Re: [LSF/MM/BPF TOPIC] Segmented Stacks for BPF Programs

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi Yonghong,

On Wed, Feb 14, 2024 at 11:53:13AM -0800, Yonghong Song wrote:
> For each active kernel thread, the thread stack size is 2*PAGE_SIZE ([1]).
> Each bpf program has a maximum stack size 512 bytes to avoid
> overflowing the thread stack. But nested bpf programs may post
> a challenge to avoid stack overflow.
> 
> For example, currently we already allow nested bpf
> programs esp in tracing, i.e.,
>   Prog_A
>     -> Call Helper_B
>       -> Call Func_C
>         -> fentry program is called due to Func_C.
>           -> Call Helper_D and then Func_E
>             -> fentry due to Func_E
>               -> ...
> If we have too many bpf programs in the chain and each bpf program
> has close to 512 byte stack size, it could overflow the kernel thread
> stack.

Just curious - overflowing the thread stack would cause some kind of
panic right? And also, segmented/split stacks for bpf just reduces
likelihood of stack overflow due to BPF prog stack requirements. In
theory, a deep call stack due to fentry probes could still occur, right?

[...]

Thanks,
Daniel




[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux