lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 3 Jun 2022 15:23:26 +0300
From:   Anton Makarov <am@...alliance.com>
To:     netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
        david.lebrun@...ouvain.be
Cc:     regressions@...ts.linux.dev, stable@...r.kernel.org
Subject: [REGRESSION] net: SRv6 End.DT6 function is broken in VRF mode

#regzbot introduced: b9132c32e01976686efa26252cc246944a0d2cab

Hi All!

Seems there is a regression of SRv6 End.DT6 function in VRF mode. In the 
following scenario packet is decapsulated successfully on vrf10 
interface but not forwarded to vrf10's slave interface:

ip netns exec r4 ip -6 nexthop add id 1004 encap seg6local action 
End.DT6 vrftable 10 dev vrf10

ip netns exec r4 ip -6 route add fcff:0:4:200:: nhid 1004


In End.DT6 legacy mode everything works good:

ip netns exec r4 ip -6 nexthop add id 1004 encap seg6local action 
End.DT6 table 10 dev vrf10

ip netns exec r4 ip -6 route add fcff:0:4:200:: nhid 1004


The issue impacts even stable v5.18.1. Please help to fix it.


Thanks!

Anton


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ