summaryrefslogtreecommitdiff
path: root/target/linux/generic/patches-4.0
diff options
context:
space:
mode:
authorFelix Fietkau <nbd@openwrt.org>2015-03-17 17:14:48 +0000
committerFelix Fietkau <nbd@openwrt.org>2015-03-17 17:14:48 +0000
commitf30358d41a41caebc1eda7d1445289d070a5cbf3 (patch)
tree361db167ea706e06bd4f1645eb4e266adfef8338 /target/linux/generic/patches-4.0
parent2e5125c3d6e4856a7bcdcef9b6698fdc3bd5659e (diff)
downloadmtk-20170518-f30358d41a41caebc1eda7d1445289d070a5cbf3.zip
mtk-20170518-f30358d41a41caebc1eda7d1445289d070a5cbf3.tar.gz
mtk-20170518-f30358d41a41caebc1eda7d1445289d070a5cbf3.tar.bz2
kernel: remove the netfilter optimization that skips the filter table, it has caused too many issues
Signed-off-by: Felix Fietkau <nbd@openwrt.org> SVN-Revision: 44873
Diffstat (limited to 'target/linux/generic/patches-4.0')
-rw-r--r--target/linux/generic/patches-4.0/617-netfilter_skip_filter_sysctl.patch87
1 files changed, 0 insertions, 87 deletions
diff --git a/target/linux/generic/patches-4.0/617-netfilter_skip_filter_sysctl.patch b/target/linux/generic/patches-4.0/617-netfilter_skip_filter_sysctl.patch
deleted file mode 100644
index 6cf6568..0000000
--- a/target/linux/generic/patches-4.0/617-netfilter_skip_filter_sysctl.patch
+++ /dev/null
@@ -1,87 +0,0 @@
---- a/include/net/netns/conntrack.h
-+++ b/include/net/netns/conntrack.h
-@@ -86,6 +86,7 @@ struct netns_ct {
- struct ctl_table_header *helper_sysctl_header;
- #endif
- char *slabname;
-+ int skip_filter;
- unsigned int sysctl_log_invalid; /* Log invalid packets */
- int sysctl_events;
- int sysctl_acct;
---- a/net/ipv4/netfilter/iptable_filter.c
-+++ b/net/ipv4/netfilter/iptable_filter.c
-@@ -15,6 +15,7 @@
- #include <linux/netfilter_ipv4/ip_tables.h>
- #include <linux/slab.h>
- #include <net/ip.h>
-+#include <net/netfilter/nf_conntrack.h>
-
- MODULE_LICENSE("GPL");
- MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>");
-@@ -37,6 +38,7 @@ iptable_filter_hook(const struct nf_hook
- const struct net_device *in, const struct net_device *out,
- int (*okfn)(struct sk_buff *))
- {
-+ enum ip_conntrack_info ctinfo;
- const struct net *net;
-
- if (ops->hooknum == NF_INET_LOCAL_OUT &&
-@@ -46,6 +48,11 @@ iptable_filter_hook(const struct nf_hook
- return NF_ACCEPT;
-
- net = dev_net((in != NULL) ? in : out);
-+ nf_ct_get(skb, &ctinfo);
-+ if ((ctinfo == IP_CT_ESTABLISHED_REPLY || ctinfo == IP_CT_ESTABLISHED) &&
-+ net->ct.skip_filter)
-+ return NF_ACCEPT;
-+
- return ipt_do_table(skb, ops->hooknum, in, out,
- net->ipv4.iptable_filter);
- }
---- a/net/ipv6/netfilter/ip6table_filter.c
-+++ b/net/ipv6/netfilter/ip6table_filter.c
-@@ -13,6 +13,7 @@
- #include <linux/moduleparam.h>
- #include <linux/netfilter_ipv6/ip6_tables.h>
- #include <linux/slab.h>
-+#include <net/netfilter/nf_conntrack.h>
-
- MODULE_LICENSE("GPL");
- MODULE_AUTHOR("Netfilter Core Team <coreteam@netfilter.org>");
-@@ -37,6 +38,12 @@ ip6table_filter_hook(const struct nf_hoo
- int (*okfn)(struct sk_buff *))
- {
- const struct net *net = dev_net((in != NULL) ? in : out);
-+ enum ip_conntrack_info ctinfo;
-+
-+ nf_ct_get(skb, &ctinfo);
-+ if ((ctinfo == IP_CT_ESTABLISHED_REPLY || ctinfo == IP_CT_ESTABLISHED) &&
-+ net->ct.skip_filter)
-+ return NF_ACCEPT;
-
- return ip6t_do_table(skb, ops->hooknum, in, out,
- net->ipv6.ip6table_filter);
---- a/net/netfilter/nf_conntrack_standalone.c
-+++ b/net/netfilter/nf_conntrack_standalone.c
-@@ -507,6 +507,13 @@ static struct ctl_table nf_ct_sysctl_tab
- .extra2 = &log_invalid_proto_max,
- },
- {
-+ .procname = "nf_conntrack_skip_filter",
-+ .data = &init_net.ct.skip_filter,
-+ .maxlen = sizeof(int),
-+ .mode = 0644,
-+ .proc_handler = proc_dointvec,
-+ },
-+ {
- .procname = "nf_conntrack_expect_max",
- .data = &nf_ct_expect_max,
- .maxlen = sizeof(int),
-@@ -542,6 +549,7 @@ static int nf_conntrack_standalone_init_
- table[2].data = &net->ct.htable_size;
- table[3].data = &net->ct.sysctl_checksum;
- table[4].data = &net->ct.sysctl_log_invalid;
-+ table[5].data = &net->ct.skip_filter;
-
- /* Don't export sysctls to unprivileged users */
- if (net->user_ns != &init_user_ns)