diff options
| author | Andrea Terzolo <[email protected]> | 2025-03-18 08:35:45 +0000 |
|---|---|---|
| committer | Alexei Starovoitov <[email protected]> | 2025-03-19 02:11:23 +0000 |
| commit | a2598045ead99b51b00e81d46560757b9a95bd84 (patch) | |
| tree | 0eb3c99ebc1137f3233d7284075ca13fb1bf5368 /tools/lib/bpf | |
| parent | Merge branch 'bpf-reject-attaching-fexit-fmod_ret-to-noreturn-functions' (diff) | |
| download | kernel-a2598045ead99b51b00e81d46560757b9a95bd84.tar.gz kernel-a2598045ead99b51b00e81d46560757b9a95bd84.zip | |
bpf: clarify a misleading verifier error message
The current verifier error message states that tail_calls are not
allowed in non-JITed programs with BPF-to-BPF calls. While this is
accurate, it is not the only scenario where this restriction applies.
Some architectures do not support this feature combination even when
programs are JITed. This update improves the error message to better
reflect these limitations.
Suggested-by: Shung-Hsi Yu <[email protected]>
Signed-off-by: Andrea Terzolo <[email protected]>
Acked-by: Shung-Hsi Yu <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Alexei Starovoitov <[email protected]>
Diffstat (limited to 'tools/lib/bpf')
0 files changed, 0 insertions, 0 deletions
