Date: Mon, 20 May 2024 12:16:07 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 278394] Reproducible kernel panic related to IPv4 routes populated by bird2 (BGP) Message-ID: <bug-278394-7501-GWYZ8wnypj@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-278394-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-278394-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D278394 --- Comment #26 from commit-hook@FreeBSD.org --- A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=3D93fbfef0b50354b7a1620822454ef29cd= 415cb2d commit 93fbfef0b50354b7a1620822454ef29cd415cb2d Author: Zhenlei Huang <zlei@FreeBSD.org> AuthorDate: 2024-05-20 12:14:07 +0000 Commit: Zhenlei Huang <zlei@FreeBSD.org> CommitDate: 2024-05-20 12:14:07 +0000 if_vxlan(4): Add checking for loops and nesting of tunnels User misconfiguration, either tunnel loops, or a large number of different nested tunnels, can overflow the kernel stack. Prevent that by using if_tunnel_check_nesting(). PR: 278394 Diagnosed by: markj Reviewed by: kp MFC after: 1 week Differential Revision: https://reviews.freebsd.org/D45197 sys/net/if_vxlan.c | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) --=20 You are receiving this mail because: You are on the CC list for the bug. You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-278394-7501-GWYZ8wnypj>