Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp2481163ybe; Tue, 3 Sep 2019 13:36:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqzH1rRbYtbcKZtJMEBhs7PpK7HmEM9RoNQqK6wX704LWwNbjQlRZDOJyfUNhZzMgFX7/7Y2 X-Received: by 2002:a17:90a:ad4a:: with SMTP id w10mr1207953pjv.41.1567543001038; Tue, 03 Sep 2019 13:36:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567543001; cv=none; d=google.com; s=arc-20160816; b=rNDw2VJAuAFm4vliWLTxt4BBQuCWix3T0or0BWwKSfqXVF6sM4QtqhOWjk4SXgP64D vfuy9mdO8o+ayB6SfX37g5jrvGrGYFwxIfExCYN3+HgUyfO1jldgrA/CWw9s/YLtR5iN n02NzThtarEwnN1yXG/266E+PZYbehHrQF7zuo0RMC27h940SEjTRMqOsbXVTqCBHvyl PCgi2p5yuU+zelSL8vfyNgbNPGlN5GJ+VF4ucIS1ZtSKzcDcRHvtFyn0a9bGBIyLiI/X w6G4jc2qsxJc6MVk5QHkutsYJxH7gJh/+1bJ+57yCmzGTg5wCpoeWhWyCe9czxx2HKcn VwLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=OP9G1sbwedb0W8ZGFyoerXtLksiBJkcwdxZoP8OSwv8=; b=EqCNxjqldPS985P73P8TytZEtuDPFkoR776V0iKTGUUkizVGIPYFnirDTSZfPbI8Zt CspFZJraPaorRbPCCnu6DEG2SQMMQ3r8P1g0AIrZode185kQHFp8TZC15wEXzXC8opRW 4SLtqRxzAszno5en0s5BF37qGQK0xwvkuLPAR/tyZYAeYzUFNFs3GhHmuWCSkqIT7ols rgWMbJCBM19IJbNGx1RadKSxkWmyM6u5oHqZY+BS6rpdaiiaXLwQJlSE4HAbl4Iho+Ro pcBZv3Tbb5rkRwZk+28q+HrLidDMEi9/iVdoz7q6/CTwCjJYwXX18Ii77u6RMJpWFDlx dbDw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f1si15483254plj.153.2019.09.03.13.36.25; Tue, 03 Sep 2019 13:36:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727528AbfICUfk (ORCPT + 99 others); Tue, 3 Sep 2019 16:35:40 -0400 Received: from Chamillionaire.breakpoint.cc ([193.142.43.52]:43882 "EHLO Chamillionaire.breakpoint.cc" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726451AbfICUfj (ORCPT ); Tue, 3 Sep 2019 16:35:39 -0400 Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.92) (envelope-from ) id 1i5FWV-0004op-J2; Tue, 03 Sep 2019 22:35:31 +0200 Date: Tue, 3 Sep 2019 22:35:31 +0200 From: Florian Westphal To: Pablo Neira Ayuso Cc: Florian Westphal , Leonardo Bras , netfilter-devel@vger.kernel.org, coreteam@netfilter.org, bridge@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Jozsef Kadlecsik , Roopa Prabhu , Nikolay Aleksandrov , "David S. Miller" Subject: Re: [PATCH v4 1/2] netfilter: Terminate rule eval if protocol=IPv6 and ipv6 module is disabled Message-ID: <20190903203531.GF13660@breakpoint.cc> References: <20190830181354.26279-1-leonardo@linux.ibm.com> <20190830181354.26279-2-leonardo@linux.ibm.com> <20190830205802.GS20113@breakpoint.cc> <99e3ef9c5ead1c95df697d49ab9cc83a95b0ac7c.camel@linux.ibm.com> <20190903164948.kuvtpy7viqhcmp77@salvia> <20190903170550.GA13660@breakpoint.cc> <20190903193155.v74ws47zcn6zrwpr@salvia> <20190903194809.GD13660@breakpoint.cc> <20190903201904.npna6dt25ug5gwvd@salvia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190903201904.npna6dt25ug5gwvd@salvia> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Pablo Neira Ayuso wrote: > On Tue, Sep 03, 2019 at 09:48:09PM +0200, Florian Westphal wrote: > > We could do that from nft_do_chain_netdev(). > > Indeed, this is all about the netdev case. > > Probably add something similar to nf_ip6_route() to deal with > ip6_route_lookup() case? This is the one trigering the problem, right? Yes, this particular problem is caused by ipv6 fib not being initialized due to ipv6.disable=1. I don't know if there are cases other than FIB. > BTW, how does nft_fib_ipv6 module kicks in if ipv6 module is not > loaded? The symbol dependency would pull in the IPv6 module anyway. ipv6.disabled=1 does load the ipv6 module, but its non-functional.