WARNING: line length of 98 exceeds 80 columns #80: FILE: kernel/bpf/verifier.c:13417: +static int check_special_kfunc(struct bpf_verifier_env *env, struct bpf_kfunc_call_arg_meta *meta, WARNING: line length of 94 exceeds 80 columns #81: FILE: kernel/bpf/verifier.c:13418: + struct bpf_reg_state *regs, struct bpf_insn_aux_data *insn_aux, WARNING: line length of 97 exceeds 80 columns #82: FILE: kernel/bpf/verifier.c:13419: + const struct btf_type *ptr_type, struct btf *desc_btf, bool *done) WARNING: line length of 99 exceeds 80 columns #98: FILE: kernel/bpf/verifier.c:13435: + if (meta->func_id == special_kfunc_list[KF_bpf_obj_new_impl] && !bpf_global_ma_set) WARNING: line length of 87 exceeds 80 columns #101: FILE: kernel/bpf/verifier.c:13438: + if (((u64)(u32)meta->arg_constant.value) != meta->arg_constant.value) { WARNING: line length of 95 exceeds 80 columns #102: FILE: kernel/bpf/verifier.c:13439: + verbose(env, "local type ID argument must be in range [0, U32_MAX]\n"); WARNING: line length of 91 exceeds 80 columns #111: FILE: kernel/bpf/verifier.c:13448: + verbose(env, "bpf_obj_new/bpf_percpu_obj_new requires prog BTF\n"); WARNING: line length of 110 exceeds 80 columns #117: FILE: kernel/bpf/verifier.c:13454: + verbose(env, "bpf_obj_new/bpf_percpu_obj_new type ID argument must be of a struct\n"); WARNING: line length of 86 exceeds 80 columns #121: FILE: kernel/bpf/verifier.c:13458: + if (meta->func_id == special_kfunc_list[KF_bpf_percpu_obj_new_impl]) { WARNING: line length of 102 exceeds 80 columns #123: FILE: kernel/bpf/verifier.c:13460: + verbose(env, "bpf_percpu_obj_new type size (%d) is greater than %d\n", WARNING: line length of 84 exceeds 80 columns #124: FILE: kernel/bpf/verifier.c:13461: + ret_t->size, BPF_GLOBAL_PERCPU_MA_MAX_SIZE); WARNING: line length of 95 exceeds 80 columns #131: FILE: kernel/bpf/verifier.c:13468: + /* Charge memory allocated with bpf_global_percpu_ma to WARNING: line length of 93 exceeds 80 columns #132: FILE: kernel/bpf/verifier.c:13469: + * root memcg. The obj_cgroup for root memcg is NULL. WARNING: line length of 101 exceeds 80 columns #134: FILE: kernel/bpf/verifier.c:13471: + err = bpf_mem_alloc_percpu_init(&bpf_global_percpu_ma, NULL); WARNING: line length of 97 exceeds 80 columns #144: FILE: kernel/bpf/verifier.c:13481: + err = bpf_mem_alloc_percpu_unit_init(&bpf_global_percpu_ma, ret_t->size); WARNING: line length of 86 exceeds 80 columns #151: FILE: kernel/bpf/verifier.c:13488: + if (meta->func_id == special_kfunc_list[KF_bpf_percpu_obj_new_impl]) { WARNING: line length of 83 exceeds 80 columns #152: FILE: kernel/bpf/verifier.c:13489: + if (!__btf_type_is_scalar_struct(env, ret_btf, ret_t, 0)) { WARNING: line length of 117 exceeds 80 columns #153: FILE: kernel/bpf/verifier.c:13490: + verbose(env, "bpf_percpu_obj_new type ID argument must be of a struct of scalars\n"); WARNING: line length of 118 exceeds 80 columns #158: FILE: kernel/bpf/verifier.c:13495: + verbose(env, "bpf_percpu_obj_new type ID argument must not contain special fields\n"); WARNING: line length of 84 exceeds 80 columns #167: FILE: kernel/bpf/verifier.c:13504: + if (meta->func_id == special_kfunc_list[KF_bpf_percpu_obj_new_impl]) WARNING: line length of 87 exceeds 80 columns #172: FILE: kernel/bpf/verifier.c:13509: + } else if (meta->func_id == special_kfunc_list[KF_bpf_refcount_acquire_impl]) { WARNING: line length of 82 exceeds 80 columns #189: FILE: kernel/bpf/verifier.c:13526: + } else if (meta->func_id == special_kfunc_list[KF_bpf_cast_to_kern_ctx]) { WARNING: line length of 83 exceeds 80 columns #207: FILE: kernel/bpf/verifier.c:13544: + meta->func_id == special_kfunc_list[KF_bpf_dynptr_slice_rdwr]) { WARNING: line length of 99 exceeds 80 columns #208: FILE: kernel/bpf/verifier.c:13545: + enum bpf_type_flag type_flag = get_dynptr_type_flag(meta->initialized_dynptr.type); WARNING: line length of 108 exceeds 80 columns #213: FILE: kernel/bpf/verifier.c:13550: + verbose(env, "verifier internal error: bpf_dynptr_slice(_rdwr) no constant size\n"); WARNING: line length of 84 exceeds 80 columns #219: FILE: kernel/bpf/verifier.c:13556: + /* PTR_MAYBE_NULL will be added when is_kfunc_ret_null is checked */ WARNING: line length of 96 exceeds 80 columns #227: FILE: kernel/bpf/verifier.c:13564: + verbose(env, "the prog does not allow writes to packet data\n"); WARNING: line length of 84 exceeds 80 columns #413: FILE: kernel/bpf/verifier.c:13820: + ptr_type = btf_type_skip_modifiers(desc_btf, t->type, &ptr_type_id); WARNING: line length of 97 exceeds 80 columns #414: FILE: kernel/bpf/verifier.c:13821: + err = check_special_kfunc(env, &meta, regs, insn_aux, ptr_type, desc_btf, &done); total: 0 errors, 29 warnings, 0 checks, 414 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 738c61929709 ("bpf: Remove special_kfunc_set from verifier") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 29 warnings, 0 checks, 414 lines checked