aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/generic/hack-4.19/640-bridge-only-accept-EAP-locally.patch
diff options
context:
space:
mode:
authorAdrian Schmutzler <freifunk@adrianschmutzler.de>2020-10-09 21:53:35 +0200
committerAdrian Schmutzler <freifunk@adrianschmutzler.de>2020-10-30 19:29:59 +0100
commit278512665094888d3c007fdd74e090496d6c811d (patch)
tree6d4f2cdddef316e07829b89c1c1a790d0db92fc3 /target/linux/generic/hack-4.19/640-bridge-only-accept-EAP-locally.patch
parent3824fa26d256d162fc0e02e46714eda7816cae4a (diff)
downloadupstream-278512665094888d3c007fdd74e090496d6c811d.tar.gz
upstream-278512665094888d3c007fdd74e090496d6c811d.tar.bz2
upstream-278512665094888d3c007fdd74e090496d6c811d.zip
kernel: remove support for kernel 4.19
We use 5.4 on all targets by default, and 4.19 has never been released in a stable version. There is no reason to keep it. Signed-off-by: Adrian Schmutzler <freifunk@adrianschmutzler.de>
Diffstat (limited to 'target/linux/generic/hack-4.19/640-bridge-only-accept-EAP-locally.patch')
-rw-r--r--target/linux/generic/hack-4.19/640-bridge-only-accept-EAP-locally.patch82
1 files changed, 0 insertions, 82 deletions
diff --git a/target/linux/generic/hack-4.19/640-bridge-only-accept-EAP-locally.patch b/target/linux/generic/hack-4.19/640-bridge-only-accept-EAP-locally.patch
deleted file mode 100644
index f77a1965ca..0000000000
--- a/target/linux/generic/hack-4.19/640-bridge-only-accept-EAP-locally.patch
+++ /dev/null
@@ -1,82 +0,0 @@
-From: Felix Fietkau <nbd@nbd.name>
-Date: Fri, 7 Jul 2017 17:18:54 +0200
-Subject: bridge: only accept EAP locally
-
-When bridging, do not forward EAP frames to other ports, only deliver
-them locally, regardless of the state.
-
-Signed-off-by: Felix Fietkau <nbd@nbd.name>
-[add disable_eap_hack sysfs attribute]
-Signed-off-by: Etienne Champetier <champetier.etienne@gmail.com>
----
-
---- a/net/bridge/br_input.c
-+++ b/net/bridge/br_input.c
-@@ -108,10 +108,14 @@ int br_handle_frame_finish(struct net *n
- }
- }
-
-+ BR_INPUT_SKB_CB(skb)->brdev = br->dev;
-+
-+ if (skb->protocol == htons(ETH_P_PAE) && !br->disable_eap_hack)
-+ return br_pass_frame_up(skb);
-+
- if (p->state == BR_STATE_LEARNING)
- goto drop;
-
-- BR_INPUT_SKB_CB(skb)->brdev = br->dev;
- BR_INPUT_SKB_CB(skb)->src_port_isolated = !!(p->flags & BR_ISOLATED);
-
- if (IS_ENABLED(CONFIG_INET) &&
---- a/net/bridge/br_private.h
-+++ b/net/bridge/br_private.h
-@@ -337,6 +337,8 @@ struct net_bridge {
- u16 group_fwd_mask;
- u16 group_fwd_mask_required;
-
-+ bool disable_eap_hack;
-+
- /* STP */
- bridge_id designated_root;
- bridge_id bridge_id;
---- a/net/bridge/br_sysfs_br.c
-+++ b/net/bridge/br_sysfs_br.c
-@@ -170,6 +170,30 @@ static ssize_t group_fwd_mask_store(stru
- }
- static DEVICE_ATTR_RW(group_fwd_mask);
-
-+static ssize_t disable_eap_hack_show(struct device *d,
-+ struct device_attribute *attr,
-+ char *buf)
-+{
-+ struct net_bridge *br = to_bridge(d);
-+ return sprintf(buf, "%u\n", br->disable_eap_hack);
-+}
-+
-+static int set_disable_eap_hack(struct net_bridge *br, unsigned long val)
-+{
-+ br->disable_eap_hack = !!val;
-+
-+ return 0;
-+}
-+
-+static ssize_t disable_eap_hack_store(struct device *d,
-+ struct device_attribute *attr,
-+ const char *buf,
-+ size_t len)
-+{
-+ return store_bridge_parm(d, buf, len, set_disable_eap_hack);
-+}
-+static DEVICE_ATTR_RW(disable_eap_hack);
-+
- static ssize_t priority_show(struct device *d, struct device_attribute *attr,
- char *buf)
- {
-@@ -810,6 +834,7 @@ static struct attribute *bridge_attrs[]
- &dev_attr_ageing_time.attr,
- &dev_attr_stp_state.attr,
- &dev_attr_group_fwd_mask.attr,
-+ &dev_attr_disable_eap_hack.attr,
- &dev_attr_priority.attr,
- &dev_attr_bridge_id.attr,
- &dev_attr_root_id.attr,