bpf: wip.

this should be MAYBE_NULL.

Signed-off-by: Alexei Starovoitov <ast@kernel.org>
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c
index 19d0c39..8af3844e 100644
--- a/kernel/bpf/verifier.c
+++ b/kernel/bpf/verifier.c
@@ -5391,12 +5391,25 @@
 	struct css_set __rcu *cgroups;
 	struct task_struct __rcu *real_parent;
 	struct task_struct *group_leader;
+	struct mm_struct *mm;
+};
+
+BTF_TYPE_SAFE_RCU(struct cgroup) {
+	struct kernfs_node *kn;
 };
 
 BTF_TYPE_SAFE_RCU(struct css_set) {
 	struct cgroup *dfl_cgrp;
 };
 
+BTF_TYPE_SAFE_RCU(struct mm_struct) {
+	struct file __rcu *exe_file;
+};
+
+BTF_TYPE_SAFE_RCU(struct sk_buff) {
+	struct sock *sk;
+};
+
 /* full trusted: these fields are trusted even outside of RCU CS and never NULL */
 BTF_TYPE_SAFE_TRUSTED(struct bpf_iter_meta) {
 	struct seq_file *seq;
@@ -5429,7 +5442,10 @@
 			const char *field_name, u32 btf_id)
 {
 	BTF_TYPE_EMIT(BTF_TYPE_SAFE_RCU(struct task_struct));
+	BTF_TYPE_EMIT(BTF_TYPE_SAFE_RCU(struct cgroup));
 	BTF_TYPE_EMIT(BTF_TYPE_SAFE_RCU(struct css_set));
+	BTF_TYPE_EMIT(BTF_TYPE_SAFE_RCU(struct mm_struct));
+	BTF_TYPE_EMIT(BTF_TYPE_SAFE_RCU(struct sk_buff));
 
 	return btf_nested_type_is_trusted(&env->log, reg, field_name, btf_id, "__safe_rcu");
 }