diff options
author | Jo-Philipp Wich <jo@mein.io> | 2020-03-31 09:54:58 +0200 |
---|---|---|
committer | Jo-Philipp Wich <jo@mein.io> | 2020-04-12 00:08:05 +0200 |
commit | 93294b516e5437980a3562496a5bedec1b3a424f (patch) | |
tree | 9afa5efab04d41af62ea806e7d4714d4ab4f4150 /target/linux/generic/pending-4.19 | |
parent | 8d9e26457c06d34a1d5d627d9d09bed6554b4b27 (diff) | |
download | upstream-93294b516e5437980a3562496a5bedec1b3a424f.tar.gz upstream-93294b516e5437980a3562496a5bedec1b3a424f.tar.bz2 upstream-93294b516e5437980a3562496a5bedec1b3a424f.zip |
generic: drop 616-net_optimize_xfrm_calls.patch
The conditional check introduced by this patch may trigger a NULL pointer
dereference in case the result of dev_net() is NULL.
Since the purpose of this patch is neither sufficiently explained and since
this patch apparently has never been submitted upstream despite it being in
the pending-* patch directory, I propose to drop it without replacement.
If the performance implications of dropping this patch are found to be
significiant, it should be reintroduced with proper description and
benchmark results.
Ref: https://bugs.openwrt.org/index.php?do=details&task_id=2943
Signed-off-by: Jo-Philipp Wich <jo@mein.io>
Diffstat (limited to 'target/linux/generic/pending-4.19')
-rw-r--r-- | target/linux/generic/pending-4.19/616-net_optimize_xfrm_calls.patch | 20 |
1 files changed, 0 insertions, 20 deletions
diff --git a/target/linux/generic/pending-4.19/616-net_optimize_xfrm_calls.patch b/target/linux/generic/pending-4.19/616-net_optimize_xfrm_calls.patch deleted file mode 100644 index 6a5801027c..0000000000 --- a/target/linux/generic/pending-4.19/616-net_optimize_xfrm_calls.patch +++ /dev/null @@ -1,20 +0,0 @@ -From: Felix Fietkau <nbd@nbd.name> -Subject: kernel: add a small xfrm related performance optimization - -Signed-off-by: Felix Fietkau <nbd@nbd.name> ---- - net/netfilter/nf_nat_core.c | 3 +++ - 1 file changed, 3 insertions(+) - ---- a/net/netfilter/nf_nat_core.c -+++ b/net/netfilter/nf_nat_core.c -@@ -110,6 +110,9 @@ int nf_xfrm_me_harder(struct net *net, s - struct sock *sk = skb->sk; - int err; - -+ if (skb->dev && !dev_net(skb->dev)->xfrm.policy_count[XFRM_POLICY_OUT]) -+ return 0; -+ - err = xfrm_decode_session(skb, &fl, family); - if (err < 0) - return err; |