WARNING: line length of 84 exceeds 80 columns #59: FILE: kernel/bpf/log.c:742: + if (slot_type != STACK_INVALID && slot_type != STACK_POISON) WARNING: line length of 142 exceeds 80 columns #126: FILE: kernel/bpf/verifier.c:5733: + verbose(env, "reading from stack off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 107 exceeds 80 columns #129: FILE: kernel/bpf/verifier.c:5736: + verbose(env, "invalid read from stack off %d+%d size %d\n", WARNING: line length of 126 exceeds 80 columns #142: FILE: kernel/bpf/verifier.c:5788: + verbose(env, "reading from stack off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 91 exceeds 80 columns #145: FILE: kernel/bpf/verifier.c:5791: + verbose(env, "invalid read from stack off %d+%d size %d\n", WARNING: line length of 122 exceeds 80 columns #186: FILE: kernel/bpf/verifier.c:8513: + verbose(env, "reading from stack R%d off %d+%d size %d, slot poisoned by dead code elimination\n", WARNING: line length of 84 exceeds 80 columns #198: FILE: kernel/bpf/verifier.c:8692: + int size = base_type(reg->type) == PTR_TO_STACK ? -(int)mem_size : mem_size; WARNING: line length of 86 exceeds 80 columns #201: FILE: kernel/bpf/verifier.c:8695: + err = err ?: check_helper_mem_access(env, regno, size, BPF_WRITE, true, NULL); WARNING: line length of 101 exceeds 80 columns #219: FILE: kernel/bpf/verifier.c:20551: + ((stack->slot_type[i] == STACK_INVALID || stack->slot_type[i] == STACK_POISON) && WARNING: line length of 82 exceeds 80 columns #234: FILE: kernel/bpf/verifier.c:20589: + u8 old_type = old->stack[spi].slot_type[i % BPF_REG_SIZE]; WARNING: line length of 98 exceeds 80 columns #236: FILE: kernel/bpf/verifier.c:20591: + cur->stack[spi].slot_type[i % BPF_REG_SIZE] : STACK_INVALID; WARNING: line length of 87 exceeds 80 columns #238: FILE: kernel/bpf/verifier.c:20593: + /* STACK_INVALID and STACK_POISON are equivalent for pruning */ WARNING: line length of 83 exceeds 80 columns #248: FILE: kernel/bpf/verifier.c:20602: + if (old->stack[spi].slot_type[i % BPF_REG_SIZE] == STACK_INVALID || total: 0 errors, 13 warnings, 0 checks, 213 lines checked NOTE: For some of the reported defects, checkpatch may be able to mechanically convert to the typical style using --fix or --fix-inplace. Commit 391899f5b108 ("bpf: poison dead stack slots") has style problems, please review. NOTE: Ignored message types: ALLOC_SIZEOF_STRUCT BAD_REPORTED_BY_LINK CAMELCASE COMMIT_LOG_LONG_LINE FILE_PATH_CHANGES GIT_COMMIT_ID MACRO_ARG_REUSE NO_AUTHOR_SIGN_OFF NOTE: If any of the errors are false positives, please report them to the maintainer, see CHECKPATCH in MAINTAINERS. total: 0 errors, 13 warnings, 0 checks, 213 lines checked