On Tue, 16 Jan 2024 05:43:00 +0000 Madhuker Mythri <[email protected]> wrote:
> Hi Stephen, > > Yes, I found that the Kernel we use has more Verification added for safe > execution: > https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier > > Here they mentioned about SKB pointer direct access, math on pointer and > array with undefined access is denied on BPF code. Have you tried running Cilium? I would expect those custom changes would break that

