{"id":2229783,"url":"http://patchwork.ozlabs.org/api/1.1/patches/2229783/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/patch/20260428175725.72050-6-ja@ssi.bg/","project":{"id":26,"url":"http://patchwork.ozlabs.org/api/1.1/projects/26/?format=json","name":"Netfilter Development","link_name":"netfilter-devel","list_id":"netfilter-devel.vger.kernel.org","list_email":"netfilter-devel@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null},"msgid":"<20260428175725.72050-6-ja@ssi.bg>","date":"2026-04-28T17:57:23","name":"[nf,5/7] ipvs: fix shift-out-of-bounds in ip_vs_rht_desired_size","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"4c8889fe6f52fdc0fbe33cac98deb4f9022111ce","submitter":{"id":2825,"url":"http://patchwork.ozlabs.org/api/1.1/people/2825/?format=json","name":"Julian Anastasov","email":"ja@ssi.bg"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/netfilter-devel/patch/20260428175725.72050-6-ja@ssi.bg/mbox/","series":[{"id":501917,"url":"http://patchwork.ozlabs.org/api/1.1/series/501917/?format=json","web_url":"http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=501917","date":"2026-04-28T17:57:19","name":"IPVS fixes for nf","version":1,"mbox":"http://patchwork.ozlabs.org/series/501917/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2229783/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2229783/checks/","tags":{},"headers":{"Return-Path":"\n <netfilter-devel+bounces-12268-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","netfilter-devel@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (4096-bit key;\n unprotected) header.d=ssi.bg header.i=@ssi.bg header.a=rsa-sha256\n header.s=ssi header.b=E5+lJux/;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12268-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=\"E5+lJux/\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=193.238.174.39","smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=ssi.bg"],"Received":["from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4pCH5fpsz1xvV\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 04:01:15 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 17A59301C6FD\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 18:01:14 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 2CAB644D022;\n\tTue, 28 Apr 2026 18:01:13 +0000 (UTC)","from mx.ssi.bg (mx.ssi.bg [193.238.174.39])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id D79CF3290DE;\n\tTue, 28 Apr 2026 18:01:10 +0000 (UTC)","from mx.ssi.bg (localhost [127.0.0.1])\n\tby mx.ssi.bg (Potsfix) with ESMTP id 5CAD9213AE;\n\tTue, 28 Apr 2026 21:00:55 +0300 (EEST)","from box.ssi.bg (box.ssi.bg [193.238.174.46])\n\tby mx.ssi.bg (Potsfix) with ESMTPS;\n\tTue, 28 Apr 2026 21:00:54 +0300 (EEST)","from ja.ssi.bg (unknown [213.16.62.126])\n\tby box.ssi.bg (Potsfix) with ESMTPSA id 8A9D76089A;\n\tTue, 28 Apr 2026 21:00:53 +0300 (EEST)","from ja.home.ssi.bg (localhost.localdomain [127.0.0.1])\n\tby ja.ssi.bg (8.18.1/8.18.1) with ESMTP id 63SHvnTG072098;\n\tTue, 28 Apr 2026 20:57:49 +0300","(from root@localhost)\n\tby ja.home.ssi.bg (8.18.1/8.18.1/Submit) id 63SHvnTL072097;\n\tTue, 28 Apr 2026 20:57:49 +0300"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777399272; cv=none;\n b=KIJaWgyq0ROWqUlZIf6yxC9QpqCFH96DUIwRJGd2DpdE52YCTs0KD2koa93znv60CcoIv1QKWWzgnPwSoK/wEVpZ1CAUHyshpfl6PrrsopjscMIAKsD6/sc8oK+U5Qq3STmHeBnHG5AJEQdGDNVpW+IO006/JYtKMCX/las7inY=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777399272; c=relaxed/simple;\n\tbh=oUFlTiGYqw73lHnw86juUKMkGTiWASsaJfIxIyDpvY8=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version;\n b=oAXewMCtXEivUC3z0GqJ+kWRiLziSOpaV4Wwu+5/EUp6XMJpZ6Y1UIbhSUHFlm9beMIQd5lV/RHk/4QbblGSGZ71cCaM5WvmGEvoa7ExxPN0WY9YF0ICqZalVsoHZLEyOzdVMNP6OuBCpHrPoNqMAPBb2hDMqal8dSOdt5hsxDs=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg;\n spf=pass smtp.mailfrom=ssi.bg;\n dkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=E5+lJux/;\n arc=none smtp.client-ip=193.238.174.39","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=ssi.bg; h=cc:cc\n\t:content-transfer-encoding:date:from:from:in-reply-to:message-id\n\t:mime-version:references:reply-to:subject:subject:to:to; s=ssi;\n\t bh=+N8l8xhO6EweGkIZO6SUeyy8/92nakMTqZK+u/GGXGQ=; b=E5+lJux/OpJz\n\tHVweWmZS1f8CpNvgRPE1Mhnk6B2Xtb6FFkIGhj1yOHiLRcfJIkrxx4rGeDsO9xdG\n\tLtf0Y8vHtlS/h2yfvXDOrKKPR/dRjPQVldSXrlSnZyLERzNYqHME3Svu6G7Gwyz3\n\tt6e6D+acpmuB7DPjfQb7y1IHyTuKiLChOD6gAtBzVMO+gd+xs+xRrtOa67KIGTZd\n\twHQDnJcrSNHRsn1Tr4hZvZHsUfSaSsyupdulRDezeBdq+TFbfyqXDRUU21p3kIpP\n\tw2ItFqNMaIhv2J72BQKhibKHTelOFDwhXjLwGz5c32grSCOroxC0IWnr08EhEAmm\n\tYUM+j0M/k+OcEZpWL9AYV2ZKCGgnThZ8pQ7IsBkwuBE9xxQH5+0FM72K2dftJ3Ye\n\tVRY5sJ3UveDufSLXQnztI0lNwnWGB6eMKq7jXwIWnHem5wdiYI9HKgn4Ps32Scfl\n\tJg/9aY9D1fUikFshxCwFJN7srjZwz5eWOF/wgiV5RHKp4rWdy6r03cjocR+QDs7K\n\tEveoxjIhjm5IwWJJZJ+pPtH+lgTAPGZRxCABBHupSfD2w4lP0c7KkENgevqVej7m\n\tdEqsEakVRxuIQXftWt/KNsKOjEqDEVFpc38cvSqvBVNKDQ3SjZCPXh2MwJBi0w4r\n\tGib8jR7p5MTwV0nmcyx7KtZ4C11qZbY=","From":"Julian Anastasov <ja@ssi.bg>","To":"Simon Horman <horms@verge.net.au>","Cc":"Pablo Neira Ayuso <pablo@netfilter.org>, Florian Westphal <fw@strlen.de>,\n        Waiman Long <longman@redhat.com>, lvs-devel@vger.kernel.org,\n        netfilter-devel@vger.kernel.org","Subject":"[PATCH nf 5/7] ipvs: fix shift-out-of-bounds in\n ip_vs_rht_desired_size","Date":"Tue, 28 Apr 2026 20:57:23 +0300","Message-ID":"<20260428175725.72050-6-ja@ssi.bg>","X-Mailer":"git-send-email 2.53.0","In-Reply-To":"<20260428175725.72050-1-ja@ssi.bg>","References":"<20260428175725.72050-1-ja@ssi.bg>","Precedence":"bulk","X-Mailing-List":"netfilter-devel@vger.kernel.org","List-Id":"<netfilter-devel.vger.kernel.org>","List-Subscribe":"<mailto:netfilter-devel+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:netfilter-devel+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Transfer-Encoding":"8bit"},"content":"Calling roundup_pow_of_two() with 0 has undefined result:\n\nUBSAN: shift-out-of-bounds in ./include/linux/log2.h:57:13\nshift exponent 64 is too large for 64-bit type 'unsigned long'\nCPU: 1 UID: 0 PID: 77 Comm: kworker/u8:4 Not tainted syzkaller #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026\nWorkqueue: events_unbound conn_resize_work_handler\nCall Trace:\n <TASK>\n dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120\n ubsan_epilogue+0xa/0x30 lib/ubsan.c:233\n __ubsan_handle_shift_out_of_bounds+0x385/0x410 lib/ubsan.c:494\n __roundup_pow_of_two include/linux/log2.h:57 [inline]\n ip_vs_rht_desired_size+0x2cf/0x410 net/netfilter/ipvs/ip_vs_core.c:240\n ip_vs_conn_desired_size net/netfilter/ipvs/ip_vs_conn.c:765 [inline]\n conn_resize_work_handler+0x1b6/0x14c0 net/netfilter/ipvs/ip_vs_conn.c:822\n process_one_work kernel/workqueue.c:3302 [inline]\n process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3385\n worker_thread+0xa53/0xfc0 kernel/workqueue.c:3466\n kthread+0x388/0x470 kernel/kthread.c:436\n ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n </TASK>\n\nReported-by: syzbot+217f1db9c791e27fe54a@syzkaller.appspotmail.com\nFixes: b655388111cf (\"ipvs: add resizable hash tables\")\nSigned-off-by: Julian Anastasov <ja@ssi.bg>\n---\n net/netfilter/ipvs/ip_vs_core.c | 2 +-\n 1 file changed, 1 insertion(+), 1 deletion(-)","diff":"diff --git a/net/netfilter/ipvs/ip_vs_core.c b/net/netfilter/ipvs/ip_vs_core.c\nindex f5b7a2047291..ea450944465f 100644\n--- a/net/netfilter/ipvs/ip_vs_core.c\n+++ b/net/netfilter/ipvs/ip_vs_core.c\n@@ -237,7 +237,7 @@ int ip_vs_rht_desired_size(struct netns_ipvs *ipvs, struct ip_vs_rht *t, int n,\n {\n \tif (!t)\n \t\treturn 1 << min_bits;\n-\tn = roundup_pow_of_two(n);\n+\tn = n ? roundup_pow_of_two(n) : 1;\n \tif (lfactor < 0) {\n \t\tint factor = min(-lfactor, max_bits);\n \n","prefixes":["nf","5/7"]}