Received: by 2002:a05:6512:3d0e:0:0:0:0 with SMTP id d14csp50131lfv; Tue, 12 Apr 2022 16:52:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJynNapFhsf8DmzNhWb4aVf4oeSPSuZB4PnrZsYdRG5xQFA3syHTlgZqiu85m93MrfUNYiKt X-Received: by 2002:a17:902:edc5:b0:156:68e4:416 with SMTP id q5-20020a170902edc500b0015668e40416mr39562314plk.87.1649807544750; Tue, 12 Apr 2022 16:52:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649807544; cv=none; d=google.com; s=arc-20160816; b=WIUzpQcGReFmmnNegSF3JI7o10SB4XkHAcerqtj5HYz/snXBLq5FtqTnAJknXDb2Bj A0q3GUsR39RXn5syg/UGjmeYntgX5TJCPDixStzNzLDNsUKCiAmLyjgiuUjgS8puC0j4 PhG3eiHrLtDeCfkrj18qLVsK6ZSiDLSFjewrVILUTFCVCEopALwohPmL/scl+A2s+NYx 2rjxUWWmuVrl0IOZXCfzKs+2hg+B4yIjCAbnYkNBOsB8rn4qp2IAn1UqUSysOWAcBIhM bWVbIM3ji4UiMmXgI8El2RB5YlJjhnx2nN4AYNhlpzqPiRb2dTarGR012TxbwEPBDT7Q apRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=NIBDIJbv2w4R8Wt9hKdfYQoUIdQcA/NFzYmPOKv1SMg=; b=c1SE06M7+UItJ/aXv6DLSTOmthGVFw6gtiioDARwrTu5cpUeSV7PdV9VDOj4vD3OTm 047sfNJFRN6K8J//ad3JAFNrE7wsQ6Y9b/tjyOmuRvakXADHoJ2XuDSubYajdk49uQ1E fV9D8IegG1WI9zAuTj/v68E6xdvBsgsO+ZK4JGRWIClKtcyOqfEXkMZ2hAet+x5tYNTd sKw/XWxlbRu3C35ZKFbO9v83A/DSTDBDKZXLmR1BNYwamtUTMY2Jh3Tt5LXsVEgI6BqH jDCzkVU17Hbvx8xWgqv5+7HI/BayUjX/X8qVcrvaFdHHMYy0jsxbf5Hc82TxPl9uPqu3 yG8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@linuxfoundation.org header.s=korg header.b=pQ+YdxD6; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id v22-20020a637a16000000b00385d870e145si3874979pgc.391.2022.04.12.16.52.24 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 16:52:24 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=fail header.i=@linuxfoundation.org header.s=korg header.b=pQ+YdxD6; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id ECA0F13987E; Tue, 12 Apr 2022 14:46:12 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1352160AbiDLHqt (ORCPT + 99 others); Tue, 12 Apr 2022 03:46:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57440 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1351617AbiDLHMs (ORCPT ); Tue, 12 Apr 2022 03:12:48 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 409ED11C13; Mon, 11 Apr 2022 23:50:39 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id D4684614AD; Tue, 12 Apr 2022 06:50:38 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E4502C385A1; Tue, 12 Apr 2022 06:50:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649746238; bh=cfbxvSeSy5I+mpC8I9GSA3K1byPd/JZby9OSQekDQxs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pQ+YdxD6sjJ6sWzmc5ZagMJhu7I4wGaK2WCSI+NqLfiTJn5vtfnKSB6+Hf7DCnW4X DSa8hfhUChuEB8EW1danS5FP/y87TeUza1Cd9fbzLulGlFVeRSM0ZjYFWU19ORulM6 olWPaxuco9FEt6o5Za+g+bESa896Oc3688rXcno0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Pudak, Filip" , "Xiao, Jiguang" , David Ahern , Paolo Abeni , Sasha Levin , Pudak@vger.kernel.org, Xiao@vger.kernel.org Subject: [PATCH 5.15 183/277] ipv6: Fix stats accounting in ip6_pkt_drop Date: Tue, 12 Apr 2022 08:29:46 +0200 Message-Id: <20220412062947.331978667@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220412062942.022903016@linuxfoundation.org> References: <20220412062942.022903016@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_INVALID, DKIM_SIGNED,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: David Ahern [ Upstream commit 1158f79f82d437093aeed87d57df0548bdd68146 ] VRF devices are the loopbacks for VRFs, and a loopback can not be assigned to a VRF. Accordingly, the condition in ip6_pkt_drop should be '||' not '&&'. Fixes: 1d3fd8a10bed ("vrf: Use orig netdev to count Ip6InNoRoutes and a fresh route lookup when sending dest unreach") Reported-by: Pudak, Filip Reported-by: Xiao, Jiguang Signed-off-by: David Ahern Link: https://lore.kernel.org/r/20220404150908.2937-1-dsahern@kernel.org Signed-off-by: Paolo Abeni Signed-off-by: Sasha Levin --- net/ipv6/route.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/net/ipv6/route.c b/net/ipv6/route.c index e0766bdf20e7..6b269595efaa 100644 --- a/net/ipv6/route.c +++ b/net/ipv6/route.c @@ -4509,7 +4509,7 @@ static int ip6_pkt_drop(struct sk_buff *skb, u8 code, int ipstats_mib_noroutes) struct inet6_dev *idev; int type; - if (netif_is_l3_master(skb->dev) && + if (netif_is_l3_master(skb->dev) || dst->dev == net->loopback_dev) idev = __in6_dev_get_safely(dev_get_by_index_rcu(net, IP6CB(skb)->iif)); else -- 2.35.1