Hi Stephen, Yes, I found that the Kernel we use has more Verification added for safe execution: https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier
Here they mentioned about SKB pointer direct access, math on pointer and array with undefined access is denied on BPF code. Thanks, Madhuker. -----Original Message----- From: Stephen Hemminger <step...@networkplumber.org> Sent: 13 January 2024 23:36 To: Madhuker Mythri <madhuker.myt...@oracle.com> Cc: dev@dpdk.org; ferruh.yi...@amd.com Subject: Re: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the Kernel-version upgrade requirements. On Sat, 13 Jan 2024 17:52:34 +0000 Madhuker Mythri <madhuker.myt...@oracle.com> wrote: > That's true, SKB pointer access denied and throws error. > So, I have to replace with this BPF helper functions. It does not for me using current Debian kernel. You may have enabled something else.