Conversation
Signed-off-by: Andrej Svenke <anryko@nebius.com>
Signed-off-by: Andrej Svenke <anryko@nebius.com>
d68a9a2 to
685f83d
Compare
Signed-off-by: Andrej Svenke <anryko@nebius.com>
1cb2253 to
43129ea
Compare
|
Summary
Please let me know if these changes make sense and I'm looking forward to your feedback. |
43129ea to
9f104eb
Compare
Signed-off-by: Andrej Svenke <anryko@nebius.com>
9f104eb to
a6e3718
Compare
|
Hi @anryko It looks like we are both interested in getting ebpf to work with BPF token. I have #1948 out which I believe implements what you already have, plus a test program to confirm that probes and ebpf operations work with dropped privileges. I would really appreciate your comments on it and whether that would meet your needs. Cheers, |
A minimal implementation of privilege delegation via BPF token feature. I only implemented the functionality which was required to test my specific usecase. I'm not sure if this is a good idea to implement it as I did, via a fallback action to try on permission error. But I did not want to introduce API changes while testing basic functionality.
Please help out and advice on how to proceed with moving forward with this feature.
Relates to: #1921