From: Sam P <sam@bynar.io>
To: Oliver Hartkopp <socketcan@hartkopp.net>, netdev@vger.kernel.org
Cc: mkl@pengutronix.de, linux-kernel@vger.kernel.org,
linux-can@vger.kernel.org
Subject: Re: [PATCH net] can: raw: fix ro->uniq use-after-free in raw_rcv()
Date: Wed, 8 Apr 2026 18:22:36 +0100 [thread overview]
Message-ID: <430cc8b9-21f0-4954-ae36-ec5e63f3ef9d@bynar.io> (raw)
In-Reply-To: <c67d6642-8078-4144-8b21-f0e882ecd61a@hartkopp.net>
On 08/04/2026 17:28, Oliver Hartkopp wrote:
> Hello Sam,
>
> many thanks for your investigation and for the provided fix.
> Excellent work!
>
> Btw. you also suggested a different solution with synchronize_rcu():
>
> diff --git a/net/can/raw.c b/net/can/raw.c
> index eee244ffc31e..5bb9a84f2471 100644
> --- a/net/can/raw.c
> +++ b/net/can/raw.c
> @@ -431,6 +431,13 @@ static int raw_release(struct socket *sock)
> if (ro->count > 1)
> kfree(ro->filter);
>
> + /*
> + * Wait for any in-flight raw_rcv() calls to finish before freeing
> + * ro->uniq. can_rx_unregister() scheduled deletion via call_rcu(),
> + * but RCU readers (raw_rcv in softirq) may still be active.
> + */
> + synchronize_rcu();
> +
> ro->ifindex = 0;
> ro->bound = 0;
> ro->dev = NULL;
>
>
> Can you tell why you preferred the destructor solution now?
Thank you :) I preferred the destructor solution as it seemed to match the socket lifetime model better and I wasn't sure if the blocking sync in the raw_release() was too heavy-handed for this specific issue, given raw_release() already holds rtnl_lock() and lock_sock(sk). That said, I'm happy to defer to your experience if the sync fix is better suited, I have tested both of them.
> And if I see it correctly the UAF problem might also show up with the
> kfree(ro->filter) statement we can see at the beginning of the above patch.
>
> So either free_percpu(ro->uniq) and kfree(ro->filter) should be handled after the finalized synchronize_rcu() process, right?
ro->filter isn't accessed in the racey raw_rcv() path as far as I can tell, and I don't *think* there are other racey paths but it wouldn't hurt to handle it just in-case. I think this would be simple with the synchronize_rcu() patch, as you mentioned, but I'm not sure with the destructor.
Kind Regards,
Sam
next prev parent reply other threads:[~2026-04-08 17:22 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-08 14:30 [PATCH net] can: raw: fix ro->uniq use-after-free in raw_rcv() Sam P
2026-04-08 16:28 ` Oliver Hartkopp
2026-04-08 17:22 ` Sam P [this message]
2026-04-08 19:31 ` Oliver Hartkopp
2026-04-08 19:32 ` Oliver Hartkopp
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=430cc8b9-21f0-4954-ae36-ec5e63f3ef9d@bynar.io \
--to=sam@bynar.io \
--cc=linux-can@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mkl@pengutronix.de \
--cc=netdev@vger.kernel.org \
--cc=socketcan@hartkopp.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox