WARNING: line length of 83 exceeds 80 columns #82: FILE: arch/arm64/net/bpf_jit_comp.c:2097: + if (IS_ENABLED(CONFIG_ARM64_BTI_KERNEL) && bpf_prog_has_jump_table(prog)) { WARNING: line length of 96 exceeds 80 columns #83: FILE: arch/arm64/net/bpf_jit_comp.c:2098: + ctx.indirect_targets = kvcalloc(BITS_TO_LONGS(prog->len), sizeof(unsigned long), CHECK: Comparison to NULL could be written "!ctx.indirect_targets" #85: FILE: arch/arm64/net/bpf_jit_comp.c:2100: + if (ctx.indirect_targets == NULL) { WARNING: line length of 91 exceeds 80 columns #111: FILE: include/linux/bpf.h:3896: +void bpf_prog_collect_indirect_targets(const struct bpf_prog *prog, unsigned long *bitmap); CHECK: Please use a blank line after function/struct/union/enum declarations #119: FILE: include/linux/bpf.h:3904: } +static inline void WARNING: line length of 85 exceeds 80 columns #120: FILE: include/linux/bpf.h:3905: +bpf_prog_collect_indirect_targets(const struct bpf_prog *prog, unsigned long *bitmap) CHECK: Please use a blank line after function/struct/union/enum declarations #123: FILE: include/linux/bpf.h:3908: +} +static inline void bpf_prog_mark_jump_table(struct bpf_map *map) CHECK: Please use a blank line after function/struct/union/enum declarations #126: FILE: include/linux/bpf.h:3911: +} +static inline bool bpf_prog_has_jump_table(const struct bpf_prog *prog) WARNING: line length of 94 exceeds 80 columns #180: FILE: kernel/bpf/bpf_insn_array.c:337: + * This function collects possible indirect jump targets in a BPF program. Since indirect jump WARNING: line length of 90 exceeds 80 columns #181: FILE: kernel/bpf/bpf_insn_array.c:338: + * targets can only be read from indirect arrays used as jump table, it traverses all jump WARNING: line length of 97 exceeds 80 columns #182: FILE: kernel/bpf/bpf_insn_array.c:339: + * tables used by @prog. For each instruction found in the jump tables, it sets the corresponding WARNING: line length of 90 exceeds 80 columns #185: FILE: kernel/bpf/bpf_insn_array.c:342: +void bpf_prog_collect_indirect_targets(const struct bpf_prog *prog, unsigned long *bitmap) total: 0 errors, 8 warnings, 4 checks, 159 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 8be4f5fce2f5 ("bpf: arm64: Fix panic due to missing BTI at indirect jump targets") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 8 warnings, 4 checks, 159 lines checked