Tamir Duberstein
Tamir Duberstein
The ones that aren't on the normal cadence are typically security-related.
All of these would be interesting topics. I would probably start with the first 3 which sound least fantastical 🙂 .
Your panic handler is a lie: https://github.com/ZuInnoTe/rust-ebpf-localnet-kernel-filter-study/blob/3d33b2e7237786c494db6c30fd0307bcaf10a054/uprobe-libcall-filter/uprobe-libcall-filter-ebpf/src/main.rs#L210 Try making it an infinite loop so the verifier gives you a more actionable error. We've made that change in the template recently...
just don't `unwrap`.
I sent https://github.com/aya-rs/book/pull/173 so other people don't use nonsense panic handlers.
You seem not to understand the purpose of the verifier. Your problem comes from the fact that the verifier cannot **prove** that your code is safe. Just because you are...
@astoycos couldn't we keep only the LE and conditionally compile a shadowing variable declaration that reverses the endianness at runtime? ```rust let foo = ...; #[cfg(...)] let foo = le_to_be(foo);...
You just need to know the element size, right?
I see. No free lunch then - you could implement a trait and use destructuring to get some compiler help but otherwise writing decoded literals rather than encoded seems a...
I think this is resolved.