xref: /openbmc/linux/kernel/bpf/log.c (revision cff36398)
14294a0a7SAndrii Nakryiko // SPDX-License-Identifier: GPL-2.0-only
24294a0a7SAndrii Nakryiko /* Copyright (c) 2011-2014 PLUMgrid, http://plumgrid.com
34294a0a7SAndrii Nakryiko  * Copyright (c) 2016 Facebook
44294a0a7SAndrii Nakryiko  * Copyright (c) 2018 Covalent IO, Inc. http://covalent.io
54294a0a7SAndrii Nakryiko  */
64294a0a7SAndrii Nakryiko #include <uapi/linux/btf.h>
74294a0a7SAndrii Nakryiko #include <linux/kernel.h>
84294a0a7SAndrii Nakryiko #include <linux/types.h>
94294a0a7SAndrii Nakryiko #include <linux/bpf.h>
104294a0a7SAndrii Nakryiko #include <linux/bpf_verifier.h>
1112166409SAndrii Nakryiko #include <linux/math64.h>
124294a0a7SAndrii Nakryiko 
bpf_verifier_log_attr_valid(const struct bpf_verifier_log * log)13bdcab414SAndrii Nakryiko static bool bpf_verifier_log_attr_valid(const struct bpf_verifier_log *log)
144294a0a7SAndrii Nakryiko {
15*fac08d45SAndrii Nakryiko 	/* ubuf and len_total should both be specified (or not) together */
16*fac08d45SAndrii Nakryiko 	if (!!log->ubuf != !!log->len_total)
17*fac08d45SAndrii Nakryiko 		return false;
18*fac08d45SAndrii Nakryiko 	/* log buf without log_level is meaningless */
19*fac08d45SAndrii Nakryiko 	if (log->ubuf && log->level == 0)
20*fac08d45SAndrii Nakryiko 		return false;
21*fac08d45SAndrii Nakryiko 	if (log->level & ~BPF_LOG_MASK)
22*fac08d45SAndrii Nakryiko 		return false;
23*fac08d45SAndrii Nakryiko 	if (log->len_total > UINT_MAX >> 2)
24*fac08d45SAndrii Nakryiko 		return false;
25*fac08d45SAndrii Nakryiko 	return true;
264294a0a7SAndrii Nakryiko }
274294a0a7SAndrii Nakryiko 
bpf_vlog_init(struct bpf_verifier_log * log,u32 log_level,char __user * log_buf,u32 log_size)28bdcab414SAndrii Nakryiko int bpf_vlog_init(struct bpf_verifier_log *log, u32 log_level,
29bdcab414SAndrii Nakryiko 		  char __user *log_buf, u32 log_size)
30bdcab414SAndrii Nakryiko {
31bdcab414SAndrii Nakryiko 	log->level = log_level;
32bdcab414SAndrii Nakryiko 	log->ubuf = log_buf;
33bdcab414SAndrii Nakryiko 	log->len_total = log_size;
34bdcab414SAndrii Nakryiko 
35bdcab414SAndrii Nakryiko 	/* log attributes have to be sane */
36bdcab414SAndrii Nakryiko 	if (!bpf_verifier_log_attr_valid(log))
37bdcab414SAndrii Nakryiko 		return -EINVAL;
38bdcab414SAndrii Nakryiko 
39bdcab414SAndrii Nakryiko 	return 0;
40bdcab414SAndrii Nakryiko }
41bdcab414SAndrii Nakryiko 
bpf_vlog_update_len_max(struct bpf_verifier_log * log,u32 add_len)42fa1c7d5cSAndrii Nakryiko static void bpf_vlog_update_len_max(struct bpf_verifier_log *log, u32 add_len)
43fa1c7d5cSAndrii Nakryiko {
44fa1c7d5cSAndrii Nakryiko 	/* add_len includes terminal \0, so no need for +1. */
45fa1c7d5cSAndrii Nakryiko 	u64 len = log->end_pos + add_len;
46fa1c7d5cSAndrii Nakryiko 
47fa1c7d5cSAndrii Nakryiko 	/* log->len_max could be larger than our current len due to
48fa1c7d5cSAndrii Nakryiko 	 * bpf_vlog_reset() calls, so we maintain the max of any length at any
49fa1c7d5cSAndrii Nakryiko 	 * previous point
50fa1c7d5cSAndrii Nakryiko 	 */
51fa1c7d5cSAndrii Nakryiko 	if (len > UINT_MAX)
52fa1c7d5cSAndrii Nakryiko 		log->len_max = UINT_MAX;
53fa1c7d5cSAndrii Nakryiko 	else if (len > log->len_max)
54fa1c7d5cSAndrii Nakryiko 		log->len_max = len;
55fa1c7d5cSAndrii Nakryiko }
56fa1c7d5cSAndrii Nakryiko 
bpf_verifier_vlog(struct bpf_verifier_log * log,const char * fmt,va_list args)574294a0a7SAndrii Nakryiko void bpf_verifier_vlog(struct bpf_verifier_log *log, const char *fmt,
584294a0a7SAndrii Nakryiko 		       va_list args)
594294a0a7SAndrii Nakryiko {
60fa1c7d5cSAndrii Nakryiko 	u64 cur_pos;
61fa1c7d5cSAndrii Nakryiko 	u32 new_n, n;
624294a0a7SAndrii Nakryiko 
634294a0a7SAndrii Nakryiko 	n = vscnprintf(log->kbuf, BPF_VERIFIER_TMP_LOG_SIZE, fmt, args);
644294a0a7SAndrii Nakryiko 
654294a0a7SAndrii Nakryiko 	if (log->level == BPF_LOG_KERNEL) {
664294a0a7SAndrii Nakryiko 		bool newline = n > 0 && log->kbuf[n - 1] == '\n';
674294a0a7SAndrii Nakryiko 
684294a0a7SAndrii Nakryiko 		pr_err("BPF: %s%s", log->kbuf, newline ? "" : "\n");
694294a0a7SAndrii Nakryiko 		return;
704294a0a7SAndrii Nakryiko 	}
714294a0a7SAndrii Nakryiko 
72fa1c7d5cSAndrii Nakryiko 	n += 1; /* include terminating zero */
73fa1c7d5cSAndrii Nakryiko 	bpf_vlog_update_len_max(log, n);
74fa1c7d5cSAndrii Nakryiko 
7512166409SAndrii Nakryiko 	if (log->level & BPF_LOG_FIXED) {
76fa1c7d5cSAndrii Nakryiko 		/* check if we have at least something to put into user buf */
77fa1c7d5cSAndrii Nakryiko 		new_n = 0;
78fa1c7d5cSAndrii Nakryiko 		if (log->end_pos < log->len_total) {
79fa1c7d5cSAndrii Nakryiko 			new_n = min_t(u32, log->len_total - log->end_pos, n);
80fa1c7d5cSAndrii Nakryiko 			log->kbuf[new_n - 1] = '\0';
81fa1c7d5cSAndrii Nakryiko 		}
8212166409SAndrii Nakryiko 
83fa1c7d5cSAndrii Nakryiko 		cur_pos = log->end_pos;
8412166409SAndrii Nakryiko 		log->end_pos += n - 1; /* don't count terminating '\0' */
8512166409SAndrii Nakryiko 
86fa1c7d5cSAndrii Nakryiko 		if (log->ubuf && new_n &&
87fa1c7d5cSAndrii Nakryiko 		    copy_to_user(log->ubuf + cur_pos, log->kbuf, new_n))
88fa1c7d5cSAndrii Nakryiko 			goto fail;
89fa1c7d5cSAndrii Nakryiko 	} else {
90fa1c7d5cSAndrii Nakryiko 		u64 new_end, new_start;
91fa1c7d5cSAndrii Nakryiko 		u32 buf_start, buf_end, new_n;
9212166409SAndrii Nakryiko 
9312166409SAndrii Nakryiko 		new_end = log->end_pos + n;
9412166409SAndrii Nakryiko 		if (new_end - log->start_pos >= log->len_total)
9512166409SAndrii Nakryiko 			new_start = new_end - log->len_total;
964294a0a7SAndrii Nakryiko 		else
9712166409SAndrii Nakryiko 			new_start = log->start_pos;
98*fac08d45SAndrii Nakryiko 
99*fac08d45SAndrii Nakryiko 		log->start_pos = new_start;
100*fac08d45SAndrii Nakryiko 		log->end_pos = new_end - 1; /* don't count terminating '\0' */
101*fac08d45SAndrii Nakryiko 
102*fac08d45SAndrii Nakryiko 		if (!log->ubuf)
103*fac08d45SAndrii Nakryiko 			return;
104*fac08d45SAndrii Nakryiko 
10512166409SAndrii Nakryiko 		new_n = min(n, log->len_total);
10612166409SAndrii Nakryiko 		cur_pos = new_end - new_n;
10712166409SAndrii Nakryiko 		div_u64_rem(cur_pos, log->len_total, &buf_start);
10812166409SAndrii Nakryiko 		div_u64_rem(new_end, log->len_total, &buf_end);
10912166409SAndrii Nakryiko 		/* new_end and buf_end are exclusive indices, so if buf_end is
11012166409SAndrii Nakryiko 		 * exactly zero, then it actually points right to the end of
11112166409SAndrii Nakryiko 		 * ubuf and there is no wrap around
11212166409SAndrii Nakryiko 		 */
11312166409SAndrii Nakryiko 		if (buf_end == 0)
11412166409SAndrii Nakryiko 			buf_end = log->len_total;
11512166409SAndrii Nakryiko 
11612166409SAndrii Nakryiko 		/* if buf_start > buf_end, we wrapped around;
11712166409SAndrii Nakryiko 		 * if buf_start == buf_end, then we fill ubuf completely; we
11812166409SAndrii Nakryiko 		 * can't have buf_start == buf_end to mean that there is
11912166409SAndrii Nakryiko 		 * nothing to write, because we always write at least
12012166409SAndrii Nakryiko 		 * something, even if terminal '\0'
12112166409SAndrii Nakryiko 		 */
12212166409SAndrii Nakryiko 		if (buf_start < buf_end) {
12312166409SAndrii Nakryiko 			/* message fits within contiguous chunk of ubuf */
12412166409SAndrii Nakryiko 			if (copy_to_user(log->ubuf + buf_start,
12512166409SAndrii Nakryiko 					 log->kbuf + n - new_n,
12612166409SAndrii Nakryiko 					 buf_end - buf_start))
12712166409SAndrii Nakryiko 				goto fail;
12812166409SAndrii Nakryiko 		} else {
12912166409SAndrii Nakryiko 			/* message wraps around the end of ubuf, copy in two chunks */
13012166409SAndrii Nakryiko 			if (copy_to_user(log->ubuf + buf_start,
13112166409SAndrii Nakryiko 					 log->kbuf + n - new_n,
13212166409SAndrii Nakryiko 					 log->len_total - buf_start))
13312166409SAndrii Nakryiko 				goto fail;
13412166409SAndrii Nakryiko 			if (copy_to_user(log->ubuf,
13512166409SAndrii Nakryiko 					 log->kbuf + n - buf_end,
13612166409SAndrii Nakryiko 					 buf_end))
13712166409SAndrii Nakryiko 				goto fail;
13812166409SAndrii Nakryiko 		}
13912166409SAndrii Nakryiko 	}
14012166409SAndrii Nakryiko 
14112166409SAndrii Nakryiko 	return;
14212166409SAndrii Nakryiko fail:
1434294a0a7SAndrii Nakryiko 	log->ubuf = NULL;
1444294a0a7SAndrii Nakryiko }
1454294a0a7SAndrii Nakryiko 
bpf_vlog_reset(struct bpf_verifier_log * log,u64 new_pos)14612166409SAndrii Nakryiko void bpf_vlog_reset(struct bpf_verifier_log *log, u64 new_pos)
1474294a0a7SAndrii Nakryiko {
1484294a0a7SAndrii Nakryiko 	char zero = 0;
14912166409SAndrii Nakryiko 	u32 pos;
15012166409SAndrii Nakryiko 
15112166409SAndrii Nakryiko 	if (WARN_ON_ONCE(new_pos > log->end_pos))
15212166409SAndrii Nakryiko 		return;
1534294a0a7SAndrii Nakryiko 
15424bc8088SAndrii Nakryiko 	if (!bpf_verifier_log_needed(log) || log->level == BPF_LOG_KERNEL)
1554294a0a7SAndrii Nakryiko 		return;
1564294a0a7SAndrii Nakryiko 
15712166409SAndrii Nakryiko 	/* if position to which we reset is beyond current log window,
15812166409SAndrii Nakryiko 	 * then we didn't preserve any useful content and should adjust
15912166409SAndrii Nakryiko 	 * start_pos to end up with an empty log (start_pos == end_pos)
16012166409SAndrii Nakryiko 	 */
16112166409SAndrii Nakryiko 	log->end_pos = new_pos;
16212166409SAndrii Nakryiko 	if (log->end_pos < log->start_pos)
16312166409SAndrii Nakryiko 		log->start_pos = log->end_pos;
164fa1c7d5cSAndrii Nakryiko 
165*fac08d45SAndrii Nakryiko 	if (!log->ubuf)
166*fac08d45SAndrii Nakryiko 		return;
167*fac08d45SAndrii Nakryiko 
168fa1c7d5cSAndrii Nakryiko 	if (log->level & BPF_LOG_FIXED)
169fa1c7d5cSAndrii Nakryiko 		pos = log->end_pos + 1;
170fa1c7d5cSAndrii Nakryiko 	else
17112166409SAndrii Nakryiko 		div_u64_rem(new_pos, log->len_total, &pos);
172fa1c7d5cSAndrii Nakryiko 
173*fac08d45SAndrii Nakryiko 	if (pos < log->len_total && put_user(zero, log->ubuf + pos))
17412166409SAndrii Nakryiko 		log->ubuf = NULL;
17512166409SAndrii Nakryiko }
17612166409SAndrii Nakryiko 
bpf_vlog_reverse_kbuf(char * buf,int len)17712166409SAndrii Nakryiko static void bpf_vlog_reverse_kbuf(char *buf, int len)
17812166409SAndrii Nakryiko {
17912166409SAndrii Nakryiko 	int i, j;
18012166409SAndrii Nakryiko 
18112166409SAndrii Nakryiko 	for (i = 0, j = len - 1; i < j; i++, j--)
18212166409SAndrii Nakryiko 		swap(buf[i], buf[j]);
18312166409SAndrii Nakryiko }
18412166409SAndrii Nakryiko 
bpf_vlog_reverse_ubuf(struct bpf_verifier_log * log,int start,int end)18512166409SAndrii Nakryiko static int bpf_vlog_reverse_ubuf(struct bpf_verifier_log *log, int start, int end)
18612166409SAndrii Nakryiko {
18712166409SAndrii Nakryiko 	/* we split log->kbuf into two equal parts for both ends of array */
18812166409SAndrii Nakryiko 	int n = sizeof(log->kbuf) / 2, nn;
18912166409SAndrii Nakryiko 	char *lbuf = log->kbuf, *rbuf = log->kbuf + n;
19012166409SAndrii Nakryiko 
19112166409SAndrii Nakryiko 	/* Read ubuf's section [start, end) two chunks at a time, from left
19212166409SAndrii Nakryiko 	 * and right side; within each chunk, swap all the bytes; after that
19312166409SAndrii Nakryiko 	 * reverse the order of lbuf and rbuf and write result back to ubuf.
19412166409SAndrii Nakryiko 	 * This way we'll end up with swapped contents of specified
19512166409SAndrii Nakryiko 	 * [start, end) ubuf segment.
19612166409SAndrii Nakryiko 	 */
19712166409SAndrii Nakryiko 	while (end - start > 1) {
19812166409SAndrii Nakryiko 		nn = min(n, (end - start ) / 2);
19912166409SAndrii Nakryiko 
20012166409SAndrii Nakryiko 		if (copy_from_user(lbuf, log->ubuf + start, nn))
20112166409SAndrii Nakryiko 			return -EFAULT;
20212166409SAndrii Nakryiko 		if (copy_from_user(rbuf, log->ubuf + end - nn, nn))
20312166409SAndrii Nakryiko 			return -EFAULT;
20412166409SAndrii Nakryiko 
20512166409SAndrii Nakryiko 		bpf_vlog_reverse_kbuf(lbuf, nn);
20612166409SAndrii Nakryiko 		bpf_vlog_reverse_kbuf(rbuf, nn);
20712166409SAndrii Nakryiko 
20812166409SAndrii Nakryiko 		/* we write lbuf to the right end of ubuf, while rbuf to the
20912166409SAndrii Nakryiko 		 * left one to end up with properly reversed overall ubuf
21012166409SAndrii Nakryiko 		 */
21112166409SAndrii Nakryiko 		if (copy_to_user(log->ubuf + start, rbuf, nn))
21212166409SAndrii Nakryiko 			return -EFAULT;
21312166409SAndrii Nakryiko 		if (copy_to_user(log->ubuf + end - nn, lbuf, nn))
21412166409SAndrii Nakryiko 			return -EFAULT;
21512166409SAndrii Nakryiko 
21612166409SAndrii Nakryiko 		start += nn;
21712166409SAndrii Nakryiko 		end -= nn;
21812166409SAndrii Nakryiko 	}
21912166409SAndrii Nakryiko 
22012166409SAndrii Nakryiko 	return 0;
22112166409SAndrii Nakryiko }
22212166409SAndrii Nakryiko 
bpf_vlog_finalize(struct bpf_verifier_log * log,u32 * log_size_actual)223bdcab414SAndrii Nakryiko int bpf_vlog_finalize(struct bpf_verifier_log *log, u32 *log_size_actual)
22412166409SAndrii Nakryiko {
22512166409SAndrii Nakryiko 	u32 sublen;
22612166409SAndrii Nakryiko 	int err;
22712166409SAndrii Nakryiko 
228bdcab414SAndrii Nakryiko 	*log_size_actual = 0;
229bdcab414SAndrii Nakryiko 	if (!log || log->level == 0 || log->level == BPF_LOG_KERNEL)
230bdcab414SAndrii Nakryiko 		return 0;
23112166409SAndrii Nakryiko 
232bdcab414SAndrii Nakryiko 	if (!log->ubuf)
233bdcab414SAndrii Nakryiko 		goto skip_log_rotate;
23412166409SAndrii Nakryiko 	/* If we never truncated log, there is nothing to move around. */
235*fac08d45SAndrii Nakryiko 	if (log->start_pos == 0)
236bdcab414SAndrii Nakryiko 		goto skip_log_rotate;
23712166409SAndrii Nakryiko 
23812166409SAndrii Nakryiko 	/* Otherwise we need to rotate log contents to make it start from the
23912166409SAndrii Nakryiko 	 * buffer beginning and be a continuous zero-terminated string. Note
24012166409SAndrii Nakryiko 	 * that if log->start_pos != 0 then we definitely filled up entire log
24112166409SAndrii Nakryiko 	 * buffer with no gaps, and we just need to shift buffer contents to
24212166409SAndrii Nakryiko 	 * the left by (log->start_pos % log->len_total) bytes.
24312166409SAndrii Nakryiko 	 *
24412166409SAndrii Nakryiko 	 * Unfortunately, user buffer could be huge and we don't want to
24512166409SAndrii Nakryiko 	 * allocate temporary kernel memory of the same size just to shift
24612166409SAndrii Nakryiko 	 * contents in a straightforward fashion. Instead, we'll be clever and
24712166409SAndrii Nakryiko 	 * do in-place array rotation. This is a leetcode-style problem, which
24812166409SAndrii Nakryiko 	 * could be solved by three rotations.
24912166409SAndrii Nakryiko 	 *
25012166409SAndrii Nakryiko 	 * Let's say we have log buffer that has to be shifted left by 7 bytes
25112166409SAndrii Nakryiko 	 * (spaces and vertical bar is just for demonstrative purposes):
25212166409SAndrii Nakryiko 	 *   E F G H I J K | A B C D
25312166409SAndrii Nakryiko 	 *
25412166409SAndrii Nakryiko 	 * First, we reverse entire array:
25512166409SAndrii Nakryiko 	 *   D C B A | K J I H G F E
25612166409SAndrii Nakryiko 	 *
25712166409SAndrii Nakryiko 	 * Then we rotate first 4 bytes (DCBA) and separately last 7 bytes
25812166409SAndrii Nakryiko 	 * (KJIHGFE), resulting in a properly rotated array:
25912166409SAndrii Nakryiko 	 *   A B C D | E F G H I J K
26012166409SAndrii Nakryiko 	 *
26112166409SAndrii Nakryiko 	 * We'll utilize log->kbuf to read user memory chunk by chunk, swap
26212166409SAndrii Nakryiko 	 * bytes, and write them back. Doing it byte-by-byte would be
26312166409SAndrii Nakryiko 	 * unnecessarily inefficient. Altogether we are going to read and
26412166409SAndrii Nakryiko 	 * write each byte twice, for total 4 memory copies between kernel and
26512166409SAndrii Nakryiko 	 * user space.
26612166409SAndrii Nakryiko 	 */
26712166409SAndrii Nakryiko 
26812166409SAndrii Nakryiko 	/* length of the chopped off part that will be the beginning;
26912166409SAndrii Nakryiko 	 * len(ABCD) in the example above
27012166409SAndrii Nakryiko 	 */
27112166409SAndrii Nakryiko 	div_u64_rem(log->start_pos, log->len_total, &sublen);
27212166409SAndrii Nakryiko 	sublen = log->len_total - sublen;
27312166409SAndrii Nakryiko 
27412166409SAndrii Nakryiko 	err = bpf_vlog_reverse_ubuf(log, 0, log->len_total);
27512166409SAndrii Nakryiko 	err = err ?: bpf_vlog_reverse_ubuf(log, 0, sublen);
27612166409SAndrii Nakryiko 	err = err ?: bpf_vlog_reverse_ubuf(log, sublen, log->len_total);
27712166409SAndrii Nakryiko 	if (err)
2784294a0a7SAndrii Nakryiko 		log->ubuf = NULL;
279bdcab414SAndrii Nakryiko 
280bdcab414SAndrii Nakryiko skip_log_rotate:
281bdcab414SAndrii Nakryiko 	*log_size_actual = log->len_max;
282bdcab414SAndrii Nakryiko 
283bdcab414SAndrii Nakryiko 	/* properly initialized log has either both ubuf!=NULL and len_total>0
284bdcab414SAndrii Nakryiko 	 * or ubuf==NULL and len_total==0, so if this condition doesn't hold,
285bdcab414SAndrii Nakryiko 	 * we got a fault somewhere along the way, so report it back
286bdcab414SAndrii Nakryiko 	 */
287bdcab414SAndrii Nakryiko 	if (!!log->ubuf != !!log->len_total)
288bdcab414SAndrii Nakryiko 		return -EFAULT;
289bdcab414SAndrii Nakryiko 
290*fac08d45SAndrii Nakryiko 	/* did truncation actually happen? */
291*fac08d45SAndrii Nakryiko 	if (log->ubuf && log->len_max > log->len_total)
292bdcab414SAndrii Nakryiko 		return -ENOSPC;
293bdcab414SAndrii Nakryiko 
294bdcab414SAndrii Nakryiko 	return 0;
2954294a0a7SAndrii Nakryiko }
2964294a0a7SAndrii Nakryiko 
2974294a0a7SAndrii Nakryiko /* log_level controls verbosity level of eBPF verifier.
2984294a0a7SAndrii Nakryiko  * bpf_verifier_log_write() is used to dump the verification trace to the log,
2994294a0a7SAndrii Nakryiko  * so the user can figure out what's wrong with the program
3004294a0a7SAndrii Nakryiko  */
bpf_verifier_log_write(struct bpf_verifier_env * env,const char * fmt,...)3014294a0a7SAndrii Nakryiko __printf(2, 3) void bpf_verifier_log_write(struct bpf_verifier_env *env,
3024294a0a7SAndrii Nakryiko 					   const char *fmt, ...)
3034294a0a7SAndrii Nakryiko {
3044294a0a7SAndrii Nakryiko 	va_list args;
3054294a0a7SAndrii Nakryiko 
3064294a0a7SAndrii Nakryiko 	if (!bpf_verifier_log_needed(&env->log))
3074294a0a7SAndrii Nakryiko 		return;
3084294a0a7SAndrii Nakryiko 
3094294a0a7SAndrii Nakryiko 	va_start(args, fmt);
3104294a0a7SAndrii Nakryiko 	bpf_verifier_vlog(&env->log, fmt, args);
3114294a0a7SAndrii Nakryiko 	va_end(args);
3124294a0a7SAndrii Nakryiko }
3134294a0a7SAndrii Nakryiko EXPORT_SYMBOL_GPL(bpf_verifier_log_write);
3144294a0a7SAndrii Nakryiko 
bpf_log(struct bpf_verifier_log * log,const char * fmt,...)3154294a0a7SAndrii Nakryiko __printf(2, 3) void bpf_log(struct bpf_verifier_log *log,
3164294a0a7SAndrii Nakryiko 			    const char *fmt, ...)
3174294a0a7SAndrii Nakryiko {
3184294a0a7SAndrii Nakryiko 	va_list args;
3194294a0a7SAndrii Nakryiko 
3204294a0a7SAndrii Nakryiko 	if (!bpf_verifier_log_needed(log))
3214294a0a7SAndrii Nakryiko 		return;
3224294a0a7SAndrii Nakryiko 
3234294a0a7SAndrii Nakryiko 	va_start(args, fmt);
3244294a0a7SAndrii Nakryiko 	bpf_verifier_vlog(log, fmt, args);
3254294a0a7SAndrii Nakryiko 	va_end(args);
3264294a0a7SAndrii Nakryiko }
3274294a0a7SAndrii Nakryiko EXPORT_SYMBOL_GPL(bpf_log);
328