-
Notifications
You must be signed in to change notification settings - Fork 175
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Malicious eBPF - slow JIT via expensive static analysis #186
Comments
Short answer: We don't know and it is quite likely that it can even run into infinite loops. |
I see, thanks. May I know if a non-uniform opcode compute unit cost table is on the horizon? In the other issue I created, I argue for why it could be sensible to do so: #185. I mistakenly assumed that CFG analysis was for the express purpose of facilitating the use of the compute meter for a non-uniform opcode cost. |
The static analysis was developed for a number of reasons:
|
I see, thanks. Maybe it's worth considering this if static analysis is used for async compilation of cached executors in the future. |
I'd like to know what the worst case compilation+static analysis time for an eBPF program of size up to 10MB, by causing the static analysis to become very slow (for instance, jumping randomly on every instruction).
Still, a BTreeMap with 10M entries with integer keys doesn't seem that daunting... Cfg graph also has branching factor at most 2 - this means at most 20M edges.
The text was updated successfully, but these errors were encountered: