Hi Stephen, Yes, I found that the Kernel we use has more Verification added for safe execution: https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier
Here they mentioned about SKB pointer direct access, math on pointer and array with undefined access is denied on BPF code. Thanks, Madhuker. -----Original Message----- From: Stephen Hemminger <[email protected]> Sent: 13 January 2024 23:36 To: Madhuker Mythri <[email protected]> Cc: [email protected]; [email protected] Subject: Re: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the Kernel-version upgrade requirements. On Sat, 13 Jan 2024 17:52:34 +0000 Madhuker Mythri <[email protected]> wrote: > That's true, SKB pointer access denied and throws error. > So, I have to replace with this BPF helper functions. It does not for me using current Debian kernel. You may have enabled something else.

