lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <aTX3tncSC5GqW-ES@lore-desk>
Date: Sun, 7 Dec 2025 22:55:02 +0100
From: Lorenzo Bianconi <lorenzo@...nel.org>
To: Jakub Kicinski <kuba@...nel.org>
Cc: Pablo Neira Ayuso <pablo@...filter.org>,
	Jozsef Kadlecsik <kadlec@...filter.org>,
	Florian Westphal <fw@...len.de>, Phil Sutter <phil@....cc>,
	"David S. Miller" <davem@...emloft.net>,
	Eric Dumazet <edumazet@...gle.com>, Paolo Abeni <pabeni@...hat.com>,
	Simon Horman <horms@...nel.org>, David Ahern <dsahern@...nel.org>,
	Shuah Khan <shuah@...nel.org>, netfilter-devel@...r.kernel.org,
	coreteam@...filter.org, netdev@...r.kernel.org,
	linux-kselftest@...r.kernel.org
Subject: Re: [PATCH nf-next 0/5] Add IP6IP6 flowtable SW acceleration

> On Sun, 07 Dec 2025 17:06:40 +0100 Lorenzo Bianconi wrote:
> > Introduce SW acceleration for IP6IP6 tunnels in the netfilter flowtable
> > infrastructure.
> 
> tc-testing build fails with this:
> 
> net/netfilter/nf_flow_table_ip.c: In function ‘nf_flow_ip6_tunnel_proto’:
> net/netfilter/nf_flow_table_ip.c:370:42: error: ‘inet6_protos’ undeclared (first use in this function); did you mean ‘inet_protos’?
>   370 |                 ipprot = rcu_dereference(inet6_protos[nexthdr]);
>       |                                          ^~~~~~~~~~~~
> ./include/linux/rcupdate.h:532:17: note: in definition of macro ‘__rcu_dereference_check’
>   532 |         typeof(*p) *local = (typeof(*p) *__force)READ_ONCE(p); \
>       |                 ^
> ./include/linux/rcupdate.h:770:28: note: in expansion of macro ‘rcu_dereference_check’
>   770 | #define rcu_dereference(p) rcu_dereference_check(p, 0)
>       |                            ^~~~~~~~~~~~~~~~~~~~~
> net/netfilter/nf_flow_table_ip.c:370:26: note: in expansion of macro ‘rcu_dereference’
>   370 |                 ipprot = rcu_dereference(inet6_protos[nexthdr]);
>       |                          ^~~~~~~~~~~~~~~
> net/netfilter/nf_flow_table_ip.c:370:42: note: each undeclared identifier is reported only once for each function it appears in
>   370 |                 ipprot = rcu_dereference(inet6_protos[nexthdr]);
>       |                                          ^~~~~~~~~~~~
> ./include/linux/rcupdate.h:532:17: note: in definition of macro ‘__rcu_dereference_check’
>   532 |         typeof(*p) *local = (typeof(*p) *__force)READ_ONCE(p); \
>       |                 ^
> ./include/linux/rcupdate.h:770:28: note: in expansion of macro ‘rcu_dereference_check’
>   770 | #define rcu_dereference(p) rcu_dereference_check(p, 0)
>       |                            ^~~~~~~~~~~~~~~~~~~~~
> net/netfilter/nf_flow_table_ip.c:370:26: note: in expansion of macro ‘rcu_dereference’
>   370 |                 ipprot = rcu_dereference(inet6_protos[nexthdr]);
>       |                          ^~~~~~~~~~~~~~~
> net/netfilter/nf_flow_table_ip.c:374:27: error: invalid use of undefined type ‘const struct inet6_protocol’
>   374 |                 if (ipprot->flags & INET6_PROTO_FINAL) {
>       |                           ^~
> net/netfilter/nf_flow_table_ip.c:374:37: error: ‘INET6_PROTO_FINAL’ undeclared (first use in this function)
>   374 |                 if (ipprot->flags & INET6_PROTO_FINAL) {
>       |                                     ^~~~~~~~~~~~~~~~~
> net/netfilter/nf_flow_table_ip.c:383:29: error: invalid use of undefined type ‘const struct inet6_protocol’
>   383 |                 ret = ipprot->handler(skb);
>       |                             ^~

Hi Jakub,

I guess CONFIG_IPV6 is not enabled, right? I will fix it.

Regards,
Lorenzo

Download attachment "signature.asc" of type "application/pgp-signature" (229 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ