel/bpf/verifier.c:6511: + err = check_ptr_to_map_access(env, regs, reg, regno, off, size, t, WARNING: line length of 98 exceeds 80 columns #451: FILE: kernel/bpf/verifier.c:6580: + err = check_mem_access(env, env->insn_idx, regs + insn->src_reg, insn->src_reg, insn->off, WARNING: line length of 98 exceeds 80 columns #460: FILE: kernel/bpf/verifier.c:6610: + err = check_mem_access(env, env->insn_idx, regs + insn->dst_reg, insn->dst_reg, insn->off, WARNING: line length of 85 exceeds 80 columns #482: FILE: kernel/bpf/verifier.c:6688: + err = check_mem_access(env, env->insn_idx, dst_reg, insn->dst_reg, insn->off, WARNING: line length of 82 exceeds 80 columns #486: FILE: kernel/bpf/verifier.c:6691: + err = check_mem_access(env, env->insn_idx, dst_reg, insn->dst_reg, WARNING: line length of 85 exceeds 80 columns #495: FILE: kernel/bpf/verifier.c:6703: + err = check_mem_access(env, env->insn_idx, dst_reg, insn->dst_reg, insn->off, WARNING: line length of 92 exceeds 80 columns #504: FILE: kernel/bpf/verifier.c:6792: + struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, int off, WARNING: line length of 88 exceeds 80 columns #517: FILE: kernel/bpf/verifier.c:6817: + err = check_stack_access_within_bounds(env, reg, regno, off, access_size, type); WARNING: line length of 81 exceeds 80 columns #539: FILE: kernel/bpf/verifier.c:6959: + if (check_map_access_type(env, reg, 0, access_size, access_type)) WARNING: line length of 99 exceeds 80 columns #571: FILE: kernel/bpf/verifier.c:7000: + int err = check_mem_region_access(env, reg, regno, 0, access_size, U16_MAX, WARNING: line length of 107 exceeds 80 columns #580: FILE: kernel/bpf/verifier.c:7161: +static int process_spin_lock(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, int flags) WARNING: line length of 102 exceeds 80 columns #593: FILE: kernel/bpf/verifier.c:7277: +static int check_map_field_pointer(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 97 exceeds 80 columns #606: FILE: kernel/bpf/verifier.c:7330: +static int process_timer_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, WARNING: line length of 99 exceeds 80 columns #618: FILE: kernel/bpf/verifier.c:7340: +static int process_timer_helper(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, WARNING: line length of 98 exceeds 80 columns #626: FILE: kernel/bpf/verifier.c:7346: +static int process_timer_kfunc(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, WARNING: line length of 112 exceeds 80 columns #639: FILE: kernel/bpf/verifier.c:7414: +static int process_dynptr_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, int insn_idx, WARNING: line length of 109 exceeds 80 columns #660: FILE: kernel/bpf/verifier.c:7520: +static int process_iter_arg(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, int insn_idx, WARNING: line length of 93 exceeds 80 columns #681: FILE: kernel/bpf/verifier.c:7993: +static int check_reg_type(struct bpf_verifier_env *env, struct bpf_reg_state *reg, u32 regno, WARNING: line length of 84 exceeds 80 columns #713: FILE: kernel/bpf/verifier.c:8614: + err = process_spin_lock(env, reg, regno, PROCESS_SPIN_LOCK); WARNING: line length of 82 exceeds 80 columns #736: FILE: kernel/bpf/verifier.c:8662: + err = process_dynptr_func(env, reg, regno, insn_idx, arg_type, 0); WARNING: line length of 89 exceeds 80 columns #745: FILE: kernel/bpf/verifier.c:9321: + ret = process_dynptr_func(env, reg, regno, -1, arg->arg_type, 0); WARNING: line length of 98 exceeds 80 columns #754: FILE: kernel/bpf/verifier.c:9332: + err = check_reg_type(env, reg, regno, arg->arg_type, &arg->btf_id, &meta); WARNING: line length of 94 exceeds 80 columns #769: FILE: kernel/bpf/verifier.c:10296: + err = check_mem_access(env, insn_idx, regs + meta.regno, meta.regno, i, BPF_B, WARNING: line length of 95 exceeds 80 columns #798: FILE: kernel/bpf/verifier.c:11475: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, CHECK: Alignment should match open parenthesis #799: FILE: kernel/bpf/verifier.c:11476: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, int regno, struct bpf_kfunc_call_arg_meta *meta) WARNING: line length of 111 exceeds 80 columns #810: FILE: kernel/bpf/verifier.c:11502: + err = check_mem_access(env, env->insn_idx, reg, regno, 0, BPF_DW, BPF_WRITE, -1, false, false); WARNING: line length of 106 exceeds 80 columns #819: FILE: kernel/bpf/verifier.c:12090: + kf_arg_type = get_kfunc_ptr_arg_type(env, meta, t, ref_t, ref_tname, args, i, nargs, reg); WARNING: line length of 112 exceeds 80 columns #828: FILE: kernel/bpf/verifier.c:12252: + ret = process_dynptr_func(env, reg, regno, insn_idx, dynptr_arg_type, clone_ref_obj_id); WARNING: line length of 98 exceeds 80 columns #846: FILE: kernel/bpf/verifier.c:12454: + ret = check_map_field_pointer(env, reg, regno, BPF_WORKQUEUE, &meta->map); WARNING: line length of 98 exceeds 80 columns #864: FILE: kernel/bpf/verifier.c:12472: + ret = check_map_field_pointer(env, reg, regno, BPF_TASK_WORK, &meta->map); WARNING: line length of 86 exceeds 80 columns #900: FILE: kernel/bpf/verifier.c:13653: + if (check_map_access(env, dst_reg, dst, 0, 1, false, ACCESS_HELPER)) { WARNING: line length of 104 exceeds 80 columns #909: FILE: kernel/bpf/verifier.c:17539: + err = check_mem_access(env, env->insn_idx, cur_regs(env) + insn->dst_reg, insn->dst_reg, total: 0 errors, 54 warnings, 1 checks, 809 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 537033077c03 ("bpf: Refactor to avoid redundant calculation of bpf_reg_state") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 54 warnings, 1 checks, 809 lines checked