@@ -58,9 +58,9 @@ static int brnf_filter_vlan_tagged __read_mostly = 0;
static int brnf_filter_pppoe_tagged __read_mostly = 0;
static int brnf_pass_vlan_indev __read_mostly = 0;
-int brnf_call_iptables __read_mostly = 1;
-int brnf_call_ip6tables __read_mostly = 1;
-int brnf_call_arptables __read_mostly = 1;
+int brnf_call_iptables __read_mostly = 2;
+int brnf_call_ip6tables __read_mostly = 2;
+int brnf_call_arptables __read_mostly = 2;
#else
#define brnf_filter_vlan_tagged 0
#define brnf_filter_pppoe_tagged 0
@@ -1065,9 +1065,16 @@ static struct ctl_table brnf_table[] = {
static void __br_register_hooks_init(struct work_struct *w)
{
int ret = nf_register_hooks(br_nf_ops, ARRAY_SIZE(br_nf_ops));
- if (ret == 0)
+ if (ret == 0) {
static_key_slow_inc(&brnf_hooks_active);
+ if ((brnf_call_iptables|brnf_call_ip6tables|brnf_call_arptables) == 2)
+ pr_info("bridge: automatic filtering via arp/ip/ip6tables "
+ "is deprecated and it will "
+ "be disabled soon. "
+ "Set bridge-nf-call-{ip,ip6,arp}tables sysctls to 1 or 0 "
+ "before adding bridge ports instead.\n");
+ }
mutex_unlock(&brnf_hook_mutex);
kfree(w);
add a warning and tell users to set call_iptables to 0 or 1 depending on desired behaviour before adding ports to the bridge. Might allow changing default to 0 in the future. Signed-off-by: Florian Westphal <fw@strlen.de> --- net/bridge/br_netfilter.c | 15 +++++++++++---- 1 file changed, 11 insertions(+), 4 deletions(-)