600-netfilter_conntrack_flush.patch 2.3 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586
  1. --- a/net/netfilter/nf_conntrack_standalone.c
  2. +++ b/net/netfilter/nf_conntrack_standalone.c
  3. @@ -17,6 +17,7 @@
  4. #include <linux/percpu.h>
  5. #include <linux/netdevice.h>
  6. #include <linux/security.h>
  7. +#include <linux/inet.h>
  8. #include <net/net_namespace.h>
  9. #ifdef CONFIG_SYSCTL
  10. #include <linux/sysctl.h>
  11. @@ -288,10 +289,66 @@ static int ct_open(struct inode *inode,
  12. sizeof(struct ct_iter_state));
  13. }
  14. +struct kill_request {
  15. + u16 family;
  16. + union nf_inet_addr addr;
  17. +};
  18. +
  19. +static int kill_matching(struct nf_conn *i, void *data)
  20. +{
  21. + struct kill_request *kr = data;
  22. + struct nf_conntrack_tuple *t1 = &i->tuplehash[IP_CT_DIR_ORIGINAL].tuple;
  23. + struct nf_conntrack_tuple *t2 = &i->tuplehash[IP_CT_DIR_REPLY].tuple;
  24. +
  25. + if (!kr->family)
  26. + return 1;
  27. +
  28. + if (t1->src.l3num != kr->family)
  29. + return 0;
  30. +
  31. + return (nf_inet_addr_cmp(&kr->addr, &t1->src.u3) ||
  32. + nf_inet_addr_cmp(&kr->addr, &t1->dst.u3) ||
  33. + nf_inet_addr_cmp(&kr->addr, &t2->src.u3) ||
  34. + nf_inet_addr_cmp(&kr->addr, &t2->dst.u3));
  35. +}
  36. +
  37. +static ssize_t ct_file_write(struct file *file, const char __user *buf,
  38. + size_t count, loff_t *ppos)
  39. +{
  40. + struct seq_file *seq = file->private_data;
  41. + struct net *net = seq_file_net(seq);
  42. + struct kill_request kr = { };
  43. + char req[INET6_ADDRSTRLEN] = { };
  44. +
  45. + if (count == 0)
  46. + return 0;
  47. +
  48. + if (count >= INET6_ADDRSTRLEN)
  49. + count = INET6_ADDRSTRLEN - 1;
  50. +
  51. + if (copy_from_user(req, buf, count))
  52. + return -EFAULT;
  53. +
  54. + if (strnchr(req, count, ':')) {
  55. + kr.family = AF_INET6;
  56. + if (!in6_pton(req, count, (void *)&kr.addr, '\n', NULL))
  57. + return -EINVAL;
  58. + } else if (strnchr(req, count, '.')) {
  59. + kr.family = AF_INET;
  60. + if (!in4_pton(req, count, (void *)&kr.addr, '\n', NULL))
  61. + return -EINVAL;
  62. + }
  63. +
  64. + nf_ct_iterate_cleanup(net, kill_matching, &kr, 0, 0);
  65. +
  66. + return count;
  67. +}
  68. +
  69. static const struct file_operations ct_file_ops = {
  70. .owner = THIS_MODULE,
  71. .open = ct_open,
  72. .read = seq_read,
  73. + .write = ct_file_write,
  74. .llseek = seq_lseek,
  75. .release = seq_release_net,
  76. };
  77. @@ -393,7 +450,7 @@ static int nf_conntrack_standalone_init_
  78. {
  79. struct proc_dir_entry *pde;
  80. - pde = proc_create("nf_conntrack", 0440, net->proc_net, &ct_file_ops);
  81. + pde = proc_create("nf_conntrack", 0660, net->proc_net, &ct_file_ops);
  82. if (!pde)
  83. goto out_nf_conntrack;