Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp2258193ybe; Tue, 3 Sep 2019 10:07:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqxHR2JBeiqFjtHJyBdvdspeeS7uXUJ9bxKOKr5VH4y9C6yYKB14LaQeGHSITCHVr74b2yO0 X-Received: by 2002:a17:90a:c305:: with SMTP id g5mr357608pjt.58.1567530430315; Tue, 03 Sep 2019 10:07:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567530430; cv=none; d=google.com; s=arc-20160816; b=ixZiJieS+o9+wshxXMQfn9jAk08yJbf+XxtxJ5O994tFIGO614vYvKdJ2Hvt5dYF21 M+FJvuQx01gOZ3rDEaEnOk7X9mX3gp4pqVvYI8WGpm/DjGa/yPjMJhiSL7y7kPoS2ZbI KTwtPeL9Pa2pXWbFNyr66weU3mbccqGMyq1+mMgm1WK53DtLyPZLrjgeJAe7++odN3k4 gc6YmCKRPlNdRKhBNmusdlqidXtBZk9tpHcb49+PVC2xDlOZvyclxzK40KU66FEIm5vr 4cYBsrHDbhQEfQBJEoMnAdxMVZzV0lFI9RSytGqXyT0ZR2wakhFG5Xq8dJ9ddux4nhid yWdQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=+aZOJcKZGFJ1a3N8Fes4mrjfpnpzW1uKGi+FldQPyY8=; b=kYJXHFrhhVOKQGkyM2cItwKqBsUx4ofO8uB+kT2PID6IhN+6MUVcGCs56hLxuIJc+O zzpyKXdPz9ZU8mwMggixdmz8XtpuQkCOCCQiRSfPj8X45w1sbAIDHg+lO5SZ6xArRj0Z sBfwhK8EGm4jQAosm9ObTBfPzhT0opfpAliYUKALm8hM6s6obm8BBizofgFcCkoJ/fqz jVv5AleAp+DfreKoRifu6xevEUFcJcacIrgYT2mkDWNjz34rHnP8k6vpIvhFMqTfvCvF 6sPZY2zhrk+c8aHBFjqSpK4i/qMoigccbczh/2KQsNB2CpmMiD+spSmNHrvquVpqFiC6 rO4w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q26si15176916pgt.233.2019.09.03.10.06.52; Tue, 03 Sep 2019 10:07:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730112AbfICRF7 (ORCPT + 99 others); Tue, 3 Sep 2019 13:05:59 -0400 Received: from Chamillionaire.breakpoint.cc ([193.142.43.52]:42914 "EHLO Chamillionaire.breakpoint.cc" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727107AbfICRF6 (ORCPT ); Tue, 3 Sep 2019 13:05:58 -0400 Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.92) (envelope-from ) id 1i5CFa-0003c1-IC; Tue, 03 Sep 2019 19:05:50 +0200 Date: Tue, 3 Sep 2019 19:05:50 +0200 From: Florian Westphal To: Pablo Neira Ayuso Cc: Leonardo Bras , netfilter-devel@vger.kernel.org, coreteam@netfilter.org, bridge@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, FlorianWestphal , Jozsef Kadlecsik , Roopa Prabhu , Nikolay Aleksandrov , "David S. Miller" Subject: Re: [PATCH v4 1/2] netfilter: Terminate rule eval if protocol=IPv6 and ipv6 module is disabled Message-ID: <20190903170550.GA13660@breakpoint.cc> References: <20190830181354.26279-1-leonardo@linux.ibm.com> <20190830181354.26279-2-leonardo@linux.ibm.com> <20190830205802.GS20113@breakpoint.cc> <99e3ef9c5ead1c95df697d49ab9cc83a95b0ac7c.camel@linux.ibm.com> <20190903164948.kuvtpy7viqhcmp77@salvia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190903164948.kuvtpy7viqhcmp77@salvia> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Pablo Neira Ayuso wrote: > On Tue, Sep 03, 2019 at 01:46:50PM -0300, Leonardo Bras wrote: > > On Fri, 2019-08-30 at 22:58 +0200, Florian Westphal wrote: > > > Leonardo Bras wrote: > > > > If IPv6 is disabled on boot (ipv6.disable=1), but nft_fib_inet ends up > > > > dealing with a IPv6 packet, it causes a kernel panic in > > > > fib6_node_lookup_1(), crashing in bad_page_fault. > > > > > > > > The panic is caused by trying to deference a very low address (0x38 > > > > in ppc64le), due to ipv6.fib6_main_tbl = NULL. > > > > BUG: Kernel NULL pointer dereference at 0x00000038 > > > > > > > > The kernel panic was reproduced in a host that disabled IPv6 on boot and > > > > have to process guest packets (coming from a bridge) using it's ip6tables. > > > > > > > > Terminate rule evaluation when packet protocol is IPv6 but the ipv6 module > > > > is not loaded. > > > > > > > > Signed-off-by: Leonardo Bras > > > > > > Acked-by: Florian Westphal > > > > > > > Hello Pablo, > > > > Any trouble with this patch? > > I could see the other* one got applied, but not this one. > > *(The other did not get acked, so i released it alone as v5) > > > > Is there any fix I need to do in this one? > > Hm, I see, so this one: > > https://patchwork.ozlabs.org/patch/1156100/ > > is not enough? No, its not. > I was expecting we could find a way to handle this from br_netfilter > alone itself. We can't because we support ipv6 fib lookups from the netdev family as well. Alternative is to auto-accept ipv6 packets from the nf_tables eval loop, but I think its worse.