> diff --git a/include/linux/bpf_verifier.h b/include/linux/bpf_verifier.h
> index 8433430dedb7..c15a4c26a43b 100644
> --- a/include/linux/bpf_verifier.h
> +++ b/include/linux/bpf_verifier.h
[ ... ]
> diff --git a/kernel/bpf/log.c b/kernel/bpf/log.c
> index fd12ad5a0338..62fe6ed18374 100644
> --- a/kernel/bpf/log.c
> +++ b/kernel/bpf/log.c
[ ... ]
> diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c
> index 2fa05ba8f161..54b43e16848a 100644
> --- a/kernel/bpf/syscall.c
> +++ b/kernel/bpf/syscall.c
[ ... ]
> @@ -1611,6 +1632,31 @@ static int map_create(union bpf_attr *attr, bpfptr_t
> uattr)
> return err;
> }
>
> +static int map_create(union bpf_attr *attr, bpfptr_t uattr, struct
> bpf_common_attr *attr_common,
> + bpfptr_t uattr_common, u32 size_common)
> +{
> + struct bpf_verifier_log *log;
> + struct bpf_log_attr attr_log;
> + int err, ret;
> +
> + log = bpf_log_attr_create_vlog(&attr_log, attr_common, uattr_common,
> size_common);
> + if (IS_ERR(log))
> + return PTR_ERR(log);
> +
> + err = __map_create(attr, uattr, log);
> +
> + ret = bpf_log_attr_finalize(&attr_log, log);
> + if (ret) {
> + if (err >= 0)
> + close_fd(err);
> + err = ret;
When bpf_log_attr_finalize() returns an error (say -ENOSPC for log buffer
truncation or -EFAULT for copy_to_user failure) after __map_create() already
returned a negative error (for example -EINVAL from CHECK_ATTR or -EPERM from
security checks), does it make sense to overwrite the original map creation
error with the log finalization error?
The result is that userspace receives -ENOSPC or -EFAULT instead of the
actual reason the map creation failed. A user with an undersized log buffer
might retry with a larger buffer expecting success, when the real issue is
that the map creation itself was rejected for a different reason.
Looking at bpf_check() in kernel/bpf/verifier.c (around the verifier log
finalization), it uses similar logic with 'err = ret;' reassignment. However,
that doesn't appear to have the preserve-original-error comment that would
clarify the intended behavior for this scenario.
> + }
> +
> +free:
Does anything use this free: label? The only exit path before it is the early
return for IS_ERR(log), which correctly returns directly since log is an error
pointer and doesn't need cleanup. There doesn't seem to be any 'goto free;'
statement in the function.
With -Wunused-label enabled by default in the kernel build (part of -Wall),
this will generate a compiler warning. When building with -Werror (common in
CI configurations and allmodconfig builds), this would break the build.
> + kfree(log);
> + return err;
> +}
> +
> void bpf_map_inc(struct bpf_map *map)
> {
> atomic64_inc(&map->refcnt);
[ ... ]
---
AI reviewed your patch. Please fix the bug or email reply why it's not a bug.
See: https://github.com/kernel-patches/vmtest/blob/master/ci/claude/README.md
CI run summary: https://github.com/kernel-patches/bpf/actions/runs/25680759838