Hi Stephen,

Yes, I found that the Kernel we use has more Verification added for safe 
execution:
https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier

Here they mentioned about SKB pointer direct access, math on pointer and array 
with undefined access is denied on BPF code.

Thanks,
Madhuker.

-----Original Message-----
From: Stephen Hemminger <[email protected]> 
Sent: 13 January 2024 23:36
To: Madhuker Mythri <[email protected]>
Cc: [email protected]; [email protected]
Subject: Re: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per 
the Kernel-version upgrade requirements.

On Sat, 13 Jan 2024 17:52:34 +0000
Madhuker Mythri <[email protected]> wrote:

> That's true, SKB pointer access denied and throws error.
> So, I have to replace with this BPF helper functions.

It does not for me using current Debian kernel.
You may have enabled something else.

Reply via email to