No, I did not run with Cilium.
Thanks,
Madhuker.
-Original Message-
From: Stephen Hemminger
Sent: 17 January 2024 08:56
To: Madhuker Mythri
Cc: dev@dpdk.org; ferruh.yi...@amd.com
Subject: Re: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per
the Kernel-version upgrade
On Tue, 16 Jan 2024 05:43:00 +
Madhuker Mythri wrote:
> Hi Stephen,
>
> Yes, I found that the Kernel we use has more Verification added for safe
> execution:
> https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier
>
> Here they mentioned about SKB pointer d
On Sat, 13 Jan 2024 17:50:19 +
Madhuker Mythri wrote:
> With the original code BPF verifier throws error, due to undefined array
> access and thus could failed to load the BPF instructions onto the Kernel.
> For safe execution on the Kernel, the array access with such undefined value
> thro
On Tue, 16 Jan 2024 05:43:00 +
Madhuker Mythri wrote:
> Hi Stephen,
>
> Yes, I found that the Kernel we use has more Verification added for safe
> execution:
> https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier
>
> Here they mentioned about SKB pointer d
on BPF code.
Thanks,
Madhuker.
-Original Message-
From: Stephen Hemminger
Sent: 13 January 2024 23:36
To: Madhuker Mythri
Cc: dev@dpdk.org; ferruh.yi...@amd.com
Subject: Re: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per
the Kernel-version upgrade requirements.
On
On Sat, 13 Jan 2024 17:52:34 +
Madhuker Mythri wrote:
> That's true, SKB pointer access denied and throws error.
> So, I have to replace with this BPF helper functions.
It does not for me using current Debian kernel.
You may have enabled something else.
On Sat, 13 Jan 2024 17:50:19 +
Madhuker Mythri wrote:
> With the original code BPF verifier throws error, due to undefined array
> access and thus could failed to load the BPF instructions onto the Kernel.
> For safe execution on the Kernel, the array access with such undefined value
> thro
d.com
Subject: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the
Kernel-version upgrade requirements.
On Fri, 12 Jan 2024 19:18:21 +0530
madhuker.myt...@oracle.com wrote:
> struct ipv4_l3_l4_tuple v4_tuple = {
> - .src_addr = IPv4(*(src_d
t/tap: Modified TAP BPF program as per the
Kernel-version upgrade requirements.
On Fri, 12 Jan 2024 19:18:21 +0530
madhuker.myt...@oracle.com wrote:
> 2) Kernel SKB data pointer access not allowed, instead use the BPF helper
> functions.
This is not true, many of the current kernel BPF ex
.
Thanks,
Madhuker,
-Original Message-
From: Stephen Hemminger
Sent: 12 January 2024 22:12
To: Madhuker Mythri
Cc: dev@dpdk.org; ferruh.yi...@amd.com
Subject: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the
Kernel-version upgrade requirements.
On Fri, 12 Jan 2024
10 matches
Mail list logo