]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
RDMA/cm: Fix leaking the multicast GID table reference
authorJason Gunthorpe <jgg@nvidia.com>
Sat, 29 Nov 2025 00:53:21 +0000 (20:53 -0400)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 19 Jan 2026 12:11:59 +0000 (13:11 +0100)
commit 57f3cb6c84159d12ba343574df2115fb18dd83ca upstream.

If the CM ID is destroyed while the CM event for multicast creating is
still queued the cancel_work_sync() will prevent the work from running
which also prevents destroying the ah_attr. This leaks a refcount and
triggers a WARN:

   GID entry ref leak for dev syz1 index 2 ref=573
   WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 release_gid_table drivers/infiniband/core/cache.c:806 [inline]
   WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 gid_table_release_one+0x284/0x3cc drivers/infiniband/core/cache.c:886

Destroy the ah_attr after canceling the work, it is safe to call this
twice.

Link: https://patch.msgid.link/r/0-v1-4285d070a6b2+20a-rdma_mc_gid_leak_syz_jgg@nvidia.com
Cc: stable@vger.kernel.org
Fixes: fe454dc31e84 ("RDMA/ucma: Fix use-after-free bug in ucma_create_uevent")
Reported-by: syzbot+b0da83a6c0e2e2bddbd4@syzkaller.appspotmail.com
Closes: https://lore.kernel.org/all/68232e7b.050a0220.f2294.09f6.GAE@google.com
Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/infiniband/core/cma.c

index 0603d069de92138f4ac1942dd11e232f76573958..61edd923114e25577d24cde30b38916d1be51460 100644 (file)
@@ -1840,6 +1840,7 @@ static void destroy_mc(struct rdma_id_private *id_priv,
                ib_sa_free_multicast(mc->sa_mc);
 
        if (rdma_protocol_roce(id_priv->id.device, id_priv->id.port_num)) {
+               struct rdma_cm_event *event = &mc->iboe_join.event;
                struct rdma_dev_addr *dev_addr =
                        &id_priv->id.route.addr.dev_addr;
                struct net_device *ndev = NULL;
@@ -1862,6 +1863,8 @@ static void destroy_mc(struct rdma_id_private *id_priv,
                dev_put(ndev);
 
                cancel_work_sync(&mc->iboe_join.work);
+               if (event->event == RDMA_CM_EVENT_MULTICAST_JOIN)
+                       rdma_destroy_ah_attr(&event->param.ud.ah_attr);
        }
        kfree(mc);
 }