WARNING: do not add new typedefs #83: FILE: kernel/bpf/verifier.c:264: +typedef struct argno { WARNING: line length of 94 exceeds 80 columns #130: FILE: kernel/bpf/verifier.c:1785: + snprintf(buf, len, "*(R11-%u)", (arg - MAX_BPF_FUNC_REG_ARGS) * BPF_REG_SIZE); WARNING: line length of 81 exceeds 80 columns #144: FILE: kernel/bpf/verifier.c:4290: + argno_t argno, int off, int access_size, WARNING: line length of 88 exceeds 80 columns #153: FILE: kernel/bpf/verifier.c:4314: + argno_t ptr_argno, int off, int size, int dst_regno) WARNING: line length of 92 exceeds 80 columns #171: FILE: kernel/bpf/verifier.c:4344: + struct bpf_reg_state *reg, argno_t ptr_argno, int off, int size, WARNING: line length of 101 exceeds 80 columns #189: FILE: kernel/bpf/verifier.c:4442: +static int __check_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 97 exceeds 80 columns #199: FILE: kernel/bpf/verifier.c:4463: + verbose(env, "invalid access to packet, off=%d size=%d, %s(id=%d,off=%d,r=%d)\n", WARNING: line length of 85 exceeds 80 columns #200: FILE: kernel/bpf/verifier.c:4464: + off, size, reg_arg_name(env, argno), reg->id, off, mem_size); WARNING: line length of 106 exceeds 80 columns #209: FILE: kernel/bpf/verifier.c:4480: +static int check_mem_region_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 115 exceeds 80 columns #219: FILE: kernel/bpf/verifier.c:4500: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 85 exceeds 80 columns #229: FILE: kernel/bpf/verifier.c:4507: + verbose(env, "%s min value is outside of the allowed memory range\n", WARNING: line length of 103 exceeds 80 columns #240: FILE: kernel/bpf/verifier.c:4517: + verbose(env, "%s unbounded memory access, make sure to bounds check any such access\n", WARNING: line length of 85 exceeds 80 columns #250: FILE: kernel/bpf/verifier.c:4524: + verbose(env, "%s max value is outside of the allowed memory range\n", WARNING: line length of 100 exceeds 80 columns #271: FILE: kernel/bpf/verifier.c:4551: + reg_type_str(env, reg->type), reg_arg_name(env, argno), reg->var_off.value); WARNING: line length of 87 exceeds 80 columns #278: FILE: kernel/bpf/verifier.c:4556: + verbose(env, "dereference of modified %s ptr %s off=%lld disallowed\n", WARNING: line length of 100 exceeds 80 columns #279: FILE: kernel/bpf/verifier.c:4557: + reg_type_str(env, reg->type), reg_arg_name(env, argno), reg->var_off.value); WARNING: line length of 99 exceeds 80 columns #306: FILE: kernel/bpf/verifier.c:4825: +static int check_map_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 95 exceeds 80 columns #315: FILE: kernel/bpf/verifier.c:4834: + err = check_mem_region_access(env, reg, argno, off, size, mem_size, zero_size_allowed); WARNING: line length of 111 exceeds 80 columns #324: FILE: kernel/bpf/verifier.c:4930: +static int check_packet_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int off, WARNING: line length of 95 exceeds 80 columns #331: FILE: kernel/bpf/verifier.c:4936: + verbose(env, "%s offset is outside of the packet\n", reg_arg_name(env, argno)); WARNING: line length of 97 exceeds 80 columns #336: FILE: kernel/bpf/verifier.c:4940: + err = check_mem_region_access(env, reg, argno, off, size, reg->range, zero_size_allowed); WARNING: line length of 113 exceeds 80 columns #345: FILE: kernel/bpf/verifier.c:4995: +static int check_ctx_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 97 exceeds 80 columns #354: FILE: kernel/bpf/verifier.c:5008: + err = check_mem_region_access(env, reg, argno, off, access_size, U16_MAX, false); WARNING: line length of 89 exceeds 80 columns #366: FILE: kernel/bpf/verifier.c:5034: + struct bpf_reg_state *reg, argno_t argno, int off, int size, WARNING: line length of 115 exceeds 80 columns #375: FILE: kernel/bpf/verifier.c:5041: + verbose(env, "%s min value is negative, either use unsigned index or do a if (index >=0) check.\n", WARNING: line length of 83 exceeds 80 columns #387: FILE: kernel/bpf/verifier.c:5071: + reg_arg_name(env, argno), reg_type_str(env, reg->type), off, size); WARNING: line length of 86 exceeds 80 columns #533: FILE: kernel/bpf/verifier.c:6271: + verbose(env, "invalid unbounded variable-offset%s stack %s\n", WARNING: line length of 91 exceeds 80 columns #545: FILE: kernel/bpf/verifier.c:6291: + err_extra, reg_arg_name(env, argno), min_off, access_size); WARNING: line length of 102 exceeds 80 columns #552: FILE: kernel/bpf/verifier.c:6296: + verbose(env, "invalid variable-offset%s stack %s var_off=%s off=%d size=%d\n", WARNING: line length of 95 exceeds 80 columns #553: FILE: kernel/bpf/verifier.c:6297: + err_extra, reg_arg_name(env, argno), tn_buf, off, access_size); WARNING: line length of 113 exceeds 80 columns #562: FILE: kernel/bpf/verifier.c:6342: +static int check_mem_access(struct bpf_verifier_env *env, int insn_idx, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 89 exceeds 80 columns #586: FILE: kernel/bpf/verifier.c:6381: + err = check_map_access(env, reg, argno, off, size, false, ACCESS_DIRECT); WARNING: line length of 94 exceeds 80 columns #595: FILE: kernel/bpf/verifier.c:6428: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, argno), WARNING: line length of 88 exceeds 80 columns #604: FILE: kernel/bpf/verifier.c:6435: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 81 exceeds 80 columns #613: FILE: kernel/bpf/verifier.c:6450: + err = check_mem_region_access(env, reg, argno, off, size, WARNING: line length of 87 exceeds 80 columns #622: FILE: kernel/bpf/verifier.c:6468: + err = check_ctx_access(env, insn_idx, reg, argno, off, size, t, &info); WARNING: line length of 86 exceeds 80 columns #631: FILE: kernel/bpf/verifier.c:6505: + err = check_stack_access_within_bounds(env, reg, argno, off, size, t); WARNING: line length of 88 exceeds 80 columns #657: FILE: kernel/bpf/verifier.c:6543: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 81 exceeds 80 columns #661: FILE: kernel/bpf/verifier.c:6546: + err = check_sock_access(env, insn_idx, reg, argno, off, size, t); WARNING: line length of 82 exceeds 80 columns #672: FILE: kernel/bpf/verifier.c:6555: + err = check_ptr_to_btf_access(env, regs, reg, argno, off, size, t, WARNING: line length of 82 exceeds 80 columns #676: FILE: kernel/bpf/verifier.c:6558: + err = check_ptr_to_map_access(env, regs, reg, argno, off, size, t, WARNING: line length of 96 exceeds 80 columns #687: FILE: kernel/bpf/verifier.c:6568: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 86 exceeds 80 columns #705: FILE: kernel/bpf/verifier.c:6585: + verbose(env, "%s invalid mem access '%s'\n", reg_arg_name(env, argno), WARNING: line length of 114 exceeds 80 columns #714: FILE: kernel/bpf/verifier.c:6627: + err = check_mem_access(env, env->insn_idx, regs + insn->src_reg, argno_from_reg(insn->src_reg), insn->off, WARNING: line length of 114 exceeds 80 columns #723: FILE: kernel/bpf/verifier.c:6657: + err = check_mem_access(env, env->insn_idx, regs + insn->dst_reg, argno_from_reg(insn->dst_reg), insn->off, WARNING: line length of 101 exceeds 80 columns #732: FILE: kernel/bpf/verifier.c:6735: + err = check_mem_access(env, env->insn_idx, dst_reg, argno_from_reg(insn->dst_reg), insn->off, WARNING: line length of 98 exceeds 80 columns #736: FILE: kernel/bpf/verifier.c:6738: + err = check_mem_access(env, env->insn_idx, dst_reg, argno_from_reg(insn->dst_reg), WARNING: line length of 101 exceeds 80 columns #745: FILE: kernel/bpf/verifier.c:6750: + err = check_mem_access(env, env->insn_idx, dst_reg, argno_from_reg(insn->dst_reg), insn->off, WARNING: line length of 96 exceeds 80 columns #754: FILE: kernel/bpf/verifier.c:6839: + struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int off, WARNING: line length of 88 exceeds 80 columns #763: FILE: kernel/bpf/verifier.c:6864: + err = check_stack_access_within_bounds(env, reg, argno, off, access_size, type); WARNING: line length of 106 exceeds 80 columns #773: FILE: kernel/bpf/verifier.c:6881: + verbose(env, "%s variable offset stack access prohibited for !root, var_off=%s\n", WARNING: line length of 121 exceeds 80 columns #793: FILE: kernel/bpf/verifier.c:6965: + verbose(env, "reading from stack %s off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 93 exceeds 80 columns #794: FILE: kernel/bpf/verifier.c:6966: + reg_arg_name(env, argno), min_off, i - min_off, access_size); WARNING: line length of 86 exceeds 80 columns #798: FILE: kernel/bpf/verifier.c:6968: + verbose(env, "invalid read from stack %s off %d+%d size %d\n", WARNING: line length of 93 exceeds 80 columns #799: FILE: kernel/bpf/verifier.c:6969: + reg_arg_name(env, argno), min_off, i - min_off, access_size); WARNING: line length of 90 exceeds 80 columns #806: FILE: kernel/bpf/verifier.c:6974: + verbose(env, "invalid read from stack %s var_off %s+%d size %d\n", WARNING: line length of 92 exceeds 80 columns #807: FILE: kernel/bpf/verifier.c:6975: + reg_arg_name(env, argno), tn_buf, i - min_off, access_size); WARNING: line length of 106 exceeds 80 columns #816: FILE: kernel/bpf/verifier.c:6984: +static int check_helper_mem_access(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 88 exceeds 80 columns #832: FILE: kernel/bpf/verifier.c:7000: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 96 exceeds 80 columns #850: FILE: kernel/bpf/verifier.c:7014: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 96 exceeds 80 columns #864: FILE: kernel/bpf/verifier.c:7025: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 99 exceeds 80 columns #890: FILE: kernel/bpf/verifier.c:7047: + int err = check_mem_region_access(env, reg, argno, 0, access_size, U16_MAX, WARNING: line length of 83 exceeds 80 columns #910: FILE: kernel/bpf/verifier.c:7077: + argno_t size_argno, enum bpf_access_type access_type, WARNING: line length of 97 exceeds 80 columns #920: FILE: kernel/bpf/verifier.c:7102: + verbose(env, "%s min value is negative, either use unsigned or 'var &= const'\n", WARNING: line length of 99 exceeds 80 columns #929: FILE: kernel/bpf/verifier.c:7109: + reg_arg_name(env, size_argno), size_reg->umin_value, size_reg->umax_value); WARNING: line length of 102 exceeds 80 columns #936: FILE: kernel/bpf/verifier.c:7114: + verbose(env, "%s unbounded memory access, use 'var &= const' or 'if (var < const)'\n", WARNING: line length of 84 exceeds 80 columns #941: FILE: kernel/bpf/verifier.c:7118: + err = check_helper_mem_access(env, mem_reg, mem_argno, size_reg->umax_value, WARNING: line length of 83 exceeds 80 columns #961: FILE: kernel/bpf/verifier.c:7146: + err = check_helper_mem_access(env, reg, argno, size, BPF_READ, true, NULL); WARNING: line length of 91 exceeds 80 columns #962: FILE: kernel/bpf/verifier.c:7147: + err = err ?: check_helper_mem_access(env, reg, argno, size, BPF_WRITE, true, NULL); WARNING: line length of 106 exceeds 80 columns #971: FILE: kernel/bpf/verifier.c:7156: + struct bpf_reg_state *size_reg, argno_t mem_argno, argno_t size_argno) WARNING: line length of 103 exceeds 80 columns #981: FILE: kernel/bpf/verifier.c:7170: + err = check_mem_size_reg(env, mem_reg, size_reg, mem_argno, size_argno, BPF_READ, true, &meta); WARNING: line length of 111 exceeds 80 columns #982: FILE: kernel/bpf/verifier.c:7171: + err = err ?: check_mem_size_reg(env, mem_reg, size_reg, mem_argno, size_argno, BPF_WRITE, true, &meta); WARNING: line length of 111 exceeds 80 columns #991: FILE: kernel/bpf/verifier.c:7207: +static int process_spin_lock(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int flags) WARNING: line length of 106 exceeds 80 columns #1011: FILE: kernel/bpf/verifier.c:7323: +static int check_map_field_pointer(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 101 exceeds 80 columns #1031: FILE: kernel/bpf/verifier.c:7376: +static int process_timer_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 103 exceeds 80 columns #1043: FILE: kernel/bpf/verifier.c:7386: +static int process_timer_helper(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 102 exceeds 80 columns #1051: FILE: kernel/bpf/verifier.c:7392: +static int process_timer_kfunc(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 116 exceeds 80 columns #1064: FILE: kernel/bpf/verifier.c:7460: +static int process_dynptr_func(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int insn_idx, WARNING: line length of 113 exceeds 80 columns #1115: FILE: kernel/bpf/verifier.c:7566: +static int process_iter_arg(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, int insn_idx, WARNING: line length of 92 exceeds 80 columns #1149: FILE: kernel/bpf/verifier.c:7598: + iter_type_str(meta->btf, btf_id), reg_arg_name(env, argno)); WARNING: line length of 92 exceeds 80 columns #1166: FILE: kernel/bpf/verifier.c:7622: + iter_type_str(meta->btf, btf_id), reg_arg_name(env, argno)); WARNING: line length of 97 exceeds 80 columns #1175: FILE: kernel/bpf/verifier.c:8042: +static int check_reg_type(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 111 exceeds 80 columns #1184: FILE: kernel/bpf/verifier.c:8077: + if (meta->func_id == BPF_FUNC_kptr_xchg && type_is_alloc(type) && reg_from_argno(argno) == BPF_REG_2) { WARNING: line length of 101 exceeds 80 columns #1193: FILE: kernel/bpf/verifier.c:8091: + verbose(env, "%s type=%s expected=", reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #1205: FILE: kernel/bpf/verifier.c:8106: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 83 exceeds 80 columns #1214: FILE: kernel/bpf/verifier.c:8129: + verbose(env, "Possibly NULL pointer passed to helper %s\n", WARNING: line length of 99 exceeds 80 columns #1224: FILE: kernel/bpf/verifier.c:8143: + if (map_kptr_match_type(env, meta->kptr_field, reg, reg_from_argno(argno))) WARNING: line length of 92 exceeds 80 columns #1231: FILE: kernel/bpf/verifier.c:8148: + verbose(env, "%s has non-overwritten BPF_PTR_POISON type\n", WARNING: line length of 85 exceeds 80 columns #1246: FILE: kernel/bpf/verifier.c:8160: + verbose(env, "%s is of type %s but %s is expected\n", WARNING: line length of 83 exceeds 80 columns #1262: FILE: kernel/bpf/verifier.c:8183: + map_kptr_match_type(env, meta->kptr_field, reg, regno)) WARNING: line length of 81 exceeds 80 columns #1271: FILE: kernel/bpf/verifier.c:8217: + const struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 118 exceeds 80 columns #1281: FILE: kernel/bpf/verifier.c:8243: + verbose(env, "%s must have zero offset when passed to release func or trusted arg to kfunc\n", WARNING: line length of 98 exceeds 80 columns #1320: FILE: kernel/bpf/verifier.c:8375: + verbose(env, "%s points to insn_array map which cannot be used as const string\n", WARNING: line length of 97 exceeds 80 columns #1327: FILE: kernel/bpf/verifier.c:8381: + verbose(env, "%s does not point to a readonly map'\n", reg_arg_name(env, argno)); WARNING: line length of 90 exceeds 80 columns #1333: FILE: kernel/bpf/verifier.c:8386: + verbose(env, "%s is not a constant address'\n", reg_arg_name(env, argno)); WARNING: line length of 90 exceeds 80 columns #1351: FILE: kernel/bpf/verifier.c:8531: + err = check_reg_type(env, reg, argno_from_reg(regno), arg_type, arg_btf_id, meta); WARNING: line length of 112 exceeds 80 columns #1365: FILE: kernel/bpf/verifier.c:8624: + err = check_helper_mem_access(env, reg, argno_from_reg(regno), key_size, BPF_READ, false, NULL); WARNING: line length of 105 exceeds 80 columns #1374: FILE: kernel/bpf/verifier.c:8651: + err = check_helper_mem_access(env, reg, argno_from_reg(regno), meta->map.ptr->value_size, WARNING: line length of 100 exceeds 80 columns #1383: FILE: kernel/bpf/verifier.c:8669: + err = process_spin_lock(env, reg, argno_from_reg(regno), PROCESS_SPIN_LOCK); WARNING: line length of 84 exceeds 80 columns #1388: FILE: kernel/bpf/verifier.c:8673: + err = process_spin_lock(env, reg, argno_from_reg(regno), 0); WARNING: line length of 82 exceeds 80 columns #1397: FILE: kernel/bpf/verifier.c:8682: + err = process_timer_helper(env, reg, argno_from_reg(regno), meta); WARNING: line length of 105 exceeds 80 columns #1406: FILE: kernel/bpf/verifier.c:8695: + err = check_helper_mem_access(env, reg, argno_from_reg(regno), fn->arg_size[arg], WARNING: line length of 104 exceeds 80 columns #1415: FILE: kernel/bpf/verifier.c:8705: + err = check_mem_size_reg(env, reg_state(env, regno - 1), reg, argno_from_reg(regno - 1), WARNING: line length of 104 exceeds 80 columns #1423: FILE: kernel/bpf/verifier.c:8712: + err = check_mem_size_reg(env, reg_state(env, regno - 1), reg, argno_from_reg(regno - 1), WARNING: line length of 98 exceeds 80 columns #1431: FILE: kernel/bpf/verifier.c:8719: + err = process_dynptr_func(env, reg, argno_from_reg(regno), insn_idx, arg_type, 0); WARNING: line length of 95 exceeds 80 columns #1456: FILE: kernel/bpf/verifier.c:9332: + bpf_log(log, "%s is not a scalar\n", reg_arg_name(env, argno)); WARNING: line length of 86 exceeds 80 columns #1465: FILE: kernel/bpf/verifier.c:9342: + ret = check_func_arg_reg_off(env, reg, argno, ARG_PTR_TO_CTX); WARNING: line length of 84 exceeds 80 columns #1479: FILE: kernel/bpf/verifier.c:9354: + ret = check_func_arg_reg_off(env, reg, argno, ARG_DONTCARE); WARNING: line length of 89 exceeds 80 columns #1497: FILE: kernel/bpf/verifier.c:9373: + bpf_log(log, "%s is not a pointer to arena or scalar.\n", WARNING: line length of 89 exceeds 80 columns #1503: FILE: kernel/bpf/verifier.c:9378: + ret = check_func_arg_reg_off(env, reg, argno, ARG_PTR_TO_DYNPTR); WARNING: line length of 89 exceeds 80 columns #1508: FILE: kernel/bpf/verifier.c:9382: + ret = process_dynptr_func(env, reg, argno, -1, arg->arg_type, 0); WARNING: line length of 98 exceeds 80 columns #1518: FILE: kernel/bpf/verifier.c:9393: + err = check_reg_type(env, reg, argno, arg->arg_type, &arg->btf_id, &meta); WARNING: line length of 92 exceeds 80 columns #1519: FILE: kernel/bpf/verifier.c:9394: + err = err ?: check_func_arg_reg_off(env, reg, argno, arg->arg_type); WARNING: line length of 110 exceeds 80 columns #1534: FILE: kernel/bpf/verifier.c:10358: + err = check_mem_access(env, insn_idx, regs + meta.regno, argno_from_reg(meta.regno), i, BPF_B, WARNING: line length of 84 exceeds 80 columns #1543: FILE: kernel/bpf/verifier.c:11367: + int arg, int nargs, argno_t argno, struct bpf_reg_state *reg) WARNING: line length of 99 exceeds 80 columns #1553: FILE: kernel/bpf/verifier.c:11442: + verbose(env, "kernel function %s %s pointer type %s %s is not supported\n", WARNING: line length of 101 exceeds 80 columns #1565: FILE: kernel/bpf/verifier.c:11460: + verbose(env, "%s pointer type %s %s must point to %sscalar, or struct with scalar\n", WARNING: line length of 86 exceeds 80 columns #1567: FILE: kernel/bpf/verifier.c:11462: + btf_type_str(ref_t), ref_tname, arg_mem_size ? "void, " : ""); WARNING: line length of 111 exceeds 80 columns #1586: FILE: kernel/bpf/verifier.c:11531: + verbose(env, "kernel function %s %s expected pointer to %s %s but %s has a pointer to %s %s\n", WARNING: line length of 81 exceeds 80 columns #1588: FILE: kernel/bpf/verifier.c:11533: + btf_type_str(ref_t), ref_tname, reg_arg_name(env, argno), WARNING: line length of 99 exceeds 80 columns #1596: FILE: kernel/bpf/verifier.c:11540: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, CHECK: Alignment should match open parenthesis #1597: FILE: kernel/bpf/verifier.c:11541: +static int process_irq_flag(struct bpf_verifier_env *env, struct bpf_reg_state *reg, argno_t argno, struct bpf_kfunc_call_arg_meta *meta) WARNING: line length of 81 exceeds 80 columns #1611: FILE: kernel/bpf/verifier.c:11568: + err = check_mem_access(env, env->insn_idx, reg, argno, 0, BPF_DW, WARNING: line length of 84 exceeds 80 columns #1651: FILE: kernel/bpf/verifier.c:11921: + struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 87 exceeds 80 columns #1655: FILE: kernel/bpf/verifier.c:11924: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_LIST_HEAD, WARNING: line length of 86 exceeds 80 columns #1661: FILE: kernel/bpf/verifier.c:11929: + struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 85 exceeds 80 columns #1665: FILE: kernel/bpf/verifier.c:11932: + return __process_kf_arg_ptr_to_graph_root(env, reg, argno, meta, BPF_RB_ROOT, WARNING: line length of 84 exceeds 80 columns #1692: FILE: kernel/bpf/verifier.c:12002: + struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 86 exceeds 80 columns #1703: FILE: kernel/bpf/verifier.c:12011: + struct bpf_reg_state *reg, argno_t argno, WARNING: line length of 95 exceeds 80 columns #1724: FILE: kernel/bpf/verifier.c:12089: + verbose(env, "%s is not a scalar\n", reg_arg_name(env, argno)); WARNING: line length of 85 exceeds 80 columns #1733: FILE: kernel/bpf/verifier.c:12099: + verbose(env, "%s must be a known constant\n", WARNING: line length of 84 exceeds 80 columns #1761: FILE: kernel/bpf/verifier.c:12143: + verbose(env, "Possibly NULL pointer passed to trusted %s\n", WARNING: line length of 95 exceeds 80 columns #1770: FILE: kernel/bpf/verifier.c:12150: + verifier_bug(env, "more than one arg with ref_obj_id %s %u %u", WARNING: line length of 87 exceeds 80 columns #1771: FILE: kernel/bpf/verifier.c:12151: + reg_arg_name(env, argno), reg->ref_obj_id, WARNING: line length of 113 exceeds 80 columns #1780: FILE: kernel/bpf/verifier.c:12163: + kf_arg_type = get_kfunc_ptr_arg_type(env, meta, t, ref_t, ref_tname, args, i, nargs, argno, reg); WARNING: line length of 81 exceeds 80 columns #1789: FILE: kernel/bpf/verifier.c:12172: + verbose(env, "pointer in %s isn't map pointer\n", WARNING: line length of 90 exceeds 80 columns #1799: FILE: kernel/bpf/verifier.c:12211: + verbose(env, "%s must be referenced or trusted\n", WARNING: line length of 82 exceeds 80 columns #1805: FILE: kernel/bpf/verifier.c:12216: + verbose(env, "%s must be a rcu pointer\n", WARNING: line length of 88 exceeds 80 columns #1824: FILE: kernel/bpf/verifier.c:12256: + verbose(env, "%s expected pointer to ctx, but got %s\n", WARNING: line length of 96 exceeds 80 columns #1825: FILE: kernel/bpf/verifier.c:12257: + reg_arg_name(env, argno), reg_type_str(env, reg->type)); WARNING: line length of 88 exceeds 80 columns #1834: FILE: kernel/bpf/verifier.c:12271: + verbose(env, "%s expected for bpf_obj_drop()\n", WARNING: line length of 95 exceeds 80 columns #1841: FILE: kernel/bpf/verifier.c:12277: + verbose(env, "%s expected for bpf_percpu_obj_drop()\n", WARNING: line length of 89 exceeds 80 columns #1847: FILE: kernel/bpf/verifier.c:12282: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 85 exceeds 80 columns #1858: FILE: kernel/bpf/verifier.c:12332: + dynptr_arg_type, clone_ref_obj_id); WARNING: line length of 102 exceeds 80 columns #1875: FILE: kernel/bpf/verifier.c:12364: + verbose(env, "%s expected pointer to map value or allocated object\n", WARNING: line length of 85 exceeds 80 columns #1884: FILE: kernel/bpf/verifier.c:12372: + ret = process_kf_arg_ptr_to_list_head(env, reg, argno, meta); WARNING: line length of 102 exceeds 80 columns #1892: FILE: kernel/bpf/verifier.c:12379: + verbose(env, "%s expected pointer to map value or allocated object\n", WARNING: line length of 87 exceeds 80 columns #1901: FILE: kernel/bpf/verifier.c:12387: + ret = process_kf_arg_ptr_to_rbtree_root(env, reg, argno, meta); WARNING: line length of 89 exceeds 80 columns #1908: FILE: kernel/bpf/verifier.c:12393: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 85 exceeds 80 columns #1917: FILE: kernel/bpf/verifier.c:12401: + ret = process_kf_arg_ptr_to_list_node(env, reg, argno, meta); WARNING: line length of 97 exceeds 80 columns #1925: FILE: kernel/bpf/verifier.c:12408: + verbose(env, "%s expected pointer to allocated object\n", WARNING: line length of 87 exceeds 80 columns #1935: FILE: kernel/bpf/verifier.c:12427: + ret = process_kf_arg_ptr_to_rbtree_node(env, reg, argno, meta); WARNING: line length of 83 exceeds 80 columns #1944: FILE: kernel/bpf/verifier.c:12442: + verbose(env, "%s is %s ", reg_arg_name(env, argno), WARNING: line length of 111 exceeds 80 columns #1952: FILE: kernel/bpf/verifier.c:12449: + ret = process_kf_arg_ptr_to_btf_id(env, reg, ref_t, ref_tname, ref_id, meta, i, argno); WARNING: line length of 107 exceeds 80 columns #1961: FILE: kernel/bpf/verifier.c:12456: + verbose(env, "%s reference type('%s %s') size cannot be determined: %ld\n", WARNING: line length of 86 exceeds 80 columns #1962: FILE: kernel/bpf/verifier.c:12457: + reg_arg_name(env, argno), btf_type_str(ref_t), WARNING: line length of 87 exceeds 80 columns #1979: FILE: kernel/bpf/verifier.c:12474: + ret = check_kfunc_mem_size_reg(env, buff_reg, size_reg, WARNING: line length of 82 exceeds 80 columns #1980: FILE: kernel/bpf/verifier.c:12475: + argno, next_argno); WARNING: line length of 90 exceeds 80 columns #1983: FILE: kernel/bpf/verifier.c:12477: + verbose(env, "%s and ", reg_arg_name(env, argno)); WARNING: line length of 108 exceeds 80 columns #1984: FILE: kernel/bpf/verifier.c:12478: + verbose(env, "%s memory, len pair leads to invalid memory access\n", WARNING: line length of 85 exceeds 80 columns #1994: FILE: kernel/bpf/verifier.c:12490: + verbose(env, "%s must be a known constant\n", WARNING: line length of 104 exceeds 80 columns #2004: FILE: kernel/bpf/verifier.c:12504: + verbose(env, "%s expected pointer to func\n", reg_arg_name(env, argno)); WARNING: line length of 88 exceeds 80 columns #2012: FILE: kernel/bpf/verifier.c:12511: + verbose(env, "%s is neither owning or non-owning ref\n", WARNING: line length of 100 exceeds 80 columns #2022: FILE: kernel/bpf/verifier.c:12525: + verbose(env, "%s doesn't point to a type with bpf_refcount field\n", WARNING: line length of 84 exceeds 80 columns #2032: FILE: kernel/bpf/verifier.c:12535: + verbose(env, "%s doesn't point to a const string\n", WARNING: line length of 81 exceeds 80 columns #2044: FILE: kernel/bpf/verifier.c:12545: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 98 exceeds 80 columns #2049: FILE: kernel/bpf/verifier.c:12549: + ret = check_map_field_pointer(env, reg, argno, BPF_WORKQUEUE, &meta->map); WARNING: line length of 81 exceeds 80 columns #2056: FILE: kernel/bpf/verifier.c:12555: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 81 exceeds 80 columns #2068: FILE: kernel/bpf/verifier.c:12565: + verbose(env, "%s doesn't point to a map value\n", WARNING: line length of 98 exceeds 80 columns #2073: FILE: kernel/bpf/verifier.c:12569: + ret = check_map_field_pointer(env, reg, argno, BPF_TASK_WORK, &meta->map); WARNING: line length of 90 exceeds 80 columns #2080: FILE: kernel/bpf/verifier.c:12575: + verbose(env, "%s doesn't point to an irq flag on stack\n", WARNING: line length of 99 exceeds 80 columns #2094: FILE: kernel/bpf/verifier.c:12588: + verbose(env, "%s doesn't point to map value or allocated object\n", WARNING: line length of 102 exceeds 80 columns #2113: FILE: kernel/bpf/verifier.c:13752: + if (check_map_access(env, dst_reg, argno_from_reg(dst), 0, 1, false, ACCESS_HELPER)) { WARNING: line length of 91 exceeds 80 columns #2122: FILE: kernel/bpf/verifier.c:16934: + return __check_ptr_off_reg(env, reg, argno_from_reg(regno), false); WARNING: line length of 120 exceeds 80 columns #2131: FILE: kernel/bpf/verifier.c:17638: + err = check_mem_access(env, env->insn_idx, cur_regs(env) + insn->dst_reg, argno_from_reg(insn->dst_reg), WARNING: line length of 104 exceeds 80 columns #2159: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:14: + { "alloc_release", "kernel function bpf_ct_release R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 116 exceeds 80 columns #2160: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:15: + { "insert_insert", "kernel function bpf_ct_insert_entry R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 116 exceeds 80 columns #2161: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:16: + { "lookup_insert", "kernel function bpf_ct_insert_entry R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 126 exceeds 80 columns #2162: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:17: + { "set_timeout_after_insert", "kernel function bpf_ct_set_timeout R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 124 exceeds 80 columns #2163: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:18: + { "set_status_after_insert", "kernel function bpf_ct_set_status R1 expected pointer to STRUCT nf_conn___init but" }, WARNING: line length of 124 exceeds 80 columns #2164: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:19: + { "change_timeout_after_alloc", "kernel function bpf_ct_change_timeout R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 122 exceeds 80 columns #2165: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:20: + { "change_status_after_alloc", "kernel function bpf_ct_change_status R1 expected pointer to STRUCT nf_conn but" }, WARNING: line length of 82 exceeds 80 columns #2171: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:22: + { "lookup_null_bpf_tuple", "Possibly NULL pointer passed to trusted R2" }, WARNING: line length of 81 exceeds 80 columns #2172: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:23: + { "lookup_null_bpf_opts", "Possibly NULL pointer passed to trusted R4" }, WARNING: line length of 86 exceeds 80 columns #2173: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:24: + { "xdp_lookup_null_bpf_tuple", "Possibly NULL pointer passed to trusted R2" }, WARNING: line length of 85 exceeds 80 columns #2174: FILE: tools/testing/selftests/bpf/prog_tests/bpf_nf.c:25: + { "xdp_lookup_null_bpf_opts", "Possibly NULL pointer passed to trusted R4" }, WARNING: line length of 108 exceeds 80 columns #2200: FILE: tools/testing/selftests/bpf/prog_tests/kfunc_call.c:71: + TC_FAIL(kfunc_call_test_pointer_arg_type_mismatch, 0, "R1 expected pointer to ctx, but got scalar"), WARNING: line length of 97 exceeds 80 columns #2969: FILE: tools/testing/selftests/bpf/progs/verifier_vfs_reject.c:31: +__failure __msg("R1 pointer type STRUCT task_struct must point to scalar, or struct with scalar") WARNING: line length of 121 exceeds 80 columns #2987: FILE: tools/testing/selftests/bpf/progs/verifier_vfs_reject.c:131: +__failure __msg("kernel function bpf_path_d_path R1 expected pointer to STRUCT path but R1 has a pointer to STRUCT file") WARNING: line length of 94 exceeds 80 columns #3022: FILE: tools/testing/selftests/bpf/verifier/calls.c:49: + .errstr = "max struct nesting depth exceeded\nR1 pointer type STRUCT prog_test_fail2", WARNING: line length of 85 exceeds 80 columns #3067: FILE: tools/testing/selftests/bpf/verifier/calls.c:155: + .errstr = "kernel function bpf_kfunc_call_memb1_release R1 expected pointer", total: 0 errors, 190 warnings, 1 checks, 2658 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit af50cc7c4326 ("bpf: Prepare verifier logs for upcoming kfunc stack arguments") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 190 warnings, 1 checks, 2658 lines checked