This patchset was prevously a single patch named: - netfilter: nf_tables: fib: Drop IPV6 packets if IPv6 is disabled on boot It fixes a bug where a host, with IPv6 disabled on boot, has to deal with guest IPv6 packets, that comes from a bridge interface. When these packets reach the host ip6tables they cause a kernel panic. --- Changes from v3: - Move drop logic from nft_fib6_eval{,_type} to nft_fib_netdev_eval - Add another patch to drop ipv6 packets from bridge when ipv6 disabled Changes from v2: - Replace veredict.code from NF_DROP to NFT_BREAK - Updated commit message (s/package/packet) Changes from v1: - Move drop logic from nft_fib_inet_eval() to nft_fib6_eval{,_type} so it can affect other usages of these functions. Leonardo Bras (2): netfilter: Terminate rule eval if protocol=IPv6 and ipv6 module is disabled net: br_netfiler_hooks: Drops IPv6 packets if IPv6 module is not loaded net/bridge/br_netfilter_hooks.c | 2 ++ net/netfilter/nft_fib_netdev.c | 3 +++ 2 files changed, 5 insertions(+) -- 2.20.1