> diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c
> index 83de8fb9b9aa..322865a88b3a 100644
> --- a/kernel/bpf/syscall.c
> +++ b/kernel/bpf/syscall.c
> @@ -1647,11 +1647,18 @@ static int map_create(union bpf_attr *attr, bpfptr_t 
> uattr, struct bpf_common_at
>
>       /* preserve original error even if log finalization is successful */
>       ret = bpf_log_attr_finalize(&attr_log, log);
> -     if (ret) {
> -             if (err >= 0)
> -                     close_fd(err);
> +     if (ret && err < 0)
> +             /*
> +              * Failed to finalize the log.
> +              * Should not close_fd(err) here. Since the bpf_map_new_fd()
> +              * has published the map fd, if a concurrent thread closes the
> +              * fd, then opens new, unrelated file that receives the exact
> +              * same fd number, close_fd(err) might inadvertently close the
> +              * unrelated file.
> +              * As a trade-off, override the err only when failed to finalize
> +              * the log and failed to create map.
> +              */
>               err = ret;

In the v13 review thread, Alexei Starovoitov suggested moving
bpf_log_attr_finalize() earlier in the flow to eliminate the race
window entirely:

  "bot is correct. Let's avoid these races. Pls move
   bpf_log_attr_finalize() into map_create and do it before
   security_bpf_map_create."

  
https://lore.kernel.org/bpf/CAADnVQ+XR3kyqizGgGhtG5xiBu3oK3O+COUMfPDQDBSJbm=5...@mail.gmail.com/

Does the current approach fully address the race concern? While removing
close_fd() prevents the specific file descriptor hijacking issue, the
suggestion was to finalize the log before security_bpf_map_create(),
which would avoid creating the race window in the first place.

Is there a reason why the log finalization cannot be moved earlier as
Alexei suggested?

>
>       kfree(log);
>       return err;


---
AI reviewed your patch. Please fix the bug or email reply why it's not a bug.
See: https://github.com/kernel-patches/vmtest/blob/master/ci/claude/README.md

CI run summary: https://github.com/kernel-patches/bpf/actions/runs/26042398224

Reply via email to