WARNING: line length of 84 exceeds 80 columns #59: FILE: kernel/bpf/log.c:742: + if (slot_type != STACK_INVALID && slot_type != STACK_POISON) WARNING: line length of 142 exceeds 80 columns #109: FILE: kernel/bpf/verifier.c:5730: + verbose(env, "reading from stack off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 107 exceeds 80 columns #112: FILE: kernel/bpf/verifier.c:5733: + verbose(env, "invalid read from stack off %d+%d size %d\n", WARNING: line length of 126 exceeds 80 columns #125: FILE: kernel/bpf/verifier.c:5785: + verbose(env, "reading from stack off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 91 exceeds 80 columns #128: FILE: kernel/bpf/verifier.c:5788: + verbose(env, "invalid read from stack off %d+%d size %d\n", WARNING: line length of 122 exceeds 80 columns #169: FILE: kernel/bpf/verifier.c:8510: + verbose(env, "reading from stack R%d off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 84 exceeds 80 columns #181: FILE: kernel/bpf/verifier.c:8689: + int size = base_type(reg->type) == PTR_TO_STACK ? -(int)mem_size : mem_size; WARNING: line length of 86 exceeds 80 columns #184: FILE: kernel/bpf/verifier.c:8692: + err = err ?: check_helper_mem_access(env, regno, size, BPF_WRITE, true, NULL); WARNING: line length of 101 exceeds 80 columns #202: FILE: kernel/bpf/verifier.c:20548: + ((stack->slot_type[i] == STACK_INVALID || stack->slot_type[i] == STACK_POISON) && WARNING: line length of 82 exceeds 80 columns #217: FILE: kernel/bpf/verifier.c:20586: + u8 old_type = old->stack[spi].slot_type[i % BPF_REG_SIZE]; WARNING: line length of 98 exceeds 80 columns #219: FILE: kernel/bpf/verifier.c:20588: + cur->stack[spi].slot_type[i % BPF_REG_SIZE] : STACK_INVALID; WARNING: line length of 87 exceeds 80 columns #221: FILE: kernel/bpf/verifier.c:20590: + /* STACK_INVALID and STACK_POISON are equivalent for pruning */ WARNING: line length of 83 exceeds 80 columns #231: FILE: kernel/bpf/verifier.c:20599: + if (old->stack[spi].slot_type[i % BPF_REG_SIZE] == STACK_INVALID || total: 0 errors, 13 warnings, 0 checks, 197 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 642c73f14ba7 ("bpf: poison dead stack slots") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 13 warnings, 0 checks, 197 lines checked