[Bug 278394] Reproducible kernel panic related to IPv4 routes populated by bird2 (BGP)

From: <bugzilla-noreply_at_freebsd.org>
Date: Wed, 22 May 2024 23:02:43 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=278394

--- Comment #29 from commit-hook@FreeBSD.org ---
A commit in branch releng/14.1 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=34db75d21876ae406ff57fdc594f151fc4214109

commit 34db75d21876ae406ff57fdc594f151fc4214109
Author:     Zhenlei Huang <zlei@FreeBSD.org>
AuthorDate: 2024-05-20 12:14:07 +0000
Commit:     Zhenlei Huang <zlei@FreeBSD.org>
CommitDate: 2024-05-22 23:00:03 +0000

    if_vxlan(4): Add checking for loops and nesting of tunnels

    User misconfiguration, either tunnel loops, or a large number of
    different nested tunnels, can overflow the kernel stack. Prevent that
    by using if_tunnel_check_nesting().

    PR:             278394
    Diagnosed by:   markj
    Reviewed by:    kp
    Approved by:    re (cperciva)
    MFC after:      1 week
    Differential Revision:  https://reviews.freebsd.org/D45197

    (cherry picked from commit 93fbfef0b50354b7a1620822454ef29cd415cb2d)
    (cherry picked from commit 3ebd2b1c730834123a53b3eddcf9029fcf414782)

 sys/net/if_vxlan.c | 23 +++++++++++++++++++++++
 1 file changed, 23 insertions(+)

-- 
You are receiving this mail because:
You are on the CC list for the bug.