Hello:
This series was applied to netdev/net.git (main)
by Jakub Kicinski <[email protected]>:
On Wed, 7 Feb 2024 08:24:14 -0500 you wrote:
> Open vSwitch module accepts actions as a list from the netlink socket
> and then creates a copy which it uses in the action set processing.
> During processing of the action list on a packet, the module keeps a
> count of the execution depth and exits processing if the action depth
> goes too high.
>
> However, during netlink processing the recursion depth isn't checked
> anywhere, and the copy trusts that kernel has large enough stack to
> accommodate it. The OVS sample action was the original action which
> could perform this kinds of recursion, and it originally checked that
> it didn't exceed the sample depth limit. However, when sample became
> optimized to provide the clone() semantics, the recursion limit was
> dropped.
>
> [...]
Here is the summary with links:
- [net,v2,1/2] net: openvswitch: limit the number of recursions from action
sets
https://git.kernel.org/netdev/net/c/6e2f90d31fe0
- [net,v2,2/2] selftests: openvswitch: Add validation for the recursion test
https://git.kernel.org/netdev/net/c/bd128f62c365
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev