On Sat, May 02, 2026 at 09:29:27PM -0700, Randy Dunlap wrote:
> > + 20) ``V`` if an eBPF program utilising unsafe, mutating helpers (such as
> > +     bpf_probe_write_user() or bpf_override_return()) was loaded. These 
> > helpers
> > +     bypass standard eBPF safety guarantees and can alter execution flow or
> > +     corrupt memory.
> 
> (If this patch goes forward:)
> 
> In this same file (above), there is a little script around line 77 where
> it should be changed:
> s/20/21/
> 
> Also please update tools/debugging/kernel-chktaint for this taint flag.
> 
Hi Randy,

Acknowledged. I'll address the above within the next iteration.


Kind regards,
-- 
Aaron Tomlin

Attachment: signature.asc
Description: PGP signature

Reply via email to