Hi, On Sat, 2017-04-22 at 14:16 +0300, Julian Anastasov wrote: > On Thu, 20 Apr 2017, Paolo Abeni wrote: > > > When creating a new ipvs service, ipv6 addresses are always accepted > > if CONFIG_IP_VS_IPV6 is enabled. On dest creation the address family > > is not explicitly checked. > > > > This allows the user-space to configure ipvs services even if the > > system is booted with ipv6.disable=1. On specific configuration, ipvs > > can try to call ipv6 routing code at setup time, causing the kernel to > > oops due to fib6_rules_ops being NULL. > > > > This change addresses the issue adding a check for the ipv6 > > module being enabled while validating ipv6 service operations and > > adding the same validation for dest operations. > > > > According to git history, this issue is apparently present since > > the introduction of ipv6 support, and the oops can be triggered > > since commit 09571c7ae30865ad ("IPVS: Add function to determine > > if IPv6 address is local") > > > > Fixes: 09571c7ae30865ad ("IPVS: Add function to determine if IPv6 address is local") > > Signed-off-by: Paolo Abeni <pabeni@xxxxxxxxxx> > > Looks good to me but I see two places that can benefit > from such check: I'm sorry for the lag, I was delayed by other notorious issues ;-) I'm unable to trigger any crash with the patched kernel. > - in ip_vs_genl_new_daemon() if we do not want to create IPv6 sockets > for the sync protocol in make_send_sock() and make_receive_sock(). > Not sure if this can lead to crashes. This one is, AFAICS, safe, because ip_vs_genl_new_daemon() calls start_sync_thread(), which tries to create a socket of the specified address family before doing any real action. Such operation will fail gracefully, and overall we will get an - expected - error to userspace. > - in ip_vs_proc_sync_conn() if we do not want backup server to accept > IPv6 conns because they may be created even when dests are missing. > We may use retc = 10 there. Not fatal but may eat memory for > conns that will not be used. If I read the above correct correctly, even that should be safe, for the same reason: ipv6 socket creation will fail if ipv6 is disabled. The problem with the patched code is that it tries to resolve ipv6 addresses that are not created/validated by the kernel. Cheers, Paolo -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html