summaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/task-analyzer.py
diff options
context:
space:
mode:
authorMatt Bobrowski <mattbobrowski@google.com>2026-01-13 08:39:47 +0000
committerAlexei Starovoitov <ast@kernel.org>2026-01-13 19:19:13 -0800
commitf8ade2342e22e7dbc71af496f07c900f8c69dd54 (patch)
treef97c5b6717b775ec8bc746bf29203233d8ddc985 /tools/perf/scripts/python/task-analyzer.py
parentb9da17391e135f65df0eaa73e7c3fd09a1d45f6d (diff)
downloadlinux-f8ade2342e22e7dbc71af496f07c900f8c69dd54.tar.gz
linux-f8ade2342e22e7dbc71af496f07c900f8c69dd54.zip
bpf: return PTR_TO_BTF_ID | PTR_TRUSTED from BPF kfuncs by default
Teach the BPF verifier to treat pointers to struct types returned from BPF kfuncs as implicitly trusted (PTR_TO_BTF_ID | PTR_TRUSTED) by default. Returning untrusted pointers to struct types from BPF kfuncs should be considered an exception only, and certainly not the norm. Update existing selftests to reflect the change in register type printing (e.g. `ptr_` becoming `trusted_ptr_` in verifier error messages). Link: https://lore.kernel.org/bpf/aV4nbCaMfIoM0awM@google.com/ Signed-off-by: Matt Bobrowski <mattbobrowski@google.com> Acked-by: Kumar Kartikeya Dwivedi <memxor@gmail.com> Link: https://lore.kernel.org/r/20260113083949.2502978-1-mattbobrowski@google.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python/task-analyzer.py')
0 files changed, 0 insertions, 0 deletions