On Sat, May 02, 2026 at 09:29:27PM -0700, Randy Dunlap wrote: > > + 20) ``V`` if an eBPF program utilising unsafe, mutating helpers (such as > > + bpf_probe_write_user() or bpf_override_return()) was loaded. These > > helpers > > + bypass standard eBPF safety guarantees and can alter execution flow or > > + corrupt memory. > > (If this patch goes forward:) > > In this same file (above), there is a little script around line 77 where > it should be changed: > s/20/21/ > > Also please update tools/debugging/kernel-chktaint for this taint flag. > Hi Randy,
Acknowledged. I'll address the above within the next iteration. Kind regards, -- Aaron Tomlin
signature.asc
Description: PGP signature
