Re: [RFC PATCH] bpf: introduce TAINT_UNSAFE_BPF for mutating helpers
From: Aaron Tomlin
Date: Sun May 03 2026 - 11:24:17 EST
On Sat, May 02, 2026 at 09:29:27PM -0700, Randy Dunlap wrote:
> > + 20) ``V`` if an eBPF program utilising unsafe, mutating helpers (such as
> > + bpf_probe_write_user() or bpf_override_return()) was loaded. These helpers
> > + bypass standard eBPF safety guarantees and can alter execution flow or
> > + corrupt memory.
>
> (If this patch goes forward:)
>
> In this same file (above), there is a little script around line 77 where
> it should be changed:
> s/20/21/
>
> Also please update tools/debugging/kernel-chktaint for this taint flag.
>
Hi Randy,
Acknowledged. I'll address the above within the next iteration.
Kind regards,
--
Aaron Tomlin
Attachment:
signature.asc
Description: PGP signature