diff options
author | Edward Cree <ecree@solarflare.com> | 2017-08-07 16:30:30 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-08-09 02:51:35 +0200 |
commit | 8e17c1b16277cba0e9426de6fe78817df378f45c (patch) | |
tree | 420fd7c2274e3749c22f23315a010ef43c99dcff /kernel/bpf | |
parent | Documentation: describe the new eBPF verifier value tracking behaviour (diff) | |
download | linux-8e17c1b16277cba0e9426de6fe78817df378f45c.tar.xz linux-8e17c1b16277cba0e9426de6fe78817df378f45c.zip |
bpf/verifier: increase complexity limit to 128k
The more detailed value tracking can reduce the effectiveness of pruning
for some programs. So, to avoid rejecting previously valid programs, up
the limit to 128kinsns. Hopefully we will be able to bring this back
down later by improving pruning performance.
Signed-off-by: Edward Cree <ecree@solarflare.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'kernel/bpf')
-rw-r--r-- | kernel/bpf/verifier.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c index 08a6fa0369c2..8160a81a40bf 100644 --- a/kernel/bpf/verifier.c +++ b/kernel/bpf/verifier.c @@ -140,7 +140,7 @@ struct bpf_verifier_stack_elem { struct bpf_verifier_stack_elem *next; }; -#define BPF_COMPLEXITY_LIMIT_INSNS 98304 +#define BPF_COMPLEXITY_LIMIT_INSNS 131072 #define BPF_COMPLEXITY_LIMIT_STACK 1024 #define BPF_MAP_PTR_POISON ((void *)0xeB9F + POISON_POINTER_DELTA) |