OK. Found it. Thanks! it works!
On Thu, Jun 1, 2017 at 9:43 AM, Adel Fuchs wrote:
> Hi,
> Thanks for your reply. Where do I need to add this workaround?
>
> Thanks,
> Adel
>
> On Mon, May 29, 2017 at 8:31 AM, Y Song wrote:
>> On Sun, May 28, 2017 at 12:38 AM, Adel Fuchs wrote:
>>> Hi,
>>> Is th
Hi,
Thanks for your reply. Where do I need to add this workaround?
Thanks,
Adel
On Mon, May 29, 2017 at 8:31 AM, Y Song wrote:
> On Sun, May 28, 2017 at 12:38 AM, Adel Fuchs wrote:
>> Hi,
>> Is there any way to run this eBPF program without that patch?
>> Alternatively, is there any other eBPF
On Sun, May 28, 2017 at 12:38 AM, Adel Fuchs wrote:
> Hi,
> Is there any way to run this eBPF program without that patch?
> Alternatively, is there any other eBPF sample that does run properly? I need
> to run a program that filters packets according to IP address or port.
The following is tempor
On Sat, May 27, 2017 at 5:11 PM, David Miller wrote:
> From: Y Song
> Date: Sat, 27 May 2017 13:52:27 -0700
>
>> On Sat, May 27, 2017 at 1:23 PM, Y Song wrote:
>>>
>>> From verifier error message:
>>> ==
>>> 0: (bf) r6 = r1
>>>
>>> 1: (18) r9 = 0xffee
>>>
>>> 3: (69) r0 = *(u16 *)(r6 +16
From: Y Song
Date: Sat, 27 May 2017 13:52:27 -0700
> On Sat, May 27, 2017 at 1:23 PM, Y Song wrote:
>>
>> From verifier error message:
>> ==
>> 0: (bf) r6 = r1
>>
>> 1: (18) r9 = 0xffee
>>
>> 3: (69) r0 = *(u16 *)(r6 +16)
>>
>> invalid bpf_context access off=16 size=2
>> ==
>>
>> The
On Sat, May 27, 2017 at 1:23 PM, Y Song wrote:
>
> From verifier error message:
> ==
> 0: (bf) r6 = r1
>
> 1: (18) r9 = 0xffee
>
> 3: (69) r0 = *(u16 *)(r6 +16)
>
> invalid bpf_context access off=16 size=2
> ==
>
> The offset 16 of struct __sk_buff is hash.
> What instruction #3 tries
>From verifier error message:
==
0: (bf) r6 = r1
1: (18) r9 = 0xffee
3: (69) r0 = *(u16 *)(r6 +16)
invalid bpf_context access off=16 size=2
==
The offset 16 of struct __sk_buff is hash.
What instruction #3 tries to do is to access 2 bytes of the hash value
instead of full 4 bytes.
T