Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp2239270ybe; Tue, 3 Sep 2019 09:51:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqw7LaCcIc3bLehgiMFBvl+qRDb9370t8RSeobxBUA+tyJFnVenbXzeQSL71EFKnwu4iVMfF X-Received: by 2002:a63:67c6:: with SMTP id b189mr31866530pgc.163.1567529460755; Tue, 03 Sep 2019 09:51:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567529460; cv=none; d=google.com; s=arc-20160816; b=XouVza9tOUN+u4+yh19HqbzXIGLk/AXKOAbsJPJpxGCwOLyH9zbnfeduE1Cldvb+LQ df9/sJytVlDPEul6fkERaQALUcWxyoHioU/RC4qY6g6MJdmY7Ih24YEovIYuHrTmDEfQ BvLrlmukUXQ6kPLMl5hohUqPtgCWmde+E32OJB7rcILbPppCYPCKn0CpdwTmmJC+bzli NB3BSqHZQE3oad9bhgjim+cKqEaIJlbwcVSmhtWlKCsGyfWkXnbl/w535et4ak7cZRiA dalh/9osyaggXanxxMQ49BG7oW25jRyEaCKcXbhwXb2iJBq1vdX/SmLtT4vT0hYdMFaY NEmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=2I8vUtC0uArubxJBdxn8fRNtnnw0zKGAusziCrFTUWE=; b=VUld5Ddmd0jX8Z0oaLCWvTXPMd5NoUu6JK+tDYxp95GZjB2VfO4XkG21p0a3kobK1a +EqEw8+xasEnhKVJPvwMDu94xVr8CVxQzoa9pK189PH1WOZqFBNPAoxneEap192+S/fG SRQVcKRro/+yFQokhk3Ybhj8lc2ECLbPkqpM3WpbdojS7ozaAKmpmJKkuq7o2/68o7c3 uq9ZV7YBRXdxYCSqW3EQMIPaBViLSXgCrRfnx2uMik9izJtwjb+OE5ayH02cSw4Vq8NO OHRTKU5xLHTNb8NfHFLepW5VC/SHLn7DN0xy8QFO1tyTstIXuUyHufdz4gSDWxrZ72cX Q5fQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e11si11652561pfj.104.2019.09.03.09.50.44; Tue, 03 Sep 2019 09:51:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727624AbfICQtx (ORCPT + 99 others); Tue, 3 Sep 2019 12:49:53 -0400 Received: from correo.us.es ([193.147.175.20]:37160 "EHLO mail.us.es" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729056AbfICQtx (ORCPT ); Tue, 3 Sep 2019 12:49:53 -0400 Received: from antivirus1-rhel7.int (unknown [192.168.2.11]) by mail.us.es (Postfix) with ESMTP id A6D63DA3D2 for ; Tue, 3 Sep 2019 18:49:49 +0200 (CEST) Received: from antivirus1-rhel7.int (localhost [127.0.0.1]) by antivirus1-rhel7.int (Postfix) with ESMTP id 9A27AFF2EB for ; Tue, 3 Sep 2019 18:49:49 +0200 (CEST) Received: by antivirus1-rhel7.int (Postfix, from userid 99) id 8FBBEB8001; Tue, 3 Sep 2019 18:49:49 +0200 (CEST) X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on antivirus1-rhel7.int X-Spam-Level: X-Spam-Status: No, score=-108.2 required=7.5 tests=ALL_TRUSTED,BAYES_50, SMTPAUTH_US2,USER_IN_WHITELIST autolearn=disabled version=3.4.1 Received: from antivirus1-rhel7.int (localhost [127.0.0.1]) by antivirus1-rhel7.int (Postfix) with ESMTP id E356AD1929; Tue, 3 Sep 2019 18:49:46 +0200 (CEST) Received: from 192.168.1.97 (192.168.1.97) by antivirus1-rhel7.int (F-Secure/fsigk_smtp/550/antivirus1-rhel7.int); Tue, 03 Sep 2019 18:49:46 +0200 (CEST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int) Received: from us.es (sys.soleta.eu [212.170.55.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: 1984lsi) by entrada.int (Postfix) with ESMTPSA id AEF35426CCBC; Tue, 3 Sep 2019 18:49:46 +0200 (CEST) Date: Tue, 3 Sep 2019 18:49:48 +0200 X-SMTPAUTHUS: auth mail.us.es From: Pablo Neira Ayuso To: Leonardo Bras Cc: netfilter-devel@vger.kernel.org, coreteam@netfilter.org, bridge@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, FlorianWestphal , Jozsef Kadlecsik , Roopa Prabhu , Nikolay Aleksandrov , "David S. Miller" Subject: Re: [PATCH v4 1/2] netfilter: Terminate rule eval if protocol=IPv6 and ipv6 module is disabled Message-ID: <20190903164948.kuvtpy7viqhcmp77@salvia> References: <20190830181354.26279-1-leonardo@linux.ibm.com> <20190830181354.26279-2-leonardo@linux.ibm.com> <20190830205802.GS20113@breakpoint.cc> <99e3ef9c5ead1c95df697d49ab9cc83a95b0ac7c.camel@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <99e3ef9c5ead1c95df697d49ab9cc83a95b0ac7c.camel@linux.ibm.com> User-Agent: NeoMutt/20170113 (1.7.2) X-Virus-Scanned: ClamAV using ClamSMTP Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 03, 2019 at 01:46:50PM -0300, Leonardo Bras wrote: > On Fri, 2019-08-30 at 22:58 +0200, Florian Westphal wrote: > > Leonardo Bras wrote: > > > If IPv6 is disabled on boot (ipv6.disable=1), but nft_fib_inet ends up > > > dealing with a IPv6 packet, it causes a kernel panic in > > > fib6_node_lookup_1(), crashing in bad_page_fault. > > > > > > The panic is caused by trying to deference a very low address (0x38 > > > in ppc64le), due to ipv6.fib6_main_tbl = NULL. > > > BUG: Kernel NULL pointer dereference at 0x00000038 > > > > > > The kernel panic was reproduced in a host that disabled IPv6 on boot and > > > have to process guest packets (coming from a bridge) using it's ip6tables. > > > > > > Terminate rule evaluation when packet protocol is IPv6 but the ipv6 module > > > is not loaded. > > > > > > Signed-off-by: Leonardo Bras > > > > Acked-by: Florian Westphal > > > > Hello Pablo, > > Any trouble with this patch? > I could see the other* one got applied, but not this one. > *(The other did not get acked, so i released it alone as v5) > > Is there any fix I need to do in this one? Hm, I see, so this one: https://patchwork.ozlabs.org/patch/1156100/ is not enough? I was expecting we could find a way to handle this from br_netfilter alone itself. Thanks.