public inbox for bpf@vger.kernel.org
 help / color / mirror / Atom feed
From: Mykyta Yatsenko <mykyta.yatsenko5@gmail.com>
To: Kumar Kartikeya Dwivedi <memxor@gmail.com>, bpf@vger.kernel.org
Cc: Alexei Starovoitov <ast@kernel.org>,
	Andrii Nakryiko <andrii@kernel.org>,
	Daniel Borkmann <daniel@iogearbox.net>,
	Martin KaFai Lau <martin.lau@kernel.org>,
	Eduard Zingerman <eddyz87@gmail.com>,
	Ihor Solodrai <ihor.solodrai@linux.dev>,
	kkd@meta.com, kernel-team@meta.com
Subject: Re: [PATCH bpf-next v3 3/4] libbpf: Request verifier warnings for object loads
Date: Mon, 20 Apr 2026 14:57:02 +0100	[thread overview]
Message-ID: <d3e3a02f-8948-4952-b0e9-6e289fe09a41@gmail.com> (raw)
In-Reply-To: <20260418171701.610025-4-memxor@gmail.com>

On 4/18/26 6:16 PM, Kumar Kartikeya Dwivedi wrote:
> On kernels supporting BPF_LOG_LEVEL_WARN, have libbpf request verifier
> warnings for BPF object program loads by ORing in the warning bit.  This
> keeps the existing log_level=0 retry semantics for verbose logs, while
> still surfacing verifier warnings for successful loads.
> 
> When libbpf owns the log buffer, use a small buffer for warning-only
> loads and flush captured warnings through the print callback. Detect
> support by probing for BPF_FEAT_VERIFIER_WARNINGS in enum bpf_features,
> and document the updated kernel_log_level behavior.
> 
> Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
> ---
>   tools/lib/bpf/features.c        | 56 +++++++++++++++++++++++++++++++++
>   tools/lib/bpf/libbpf.c          | 25 ++++++++++-----
>   tools/lib/bpf/libbpf.h          |  7 +++--
>   tools/lib/bpf/libbpf_internal.h |  2 ++
>   4 files changed, 80 insertions(+), 10 deletions(-)
> 
> diff --git a/tools/lib/bpf/features.c b/tools/lib/bpf/features.c
> index 4f19a0d79b0c..78f07866db12 100644
> --- a/tools/lib/bpf/features.c
> +++ b/tools/lib/bpf/features.c
> @@ -208,6 +208,59 @@ static int probe_kern_btf_type_tag(int token_fd)
>   					     strs, sizeof(strs), token_fd));
>   }
>   
> +static bool btf_type_has_enum_value(const struct btf *btf, const struct btf_type *t,
> +				    const char *value_name)
> +{
> +	int i, vlen = btf_vlen(t);
> +
> +	if (btf_is_enum(t)) {
> +		const struct btf_enum *e = btf_enum(t);
> +
> +		for (i = 0; i < vlen; i++, e++) {
> +			if (strcmp(btf__name_by_offset(btf, e->name_off), value_name) == 0)
> +				return true;
> +		}
> +	} else if (btf_is_enum64(t)) {
> +		const struct btf_enum64 *e = btf_enum64(t);
> +
> +		for (i = 0; i < vlen; i++, e++) {
> +			if (strcmp(btf__name_by_offset(btf, e->name_off), value_name) == 0)
> +				return true;
> +		}
> +	}
> +
> +	return false;
> +}
> +
> +static int probe_kern_verifier_warnings(int token_fd)
> +{
> +	const struct btf_type *t;
> +	struct btf *btf;
> +	bool found = false;
> +	__s32 type_id;
> +
> +	(void)token_fd;
> +
> +	btf = btf__load_vmlinux_btf();
> +	if (libbpf_get_error(btf))
> +		return 0;
> +
> +	type_id = btf__find_by_name_kind(btf, "bpf_features", BTF_KIND_ENUM);
> +	if (type_id < 0)
> +		type_id = btf__find_by_name_kind(btf, "bpf_features", BTF_KIND_ENUM64);
> +	if (type_id < 0) {
> +		btf__free(btf);
> +		return 0;
> +	}
> +
> +	t = btf__type_by_id(btf, type_id);
> +	if (t)
> +		found = btf_type_has_enum_value(btf, t, "BPF_FEAT_VERIFIER_WARNINGS");
> +
> +	btf__free(btf);
> +	return found;
> +}
> +
>   static int probe_kern_array_mmap(int token_fd)
>   {
>   	LIBBPF_OPTS(bpf_map_create_opts, opts,
> @@ -669,6 +722,9 @@ static struct kern_feature_desc {
>   	[FEAT_BTF_TYPE_TAG] = {
>   		"BTF_KIND_TYPE_TAG support", probe_kern_btf_type_tag,
>   	},
> +	[FEAT_VERIFIER_WARNINGS] = {
> +		"BPF_LOG_LEVEL_WARN verifier warnings", probe_kern_verifier_warnings,
> +	},
>   	[FEAT_MEMCG_ACCOUNT] = {
>   		"memcg-based memory accounting", probe_memcg_account,
>   	},
> diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
> index 3a80a018fc7d..c7b00c097698 100644
> --- a/tools/lib/bpf/libbpf.c
> +++ b/tools/lib/bpf/libbpf.c
> @@ -7841,12 +7841,17 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
>   {
>   	LIBBPF_OPTS(bpf_prog_load_opts, load_attr);
>   	const char *prog_name = NULL;
> +	const size_t warn_log_buf_size = 4096;
>   	size_t log_buf_size = 0;
>   	char *log_buf = NULL, *tmp;
>   	bool own_log_buf = true;
>   	__u32 log_level = prog->log_level;
> +	bool supports_verifier_warnings = kernel_supports(obj, FEAT_VERIFIER_WARNINGS);
>   	int ret, err;
>   
> +	if (supports_verifier_warnings)
> +		log_level |= 16;
> +
>   	/* Be more helpful by rejecting programs that can't be validated early
>   	 * with more meaningful and actionable error message.
>   	 */
> @@ -7921,10 +7926,9 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
>   	}
>   
>   retry_load:
> -	/* if log_level is zero, we don't request logs initially even if
> -	 * custom log_buf is specified; if the program load fails, then we'll
> -	 * bump log_level to 1 and use either custom log_buf or we'll allocate
> -	 * our own and retry the load to get details on what failed
> +	/* If verifier warning logging is supported, we can request warnings
> +	 * even without verbose logging. If the program load fails, retry with
> +	 * log_level=1 to get details on what failed.
>   	 */
>   	if (log_level) {
>   		if (prog->log_buf) {
> @@ -7936,7 +7940,9 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
>   			log_buf_size = obj->log_size;
>   			own_log_buf = false;
>   		} else {
> -			log_buf_size = max((size_t)BPF_LOG_BUF_SIZE, log_buf_size * 2);
> +			log_buf_size = max(log_level == 16 ? warn_log_buf_size :
> +					   (size_t)BPF_LOG_BUF_SIZE,
> +					   log_buf_size * 2);
>   			tmp = realloc(log_buf, log_buf_size);
>   			if (!tmp) {
>   				ret = -ENOMEM;
> @@ -7954,7 +7960,10 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
>   
>   	ret = bpf_prog_load(prog->type, prog_name, license, insns, insns_cnt, &load_attr);
>   	if (ret >= 0) {
> -		if (log_level && own_log_buf) {
> +		if (log_level == 16 && load_attr.log_true_size && own_log_buf) {
> +			pr_warn("prog '%s': -- BEGIN PROG LOAD WARNINGS --\n%s-- END PROG LOAD WARNINGS --\n",
> +				prog->name, log_buf);

I'm not sure if this block makes sense to me: we only print warnings 
banner is warnings is the only requested log type, but we print no 
banner if warnings are requested with other log level, also different 
log_levels: pr_warn() vs pr_debug().

> +		} else if (log_level && own_log_buf) {
>   			pr_debug("prog '%s': -- BEGIN PROG LOAD LOG --\n%s-- END PROG LOAD LOG --\n",
>   				 prog->name, log_buf);
>   		}
> @@ -7981,8 +7990,8 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
>   		goto out;
>   	}
>   
> -	if (log_level == 0) {
> -		log_level = 1;
> +	if (log_level == (supports_verifier_warnings ? 16 : 0)) {
> +		log_level = 1 | (supports_verifier_warnings ? 16 : 0);
>   		goto retry_load;
>   	}
>   	/* On ENOSPC, increase log buffer size and retry, unless custom
> diff --git a/tools/lib/bpf/libbpf.h b/tools/lib/bpf/libbpf.h
> index bba4e8464396..598c6daa822b 100644
> --- a/tools/lib/bpf/libbpf.h
> +++ b/tools/lib/bpf/libbpf.h
> @@ -194,8 +194,11 @@ struct bpf_object_open_opts {
>   	/*
>   	 * Log level can be set independently from log buffer. Log_level=0
>   	 * means that libbpf will attempt loading BTF or program without any
> -	 * logging requested, but will retry with either its own or custom log
> -	 * buffer, if provided, and log_level=1 on any error.
> +	 * verbose logging requested, but will retry with either its own or
> +	 * custom log buffer, if provided, and log_level=1 on any error. On
> +	 * kernels supporting verifier warning logging, libbpf will also
> +	 * request warning messages for successful program loads by default
> +	 * when log_level=0.
>   	 * And vice versa, setting log_level>0 will request BTF or prog
>   	 * loading with verbose log from the first attempt (and as such also
>   	 * for successfully loaded BTF or program), and the actual log buffer
> diff --git a/tools/lib/bpf/libbpf_internal.h b/tools/lib/bpf/libbpf_internal.h
> index 3781c45b46d3..b2460982d6ca 100644
> --- a/tools/lib/bpf/libbpf_internal.h
> +++ b/tools/lib/bpf/libbpf_internal.h
> @@ -378,6 +378,8 @@ enum kern_feature_id {
>   	FEAT_BTF_DECL_TAG,
>   	/* BTF_KIND_TYPE_TAG support */
>   	FEAT_BTF_TYPE_TAG,
> +	/* Kernel supports BPF_LOG_LEVEL_WARN for verifier warnings */
> +	FEAT_VERIFIER_WARNINGS,
>   	/* memcg-based accounting for BPF maps and progs */
>   	FEAT_MEMCG_ACCOUNT,
>   	/* BPF cookie (bpf_get_attach_cookie() BPF helper) support */


  parent reply	other threads:[~2026-04-20 13:57 UTC|newest]

Thread overview: 22+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-18 17:16 [PATCH bpf-next v3 0/4] Add support to emit verifier warnings Kumar Kartikeya Dwivedi
2026-04-18 17:16 ` [PATCH bpf-next v3 1/4] bpf: Add support for verifier warning messages Kumar Kartikeya Dwivedi
2026-04-18 17:42   ` sashiko-bot
2026-04-18 20:33     ` Kumar Kartikeya Dwivedi
2026-04-20 13:37   ` Mykyta Yatsenko
2026-04-20 15:26     ` Kumar Kartikeya Dwivedi
2026-04-18 17:16 ` [PATCH bpf-next v3 2/4] bpf: Introduce __bpf_kfunc_mark_deprecated annotation Kumar Kartikeya Dwivedi
2026-04-18 18:06   ` sashiko-bot
2026-04-18 20:34     ` Kumar Kartikeya Dwivedi
2026-04-20 14:21   ` Mykyta Yatsenko
2026-04-20 15:27     ` Kumar Kartikeya Dwivedi
2026-04-20 18:15   ` David Faust
2026-04-20 18:19     ` Kumar Kartikeya Dwivedi
2026-04-18 17:16 ` [PATCH bpf-next v3 3/4] libbpf: Request verifier warnings for object loads Kumar Kartikeya Dwivedi
2026-04-18 18:35   ` sashiko-bot
2026-04-18 20:38     ` Kumar Kartikeya Dwivedi
2026-04-20 13:57   ` Mykyta Yatsenko [this message]
2026-04-20 15:23     ` Kumar Kartikeya Dwivedi
2026-04-20 15:49       ` Alexei Starovoitov
2026-04-18 17:16 ` [PATCH bpf-next v3 4/4] selftests/bpf: Test verifier warning logging Kumar Kartikeya Dwivedi
2026-04-18 18:45   ` sashiko-bot
2026-04-18 20:39     ` Kumar Kartikeya Dwivedi

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=d3e3a02f-8948-4952-b0e9-6e289fe09a41@gmail.com \
    --to=mykyta.yatsenko5@gmail.com \
    --cc=andrii@kernel.org \
    --cc=ast@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=eddyz87@gmail.com \
    --cc=ihor.solodrai@linux.dev \
    --cc=kernel-team@meta.com \
    --cc=kkd@meta.com \
    --cc=martin.lau@kernel.org \
    --cc=memxor@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox