[External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the Kernel-version upgrade requirements.
    Madhuker Mythri 
    madhuker.mythri at oracle.com
       
    Wed Jan 17 17:19:14 CET 2024
    
    
  
No, I did not run with Cilium.
Thanks,
Madhuker.
-----Original Message-----
From: Stephen Hemminger <stephen at networkplumber.org> 
Sent: 17 January 2024 08:56
To: Madhuker Mythri <madhuker.mythri at oracle.com>
Cc: dev at dpdk.org; ferruh.yigit at amd.com
Subject: Re: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the Kernel-version upgrade requirements.
On Tue, 16 Jan 2024 05:43:00 +0000
Madhuker Mythri <madhuker.mythri at oracle.com> wrote:
> Hi Stephen,
> 
> Yes, I found that the Kernel we use has more Verification added for safe execution:
> https://blogs.oracle.com/linux/post/bpf-in-depth-the-bpf-bytecode-and-the-bpf-verifier
> 
> Here they mentioned about SKB pointer direct access, math on pointer and array with undefined access is denied on BPF code.
Have you tried running Cilium? I would expect those custom changes would break that
    
    
More information about the dev
mailing list