From: Zbigniew Jędrzejewski-Szmek Date: Tue, 30 Jun 2015 00:34:45 +0000 (-0400) Subject: man: update sysctl example about netfilter X-Git-Tag: v222~40^2 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=9407bc2d03b6405754807b6f38c8ca95b4fc1f40;p=platform%2Fupstream%2Fsystemd.git man: update sysctl example about netfilter It turns out that since kernel 3.18 netfilter on bridged packets is off anyway, so the example should be reworded (and the module name updated). --- diff --git a/man/sysctl.d.xml b/man/sysctl.d.xml index 8a13179..e5b2bc0 100644 --- a/man/sysctl.d.xml +++ b/man/sysctl.d.xml @@ -123,11 +123,12 @@ - Disable packet filter on bridged packets (method one) + Apply settings available only when a certain module is loaded (method one) /etc/udev/rules.d/99-bridge.rules: - ACTION=="add", SUBSYSTEM=="module", KERNEL=="bridge", RUN+="/usr/lib/systemd/systemd-sysctl --prefix=/net/bridge" + ACTION=="add", SUBSYSTEM=="module", KERNEL=="br_netfilter", \ + RUN+="/usr/lib/systemd/systemd-sysctl --prefix=/net/bridge" /etc/sysctl.d/bridge.conf: @@ -137,14 +138,20 @@ net.bridge.bridge-nf-call-iptables = 0 net.bridge.bridge-nf-call-arptables = 0 + + This method applies settings when the module is + loaded. Please note that unless the br_netfilter + module is loaded, bridged packets will not be filtered by + netfilter (starting with kernel 3.18), so simply not loading the + module is suffient to avoid filtering. - Disable packet filter on bridged packets (method two) + Apply settings available only when a certain module is loaded (method two) /etc/modules-load.d/bridge.conf: - bridge + br_netfilter /etc/sysctl.d/bridge.conf: @@ -153,6 +160,12 @@ net.bridge.bridge-nf-call-arptables = 0 net.bridge.bridge-nf-call-iptables = 0 net.bridge.bridge-nf-call-arptables = 0 + + This method forces the module to be always loaded. Please + note that unless the br_netfilter module is + loaded, bridged packets will not be filtered with netfilter + (starting with kernel 3.18), so simply not loading the module is + suffient to avoid filtering.