From: Connor O'Brien <conn...@google.com>

Enabling CONFIG_MODULE_ALLOW_BTF_MISMATCH is an indication that BTF
mismatches are expected and module loading should proceed
anyway. Logging with pr_warn() on every one of these "benign"
mismatches creates unnecessary noise when many such modules are
loaded. Instead, handle this case with a single log warning that BTF
info may be unavailable.

Mismatches also result in calls to __btf_verifier_log() via
__btf_verifier_log_type() or btf_verifier_log_member(), adding several
additional lines of logging per mismatched module. Add checks to these
paths to skip logging for module BTF mismatches in the "allow
mismatch" case.

All existing logging behavior is preserved in the default
CONFIG_MODULE_ALLOW_BTF_MISMATCH=n case.

Signed-off-by: Connor O'Brien <conn...@google.com>
Acked-by: Yonghong Song <y...@fb.com>
Link: https://lore.kernel.org/r/20230107025331.3240536-1-conn...@google.com
Signed-off-by: Martin KaFai Lau <martin....@kernel.org>
Signed-off-by: Xiangyu Chen <xiangyu.c...@windriver.com>
---
 kernel/bpf/btf.c | 38 +++++++++++++++++++++++++++-----------
 1 file changed, 27 insertions(+), 11 deletions(-)

diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c
index fb78bb26786f..7923c16aca6f 100644
--- a/kernel/bpf/btf.c
+++ b/kernel/bpf/btf.c
@@ -1399,12 +1399,18 @@ __printf(4, 5) static void 
__btf_verifier_log_type(struct btf_verifier_env *env,
        if (!bpf_verifier_log_needed(log))
                return;
 
-       /* btf verifier prints all types it is processing via
-        * btf_verifier_log_type(..., fmt = NULL).
-        * Skip those prints for in-kernel BTF verification.
-        */
-       if (log->level == BPF_LOG_KERNEL && !fmt)
-               return;
+       if (log->level == BPF_LOG_KERNEL) {
+               /* btf verifier prints all types it is processing via
+                * btf_verifier_log_type(..., fmt = NULL).
+                * Skip those prints for in-kernel BTF verification.
+                */
+               if (!fmt)
+                       return;
+
+               /* Skip logging when loading module BTF with mismatches 
permitted */
+               if (env->btf->base_btf && 
IS_ENABLED(CONFIG_MODULE_ALLOW_BTF_MISMATCH))
+                       return;
+       }
 
        __btf_verifier_log(log, "[%u] %s %s%s",
                           env->log_type_id,
@@ -1443,8 +1449,15 @@ static void btf_verifier_log_member(struct 
btf_verifier_env *env,
        if (!bpf_verifier_log_needed(log))
                return;
 
-       if (log->level == BPF_LOG_KERNEL && !fmt)
-               return;
+       if (log->level == BPF_LOG_KERNEL) {
+               if (!fmt)
+                       return;
+
+               /* Skip logging when loading module BTF with mismatches 
permitted */
+               if (env->btf->base_btf && 
IS_ENABLED(CONFIG_MODULE_ALLOW_BTF_MISMATCH))
+                       return;
+       }
+
        /* The CHECK_META phase already did a btf dump.
         *
         * If member is logged again, it must hit an error in
@@ -7113,11 +7126,14 @@ static int btf_module_notify(struct notifier_block *nb, 
unsigned long op,
                }
                btf = btf_parse_module(mod->name, mod->btf_data, 
mod->btf_data_size);
                if (IS_ERR(btf)) {
-                       pr_warn("failed to validate module [%s] BTF: %ld\n",
-                               mod->name, PTR_ERR(btf));
                        kfree(btf_mod);
-                       if (!IS_ENABLED(CONFIG_MODULE_ALLOW_BTF_MISMATCH))
+                       if (!IS_ENABLED(CONFIG_MODULE_ALLOW_BTF_MISMATCH)) {
+                               pr_warn("failed to validate module [%s] BTF: 
%ld\n",
+                                       mod->name, PTR_ERR(btf));
                                err = PTR_ERR(btf);
+                       } else {
+                               pr_warn_once("Kernel module BTF mismatch 
detected, BTF debug info may be unavailable for some modules\n");
+                       }
                        goto out;
                }
                err = btf_alloc_id(btf);
-- 
2.34.1

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#12913): 
https://lists.yoctoproject.org/g/linux-yocto/message/12913
Mute This Topic: https://lists.yoctoproject.org/mt/100407963/21656
Group Owner: linux-yocto+ow...@lists.yoctoproject.org
Unsubscribe: https://lists.yoctoproject.org/g/linux-yocto/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to