WARNING: line length of 83 exceeds 80 columns #82: FILE: arch/arm64/net/bpf_jit_comp.c:2097: + if (IS_ENABLED(CONFIG_ARM64_BTI_KERNEL) && bpf_prog_has_jump_table(prog)) { WARNING: line length of 96 exceeds 80 columns #83: FILE: arch/arm64/net/bpf_jit_comp.c:2098: + ctx.indirect_targets = kvcalloc(BITS_TO_LONGS(prog->len), sizeof(unsigned long), CHECK: Comparison to NULL could be written "!ctx.indirect_targets" #85: FILE: arch/arm64/net/bpf_jit_comp.c:2100: + if (ctx.indirect_targets == NULL) { WARNING: line length of 91 exceeds 80 columns #118: FILE: include/linux/bpf.h:3885: +void bpf_prog_collect_indirect_targets(const struct bpf_prog *prog, unsigned long *bitmap); CHECK: Please use a blank line after function/struct/union/enum declarations #126: FILE: include/linux/bpf.h:3893: } +static inline void WARNING: line length of 85 exceeds 80 columns #127: FILE: include/linux/bpf.h:3894: +bpf_prog_collect_indirect_targets(const struct bpf_prog *prog, unsigned long *bitmap) CHECK: Please use a blank line after function/struct/union/enum declarations #130: FILE: include/linux/bpf.h:3897: +} +static inline void bpf_prog_set_insn_array_type(struct bpf_map *map, int type) CHECK: Please use a blank line after function/struct/union/enum declarations #133: FILE: include/linux/bpf.h:3900: +} +static inline bool bpf_prog_has_jump_table(const struct bpf_prog *prog) WARNING: line length of 94 exceeds 80 columns #187: FILE: kernel/bpf/bpf_insn_array.c:330: + * This function collects possible indirect jump targets in a BPF program. Since indirect jump WARNING: line length of 90 exceeds 80 columns #188: FILE: kernel/bpf/bpf_insn_array.c:331: + * targets can only be read from indirect arrays used as jump table, it traverses all jump WARNING: line length of 97 exceeds 80 columns #189: FILE: kernel/bpf/bpf_insn_array.c:332: + * tables used by @prog. For each instruction found in the jump tables, it sets the corresponding WARNING: line length of 90 exceeds 80 columns #192: FILE: kernel/bpf/bpf_insn_array.c:335: +void bpf_prog_collect_indirect_targets(const struct bpf_prog *prog, unsigned long *bitmap) total: 0 errors, 8 warnings, 4 checks, 172 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit e2beb782a0e8 ("bpf: arm64: Fix panic due to missing BTI at indirect jump targets") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 8 warnings, 4 checks, 172 lines checked