by jgrahamc on 5/7/25, 5:55 PM with 1 comments
by majke on 5/8/25, 9:31 AM
It turns out - there is now some reasonable tooling to understand verifier!
For stack problems, clang accepts `-s` which prints stack requirement per function, like so:
** stack usage by function **
ebpf/ebpf_aes128.c:180 AES_ECB_encrypt 32 static
ebpf/ebpf_sha256.c:34 sha256_calc_chunk 64 static
ebpf/ebpf_sha256.c:123 sha256_hmac 40 static
ebpf/ebpf_quic.c:86 compute_hp_mask 24 static
ebpf/ebpf_quic.c:242 decrypt_quic 16 static
ebpf/ebpf_quic.c:193 _do_decrypt_quic_loop 16 static
And for instruction count, I was able to feed the logs from verbose verifier (during loading) into code-coverage tooling, and count stuff up. The reuseorg prog takes 100k verifier instruction count/paths: ** verifier instruction count **
udpgrm_reuseport_prog processed 103486 insns
udpgrm_setsockopt processed 9260 insns
udpgrm_getsockopt processed 4215 insns
udpgrm_bpf_bind6 processed 75 insns
While 100k is lower than 1m instr count limit, it's still a lot. And reordering some loop or introducing some "if" often makes that count baloon. Remember that verifier instructions is not real instructions during run. Rather it's a pessimistic interpretation of how many instr max under pessimistic conditions could possibly be run. I don't think having an actual run of that max is even practically possible. Think about it as upper bound of static analysis.Anyway - with stack and instr statistics it's way easier to make sense of verifier problems.