summary |
shortlog |
log |
commit | commitdiff |
tree
raw |
patch |
inline | side by side (from parent 1:
afb5ee2)
Later kernels don't actually populate `/proc/net/ip{,6}_tables_names'
with anything.
for ip in ip ip6; do
if [ "$FW_NOACT" ]; then break; fi
for ip in ip ip6; do
if [ "$FW_NOACT" ]; then break; fi
- for table in $(cat /proc/net/${ip}_tables_names); do
+ for table in filter mangle nat raw; do
## Step 1: clear out the builtin chains.
${ip}tables -nL -t $table |
## Step 1: clear out the builtin chains.
${ip}tables -nL -t $table |
## Allow stuff through unknown tables.
for ip in ip ip6; do
## Allow stuff through unknown tables.
for ip in ip ip6; do
- for table in $(cat /proc/net/${ip}_tables_names); do
- case $table in mangle | filter) continue ;; esac
+ for table in nat raw security; do
${ip}tables -nL -t $table |
sed -n '/^Chain \([^ ]\+\) (policy .*$/ s//\1/p ' |
while read chain; do
${ip}tables -nL -t $table |
sed -n '/^Chain \([^ ]\+\) (policy .*$/ s//\1/p ' |
while read chain; do