From nobody Thu Apr 18 02:06:45 2024 X-Original-To: net@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4VKh3T2NWfz5Hbsj for ; Thu, 18 Apr 2024 02:06:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4VKh3T0G51z426k for ; Thu, 18 Apr 2024 02:06:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1713406005; a=rsa-sha256; cv=none; b=RryGG2hEHBiuC+DSihb2mA2lfJsJIbQzgbD/zYw5SwvWc4ZEdPkXi1ceUNhDOnXzDjyzzj 9SgVZ3t3a0bAq6OpjAqgDH+qeXF/0sdEu2KkNhDPlQEgOxvdUOTNjYqZ9r51ltF49vbWZC MVskfHWYSMmsz0bP3i6QqOAESM7GE+ikBM4cC3cGSxXYLUVYgnHYLM7n2WpKpqkHJmvpMS qElEfEFm9anTak5TEBluHsxum6LMX7sko/TdPQTzFZiEJroEowrN9EdAbBp5bSwDLC20Rb +FhFBKjovzH/QxtdOy/zEZRV6l03t0iOaUdI3uwPb82+8jnK+KwCme4iCOjH7A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1713406005; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=1j2MtQ68s6TKeWGjosFFBhvE97wD9rXgVEVDQS6SNzo=; b=MpZHlDXLy+2fSs37i57jVI6GJ58YBJ2ZbtkVNFvTlkYHnO6pBSnZ8SajZvUYI680I3uFuM 3aRQEbOjxp7iV2zPfccOJVYh8jHrPMTV4eFJrmn1FwyB24zzm1XDswuceQxVjYlXD6X6ak BTpEPOppFKrtA4LzLT5Q9x8PGoDIkiuUb3prYY7amqgXV4rsPtudWmldbGCl66E7G9noVx WdgoaY4OC5F2E7lPkIhqoyqUTc4DRs2Lmy8CDTsAL1JVUuFTMGQfmnfvgXBjOSwPthja/y B5t9jX4mQFOaxMjYO4aJKodZDxpg0mx9vBj0AANrptzcL7AlieG1jisWOg38ag== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4VKh3S6zj9zrVY for ; Thu, 18 Apr 2024 02:06:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 43I26iu1018917 for ; Thu, 18 Apr 2024 02:06:44 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 43I26ixc018916 for net@FreeBSD.org; Thu, 18 Apr 2024 02:06:44 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 278394] Reproducible kernel panic related to IPv4 routes populated by bird2 (BGP) Date: Thu, 18 Apr 2024 02:06:45 +0000 X-Bugzilla-Reason: AssignedTo CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.0-RELEASE X-Bugzilla-Keywords: crash X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: gshapiro@FreeBSD.org X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Networking and TCP/IP with FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-net List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-net@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D278394 --- Comment #18 from Gregory Neil Shapiro --- Verified: #23 ip_output (m=3Dm@entry=3D0xfffff80007e3e000, opt=3Dopt@entry=3D0x0, ro= =3D, flags=3Dflags@entry=3D0, imo=3D0x0, inp=3Dinp@entry=3D0x0) at ../../../netinet/ip_output.c:699 699 switch (ip_output_pfil(&m, ifp, flags, inp, dst, &fibnum, (kgdb) print *dst $6 =3D {sin_len =3D 16 '\020', sin_family =3D 2 '\002', sin_port =3D 0, sin= _addr =3D {s_addr =3D 4017795422}, sin_zero =3D "\000\000\000\000\000\000\000"} s_addr is 94.177.122.239, which is the vxlanremote IP for vxlan0. Checking BGP route map: 94.177.122.0/24 unicast [4IXP4RS1 18:24:23.600 from 185.1.125.1] * (10= 0) [AS58057i] via 185.1.125.5 on vxlan0 Once that route was exported to the kernel, routing to 94.177.122.239 went = out over vxlan0. Configuration wise, I can avoid the crash with a static route for 94.177.122.239/32 out of the default gateway instead of the tunnel. Howeve= r, would be good to fix the crash. Might even be interesting for all of the tunnel interfaces (not just vxlan)= to check if they are about to send a packet for the tunnel endpoint inside the tunnel and realize that won't work (e.g., if dst =3D=3D vxlanremote). Is t= hat what if_tunnel_check_nesting() does? --=20 You are receiving this mail because: You are the assignee for the bug. You are on the CC list for the bug.=