-
Notifications
You must be signed in to change notification settings - Fork 457
Pr/olsajiri/override user #4005
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
✅ Deploy Preview for tetragon ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
205987b
to
0458739
Compare
987681b
to
a5476da
Compare
Signed-off-by: Jiri Olsa <[email protected]>
It helps with making verifier happy wrt masking usdt arg index. Signed-off-by: Jiri Olsa <[email protected]>
Signed-off-by: Jiri Olsa <[email protected]>
Signed-off-by: Jiri Olsa <[email protected]>
Signed-off-by: Jiri Olsa <[email protected]>
Signed-off-by: Jiri Olsa <[email protected]>
Signed-off-by: Jiri Olsa <[email protected]>
Signed-off-by: Jiri Olsa <[email protected]>
Signed-off-by: Jiri Olsa <[email protected]>
a5476da
to
65f03fe
Compare
Tried this out and it seems to work 🎉 One thing I noticed is that the kernel has lockdown enabled, the program refuses to load:
This happens even if we don't use the "Set" action. So we might want to have a way to check this at runtime and set a constant in the bpf code to prove to the verifier that the write is actually dead code, so that we can load policies that do not use "Set" in lockdown kernels. It can be a followup to this PR though. |
wip