[External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the Kernel-version upgrade requirements.

Madhuker Mythri madhuker.mythri at oracle.com
Tue Jan 16 06:43:00 CET 2024


Hi Stephen,

Yes, I found that the Kernel we use has more Verification added for safe execution:
https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier

Here they mentioned about SKB pointer direct access, math on pointer and array with undefined access is denied on BPF code.

Thanks,
Madhuker.

-----Original Message-----
From: Stephen Hemminger <stephen at networkplumber.org> 
Sent: 13 January 2024 23:36
To: Madhuker Mythri <madhuker.mythri at oracle.com>
Cc: dev at dpdk.org; ferruh.yigit at amd.com
Subject: Re: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the Kernel-version upgrade requirements.

On Sat, 13 Jan 2024 17:52:34 +0000
Madhuker Mythri <madhuker.mythri at oracle.com> wrote:

> That's true, SKB pointer access denied and throws error.
> So, I have to replace with this BPF helper functions.

It does not for me using current Debian kernel.
You may have enabled something else.


More information about the dev mailing list