Hi Garri, On Sun, Dec 07, 2025 at 01:33:07PM +0100, Garri Djavadyan wrote: > Hi Salvatore, > > On Fri, 2025-11-21 at 12:07 +0100, Salvatore Bonaccorso wrote: > > HI Garri, > > > > On Fri, Nov 21, 2025 at 11:07:39AM +0100, Garri Djavadyan wrote: > > > On Sat, 2025-11-15 at 14:02 +0100, Garri Djavadyan wrote: > > > > On Mon, 2025-11-10 at 17:54 +0100, Fernando Fernandez Mancera > > > > wrote: > > > > > > > > > > > > > > > On 10/25/25 11:21 PM, Garri Djavadyan wrote: > > > > > > On Sat, 2025-10-25 at 16:53 +0200, Salvatore Bonaccorso > > > > > > wrote: > > > > > > > Hi Garri, > > > > > > > > > > > > > > On Sat, Oct 18, 2025 at 01:39:02AM -0700, Stephen Hemminger > > > > > > > wrote: > > > > > > > > On Thu, 16 Oct 2025 00:12:40 +0200 > > > > > > > > Garri Djavadyan <[email protected]> wrote: > > > > > > > > > > > > > > > > > Hi Everyone, > > > > > > > > > > > > > > > > > > A year ago I noticed a problem with handling ipv6_route > > > > > > > > > flags > > > > > > > > > that in > > > > > > > > > some scenarios can lead to reachability issues. It was > > > > > > > > > reported > > > > > > > > > here: > > > > > > > > > > > > > > > > > > https://bugzilla.kernel.org/show_bug.cgi?id=219205 > > > > > > > > > > > > > > > > > > > > > > > > > > > Also it was recently reported in the Debian tracker > > > > > > > > > after > > > > > > > > > checking if > > > > > > > > > the latest Debian stable is still affected: > > > > > > > > > > > > > > > > > > https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1117959 > > > > > > > > > > > > > > > > > > > > > > > > > > > Unfortunately, the Debian team cannot act on the report > > > > > > > > > because > > > > > > > > > no one > > > > > > > > > from the upstream kernel team has confirmed if the > > > > > > > > > report > > > > > > > > > in > > > > > > > > > the > > > > > > > > > upstream tracker is valid or not. Therefore, I am > > > > > > > > > checking > > > > > > > > > if > > > > > > > > > anyone > > > > > > > > > can help confirm if the observed behavior is indeed a > > > > > > > > > bug. > > > > > > > > > > > > > > > > > > Many thanks in advance! > > > > > > > > > > > > > > > > > > Regards, > > > > > > > > > Garri > > > > > > > > > > > > > > > > > > > > > > > > > Linux networking does not actively use kernel bugzilla. > > > > > > > > I forward the reports to the mailing list, that is all. > > > > > > > > After than sometimes developers go back and update > > > > > > > > bugzilla > > > > > > > > but it is not required or expected. > > > > > > > > > > > > > > Garri, best action would likely be to really post your full > > > > > > > report on > > > > > > > netdev directly. > > > > > > > > > > > > > > Regards, > > > > > > > Salvatore > > > > > > > > > > > > > > > > > > Thank you for your suggestions Stephen and Salvatore. > > > > > > > > > > > > Below is the full report that was originally posted to the > > > > > > kernel > > > > > > bugzilla a year ago. It is still reproducible with fresher > > > > > > kernels. > > > > > > > > > > > > -----BEGIN REPORT----- > > > > > > I noticed that the ipv6_route flags RTF_ADDRCONF and > > > > > > RTF_PREFIX_RT > > > > > > are > > > > > > not cleared when static on-link routes are added during IPv6 > > > > > > address > > > > > > configuration, and it leads to situations when the kernel > > > > > > updates > > > > > > the > > > > > > static on-link routes with expiration time. > > > > > > > > > > > > > > > > This is indeed a bug, I have a patch already and I am doing > > > > > some > > > > > testing > > > > > before sending it to net.git. I hope it can be sent tomorrow. > > > > > > > > > > Thanks, > > > > > Fernando. > > > > > > > > > > > > For the record, Fernando submitted the patch for review to net- > > > > next: > > > > > > > > https://lore.kernel.org/netdev/[email protected]/ > > > > > > > > > > > > Regards, > > > > Garri > > > > > > The patch has landed on linux-next: > > > > > > https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f72514b3c5698e4b900b25345e09f9ed33123de6 > > > > That is great :) > > > > > Salvatore, could you please clarify a few questions to which I > > > could > > > not find clear answers in the Debian Linux kernel handbook? > > > > > > - Should the patch first make it to the mainline or stable upstream > > > trees before it is considered for acceptance in the Debian trees? > > > - Will it be acceptable for both stable and oldstable Debian > > > releases > > > to include the fix considering that it can be seen as a security > > > issue > > > in some corner cases? > > > > There is really no need for a Debian specific approach here in my > > opinion. The patch has the correct fixes tags upstream so once it is > > in mainline it should make it the way down to the stable series. > > > > As you know Debian follows the upstream stable series. In case a fix > > is now known to be okay (needs to be at least in mainline, ideally > > already queued for stable), we might pick the commit as well for a > > next upload in case it is urgent enough. But usually the best thing > > is > > monitor the situation and help that the patch goes accepted in the > > desired stable series and it will land in Debian correspondly as well > > with the next rebased upload (both done at point release times but as > > well in DSAs via a security upload). > > > > The maybe bit shorter answer is, that the fix should be ideally at > > least in mainline and well vetted that to go to the stable series, > > and > > might then be picked as well in advance bit earlier than the actual > > release in the upstream series. > > > > Does this answers your question? > > > > Regards, > > Salvatore > > > As far as I can see, the fix was not ported to 6.12.61: > > https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/log/?h=linux-6.12.y > > > Does it mean this still can happen in the next stable releases, or the > stable team needs to be notified explicitly as it is mentioned on the > following page? > > https://docs.kernel.org/process/stable-kernel-rules.html
I do not think an action is need reight now. The commit landed in mainline so I expect with the given "Fixes" tag that it will be picked next in the review queues (likely only after 6.19-rc1 is tagged). If that is not happening, then yes, it would be sensible to explicitly ask for a backport to the relevant stable series (but again I would expect all is working as expected and the commit be picked up in the next review rounds). Regards, Salvatore

