summaryrefslogtreecommitdiff
path: root/target/linux/config/Config.in.netfilter
diff options
context:
space:
mode:
authorWaldemar Brodkorb <wbx@openadk.org>2009-06-11 12:34:46 +0200
committerWaldemar Brodkorb <wbx@openadk.org>2009-06-11 12:34:46 +0200
commitbf5a88ed54be4372dca6c26e0eee2cf7ac372483 (patch)
treef1258f5d38751e815853ed1f14f34ee981c70c09 /target/linux/config/Config.in.netfilter
parent394842d31c51cb642d7ed7a65948d15fd65985ce (diff)
update alix1c to 2.6.30
- regenerate patches - fix exmap compile
Diffstat (limited to 'target/linux/config/Config.in.netfilter')
-rw-r--r--target/linux/config/Config.in.netfilter12
1 files changed, 0 insertions, 12 deletions
diff --git a/target/linux/config/Config.in.netfilter b/target/linux/config/Config.in.netfilter
index 6553471a0..48db426ef 100644
--- a/target/linux/config/Config.in.netfilter
+++ b/target/linux/config/Config.in.netfilter
@@ -440,17 +440,5 @@ config ADK_KPACKAGE_KMOD_IP_NF_TARGET_ECN
existing ECN blackholes on the internet, but don't want to disable
ECN support in general.
-config ADK_KPACKAGE_KMOD_IP_NF_TARGET_TTL
- tristate 'TTL target support'
- depends ADK_KPACKAGE_KMOD_IP_NF_MANGLE
- help
- This option adds a `TTL' target, which enables the user to modify
- the TTL value of the IP header.
-
- While it is safe to decrement/lower the TTL, this target also enables
- functionality to increment and set the TTL value of the IP header to
- arbitrary values. This is EXTREMELY DANGEROUS since you can easily
- create immortal packets that loop forever on the network.
-
endmenu
endmenu