<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_NEW "
title="NEW - Packet corruption occurs when using the nftables vlan pcp set command"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1744#c4">Comment # 4</a>
on <a class="bz_bug_link
bz_status_NEW "
title="NEW - Packet corruption occurs when using the nftables vlan pcp set command"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=1744">bug 1744</a>
from <span class="vcard"><a class="email" href="mailto:yungan.wang@broadcom.com" title="Yungan Wang <yungan.wang@broadcom.com>"> <span class="fn">Yungan Wang</span></a>
</span></b>
<pre>(In reply to Phil Sutter from <a href="show_bug.cgi?id=1744#c2">comment #2</a>)
<span class="quote">> Hi,
>
> (In reply to Yungan Wang from <a href="show_bug.cgi?id=1744#c1">comment #1</a>)
> > Hi netfilter team,
> >
> > I was hoping you could assist in clarifying whether the issue I'm
> > encountering is a bug or not.
>
> It clearly is a bug, but the question is whether it has been fixed already
> or not. I see several fixes in respective kernel code in near past, could
> you please try to reproduce using a more recent (v6.2 at least) kernel?
>
> Cheers, Phil</span >
Hi Phil,
I took a look at the latest version of the kernel's net/netfilter/nft_payload.c
file:
<a href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/net/netfilter/nft_payload.c?h=v6.9-rc6">https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/net/netfilter/nft_payload.c?h=v6.9-rc6</a>
It seems that nft_payload_set_eval() still doesn't handle skb->vlan_tci.
Therefore, I believe this issue may still occur in the latest kernel version.
Cheers,
Yungan</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>