On Tue, 16 Jan 2024 05:43:00 +0000
Madhuker Mythri <madhuker.myt...@oracle.com> wrote:

> Hi Stephen,
> 
> Yes, I found that the Kernel we use has more Verification added for safe 
> execution:
> https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier
> 
> Here they mentioned about SKB pointer direct access, math on pointer and 
> array with undefined access is denied on BPF code.

Have you tried running Cilium? I would expect those custom changes would break 
that

Reply via email to