CHECK: Please don't use multiple blank lines #25: FILE: kernel/bpf/verifier.c:17803: + WARNING: line length of 92 exceeds 80 columns #26: FILE: kernel/bpf/verifier.c:17804: +static int return_retval_range(struct bpf_verifier_env *env, struct bpf_retval_range *range, CHECK: Alignment should match open parenthesis #27: FILE: kernel/bpf/verifier.c:17805: +static int return_retval_range(struct bpf_verifier_env *env, struct bpf_retval_range *range, + bool *return_32bit) WARNING: line length of 81 exceeds 80 columns #169: FILE: kernel/bpf/verifier.c:17878: + if (range->minval == S32_MIN && range->maxval == S32_MAX) WARNING: line length of 91 exceeds 80 columns #203: FILE: kernel/bpf/verifier.c:17908: +static int check_return_code(struct bpf_verifier_env *env, int regno, const char *reg_name) WARNING: line length of 97 exceeds 80 columns #222: FILE: kernel/bpf/verifier.c:17927: + /* See return_retval_range, can be 0 or 0-1 depending on hook. */ WARNING: line length of 87 exceeds 80 columns #234: FILE: kernel/bpf/verifier.c:17939: + /* Allow a struct_ops program to return a referenced kptr if it WARNING: line length of 86 exceeds 80 columns #235: FILE: kernel/bpf/verifier.c:17940: + * matches the operator's return type and is in its unmodified WARNING: line length of 86 exceeds 80 columns #236: FILE: kernel/bpf/verifier.c:17941: + * form. A scalar zero (i.e., a null pointer) is also allowed. WARNING: line length of 91 exceeds 80 columns #238: FILE: kernel/bpf/verifier.c:17943: + reg_type = reg->btf ? btf_type_by_id(reg->btf, reg->btf_id) : NULL; WARNING: line length of 91 exceeds 80 columns #240: FILE: kernel/bpf/verifier.c:17945: + prog->aux->attach_func_proto->type, WARNING: line length of 83 exceeds 80 columns #243: FILE: kernel/bpf/verifier.c:17948: + return __check_ptr_off_reg(env, reg, regno, false); WARNING: line length of 104 exceeds 80 columns #273: FILE: kernel/bpf/verifier.c:17978: + verbose(env, "At subprogram exit the register R%d is not a scalar value (%s)\n", WARNING: line length of 113 exceeds 80 columns #283: FILE: kernel/bpf/verifier.c:17988: + if (prog_type == BPF_PROG_TYPE_CGROUP_SKB && (env->prog->expected_attach_type == BPF_CGROUP_INET_EGRESS)) CHECK: Unnecessary parentheses around 'env->prog->expected_attach_type == BPF_CGROUP_INET_EGRESS' #283: FILE: kernel/bpf/verifier.c:17988: + if (prog_type == BPF_PROG_TYPE_CGROUP_SKB && (env->prog->expected_attach_type == BPF_CGROUP_INET_EGRESS)) total: 0 errors, 12 warnings, 3 checks, 272 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 558e6d7ad85c ("bpf: Factor out program return value calculation") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 12 warnings, 3 checks, 272 lines checked