This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1860969 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1860969 Title: ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets Status in linux package in Ubuntu: Incomplete Bug description: [SRU Justification] [Impact] Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an AF_PACKET socket are dropped (no carrier). This has been fixed in v5.5 by the following upstream commits - 95224166a903 ("vti[6]: fix packet tx through bpf_redirect()") - f042365dbffe ("xfrm interface: fix packet tx through bpf_redirect()") https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95224166a903 https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f042365dbffe The bug exists since the beginning of each driver. == Fix == Backport the requested patches to Focal (5.4), Disco (5.0), Bionic (4.15) and Xenial (4.4). == Risk of Regression == This patch affects only the cases described above (when no dst is attached to the skb), thus the risk should be low. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1860969/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp