Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp2434760ybe; Tue, 3 Sep 2019 12:49:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqzeZaPlYU0y84VJ7JRFAQbRZbXPTynjK5sMCXmA8iVCX8RNPv1Yd/u50xzINeVThAFW9Lj6 X-Received: by 2002:a63:9318:: with SMTP id b24mr31531567pge.31.1567540164013; Tue, 03 Sep 2019 12:49:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567540164; cv=none; d=google.com; s=arc-20160816; b=QLnLB7F73PdgX6gQLVjg6BF+cK9plmev300Rd6rZRGqnayj6W3ISLC/Gkn121tVW6V jId6XKu4/LHMzZB4kr+u8W2vNG9n+r74fHuI6O2VMlr6kjYMSKu6S7fTvp2gqpBRvZJo Hr9YhCGXixvPZRzSpR9ukTJZAhiFfIkA2Vzrsdj1ezzIMdPlNUDeJR43I3LxbSXxsnFG RRHIBsaFzeKNJLk5fbWhybocWDz17tMzE2OQ0kp7YpSXftE7FxMKN3dsbvBvou6S//TN Oz1RRdJuZJzqCte+BsJGUPluSZWyi9X1MGuuDWfsk4ZQDfeHIgI3sP8yelwIh3lLqc6f DAxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=0PP36EoCSEsyZk9jkagTYdadstQvGHywha3mLVo7pGQ=; b=J6czTP8Di2RrkMI8xYuPmumXF8cPSulD4SX7480vUaAdR4XdTfIKuR/zmEowHEyijD avtg8VEn7b9+QqqdhR5F+/WHEpoh6fP+UNKm0MvIjbTZeVJFQlfqKDV0Rt49UVRzhn0T /u3jxsRKXeRh9ZptmvhOzxEpFBy//w9en3LtWV3dgzvwdlPpXcBaLzULgJhZBxuTcO/g Ij9QU6E32U3i5PTZP8Buh43uQpiIZJXHhk94i/EoJRBuJYp3xOzWFFP7ExG9huQMfIxs w1UtCkF/HF0uPBH1+mtuFsQnTFQRfs5wNLAg00WcVAoska3KLocFp9I4wvDO1la8BYAV El/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a123si18939314pfd.114.2019.09.03.12.49.08; Tue, 03 Sep 2019 12:49:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726465AbfICTsQ (ORCPT + 99 others); Tue, 3 Sep 2019 15:48:16 -0400 Received: from Chamillionaire.breakpoint.cc ([193.142.43.52]:43564 "EHLO Chamillionaire.breakpoint.cc" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725962AbfICTsQ (ORCPT ); Tue, 3 Sep 2019 15:48:16 -0400 Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.92) (envelope-from ) id 1i5Emf-0004Va-9c; Tue, 03 Sep 2019 21:48:09 +0200 Date: Tue, 3 Sep 2019 21:48:09 +0200 From: Florian Westphal To: Pablo Neira Ayuso Cc: Florian Westphal , Leonardo Bras , netfilter-devel@vger.kernel.org, coreteam@netfilter.org, bridge@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Jozsef Kadlecsik , Roopa Prabhu , Nikolay Aleksandrov , "David S. Miller" Subject: Re: [PATCH v4 1/2] netfilter: Terminate rule eval if protocol=IPv6 and ipv6 module is disabled Message-ID: <20190903194809.GD13660@breakpoint.cc> References: <20190830181354.26279-1-leonardo@linux.ibm.com> <20190830181354.26279-2-leonardo@linux.ibm.com> <20190830205802.GS20113@breakpoint.cc> <99e3ef9c5ead1c95df697d49ab9cc83a95b0ac7c.camel@linux.ibm.com> <20190903164948.kuvtpy7viqhcmp77@salvia> <20190903170550.GA13660@breakpoint.cc> <20190903193155.v74ws47zcn6zrwpr@salvia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190903193155.v74ws47zcn6zrwpr@salvia> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Pablo Neira Ayuso wrote: > > > I was expecting we could find a way to handle this from br_netfilter > > > alone itself. > > > > We can't because we support ipv6 fib lookups from the netdev family > > as well. > > > > Alternative is to auto-accept ipv6 packets from the nf_tables eval loop, > > but I think its worse. > > Could we add a restriction for nf_tables + br_netfilter + !ipv6. I > mean, if this is an IPv6 packet, nf_tables is on and IPv6 module if > off, then drop this packet? We could do that from nft_do_chain_netdev().