Christian Deacon <gamemann@xxxxxxxxxxx> writes: > Hey everyone, > > I apologize if this isn't the correct place to discuss an issue with XDP > software I'm attempting to create. I'm not sure where else I can request > help on this since it may be related to BPF/XDP itself. > > I've made an XDP Firewall project on GitHub here: > > https://github.com/gamemann/XDP-Firewall > > I am still fairly new to C and XDP. Therefore, I'm sure many > improvements could be made to the software. However, everything besides > the payload matching is working correctly from what I've tested. > > Basically, this program transfers filtering rules from a config file in > the user space to the XDP program via BPF maps. The XDP program then > performs checks against each filter specified. I'm trying to implement > payload matching into this project and I got the user-space side working > properly. However, when I attempt to check the payload within the XDP > program, I keep receiving errors either when compiling (stating the BPF > stack has been exhausted) or the following error when attaching the XDP > program: > > ``` > The sequence of 8193 jumps is too complex. > processed 100132 insns (limit 1000000) max_states_per_insn 4 > total_states 1279 peak_states 1279 mark_read 97 > ``` > > There is a very long BPF stack trace that I can attach if need to be. > The following is the part of code causing this issue (it's not commented > out on my development VM): > > https://github.com/gamemann/XDP-Firewall/blob/master/src/xdpfw_kern.c#L306 > > If I comment out line 332 or set `found` to 1, the XDP program does not > crash. I've tried a `goto` approach as well which is available here: > > https://gist.github.com/gamemann/9f0d42c25151d0f2e1630840d04fd599 > > However, this causes the following error when starting the XDP program: > > ``` > invalid read from stack off -488+0 size 8 > processed 844 insns (limit 1000000) max_states_per_insn 4 total_states > 28 peak_states 28 mark_read > ``` > > If I comment out line 27 from that Gist (`continue;`), the program runs > properly. I've also tried moving the code into its own for loop by > making some modifications. However, I get the same results. I'd assume > this is some sort of BPF limitation with for loops and jumps. However, > I'm sure there's a strong possibility I'm just not doing something right > when attempting to match the payload. Yeah, you're right, the verifier caps the size of the tree of branches it'll explore at 8192 entries (which is why your error triggers at 8193). So to get past the verifier you'll simply have to limit the complexity of your program. A few techniques come to mind to achieve this: - Limit the length of the loop (you have MAX_PCKT_LENGTH at 64k, which is never going to be the case since XDP doesn't support jumboframes). - Split up your program into smaller components and use tail calls or non-inlined functions to call through to them (though not sure how far per-function verification has come, so the latter may not give you much benefit yet). Splitting up the code also helps with not running the bits that are not needed in a current filter configuration, which is an important way to improve performance of XDP programs. See xdp-filter[0] for an example of how to conditionally load different code subsets as needed. - Use a matching algorithm that doesn't require looping through the packet byte-by-byte as you're doing now. For instance, you could have a hash map that uses the payload you're trying to match as the key with an appropriate chunk size. -Toke [0] https://github.com/xdp-project/xdp-tools/tree/master/xdp-filter