600-netfilter_conntrack_flush.patch 2.6 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495
  1. From: Felix Fietkau <nbd@nbd.name>
  2. Subject: netfilter: add support for flushing conntrack via /proc
  3. lede-commit 8193bbe59a74d34d6a26d4a8cb857b1952905314
  4. Signed-off-by: Felix Fietkau <nbd@nbd.name>
  5. ---
  6. net/netfilter/nf_conntrack_standalone.c | 59 ++++++++++++++++++++++++++++++++-
  7. 1 file changed, 58 insertions(+), 1 deletion(-)
  8. --- a/net/netfilter/nf_conntrack_standalone.c
  9. +++ b/net/netfilter/nf_conntrack_standalone.c
  10. @@ -17,6 +17,7 @@
  11. #include <linux/percpu.h>
  12. #include <linux/netdevice.h>
  13. #include <linux/security.h>
  14. +#include <linux/inet.h>
  15. #include <net/net_namespace.h>
  16. #ifdef CONFIG_SYSCTL
  17. #include <linux/sysctl.h>
  18. @@ -382,10 +383,66 @@ static int ct_open(struct inode *inode,
  19. sizeof(struct ct_iter_state));
  20. }
  21. +struct kill_request {
  22. + u16 family;
  23. + union nf_inet_addr addr;
  24. +};
  25. +
  26. +static int kill_matching(struct nf_conn *i, void *data)
  27. +{
  28. + struct kill_request *kr = data;
  29. + struct nf_conntrack_tuple *t1 = &i->tuplehash[IP_CT_DIR_ORIGINAL].tuple;
  30. + struct nf_conntrack_tuple *t2 = &i->tuplehash[IP_CT_DIR_REPLY].tuple;
  31. +
  32. + if (!kr->family)
  33. + return 1;
  34. +
  35. + if (t1->src.l3num != kr->family)
  36. + return 0;
  37. +
  38. + return (nf_inet_addr_cmp(&kr->addr, &t1->src.u3) ||
  39. + nf_inet_addr_cmp(&kr->addr, &t1->dst.u3) ||
  40. + nf_inet_addr_cmp(&kr->addr, &t2->src.u3) ||
  41. + nf_inet_addr_cmp(&kr->addr, &t2->dst.u3));
  42. +}
  43. +
  44. +static ssize_t ct_file_write(struct file *file, const char __user *buf,
  45. + size_t count, loff_t *ppos)
  46. +{
  47. + struct seq_file *seq = file->private_data;
  48. + struct net *net = seq_file_net(seq);
  49. + struct kill_request kr = { };
  50. + char req[INET6_ADDRSTRLEN] = { };
  51. +
  52. + if (count == 0)
  53. + return 0;
  54. +
  55. + if (count >= INET6_ADDRSTRLEN)
  56. + count = INET6_ADDRSTRLEN - 1;
  57. +
  58. + if (copy_from_user(req, buf, count))
  59. + return -EFAULT;
  60. +
  61. + if (strnchr(req, count, ':')) {
  62. + kr.family = AF_INET6;
  63. + if (!in6_pton(req, count, (void *)&kr.addr, '\n', NULL))
  64. + return -EINVAL;
  65. + } else if (strnchr(req, count, '.')) {
  66. + kr.family = AF_INET;
  67. + if (!in4_pton(req, count, (void *)&kr.addr, '\n', NULL))
  68. + return -EINVAL;
  69. + }
  70. +
  71. + nf_ct_iterate_cleanup_net(net, kill_matching, &kr, 0, 0);
  72. +
  73. + return count;
  74. +}
  75. +
  76. static const struct file_operations ct_file_ops = {
  77. .owner = THIS_MODULE,
  78. .open = ct_open,
  79. .read = seq_read,
  80. + .write = ct_file_write,
  81. .llseek = seq_lseek,
  82. .release = seq_release_net,
  83. };
  84. @@ -489,7 +546,7 @@ static int nf_conntrack_standalone_init_
  85. kuid_t root_uid;
  86. kgid_t root_gid;
  87. - pde = proc_create("nf_conntrack", 0440, net->proc_net, &ct_file_ops);
  88. + pde = proc_create("nf_conntrack", 0660, net->proc_net, &ct_file_ops);
  89. if (!pde)
  90. goto out_nf_conntrack;