Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1414347imm; Tue, 10 Jul 2018 01:07:13 -0700 (PDT) X-Google-Smtp-Source: AAOMgpefkmQWoArZ/namSGPBzznZzDRFHCaAFBKu/psEqlenKATKDAsja/2J5uFZqvKoOVffXP73 X-Received: by 2002:a62:fb05:: with SMTP id x5-v6mr24766089pfm.210.1531210033600; Tue, 10 Jul 2018 01:07:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531210033; cv=none; d=google.com; s=arc-20160816; b=tyDs/uGjews0R3bsmE1VD6L8jswTwl0oI2gEf7PNoczv4iI33mg5Q55njVXTyL/8Oj vfS52aOOkLrBK9LgJnUN/KlFnxHCFhOkPegjCXV1/pym5DFVzN5Dql6ZxT/dmOu1MrFe Jp3kikbIXN+Wmck5nUipV24hK8ERublcveuwoQOVxKP7hFS88iGe02VT+gGhL1RXOkf5 TkEruxEvV6sojEtX3YgvlIeKPFKuNI+2cwVS3dnM+217gkQ7U+yk4hmVhVceSthoFGe/ 0i/8FchjnEqlu7FKZruK2oErjodzPrxD3cYKxHWSA0NhPm3C48ANfKognoppg0JHy6w/ 26gQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=AEMtbuUhv/qRM3s7RRCVxxLavMk2dUJQTwmx2LJebgs=; b=JtjYEdKbDLXEjpElRV/Jj9WZeBk6mBPfsoroY0Wj2HzMc6PQ0c9hqM0rMOgipZek30 o7+fp/+fTAIu0ceybnT+KywfcGyB4PAM66pDWPcCJuefgX12Vd7KpIVnC+g12n1CcQx4 wH7yUkKDHkAPCAIV5ENvv70rtROhpwt5jPSW3kfYMvcSbcqKOTNfhehy3SV1764jSr7k mmJZtUAve20bKRHTSRBtiRBLYDeZPbuKiQQ0kDvgwyBKDdQveMkxzFwCkqs3DoIVrcdv UfXKuRZjoAYg1M3eEM1TocZSqCRZpkwZZ14pHJ07ZsMndr4P9OOUFnP9BC6fb6h2HHlm DIVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=eMfK8KOL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y7-v6si14527785pgp.551.2018.07.10.01.06.58; Tue, 10 Jul 2018 01:07:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=eMfK8KOL; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933484AbeGJIFo (ORCPT + 99 others); Tue, 10 Jul 2018 04:05:44 -0400 Received: from mail-wm0-f66.google.com ([74.125.82.66]:56253 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751129AbeGJIFl (ORCPT ); Tue, 10 Jul 2018 04:05:41 -0400 Received: by mail-wm0-f66.google.com with SMTP id v128-v6so6053063wme.5; Tue, 10 Jul 2018 01:05:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to :user-agent; bh=AEMtbuUhv/qRM3s7RRCVxxLavMk2dUJQTwmx2LJebgs=; b=eMfK8KOLCQ81Qhxyaf4lB5w8cw/HqZB7cwi5Bvj4m+D9z/khXxADaI0PERkUnY2Dyz LlzGTjPYnXmEXGIisTyV7w6KsNko/Um6xToI87A88xwUzB1EGxZRMgbMOkrB8pB00t9r DTcakFHOcSbV26vPwoNIGz83gQ/uOSSVitT5DcktsUV0v50WmQPOzxM195MytM2a+YOw 0osiUhGwqu5hLNw8XlESoDaEXlsSFbPd6w0QtpCsz1x+CC6kCrnyy7nSUI+45CAJAjLU aRSZ0f6ZhPv2rYSfgxWcMRCzPKsxwL8F7xbLgfl4U72uPc73b5cvdPv0janVWwUF2EEc ddhA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to:user-agent; bh=AEMtbuUhv/qRM3s7RRCVxxLavMk2dUJQTwmx2LJebgs=; b=sNHcdQ/jfOQAiVE3S+QlbqXqRjChgKk7QLz4BdCL1eFaZHr74ZaYFsyLSMMnOwumRw WsLggWbInM2acVud4Qq8IJiBp0E8UUmIj7PmAeVUmCU2MSv2FgAtWruzYPWmpOGA8odh PNqvPE0GjHjaUkoMHWDWsbMwFUbCx3GN5iox8REH/TB0BbBdoPblCftzSObdFLKViR5i f7cAjpOKEcuO8jc+/+p2sOYV7gkZ+llE8+5Htog6tlKRolYKfJNo1T/Xq7jvgRlV7L4Y mjMDJMsC93uhxIxTwtM5CGxZR5X1OU8tE2oMgkJgYr8hwqM1otl+u1iXy8l9LwRqv84x D+nA== X-Gm-Message-State: APt69E1ZMFuQ4Y87PfmWUSZo9nV7BH9TweBqFE2qpM5I9+rkDxOI87zx fW/j56ZTzXAmhwMbisPFfJo= X-Received: by 2002:a1c:bd5:: with SMTP id 204-v6mr15240129wml.160.1531209940021; Tue, 10 Jul 2018 01:05:40 -0700 (PDT) Received: from sch.bme.hu (ecklm-pi.sch.bme.hu. [152.66.179.182]) by smtp.gmail.com with ESMTPSA id c13-v6sm3689260wrt.24.2018.07.10.01.05.38 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 10 Jul 2018 01:05:39 -0700 (PDT) Date: Tue, 10 Jul 2018 10:05:38 +0200 From: =?utf-8?B?TcOhdMOp?= Eckl To: Arnd Bergmann Cc: Pablo Neira Ayuso , Jozsef Kadlecsik , Florian Westphal , "David S. Miller" , Flavio Leitner , netfilter-devel@vger.kernel.org, coreteam@netfilter.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] netfilter: NFT_SOCKET don't use NF_SOCKET_IPV6 without NF_TABLES_IPV6 Message-ID: <20180710080538.d7xqpjdvpksfrx6o@sch.bme.hu> References: <20180709213537.2748896-1-arnd@arndb.de> <20180710080227.qwh53ahq26j6phhd@sch.bme.hu> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20180710080227.qwh53ahq26j6phhd@sch.bme.hu> User-Agent: NeoMutt/20180622 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 10, 2018 at 10:02:27AM +0200, M?t? Eckl wrote: > On Mon, Jul 09, 2018 at 11:35:09PM +0200, Arnd Bergmann wrote: > > It is now possible to build the nft_socket module as built-in when > > NF_TABLES_IPV6 is disabled, and have NF_SOCKET_IPV6=m set manually. > > > > In this case, the NF_SOCKET_IPV6 functionality will be useless according > > to the explanation in commit 35bf1ccecaaa ("netfilter: Kconfig: Change > > IPv6 select dependencies"), but on top of that it also causes a link > > error: > > > > net/netfilter/nft_socket.o: In function `nft_socket_eval': > > nft_socket.c:(.text+0x162): undefined reference to `nf_sk_lookup_slow_v6' > > > > This changes the compile-time check so we don't attempt to use > > the NF_SOCKET_IPV6 code when it cannot be used, and make it all > > compile again. That may lead to unexpected behavior when a user > > enables NF_SOCKET_IPV6 but cannot use it, but seems to be the > > logical conclusion of the 35bf1ccecaaa change. > > > > Fixes: 35bf1ccecaaa ("netfilter: Kconfig: Change IPv6 select dependencies") > > Signed-off-by: Arnd Bergmann > > I think this should be fixed in the Kconfig rather than inside the module(s). > > I did some investigation and it turns out that you missed a circumstance. This > link error occures only if NFT_SOCKET=y && NF_SOCKET_IPV6=m && NF_TABLES_IPV6=y > (cannot be m here if NFT_SOCKET is y). And probably the same with > iptables-related modules. Probably this possibility should be eliminated. NF_TPROXY_IPV6 might be in the same situation.