From: Mykyta Yatsenko <mykyta.yatsenko5@gmail.com>
To: Kumar Kartikeya Dwivedi <memxor@gmail.com>, bpf@vger.kernel.org
Cc: Alexei Starovoitov <ast@kernel.org>,
Andrii Nakryiko <andrii@kernel.org>,
Daniel Borkmann <daniel@iogearbox.net>,
Martin KaFai Lau <martin.lau@kernel.org>,
Eduard Zingerman <eddyz87@gmail.com>,
Ihor Solodrai <ihor.solodrai@linux.dev>,
kkd@meta.com, kernel-team@meta.com
Subject: Re: [PATCH bpf-next v3 3/4] libbpf: Request verifier warnings for object loads
Date: Mon, 20 Apr 2026 14:57:02 +0100 [thread overview]
Message-ID: <d3e3a02f-8948-4952-b0e9-6e289fe09a41@gmail.com> (raw)
In-Reply-To: <20260418171701.610025-4-memxor@gmail.com>
On 4/18/26 6:16 PM, Kumar Kartikeya Dwivedi wrote:
> On kernels supporting BPF_LOG_LEVEL_WARN, have libbpf request verifier
> warnings for BPF object program loads by ORing in the warning bit. This
> keeps the existing log_level=0 retry semantics for verbose logs, while
> still surfacing verifier warnings for successful loads.
>
> When libbpf owns the log buffer, use a small buffer for warning-only
> loads and flush captured warnings through the print callback. Detect
> support by probing for BPF_FEAT_VERIFIER_WARNINGS in enum bpf_features,
> and document the updated kernel_log_level behavior.
>
> Signed-off-by: Kumar Kartikeya Dwivedi <memxor@gmail.com>
> ---
> tools/lib/bpf/features.c | 56 +++++++++++++++++++++++++++++++++
> tools/lib/bpf/libbpf.c | 25 ++++++++++-----
> tools/lib/bpf/libbpf.h | 7 +++--
> tools/lib/bpf/libbpf_internal.h | 2 ++
> 4 files changed, 80 insertions(+), 10 deletions(-)
>
> diff --git a/tools/lib/bpf/features.c b/tools/lib/bpf/features.c
> index 4f19a0d79b0c..78f07866db12 100644
> --- a/tools/lib/bpf/features.c
> +++ b/tools/lib/bpf/features.c
> @@ -208,6 +208,59 @@ static int probe_kern_btf_type_tag(int token_fd)
> strs, sizeof(strs), token_fd));
> }
>
> +static bool btf_type_has_enum_value(const struct btf *btf, const struct btf_type *t,
> + const char *value_name)
> +{
> + int i, vlen = btf_vlen(t);
> +
> + if (btf_is_enum(t)) {
> + const struct btf_enum *e = btf_enum(t);
> +
> + for (i = 0; i < vlen; i++, e++) {
> + if (strcmp(btf__name_by_offset(btf, e->name_off), value_name) == 0)
> + return true;
> + }
> + } else if (btf_is_enum64(t)) {
> + const struct btf_enum64 *e = btf_enum64(t);
> +
> + for (i = 0; i < vlen; i++, e++) {
> + if (strcmp(btf__name_by_offset(btf, e->name_off), value_name) == 0)
> + return true;
> + }
> + }
> +
> + return false;
> +}
> +
> +static int probe_kern_verifier_warnings(int token_fd)
> +{
> + const struct btf_type *t;
> + struct btf *btf;
> + bool found = false;
> + __s32 type_id;
> +
> + (void)token_fd;
> +
> + btf = btf__load_vmlinux_btf();
> + if (libbpf_get_error(btf))
> + return 0;
> +
> + type_id = btf__find_by_name_kind(btf, "bpf_features", BTF_KIND_ENUM);
> + if (type_id < 0)
> + type_id = btf__find_by_name_kind(btf, "bpf_features", BTF_KIND_ENUM64);
> + if (type_id < 0) {
> + btf__free(btf);
> + return 0;
> + }
> +
> + t = btf__type_by_id(btf, type_id);
> + if (t)
> + found = btf_type_has_enum_value(btf, t, "BPF_FEAT_VERIFIER_WARNINGS");
> +
> + btf__free(btf);
> + return found;
> +}
> +
> static int probe_kern_array_mmap(int token_fd)
> {
> LIBBPF_OPTS(bpf_map_create_opts, opts,
> @@ -669,6 +722,9 @@ static struct kern_feature_desc {
> [FEAT_BTF_TYPE_TAG] = {
> "BTF_KIND_TYPE_TAG support", probe_kern_btf_type_tag,
> },
> + [FEAT_VERIFIER_WARNINGS] = {
> + "BPF_LOG_LEVEL_WARN verifier warnings", probe_kern_verifier_warnings,
> + },
> [FEAT_MEMCG_ACCOUNT] = {
> "memcg-based memory accounting", probe_memcg_account,
> },
> diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c
> index 3a80a018fc7d..c7b00c097698 100644
> --- a/tools/lib/bpf/libbpf.c
> +++ b/tools/lib/bpf/libbpf.c
> @@ -7841,12 +7841,17 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
> {
> LIBBPF_OPTS(bpf_prog_load_opts, load_attr);
> const char *prog_name = NULL;
> + const size_t warn_log_buf_size = 4096;
> size_t log_buf_size = 0;
> char *log_buf = NULL, *tmp;
> bool own_log_buf = true;
> __u32 log_level = prog->log_level;
> + bool supports_verifier_warnings = kernel_supports(obj, FEAT_VERIFIER_WARNINGS);
> int ret, err;
>
> + if (supports_verifier_warnings)
> + log_level |= 16;
> +
> /* Be more helpful by rejecting programs that can't be validated early
> * with more meaningful and actionable error message.
> */
> @@ -7921,10 +7926,9 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
> }
>
> retry_load:
> - /* if log_level is zero, we don't request logs initially even if
> - * custom log_buf is specified; if the program load fails, then we'll
> - * bump log_level to 1 and use either custom log_buf or we'll allocate
> - * our own and retry the load to get details on what failed
> + /* If verifier warning logging is supported, we can request warnings
> + * even without verbose logging. If the program load fails, retry with
> + * log_level=1 to get details on what failed.
> */
> if (log_level) {
> if (prog->log_buf) {
> @@ -7936,7 +7940,9 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
> log_buf_size = obj->log_size;
> own_log_buf = false;
> } else {
> - log_buf_size = max((size_t)BPF_LOG_BUF_SIZE, log_buf_size * 2);
> + log_buf_size = max(log_level == 16 ? warn_log_buf_size :
> + (size_t)BPF_LOG_BUF_SIZE,
> + log_buf_size * 2);
> tmp = realloc(log_buf, log_buf_size);
> if (!tmp) {
> ret = -ENOMEM;
> @@ -7954,7 +7960,10 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
>
> ret = bpf_prog_load(prog->type, prog_name, license, insns, insns_cnt, &load_attr);
> if (ret >= 0) {
> - if (log_level && own_log_buf) {
> + if (log_level == 16 && load_attr.log_true_size && own_log_buf) {
> + pr_warn("prog '%s': -- BEGIN PROG LOAD WARNINGS --\n%s-- END PROG LOAD WARNINGS --\n",
> + prog->name, log_buf);
I'm not sure if this block makes sense to me: we only print warnings
banner is warnings is the only requested log type, but we print no
banner if warnings are requested with other log level, also different
log_levels: pr_warn() vs pr_debug().
> + } else if (log_level && own_log_buf) {
> pr_debug("prog '%s': -- BEGIN PROG LOAD LOG --\n%s-- END PROG LOAD LOG --\n",
> prog->name, log_buf);
> }
> @@ -7981,8 +7990,8 @@ static int bpf_object_load_prog(struct bpf_object *obj, struct bpf_program *prog
> goto out;
> }
>
> - if (log_level == 0) {
> - log_level = 1;
> + if (log_level == (supports_verifier_warnings ? 16 : 0)) {
> + log_level = 1 | (supports_verifier_warnings ? 16 : 0);
> goto retry_load;
> }
> /* On ENOSPC, increase log buffer size and retry, unless custom
> diff --git a/tools/lib/bpf/libbpf.h b/tools/lib/bpf/libbpf.h
> index bba4e8464396..598c6daa822b 100644
> --- a/tools/lib/bpf/libbpf.h
> +++ b/tools/lib/bpf/libbpf.h
> @@ -194,8 +194,11 @@ struct bpf_object_open_opts {
> /*
> * Log level can be set independently from log buffer. Log_level=0
> * means that libbpf will attempt loading BTF or program without any
> - * logging requested, but will retry with either its own or custom log
> - * buffer, if provided, and log_level=1 on any error.
> + * verbose logging requested, but will retry with either its own or
> + * custom log buffer, if provided, and log_level=1 on any error. On
> + * kernels supporting verifier warning logging, libbpf will also
> + * request warning messages for successful program loads by default
> + * when log_level=0.
> * And vice versa, setting log_level>0 will request BTF or prog
> * loading with verbose log from the first attempt (and as such also
> * for successfully loaded BTF or program), and the actual log buffer
> diff --git a/tools/lib/bpf/libbpf_internal.h b/tools/lib/bpf/libbpf_internal.h
> index 3781c45b46d3..b2460982d6ca 100644
> --- a/tools/lib/bpf/libbpf_internal.h
> +++ b/tools/lib/bpf/libbpf_internal.h
> @@ -378,6 +378,8 @@ enum kern_feature_id {
> FEAT_BTF_DECL_TAG,
> /* BTF_KIND_TYPE_TAG support */
> FEAT_BTF_TYPE_TAG,
> + /* Kernel supports BPF_LOG_LEVEL_WARN for verifier warnings */
> + FEAT_VERIFIER_WARNINGS,
> /* memcg-based accounting for BPF maps and progs */
> FEAT_MEMCG_ACCOUNT,
> /* BPF cookie (bpf_get_attach_cookie() BPF helper) support */
next prev parent reply other threads:[~2026-04-20 13:57 UTC|newest]
Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-18 17:16 [PATCH bpf-next v3 0/4] Add support to emit verifier warnings Kumar Kartikeya Dwivedi
2026-04-18 17:16 ` [PATCH bpf-next v3 1/4] bpf: Add support for verifier warning messages Kumar Kartikeya Dwivedi
2026-04-18 17:42 ` sashiko-bot
2026-04-18 20:33 ` Kumar Kartikeya Dwivedi
2026-04-20 13:37 ` Mykyta Yatsenko
2026-04-20 15:26 ` Kumar Kartikeya Dwivedi
2026-04-18 17:16 ` [PATCH bpf-next v3 2/4] bpf: Introduce __bpf_kfunc_mark_deprecated annotation Kumar Kartikeya Dwivedi
2026-04-18 18:06 ` sashiko-bot
2026-04-18 20:34 ` Kumar Kartikeya Dwivedi
2026-04-20 14:21 ` Mykyta Yatsenko
2026-04-20 15:27 ` Kumar Kartikeya Dwivedi
2026-04-20 18:15 ` David Faust
2026-04-20 18:19 ` Kumar Kartikeya Dwivedi
2026-04-18 17:16 ` [PATCH bpf-next v3 3/4] libbpf: Request verifier warnings for object loads Kumar Kartikeya Dwivedi
2026-04-18 18:35 ` sashiko-bot
2026-04-18 20:38 ` Kumar Kartikeya Dwivedi
2026-04-20 13:57 ` Mykyta Yatsenko [this message]
2026-04-20 15:23 ` Kumar Kartikeya Dwivedi
2026-04-20 15:49 ` Alexei Starovoitov
2026-04-18 17:16 ` [PATCH bpf-next v3 4/4] selftests/bpf: Test verifier warning logging Kumar Kartikeya Dwivedi
2026-04-18 18:45 ` sashiko-bot
2026-04-18 20:39 ` Kumar Kartikeya Dwivedi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=d3e3a02f-8948-4952-b0e9-6e289fe09a41@gmail.com \
--to=mykyta.yatsenko5@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=eddyz87@gmail.com \
--cc=ihor.solodrai@linux.dev \
--cc=kernel-team@meta.com \
--cc=kkd@meta.com \
--cc=martin.lau@kernel.org \
--cc=memxor@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox