No, I did not run with Cilium. Thanks, Madhuker.
-----Original Message----- From: Stephen Hemminger <step...@networkplumber.org> Sent: 17 January 2024 08:56 To: Madhuker Mythri <madhuker.myt...@oracle.com> Cc: dev@dpdk.org; ferruh.yi...@amd.com Subject: Re: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the Kernel-version upgrade requirements. On Tue, 16 Jan 2024 05:43:00 +0000 Madhuker Mythri <madhuker.myt...@oracle.com> wrote: > Hi Stephen, > > Yes, I found that the Kernel we use has more Verification added for safe > execution: > https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier > > Here they mentioned about SKB pointer direct access, math on pointer and > array with undefined access is denied on BPF code. Have you tried running Cilium? I would expect those custom changes would break that