WARNING: line length of 100 exceeds 80 columns #125: FILE: kernel/bpf/verifier.c:3572: + verbose(env, "kfunc %s arg#%d size %d > %zu not supported for stack args\n", WARNING: line length of 84 exceeds 80 columns #126: FILE: kernel/bpf/verifier.c:3573: + kfunc.name, i, func_model.arg_size[i], sizeof(u64)); WARNING: line length of 87 exceeds 80 columns #138: FILE: kernel/bpf/verifier.c:13094: +static struct bpf_reg_state *get_kfunc_arg_reg(struct bpf_verifier_env *env, int argno) WARNING: line length of 96 exceeds 80 columns #147: FILE: kernel/bpf/verifier.c:13103: + spi = caller->incoming_stack_arg_depth / BPF_REG_SIZE + (argno - MAX_BPF_FUNC_REG_ARGS); WARNING: line length of 101 exceeds 80 columns #160: FILE: kernel/bpf/verifier.c:13125: + (is_kfunc_arg_mem_size(meta->btf, &args[argno + 1], get_kfunc_arg_reg(env, argno + 1)) || WARNING: line length of 106 exceeds 80 columns #161: FILE: kernel/bpf/verifier.c:13126: + is_kfunc_arg_const_mem_size(meta->btf, &args[argno + 1], get_kfunc_arg_reg(env, argno + 1)))) WARNING: line length of 82 exceeds 80 columns #195: FILE: kernel/bpf/verifier.c:13817: + * Retrieve the spilled reg state from the stack arg slot. WARNING: line length of 83 exceeds 80 columns #202: FILE: kernel/bpf/verifier.c:13824: + int spi = caller->incoming_stack_arg_depth / BPF_REG_SIZE + WARNING: line length of 91 exceeds 80 columns #206: FILE: kernel/bpf/verifier.c:13828: + verbose(env, "stack arg#%d not properly initialized\n", i); WARNING: line length of 83 exceeds 80 columns #213: FILE: kernel/bpf/verifier.c:13835: + regs[BPF_REG_1] = caller->stack_arg_slots[spi].spilled_ptr; WARNING: line length of 97 exceeds 80 columns #225: FILE: kernel/bpf/verifier.c:13847: + verbose(env, "arg#%d prog->aux cannot be a stack argument\n", i); WARNING: line length of 107 exceeds 80 columns #280: FILE: kernel/bpf/verifier.c:13931: + verbose(env, "arg#%d release arg cannot be a stack argument\n", i); WARNING: line length of 107 exceeds 80 columns #302: FILE: kernel/bpf/verifier.c:14087: + verbose(env, "arg#%d release arg cannot be a stack argument\n", i); WARNING: line length of 81 exceeds 80 columns #321: FILE: kernel/bpf/verifier.c:14247: + regs[regno + 1] = *get_kfunc_arg_reg(env, i + 1); WARNING: line length of 94 exceeds 80 columns #322: FILE: kernel/bpf/verifier.c:14248: + verbose(env, "Use reg %d to represent mem_size\n", regno + 1); WARNING: line length of 89 exceeds 80 columns #345: FILE: kernel/bpf/verifier.c:14380: + verbose(env, "End of using reg %d for stack arg#%d\n", regno, i); WARNING: line length of 93 exceeds 80 columns #366: FILE: kernel/bpf/verifier.c:15161: + struct bpf_subprog_info *caller_info = &env->subprog_info[caller->subprogno]; WARNING: line length of 91 exceeds 80 columns #367: FILE: kernel/bpf/verifier.c:15162: + u16 kfunc_stack_arg_depth = (nargs - MAX_BPF_FUNC_REG_ARGS) * BPF_REG_SIZE; WARNING: line length of 82 exceeds 80 columns #369: FILE: kernel/bpf/verifier.c:15164: + if (kfunc_stack_arg_depth > caller_info->outgoing_stack_arg_depth) WARNING: line length of 86 exceeds 80 columns #370: FILE: kernel/bpf/verifier.c:15165: + caller_info->outgoing_stack_arg_depth = kfunc_stack_arg_depth; total: 0 errors, 20 warnings, 0 checks, 266 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 998fd8222c53 ("bpf: Support stack arguments for kfunc calls") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 20 warnings, 0 checks, 266 lines checked