Having troubles with IPv6 and bgp. Traffic comes back on the interface (eth4.431) connected to the bgp peer but traffic won't pass through the kernel to the interface the ping is coming from. Also I can see 4 extra ping replies with tcpdump. Works fine on old Quagga bgpd. Any ideas what could be going on? FRR 7.3-dev: # tcpdump -nn ip6 and host 2620:8b:8000:0:7064:ee:ab4c:621 and icmp6 -i eth4.431 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth4.431, link-type EN10MB (Ethernet), capture size 262144 bytes 09:25:04.058721 IP6 2620:8b:8000:0:7064:ee:ab4c:621 > 2607:f8b0:4020:804::200e: ICMP6, echo request, seq 52, length 64 09:25:04.073358 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 52, length 64 09:25:04.103068 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 52, length 64 09:25:04.132735 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 52, length 64 09:25:04.162433 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 52, length 64 09:25:04.192130 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 52, length 64 09:25:05.058671 IP6 2620:8b:8000:0:7064:ee:ab4c:621 > 2607:f8b0:4020:804::200e: ICMP6, echo request, seq 53, length 64 09:25:05.073322 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 53, length 64 09:25:05.103023 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 53, length 64 09:25:05.132822 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 53, length 64 09:25:05.162499 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 53, length 64 09:25:05.192275 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 53, length 64 09:25:06.058736 IP6 2620:8b:8000:0:7064:ee:ab4c:621 > 2607:f8b0:4020:804::200e: ICMP6, echo request, seq 54, length 64 09:25:06.073396 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 54, length 64 09:25:06.103114 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 54, length 64 09:25:06.132879 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 54, length 64 09:25:06.162550 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 54, length 64 09:25:06.192316 IP6 2607:f8b0:4020:804::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 54, length 64 Quagga: tcpdump -nn ip6 and host 2620:8b:8000:0:7064:ee:ab4c:621 and icmp6 -i eth4.431 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth4.431, link-type EN10MB (Ethernet), capture size 262144 bytes 09:29:19.261904 IP6 2620:8b:8000:0:7064:ee:ab4c:621 > 2607:f8b0:4020:805::200e: ICMP6, echo request, seq 12, length 64 09:29:19.276527 IP6 2607:f8b0:4020:805::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 12, length 64 09:29:20.262978 IP6 2620:8b:8000:0:7064:ee:ab4c:621 > 2607:f8b0:4020:805::200e: ICMP6, echo request, seq 13, length 64 09:29:20.277640 IP6 2607:f8b0:4020:805::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 13, length 64 09:29:21.265010 IP6 2620:8b:8000:0:7064:ee:ab4c:621 > 2607:f8b0:4020:805::200e: ICMP6, echo request, seq 14, length 64 09:29:21.279670 IP6 2607:f8b0:4020:805::200e > 2620:8b:8000:0:7064:ee:ab4c:621: ICMP6, echo reply, seq 14, length 64