Hi Stephen,

Yes, I found that the Kernel we use has more Verification added for safe 
execution:
https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier

Here they mentioned about SKB pointer direct access, math on pointer and array 
with undefined access is denied on BPF code.

Thanks,
Madhuker.

-----Original Message-----
From: Stephen Hemminger <step...@networkplumber.org> 
Sent: 13 January 2024 23:36
To: Madhuker Mythri <madhuker.myt...@oracle.com>
Cc: dev@dpdk.org; ferruh.yi...@amd.com
Subject: Re: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per 
the Kernel-version upgrade requirements.

On Sat, 13 Jan 2024 17:52:34 +0000
Madhuker Mythri <madhuker.myt...@oracle.com> wrote:

> That's true, SKB pointer access denied and throws error.
> So, I have to replace with this BPF helper functions.

It does not for me using current Debian kernel.
You may have enabled something else.

Reply via email to