Date: Wed, 22 May 2024 23:02:43 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 278394] Reproducible kernel panic related to IPv4 routes populated by bird2 (BGP) Message-ID: <bug-278394-7501-YI4er8cS0C@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-278394-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-278394-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D278394 --- Comment #29 from commit-hook@FreeBSD.org --- A commit in branch releng/14.1 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D34db75d21876ae406ff57fdc594f151fc= 4214109 commit 34db75d21876ae406ff57fdc594f151fc4214109 Author: Zhenlei Huang <zlei@FreeBSD.org> AuthorDate: 2024-05-20 12:14:07 +0000 Commit: Zhenlei Huang <zlei@FreeBSD.org> CommitDate: 2024-05-22 23:00:03 +0000 if_vxlan(4): Add checking for loops and nesting of tunnels User misconfiguration, either tunnel loops, or a large number of different nested tunnels, can overflow the kernel stack. Prevent that by using if_tunnel_check_nesting(). PR: 278394 Diagnosed by: markj Reviewed by: kp Approved by: re (cperciva) MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D45197 (cherry picked from commit 93fbfef0b50354b7a1620822454ef29cd415cb2d) (cherry picked from commit 3ebd2b1c730834123a53b3eddcf9029fcf414782) sys/net/if_vxlan.c | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) --=20 You are receiving this mail because: You are on the CC list for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-278394-7501-YI4er8cS0C>