aboutsummaryrefslogtreecommitdiffstats
path: root/target/linux/generic/pending-5.10/613-netfilter_optional_tcp_window_check.patch
diff options
context:
space:
mode:
authorHauke Mehrtens <hauke@hauke-m.de>2022-03-05 19:08:27 +0100
committerHauke Mehrtens <hauke@hauke-m.de>2022-08-14 00:29:20 +0200
commit6c901ec97d73a7835c2bb7525e51cc3d3614f344 (patch)
treef6c40f3a1f677c49855e17a4b28a53690fb48672 /target/linux/generic/pending-5.10/613-netfilter_optional_tcp_window_check.patch
parent6a638c134d790413ea2c6976caaa89f73375310c (diff)
downloadupstream-6c901ec97d73a7835c2bb7525e51cc3d3614f344.tar.gz
upstream-6c901ec97d73a7835c2bb7525e51cc3d3614f344.tar.bz2
upstream-6c901ec97d73a7835c2bb7525e51cc3d3614f344.zip
kernel: Backport upstream flowtable patches from 5.15
This backports some patches from kernel 5.15 to fix issues with flowtable offloading in kernel 5.10. OpenWrt backports most of the patches related to flowtable offloading from kernel 5.15 already, but we are missing some of the extra fixes. This fixes some connection tracking problems when a flow gets removed from the offload and added to the normal SW path again. The patch 614-v5.18-netfilter-flowtable-fix-TCP-flow-teardown.patch was extended manually with the nf_conntrack_tcp_established() function. All changes are already included in kernel 5.15. Fixes: #8776 Signed-off-by: Hauke Mehrtens <hauke@hauke-m.de> (cherry picked from commit 96ef2dabce1a5f102d53a15f33383193b47fd297)
Diffstat (limited to 'target/linux/generic/pending-5.10/613-netfilter_optional_tcp_window_check.patch')
-rw-r--r--target/linux/generic/pending-5.10/613-netfilter_optional_tcp_window_check.patch4
1 files changed, 2 insertions, 2 deletions
diff --git a/target/linux/generic/pending-5.10/613-netfilter_optional_tcp_window_check.patch b/target/linux/generic/pending-5.10/613-netfilter_optional_tcp_window_check.patch
index 4cf07a3e2c..458b6761bc 100644
--- a/target/linux/generic/pending-5.10/613-netfilter_optional_tcp_window_check.patch
+++ b/target/linux/generic/pending-5.10/613-netfilter_optional_tcp_window_check.patch
@@ -49,7 +49,7 @@ Signed-off-by: Felix Fietkau <nbd@nbd.name>
static bool enable_hooks __read_mostly;
MODULE_PARM_DESC(enable_hooks, "Always enable conntrack hooks");
module_param(enable_hooks, bool, 0000);
-@@ -660,6 +663,7 @@ enum nf_ct_sysctl_index {
+@@ -658,6 +661,7 @@ enum nf_ct_sysctl_index {
NF_SYSCTL_CT_PROTO_TIMEOUT_GRE_STREAM,
#endif
@@ -57,7 +57,7 @@ Signed-off-by: Felix Fietkau <nbd@nbd.name>
__NF_SYSCTL_CT_LAST_SYSCTL,
};
-@@ -1014,6 +1018,13 @@ static struct ctl_table nf_ct_sysctl_tab
+@@ -1000,6 +1004,13 @@ static struct ctl_table nf_ct_sysctl_tab
.proc_handler = proc_dointvec_jiffies,
},
#endif