WARNING: line length of 81 exceeds 80 columns #165: FILE: kernel/bpf/verifier.c:12734: +#define btf_id_in_kfunc_table(__btf_id, __kfuncs) \ WARNING: line length of 81 exceeds 80 columns #166: FILE: kernel/bpf/verifier.c:12735: + ({ \ WARNING: line length of 81 exceeds 80 columns #167: FILE: kernel/bpf/verifier.c:12736: + u32 ___id = (__btf_id); \ WARNING: line length of 81 exceeds 80 columns #168: FILE: kernel/bpf/verifier.c:12737: + unsigned int ___i; \ WARNING: line length of 81 exceeds 80 columns #169: FILE: kernel/bpf/verifier.c:12738: + bool ___found = false; \ WARNING: line length of 81 exceeds 80 columns #170: FILE: kernel/bpf/verifier.c:12739: + \ WARNING: line length of 81 exceeds 80 columns #171: FILE: kernel/bpf/verifier.c:12740: + for (___i = 0; ___i < ARRAY_SIZE(__kfuncs); ___i++) { \ WARNING: line length of 81 exceeds 80 columns #172: FILE: kernel/bpf/verifier.c:12741: + if (___id == special_kfunc_list[(__kfuncs)[___i]]) { \ WARNING: line length of 81 exceeds 80 columns #173: FILE: kernel/bpf/verifier.c:12742: + ___found = true; \ WARNING: line length of 81 exceeds 80 columns #174: FILE: kernel/bpf/verifier.c:12743: + break; \ WARNING: line length of 81 exceeds 80 columns #175: FILE: kernel/bpf/verifier.c:12744: + } \ WARNING: line length of 81 exceeds 80 columns #176: FILE: kernel/bpf/verifier.c:12745: + } \ WARNING: line length of 81 exceeds 80 columns #177: FILE: kernel/bpf/verifier.c:12746: + ___found; \ WARNING: line length of 81 exceeds 80 columns #329: FILE: kernel/bpf/verifier.c:13218: + ret = btf_id_in_kfunc_table(kfunc_btf_id, bpf_rbtree_api_kfuncs); WARNING: line length of 84 exceeds 80 columns #339: FILE: kernel/bpf/verifier.c:13240: + ret = btf_id_in_kfunc_table(kfunc_btf_id, bpf_list_node_api_kfuncs); WARNING: line length of 86 exceeds 80 columns #346: FILE: kernel/bpf/verifier.c:13243: + ret = btf_id_in_kfunc_table(kfunc_btf_id, bpf_rbtree_node_api_kfuncs); WARNING: line length of 96 exceeds 80 columns #355: FILE: kernel/bpf/verifier.c:13951: + if (!btf_id_in_kfunc_table(meta->func_id, bpf_res_spin_lock_api_kfuncs)) WARNING: line length of 87 exceeds 80 columns #389: FILE: kernel/bpf/verifier.c:14417: + !btf_id_in_kfunc_table(meta.func_id, bpf_obj_acquire_ptr_kfuncs)) { WARNING: line length of 88 exceeds 80 columns #400: FILE: kernel/bpf/verifier.c:23396: + } else if (btf_id_in_kfunc_table(desc->func_id, bpf_collection_insert_kfuncs)) { total: 0 errors, 19 warnings, 0 checks, 367 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit aefe7bb77841 ("bpf: refactor kfunc checks using table-driven approach in verifier") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 19 warnings, 0 checks, 367 lines checked