Linux TCP/IP Netfilter Devel
[Prev Page][Next Page]
- [GIT PULL net-next v2] IPVS
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [GIT PULL next-net] IPVS
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [GIT PULL next-net] IPVS
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v3 2/2] netfilter: ipvs: use GFP_KERNEL allocation where possible
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 05/17] ipvs: LBLCR scheduler does not need GFP_ATOMIC allocation on init
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 08/17] ipvs: ignore IP_VS_CONN_F_NOOUTPUT in backup server
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 01/17] ipvs: timeout tables do not need GFP_ATOMIC allocation
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 07/17] netfilter: ipvs: use GFP_KERNEL allocation where possible
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 06/17] ipvs: SH scheduler does not need GFP_ATOMIC allocation
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 10/17] ipvs: fix ip_vs_try_bind_dest to rebind app and transmitter
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 13/17] ipvs: reduce sync rate with time thresholds
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 12/17] ipvs: wakeup master thread
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 11/17] ipvs: always update some of the flags bits in backup
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 09/17] ipvs: remove check for IP_VS_CONN_F_SYNC from ip_vs_bind_dest
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 02/17] ipvs: LBLC scheduler does not need GFP_ATOMIC allocation on init
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 16/17] IPVS: ip_vs_ftp.c: local functions should not be exposed globally
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 15/17] ipvs: optimize the use of flags in ip_vs_bind_dest
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 14/17] ipvs: add support for sync threads
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 17/17] IPVS: ip_vs_proto.c: local functions should not be exposed globally
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 03/17] ipvs: DH scheduler does not need GFP_ATOMIC allocation
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT PULL next-net] IPVS
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 04/17] ipvs: WRR scheduler does not need GFP_ATOMIC allocation
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH 1/1] netfilter: xt_recent: Add optional mask option for xt_recent
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] netfilter: xt_recent: Add optional mask option for xt_recent
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 2/2] netfilter: conntrack: replace mutex with cmpxchg
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/17] netfilter: add namespace support for netfilter protos
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [v12 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 00/17] netfilter: add namespace support for netfilter protos
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: [PATCH 0/8] netfilter updates for 3.4-rc5
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 6/8] ipvs: take care of return value from protocol init_netns
- From: pablo@xxxxxxxxxxxxx
- [PATCH 7/8] ipvs: kernel oops - do_ip_vs_get_ctl
- From: pablo@xxxxxxxxxxxxx
- [PATCH 8/8] netfilter: xt_CT: fix wrong checking in the timeout assignment path
- From: pablo@xxxxxxxxxxxxx
- [PATCH 5/8] ipvs: null check of net->ipvs in lblc(r) shedulers
- From: pablo@xxxxxxxxxxxxx
- [PATCH 4/8] ipvs: reset ipvs pointer in netns
- From: pablo@xxxxxxxxxxxxx
- [PATCH 1/8] ipvs: Verify that IP_VS protocol has been registered
- From: pablo@xxxxxxxxxxxxx
- [PATCH 3/8] ipvs: add check in ftp for initialized core
- From: pablo@xxxxxxxxxxxxx
- [PATCH 2/8] ipvs: fix crash in ip_vs_control_net_cleanup on unload
- From: pablo@xxxxxxxxxxxxx
- [PATCH 0/8] netfilter updates for 3.4-rc5
- From: pablo@xxxxxxxxxxxxx
- Re: [GIT PULL net] IPVS
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] export sysctl symbols needed by ip_vs_sync
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH 3/5] ipvs: null check of net->ipvs in lblc(r) shedulers
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 1/1] export sysctl symbols needed by ip_vs_sync
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH 3/5] ipvs: null check of net->ipvs in lblc(r) shedulers
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 1/2] netfilter: conntrack: remove RCU usage in conntrack notifier
- From: Benjamin Poirier <bpoirier@xxxxxxx>
- Re: [PATCH RFC 1/2] netfilter: conntrack: remove RCU usage in conntrack notifier
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH RFC 2/2] netfilter: conntrack: replace mutex with cmpxchg
- From: Benjamin Poirier <bpoirier@xxxxxxx>
- [PATCH RFC 1/2] netfilter: conntrack: remove RCU usage in conntrack notifier
- From: Benjamin Poirier <bpoirier@xxxxxxx>
- [PATCH 03/17] netfilter: add namespace support for l3proto
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 05/17] netfilter: add namespace support for l4proto_tcp
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH v2 00/17] netfilter: add namespace support for netfilter protos
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 04/17] netfilter: add namespace support for l4proto_generic
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 02/17] netfilter: add namespace support for l4proto
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 07/17] netfilter: add namespace support for l4proto_icmp
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 10/17] netfilter: add namespace support for l3proto_ipv6
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 11/17] netfilter: add namespace support for l4proto_sctp
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 09/17] netfilter: add namespace support for l3proto_ipv4
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 08/17] netfilter: add namespace support for l4proto_icmpv6
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 17/17] netfilter: cttimeout use pernet data of l4proto
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 15/17] netfilter: cleanup sysctl for l4proto and l3proto
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 16/17] netfilter: add namespace support for cttimeout
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 13/17] netfilter: adjust l4proto_dccp to the nf_conntrack_l4proto_register
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 12/17] netfilter: add namespace support for l4proto_udplite
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 14/17] netfilter: adjust l4proto_gre4 to the nf_conntrack_l4proto_register
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 06/17] netfilter: add namespace support for l4proto_udp
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 01/17] netfilter: add struct nf_proto_net for register l4proto sysctl
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 4/5] ipvs: take care of return value from protocol init_netns
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 1/5] ipvs: add check in ftp for initialized core
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 5/5] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 2/5] ipvs: reset ipvs pointer in netns
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT PULL net] IPVS
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 3/5] ipvs: null check of net->ipvs in lblc(r) shedulers
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [v2 PATCH 1/1] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [v2 PATCH 1/1] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [v2 PATCH 0/2] ipvs: netns avoid crash at netns init
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [v2 PATCH 0/2] ipvs: netns avoid crash at netns init
- From: Julian Anastasov <ja@xxxxxx>
- Re: [v2 PATCH 1/1] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Jesper Dangaard Brouer <brouer@xxxxxxxxxx>
- Re: [v2 PATCH 1/1] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Julian Anastasov <ja@xxxxxx>
- [v2 PATCH 2/2] ipvs: take care of return value from protocol init_netns
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v2 PATCH 0/2] ipvs: netns avoid crash at netns init
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v2 PATCH 1/2] ipvs: null check of net->ipvs in lblc(r) shedulers
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [v2 PATCH 1/1] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH 1/1] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH 2/2] ipvs: fix crash in ip_vs_control_net_cleanup on unload
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Jesper Dangaard Brouer <brouer@xxxxxxxxxx>
- Re: [PATCH 1/1] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH 2/4] ipvs: take care of return value from protocol init_netns
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH 1/1] ipvs: kernel oops - do_ip_vs_get_ctl
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [PATCH 1/2] ipvs: null check of net->ipvs in lblc(r) shedulers
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [PATCH 2/4] ipvs: take care of return value from protocol init_netns
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [PATCH 0/2] ipvs: netns avoid crash at netns init
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH v2 next] netfilter: bridge: optionally set indev to vlan
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- RE: concatenate udp payloads of multiple packet
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: [PATCH 2/2] netfilter: ipvs: use GFP_KERNEL allocation where possible
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH 2/2] netfilter: ipvs: use GFP_KERNEL allocation where possible
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [v12 PATCH 3/3] NETFILTER userspace part for target HMARK
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v12 PATCH 1/3] NETFILTER added flags to ipv6_find_hdr()
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v12 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v12 PATCH 0/3] NETFILTER new target module, HMARK
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 2/2] ipvs: fix crash in ip_vs_control_net_cleanup on unload
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT PULL net] IPVS (v2)
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [GIT PULL net] IPVS
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [v11 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH v3 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 2/2] netfilter: ipvs: use GFP_KERNEL allocation where possible
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT PULL net] IPVS
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: wrong order of received packets/bytes and sent packets/bytes with local incoming connections
- From: "alois.klingler@xxxxxxxxx" <alois.klingler@xxxxxxxxx>
- Re: wrong order of received packets/bytes and sent packets/bytes with local incoming connections
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- wrong order of received packets/bytes and sent packets/bytes with local incoming connections
- From: "alois.klingler@xxxxxxxxx" <alois.klingler@xxxxxxxxx>
- Re: concatenate udp payloads of multiple packet
- From: Arif Hossain <aftnix@xxxxxxxxx>
- Re: concatenate udp payloads of multiple packet
- From: Arif Hossain <aftnix@xxxxxxxxx>
- Re: [PATCH 5/9] ipvs: use adaptive pause in master thread
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH net-next] netfilter: nf_conntrack.h: use this_cpu_inc()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: concatenate udp payloads of multiple packet
- From: Rick Jones <rick.jones2@xxxxxx>
- Re: [PATCH v2.1] conntrack: add /proc entry to disable helper by default
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2] net/netfilter: refactor notifier registration
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- RE: concatenate udp payloads of multiple packet
- From: Jeff Haran <jharan@xxxxxxxxxxxxxx>
- Re: libiptc: fix retry path in TC_INIT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- concatenate udp payloads of multiple packet
- From: Arif Hossain <aftnix@xxxxxxxxx>
- Re: libiptc: fix retry path in TC_INIT
- From: Miguel GAIO <miguel.gaio@xxxxxxxxx>
- Re: libiptc: fix retry path in TC_INIT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: libmnl: fix valgrind warnings about padding
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re[3]: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: "Hans Schillstrom" <hans@xxxxxxxxxxxxxxx>
- Re[2]: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: Julian Anastasov <ja@xxxxxx>
- libmnl: fix valgrind warnings about padding
- From: Stephen Hemminger <shemminger@xxxxxxxxxx>
- Re[2]: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: "Hans Schillstrom" <hans@xxxxxxxxxxxxxxx>
- Re: [PATCH xt-addons] xt_psd: avoid crash due to curr->next corruption
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- [PATCH xt-addons] xt_psd: avoid crash due to curr->next corruption
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 03/12] netfilter: generic proto sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: a possible bug in netfilter
- From: Serge Leschinsky <serge.leschinsky@xxxxxxxxx>
- Re: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH 00/12] add namespace support for netfilter protos
- From: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] netfilter: generic proto sysctl support for net namespace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 10/12] netfilter: sctp proto sysctl support for net namespace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 02/12] netfilter: don't register sysctl when register proto
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH 00/12] add namespace support for netfilter protos
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] add namespace support for netfilter protos
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: [PATCH 10/12] netfilter: sctp proto sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: [PATCH 02/12] netfilter: don't register sysctl when register proto
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: [PATCH 03/12] netfilter: generic proto sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: [PATCH 00/12] add namespace support for netfilter protos
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: [PATCH 12/12] netfilter: export necessary function for generic proto
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 03/12] netfilter: generic proto sysctl support for net namespace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 02/12] netfilter: don't register sysctl when register proto
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 01/12] netfilter: add struct netns_ct_proto to support netfilter namespace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 00/12] add namespace support for netfilter protos
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- libiptc: fix retry path in TC_INIT
- From: Miguel GAIO <miguel.gaio@xxxxxxxxx>
- [PATCH 11/12] netfilter: udplite proto sysctl support for net
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 00/12] add namespace support for netfilter protos
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 09/12] netfilter: ipv6 sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 05/12] netfilter: udp proto sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 02/12] netfilter: don't register sysctl when register proto
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 06/12] netfilter: icmp proto sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 08/12] netfilter: ipv4 sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 07/12] netfilter: icmpv6 proto sysctl support for net
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 10/12] netfilter: sctp proto sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 03/12] netfilter: generic proto sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 04/12] netfilter: tcp proto sysctl support for net namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 01/12] netfilter: add struct netns_ct_proto to support netfilter namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- [PATCH 12/12] netfilter: export necessary function for generic proto
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH 2/2] IPVS: make failure of netns init more stable
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH 1/2] IPVS: take care of return value from protocol init_netns
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [PATCH 2/2] IPVS: make failure of netns init more stable
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: xtables-addons link error
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: xtables-addons link error
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH v3 2/2] netfilter: ipvs: use GFP_KERNEL allocation where possible
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- [PATCH v3 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH v2 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH v2 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH v2 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH v2 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH v2 1/2] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- [PATCH v2 2/2] netfilter: ipvs: use GFP_KERNEL allocation where possible
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: xtables-addons link error
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: xtables-addons link error
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- some questiones about netfilter namespace
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH v2 next] netfilter: bridge: optionally set indev to vlan
- From: Bart De Schuymer <bdschuym@xxxxxxxxxx>
- Re: [PATCH v2.1] conntrack: add /proc entry to disable helper by default
- From: Eric Leblond <eric@xxxxxxxxx>
- Re: [v11 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2.1] conntrack: add /proc entry to disable helper by default
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [ANN] Linux Security Summit 2012 - Announcement and CFP
- From: James Morris <jmorris@xxxxxxxxx>
- Re: [PATCH 1/1] netfilter: xt_recent: Add optional mask option for xt_recent
- From: Denys Fedoryshchenko <denys@xxxxxxxxxxx>
- Re: [PATCH 5/9] ipvs: use adaptive pause in master thread
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Proposed new target SESSION allow for session/accounting management [RADIUS/802.1x]
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] netfilter: xt_recent: Add optional mask option for xt_recent
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 5/9] ipvs: use adaptive pause in master thread
- From: Julian Anastasov <ja@xxxxxx>
- Re: nomatch in bitmap:* sets
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: [PATCH 0/5] netfilter fixes for 3.4-rc2
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 2/5] netfilter: ip6_tables: ip6t_ext_hdr is now static inline
- From: pablo@xxxxxxxxxxxxx
- [PATCH 4/5] netfilter: nf_ct_ipv4: packets with wrong ihl are invalid
- From: pablo@xxxxxxxxxxxxx
- [PATCH 5/5] netfilter: nf_conntrack: fix incorrect logic in nf_conntrack_init_net
- From: pablo@xxxxxxxxxxxxx
- [PATCH 1/5] netfilter: nf_ct_tcp: don't scale the size of the window up twice
- From: pablo@xxxxxxxxxxxxx
- [PATCH 3/5] netfilter: nf_ct_ipv4: handle invalid IPv4 and IPv6 packets consistently
- From: pablo@xxxxxxxxxxxxx
- [PATCH 0/5] netfilter fixes for 3.4-rc2
- From: pablo@xxxxxxxxxxxxx
- Re: [PATCH] netfilter: fix incorrect logic in nf_conntrack_init_net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nomatch in bitmap:* sets
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: don't scale the size of the window up twice
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH v2 next] netfilter: bridge: optionally set indev to vlan
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 5/9] ipvs: use adaptive pause in master thread
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] Handle invalid packets in conntrack consistently
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nomatch in bitmap:* sets
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: ipsets and network namespaces
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: nomatch in bitmap:* sets
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Proposed new target SESSION allow for session/accounting management [RADIUS/802.1x]
- From: Gregory Nietsky <gregory@xxxxxxxxxxxxxxxx>
- I fail to correctly modify ICMP traffic in a kernel module
- From: Adel Kodmani <mpcadel@xxxxxxxxx>
- Re: ipsets and network namespaces
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: nomatch in bitmap:* sets
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: [PATCH 5/9] ipvs: use adaptive pause in master thread
- From: Julian Anastasov <ja@xxxxxx>
- Re: nomatch in bitmap:* sets
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: ipsets and network namespaces
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- nomatch in bitmap:* sets
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: ipsets and network namespaces
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: a possible bug in netfilter
- From: Serge Leschinsky <serge.leschinsky@xxxxxxxxx>
- [PATCH] netfilter: fix incorrect logic in nf_conntrack_init_net
- From: Gao feng <gaofeng@xxxxxxxxxxxxxx>
- Re: a possible bug in netfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: xt_LOG depends on ip6t_ext_hdr
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- IPv6 NAT - yes or no ?
- From: netfilter@xxxxxxxxxxxx
- About Netmap
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- [PATCH 1/2] net: netfilter: prepare conntrack for consistent invalid packet handling
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [PATCH 2/2] net: netfilter: handle invalid packets consistently in conntrack
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Handle invalid packets in conntrack consistently
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: a possible bug in netfilter
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re[2]: Re[2]: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: "Hans Schillstrom" <hans@xxxxxxxxxxxxxxx>
- Re: Re[2]: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re[2]: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: "Hans Schillstrom" <hans@xxxxxxxxxxxxxxx>
- a possible bug in netfilter
- From: Serge Leschinsky <serge.leschinsky@xxxxxxxxx>
- Re: [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH] netfilter: ipvs: Verify that IP_VS protocol has been registered
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH -next] netfilter: bridge: optionally set indev to vlan
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH -next] netfilter: bridge: optionally set indev to vlan
- From: Bart De Schuymer <bdschuym@xxxxxxxxxx>
- Re: [PATCH 5/9] ipvs: use adaptive pause in master thread
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: ipsets and network namespaces
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH -next] netfilter: bridge: optionally set indev to vlan
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- ipsets and network namespaces
- From: Gorik Van Steenberge <gorik.vansteenberge@xxxxxxxxx>
- Re: xtables-addons compile error
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: [PATCH -next] netfilter: bridge: optionally set indev to vlan
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: xtables-addons compile error
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: [PATCH -next] netfilter: bridge: optionally set indev to vlan
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- xt_LOG depends on ip6t_ext_hdr
- From: Simon Kirby <sim@xxxxxxxxxxxxx>
- [PATCH -next] netfilter: bridge: optionally set indev to vlan
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] netfilter: don't scale the size of the window up twice
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: drop malformed IPv4 packets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: don't scale the size of the window up twice
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: drop malformed IPv4 packets
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: drop malformed IPv4 packets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- xtables-addons compile error
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: [PATCH 0/3] netfilter fixes for 3.4-rc1
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 5/9] ipvs: use adaptive pause in master thread
- From: Julian Anastasov <ja@xxxxxx>
- Re: RFC: bridge netfilter vlan device name resolution
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH 0/1] Drop malformed IPv4 packets in conntrack, 2nd try
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [PATCH 1/1] netfilter: conntrack: drop malformed IPv4 packets
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: drop malformed IPv4 packets
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: drop malformed IPv4 packets
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] netfilter: conntrack: drop malformed IPv4 packets
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [PATCH 0/1] Drop malformed IPv4 packets in conntrack
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: NFQUEUE target with --treat-accept-as-continue?
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: RFC: bridge netfilter vlan device name resolution
- From: Bart De Schuymer <bdschuym@xxxxxxxxxx>
- [PATCH 2/3] netfilter: ipset: avoid use of kernel-only types
- From: pablo@xxxxxxxxxxxxx
- [PATCH 3/3] netfilter: xt_CT: remove a compile warning
- From: pablo@xxxxxxxxxxxxx
- [PATCH 1/3] netfilter: xt_LOG: don't use xchg() for simple assignment
- From: pablo@xxxxxxxxxxxxx
- [PATCH 0/3] netfilter fixes for 3.4-rc1
- From: pablo@xxxxxxxxxxxxx
- Re: [PATCH 5/9] ipvs: use adaptive pause in master thread
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: RFC: bridge netfilter vlan device name resolution
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: NFQUEUE target with --treat-accept-as-continue?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH] netfilter: don't scale the size of the window up twice
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] net: check the length of the data before dereferencing it
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: NFQUEUE target with --treat-accept-as-continue?
- From: Amm Snort <ammdispose-snort@xxxxxxxxx>
- [PATCH] net: check the length of the data before dereferencing it
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- Re: [PATCH] netfilter: check the length of the data before dereferencing it
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- Netfilter + TSO/GSO
- From: alan furlong <alan250985@xxxxxxxxx>
- Re: [patch 1/1] net/netfilter/nfnetlink_acct.c: use linux/atomic.h
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: `iptables -m tcp --syn` doesn't do what the man says
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: NFQUEUE target with --treat-accept-as-continue?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: `iptables -m tcp --syn` doesn't do what the man says
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: check the length of the data before dereferencing it
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: check the length of the data before dereferencing it
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] netfilter: check the length of the data before dereferencing it
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: don't do window scaling for a picked up connection
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- Re: [PATCH] netfilter: don't do window scaling for a picked up connection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH] netfilter: don't do window scaling for a picked up connection
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- [PATCH] netfilter: check the length of the data before dereferencing it
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- NFQUEUE target with --treat-accept-as-continue?
- From: Amm Snort <ammdispose-snort@xxxxxxxxx>
- Re: `iptables -m tcp --syn` doesn't do what the man says
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: `iptables -m tcp --syn` doesn't do what the man says
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: `iptables -m tcp --syn` doesn't do what the man says
- From: Artyom Gavrichenkov <ximaera@xxxxxxxxx>
- `iptables -m tcp --syn` doesn't do what the man says
- From: Artyom Gavrichenkov <ximaera@xxxxxxxxx>
- Re: ipset nomatch not showing
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- [patch 1/1] net/netfilter/nfnetlink_acct.c: use linux/atomic.h
- From: akpm@xxxxxxxxxxxxxxxxxxxx
- [PATCH v2.1] conntrack: add /proc entry to disable helper by default
- From: Eric Leblond <eric@xxxxxxxxx>
- rework of patch following git rebase
- From: Eric Leblond <eric@xxxxxxxxx>
- [PATCH v2] conntrack: add /proc entry to disable helper by default
- From: Eric Leblond <eric@xxxxxxxxx>
- Re: RFC: bridge netfilter vlan device name resolution
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: RFC: bridge netfilter vlan device name resolution
- From: Bart De Schuymer <bdschuym@xxxxxxxxxx>
- Re: [RFC PATCH] netfilter: bridge: change indev name to vlan if vlan tag present
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] conntrack: add /proc entry to disable helper by default
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [ANNOUNCE] Netfilter releases: iptables 1.4.13, nfacct 1.0.0 and libnetfilter_acct 1.0.0
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [RFC PATCH] Disabling helper assignement by default
- From: Eric Leblond <eric@xxxxxxxxx>
- [PATCH] conntrack: add /proc entry to disable helper by default
- From: Eric Leblond <eric@xxxxxxxxx>
- [RFC PATCH] netfilter: bridge: change indev name to vlan if vlan tag present
- From: Florian Westphal <fw@xxxxxxxxx>
- RFC: bridge netfilter vlan device name resolution
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] xt_log.h: don't use xchg() for simple assignment
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: ipset nomatch not showing
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Sending Data
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- Re: [PATCH] mark newly opened fds as FD_CLOEXEC (close on exec) [part 2]
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- RE: Netfilter Packet Reinjection
- From: Jeff Haran <jharan@xxxxxxxxxxxxxx>
- RE: Netfilter Packet Reinjection
- From: Jeff Haran <jharan@xxxxxxxxxxxxxx>
- Re: Netfilter Packet Reinjection
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- Netfilter Packet Reinjection
- From: Fr3DBr <fr3dbr@xxxxxxxxx>
- Re: ipset nomatch not showing
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: ipset nomatch not showing
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/5] netfilter updates for net (3.4) tree
- From: David Miller <davem@xxxxxxxxxxxxx>
- ipset nomatch not showing
- From: Mr Dash Four <mr.dash.four@xxxxxxxxxxxxxx>
- Re: [PATCH] xt_log.h: don't use xchg() for simple assignment
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] mark newly opened fds as FD_CLOEXEC (close on exec) [part 2]
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] xt_log.h: don't use xchg() for simple assignment
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] xt_log.h: don't use xchg() for simple assignment
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 5/5] netfilter: nf_conntrack: permanently attach timeout policy to conntrack
- From: pablo@xxxxxxxxxxxxx
- [PATCH 4/5] netfilter: xt_CT: fix assignation of the generic protocol tracker
- From: pablo@xxxxxxxxxxxxx
- [PATCH 3/5] netfilter: xt_CT: missing rcu_read_lock section in timeout assignment
- From: pablo@xxxxxxxxxxxxx
- [PATCH 2/5] netfilter: cttimeout: fix dependency with l4protocol conntrack module
- From: pablo@xxxxxxxxxxxxx
- [PATCH 1/5] netfilter: xt_LOG: use CONFIG_IP6_NF_IPTABLES instead of CONFIG_IPV6
- From: pablo@xxxxxxxxxxxxx
- [PATCH 0/5] netfilter updates for net (3.4) tree
- From: pablo@xxxxxxxxxxxxx
- Re: [PATCH] netfilter: remove forward module param confusion.
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: conntrack can't update mark on icmp connection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH] netfilter: remove forward module param confusion.
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- re: module_param: make bool parameters really bool (net & drivers/net)
- From: Rusty Russell <rusty@xxxxxxxxxxxxxxx>
- [v11 PATCH 1/3] NETFILTER added flags to ipv6_find_hdr()
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v11 PATCH 3/3] NETFILTER userspace part for target HMARK
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v11 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v11 PATCH 0/3] NETFILTER new target module, HMARK
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH] mark newly opened fds as FD_CLOEXEC (close on exec) [part 2]
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Mar 21 (netfilter: xt_LOG.c)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Mar 21 (netfilter: xt_LOG.c)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxx>
- Re: [PATCH] mark newly opened fds as FD_CLOEXEC (close on exec) [part 2]
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- Re: [PATCH] mark newly opened fds as FD_CLOEXEC (close on exec) [part 2]
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH] mark newly opened fds as FD_CLOEXEC (close on exec) [part 2]
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- Re: [PATCH] mark newly opened fds as FD_CLOEXEC (close on exec) [part 2]
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] mark newly opened fds as FD_CLOEXEC (close on exec) [part 2]
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- [PATCH 2/9] ipvs: remove check for IP_VS_CONN_F_SYNC from ip_vs_bind_dest
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 3/9] ipvs: fix ip_vs_try_bind_dest to rebind app and transmitter
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 4/9] ipvs: always update some of the flags bits in backup
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT PULL nf-next] IPVS
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 8/9] ipvs: optimize the use of flags in ip_vs_bind_dest
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 7/9] ipvs: add support for sync threads
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 6/9] ipvs: reduce sync rate with time thresholds
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 5/9] ipvs: use adaptive pause in master thread
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 9/9] ipvs: Provide a generic ip_vs_bind_xmit()
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 1/9] ipvs: ignore IP_VS_CONN_F_NOOUTPUT in backup server
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: conntrack can't update mark on icmp connection
- From: <abirvalg@xxxxxxxxxxx>
- Re: manpage fixes for conntrack-tools
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] adjust __net_exit
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- manpage fixes for conntrack-tools
- From: Adrian Bridgett <adrian@xxxxxxxxxx>
- Re: netfilter: Hung task
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: netfilter: Hung task
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: netfilter: Hung task
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: netfilter: Hung task
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: netfilter: Hung task
- From: Christoph Lameter <cl@xxxxxxxxx>
- Re: [PATCH] adjust __net_exit
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] adjust __net_exit
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH] adjust __net_exit
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH] adjust __net_exit
- From: ebiederm@xxxxxxxxxxxx (Eric W. Biederman)
- Re: netfilter: Hung task
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: netfilter: Hung task
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: netfilter: Hung task
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- netfilter: Hung task
- From: Sasha Levin <levinsasha928@xxxxxxxxx>
- Re: [PATCH] adjust __net_exit
- From: Sam Ravnborg <sam@xxxxxxxxxxxx>
- Re: [PATCH] netfilter: ctnetlink: fix race between delete and timeout expiration
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] adjust __net_exit
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: NAT IPv6/IPv4 translator - request for review, plus two questions regarding code
- From: Łukasz Czyż <lukasz.czyzz@xxxxxxxxx>
- How to get notified if packets are dropped because of checksum mismatch error
- From: Arif Hossain <freefall1986@xxxxxxxxx>
- [PATCH] netfilter: ctnetlink: fix race between delete and timeout expiration
- From: pablo@xxxxxxxxxxxxx
- Re: NAT IPv6/IPv4 translator - request for review, plus two questions regarding code
- From: Maciej Żenczykowski <zenczykowski@xxxxxxxxx>
- NAT IPv6/IPv4 translator - request for review, plus two questions regarding code
- From: Łukasz Czyż <lukasz.czyzz@xxxxxxxxx>
- Re: 10GbE Connectivity & Netfilter
- From: Tarkan Erimer <tarkan.erimer@xxxxxxxxxxxx>
- Re: 10GbE Connectivity & Netfilter
- From: Tarkan Erimer <tarkan.erimer@xxxxxxxxxxxx>
- Re: 10GbE Connectivity & Netfilter
- From: Thomas Jarosch <thomas.jarosch@xxxxxxxxxxxxx>
- Re: 10GbE Connectivity & Netfilter
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- 10GbE Connectivity & Netfilter
- From: Tarkan Erimer <tarkan.erimer@xxxxxxxxxxxx>
- after setting verdict in netfilter_queue packet is not reaching udp server daemon
- From: Arif Hossain <freefall1986@xxxxxxxxx>
- Re: [PATCH v6] Netfilter ring buffer support
- From: Richard Weinberger <richard@xxxxxx>
- [v10 PATCH 3/3] NETFILTER userspace part for target HMARK
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v10 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v10 PATCH 1/3] NETFILTER added flags to ipv6_find_hdr()
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [v10 PATCH 0/3] NETFILTER new target module, HMARK
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH v6] Netfilter ring buffer support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v6] Netfilter ring buffer support
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH v6] Netfilter ring buffer support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] iptables: missing free() in function delete_entry()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] iptables: missing free() in function cache_add_entry()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Mar 9 (netfilter)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Mar 9 (netfilter)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re[2]: linux-next: Tree for Mar 9 (netfilter)
- From: "Hans Schillstrom" <hans@xxxxxxxxxxxxxxx>
- Re: linux-next: Tree for Mar 9 (netfilter)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxx>
- Re: linux-next: Tree for Mar 9 (netfilter)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: linux-next: Tree for Mar 9 (netfilter)
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxx>
- [PATCH v2] net/netfilter: refactor notifier registration
- From: Tony Zelenoff <antonz@xxxxxxxxxxxxx>
- [PATCH] iptables: missing free() in function cache_add_entry()
- From: Christian Engelmayer <christian.engelmayer@xxxxxxxxxxxxxx>
- [PATCH] iptables: missing free() in function delete_entry()
- From: Christian Engelmayer <christian.engelmayer@xxxxxxxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Kerin Millar <kerframil@xxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Kerin Millar <kerframil@xxxxxxxxx>
- [PATCH] xt_log.h: don't use xchg() for simple assignment
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- [PATCH] adjust __net_exit
- From: "Jan Beulich" <JBeulich@xxxxxxxx>
- Re: [PATCH v6] Netfilter ring buffer support
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 00/23] netfilter updates for net-next
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v6] Netfilter ring buffer support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 05/23] netfilter: ipset: hash:net,iface timeout bug fixed
- From: pablo@xxxxxxxxxxxxx
- [PATCH 11/23] netfilter: nf_ct_ecache: trailing whitespace removed
- From: pablo@xxxxxxxxxxxxx
- [PATCH 04/23] netfilter: ipset: Exceptions support added to hash:*net* types
- From: pablo@xxxxxxxxxxxxx
- [PATCH 08/23] netfilter: ctnetlink: add NAT support for expectations
- From: pablo@xxxxxxxxxxxxx
- [PATCH 14/23] netfilter: xt_LOG: fix bogus extra layer-4 logging information
- From: pablo@xxxxxxxxxxxxx
- [PATCH 16/23] netfilter: nf_ct_udp[lite]: convert UDP[lite] timeouts to array
- From: pablo@xxxxxxxxxxxxx
- [PATCH 13/23] netfilter: remove ipt_SAME.h and ipt_realm.h
- From: pablo@xxxxxxxxxxxxx
- [PATCH 10/23] netfilter: merge ipt_LOG and ip6_LOG into xt_LOG
- From: pablo@xxxxxxxxxxxxx
- [PATCH 22/23] netfilter: xt_CT: allow to attach timeout policy + glue code
- From: pablo@xxxxxxxxxxxxx
- [PATCH 23/23] netfilter: xt_LOG: add __printf() to sb_add()
- From: pablo@xxxxxxxxxxxxx
- [PATCH 19/23] netfilter: nf_conntrack: pass timeout array to l4->new and l4->packet
- From: pablo@xxxxxxxxxxxxx
- [PATCH 21/23] netfilter: nf_ct_ext: add timeout extension
- From: pablo@xxxxxxxxxxxxx
- [PATCH 20/23] netfilter: add cttimeout infrastructure for fine timeout tuning
- From: pablo@xxxxxxxxxxxxx
- [PATCH 18/23] netfilter: nf_ct_gre: add unsigned int array to define timeouts
- From: pablo@xxxxxxxxxxxxx
- [PATCH 15/23] netfilter: ctnetlink: fix lockep splats
- From: pablo@xxxxxxxxxxxxx
- [PATCH 17/23] netfilter: nf_ct_tcp: move retransmission and unacknowledged timeout to array
- From: pablo@xxxxxxxxxxxxx
- [PATCH 12/23] netfilter: nf_ct_ecache: refactor nf_ct_deliver_cached_events
- From: pablo@xxxxxxxxxxxxx
- [PATCH 09/23] netfilter: ctnetlink: allow to set expectfn for expectations
- From: pablo@xxxxxxxxxxxxx
- [PATCH 07/23] netfilter: ctnetlink: allow to set expectation class
- From: pablo@xxxxxxxxxxxxx
- [PATCH 06/23] netfilter: ctnetlink: allow to set helper for new expectations
- From: pablo@xxxxxxxxxxxxx
- [PATCH 03/23] netfilter: ipset: Log warning when a hash type of set gets full
- From: pablo@xxxxxxxxxxxxx
- [PATCH 01/23] netfilter: ipset: use NFPROTO_ constants
- From: pablo@xxxxxxxxxxxxx
- [PATCH 02/23] netfilter: ipset: expose userspace-relevant parts in ip_set.h
- From: pablo@xxxxxxxxxxxxx
- [PATCH 00/23] netfilter updates for net-next
- From: pablo@xxxxxxxxxxxxx
- Re: [PATCH 6/6] Netfilter: xt_LOG: Add timestamp support
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 6/6] Netfilter: xt_LOG: Add timestamp support
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 6/6] Netfilter: xt_LOG: Add timestamp support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Kerin Millar <kerframil@xxxxxxxxx>
- Re: [PATCH 6/6] netfilter: nf_conntrack: fix early_drop with reliable event delivery
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: NFQUEUE in bridge mode performance poor in the last kernels
- From: tingwei liu <tingw.liu@xxxxxxxxx>
- Re: NFQUEUE in bridge mode performance poor in the last kernels
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: NFQUEUE in bridge mode performance poor in the last kernels
- From: tingwei liu <tingw.liu@xxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Kerin Millar <kerframil@xxxxxxxxx>
- Re: netfilter_queue : use --queue-balance in multithreaded environment
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: NFQUEUE in bridge mode performance poor in the last kernels
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 3/6] netfilter: ctnetlink: use GFP_ATOMIC in all allocations
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 6/6] netfilter: nf_conntrack: fix early_drop with reliable event delivery
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 5/6] bridge: netfilter: don't call iptables on vlan packets if sysctl is off
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 4/6] netfilter: bridge: fix wrong pointer dereference
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] netfilter: ctnetlink: remove incorrect spin_[un]lock_bh on NAT module autoload
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/6] netfilter: ebtables: fix wrong name length while copying to user-space
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Kerin Millar <kerframil@xxxxxxxxx>
- Re: [PATCH 3/6] netfilter: ctnetlink: use GFP_ATOMIC in all allocations
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: NFQUEUE in bridge mode performance poor in the last kernels
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 3/6] netfilter: ctnetlink: use GFP_ATOMIC in all allocations
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 3/6] netfilter: ctnetlink: use GFP_ATOMIC in all allocations
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 3/6] netfilter: ctnetlink: use GFP_ATOMIC in all allocations
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH 1/1] netfilter: xt_recent: Add optional mask option for xt_recent
- From: Denys Fedoryshchenko <denys@xxxxxxxxxxx>
- [PATCH 1/6] netfilter: ebtables: fix wrong name length while copying to user-space
- From: pablo@xxxxxxxxxxxxx
- [PATCH 2/6] netfilter: ctnetlink: remove incorrect spin_[un]lock_bh on NAT module autoload
- From: pablo@xxxxxxxxxxxxx
- [PATCH 4/6] netfilter: bridge: fix wrong pointer dereference
- From: pablo@xxxxxxxxxxxxx
- [PATCH 6/6] netfilter: nf_conntrack: fix early_drop with reliable event delivery
- From: pablo@xxxxxxxxxxxxx
- [PATCH 5/6] bridge: netfilter: don't call iptables on vlan packets if sysctl is off
- From: pablo@xxxxxxxxxxxxx
- [PATCH 3/6] netfilter: ctnetlink: use GFP_ATOMIC in all allocations
- From: pablo@xxxxxxxxxxxxx
- [PATCH 0/6] netfilter fixes for 3.3-rc6
- From: pablo@xxxxxxxxxxxxx
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] conntrack, suspicious RCU usage
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 1/1] conntrack, suspicious RCU usage
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [PATCH 5/6] Netfilter: xt_LOG: Implement ring buffer support
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- NFQUEUE in bridge mode performance poor in the last kernels
- From: tingwei liu <tingw.liu@xxxxxxxxx>
- [patch 1/1] net/netfilter/nfnetlink_acct.c: use linux/atomic.h
- From: akpm@xxxxxxxxxxxxxxxxxxxx
- [PATCH 1/6] Netfilter: Merge ipt_LOG and ip6_LOG into xt_LOG
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH v6] Netfilter ring buffer support
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 3/6] ring_buffer: Export for_each_buffer_cpu()
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 2/6] netfilter: xt_LOG: fix bogus extra layer-4 logging information
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 4/6] xt_log: Make printk() in sb_close() optional
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 5/6] Netfilter: xt_LOG: Implement ring buffer support
- From: Richard Weinberger <richard@xxxxxx>
- [PATCH 6/6] Netfilter: xt_LOG: Add timestamp support
- From: Richard Weinberger <richard@xxxxxx>
- Generic NAT helper module using NetPDL
- From: Derick Winkworth <ccie15672@xxxxxxxxx>
- Re: [PATCH 1/1] conntrack, suspicious RCU usage
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2] bridge: netfilter: don't call iptables on vlan packets if sysctl is off
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [v9 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2] bridge: netfilter: don't call iptables on vlan packets if sysctl is off
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [v9 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Hans Schillstrom <hans@xxxxxxxxxxxxxxx>
- Re: [v9 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Hans Schillstrom <hans@xxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] Netfilter: xt_LOG: Implement ring buffer support
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [v9 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Kerin Millar <kerframil@xxxxxxxxx>
- Re: [PATCH 1/1] conntrack, suspicious RCU usage
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2] bridge: netfilter: don't call iptables on vlan packets if sysctl is off
- From: Bart De Schuymer <bdschuym@xxxxxxxxxx>
- Re: [v9 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 1/1] conntrack, suspicious RCU usage
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: [v9 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- [PATCH v2] bridge: netfilter: don't call iptables on vlan packets if sysctl is off
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [v9 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: [v9 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Hans Schillstrom <hans.schillstrom@xxxxxxxxxxxx>
- Re: Replacement for nf-HiPAC
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: Replacement for nf-HiPAC
- From: Abhi Devireddy <abhi@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] Netfilter: xt_LOG: Implement ring buffer support
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 1/2] Netfilter: xt_LOG: Implement ring buffer support
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- Re: [PATCH 1/2] Netfilter: xt_LOG: Implement ring buffer support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [v9 PATCH 2/3] NETFILTER module xt_hmark, new target for HASH based fwmark
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Resend [PATCH] netfilter: Fix copy_to_user too small size parametre.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Resend [PATCH] netfilter: Fix copy_to_user too small size parametre.
- From: santosh prasad nayak <santoshprasadnayak@xxxxxxxxx>
- Re: Resend [PATCH] netfilter: Fix copy_to_user too small size parametre.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Netfilter: Merge ipt_LOG and ip6_LOG into xt_LOG
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 3/7] netfilter: nf_ct_gre: add unsigned int array to define timeouts
- From: pablo@xxxxxxxxxxxxx
- [PATCH 1/7] netfilter: nf_ct_udp[lite]: convert UDP[lite] timeouts to array
- From: pablo@xxxxxxxxxxxxx
- [PATCH 2/7] netfilter: nf_ct_tcp: move retransmission and unacknowledged timeout to array
- From: pablo@xxxxxxxxxxxxx
- [PATCH 4/7] netfilter: nf_conntrack: pass timeout array to l4->new and l4->packet
- From: pablo@xxxxxxxxxxxxx
- [PATCH 5/7] netfilter: add cttimeout infrastructure for fine timeout tuning
- From: pablo@xxxxxxxxxxxxx
- [PATCH 7/7] netfilter: xt_CT: allow to attach timeout policy + glue code
- From: pablo@xxxxxxxxxxxxx
- [PATCH 6/7] netfilter: nf_ct_ext: add timeout extension
- From: pablo@xxxxxxxxxxxxx
- [PATCH 0/7] [RFC] cttimeout v2
- From: pablo@xxxxxxxxxxxxx
- Re: [PATCH 1/4] Netfilter: Merge ipt_LOG and ip6_LOG into xt_LOG
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 1/4] Netfilter: Merge ipt_LOG and ip6_LOG into xt_LOG
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Kerin Millar <kerframil@xxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Kerin Millar <kerframil@xxxxxxxxx>
- Re: Current state of nftables
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 0/7] [RFC] new cttimeout infrastructure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: patch in bugzilla
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] DHCPv6 connection tracker helper
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: scheduling while atomic followed by oops upon conntrackd -c execution
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] bridge: netfilter: don't call iptables on vlan packets if sysctl is off
- From: Florian Westphal <fw@xxxxxxxxx>
- netfilter: ctnetlink: remove incorrect spin_[un]lock_bh on NAT module autoload
- From: pablo@xxxxxxxxxxxxx
- Re: [Bridge] [PATCH 2/3] netfilter: potential null derefence.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [Bridge] [PATCH 2/3] netfilter: potential null derefence.
- From: santosh prasad nayak <santoshprasadnayak@xxxxxxxxx>
- Re: [Bridge] [PATCH 2/3] netfilter: potential null derefence.
- From: Bart De Schuymer <bdschuym@xxxxxxxxxx>
- Re: [PATCH] bridge: netfilter: don't call iptables on vlan packets if sysctl is off
- From: Bart De Schuymer <bdschuym@xxxxxxxxxx>
- Re: patch in bugzilla
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: [PATCH 1/4] Netfilter: Merge ipt_LOG and ip6_LOG into xt_LOG
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 1/4] Netfilter: Merge ipt_LOG and ip6_LOG into xt_LOG
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: patch in bugzilla
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- scheduling while atomic followed by oops upon conntrackd -c execution
- From: Kerin Millar <kerframil@xxxxxxxxx>
- Re: [PATCH 1/2] IPVS Bug IPv6 extension header handling faulty.
- From: Hans Schillstrom <hans@xxxxxxxxxxxxxxx>
- Re: Resend [PATCH] netfilter: Fix copy_to_user too small size parametre.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- netfilter_queue : use --queue-balance in multithreaded environment
- From: Arif Hossain <freefall1986@xxxxxxxxx>
- RE: Resend [PATCH] netfilter: Fix copy_to_user too small size parametre.
- From: "David Laight" <David.Laight@xxxxxxxxxx>
- Re: [PATCH] DHCPv6 connection tracker helper
- From: Darren Willis <djw@xxxxxxxxxx>
- Re: [PATCH 2/3] netfilter: potential null derefence.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH] bridge: netfilter: don't call iptables on vlan packets if sysctl is off
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 1/4] Netfilter: Merge ipt_LOG and ip6_LOG into xt_LOG
- From: Richard Weinberger <richard@xxxxxx>
- iptables recent mask option, request for comments
- From: Denys Fedoryshchenko <denys@xxxxxxxxxxx>
- Re: [PATCH] netfilter updates for 3.3-rc5
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: patch in bugzilla
- From: Jonh Wendell <jonh.wendell@xxxxxxxxxxx>
- Resend [PATCH] netfilter: Fix copy_to_user too small size parametre.
- From: santosh nayak <santoshprasadnayak@xxxxxxxxx>
- Re: [PATCH 1/3] netfilter: Fix copy_to_user too small size parametre.
- From: santosh prasad nayak <santoshprasadnayak@xxxxxxxxx>
- Re: [PATCH 1/3] netfilter: Fix copy_to_user too small size parametre.
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/3] netfilter: Fix copy_to_user too small size parametre.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] netfilter: Fix copy_to_user too small size parametre.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH] netfilter: ipt_LOG: add __printf() to sb_add()
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH 0/7] [RFC] new cttimeout infrastructure
- From: Changli Gao <xiaosuo@xxxxxxxxx>
- Re: [PATCH 3/3] netfilter: Remove redundant code.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] netfilter: potential null derefence.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] Netfilter: Merge ipt_LOG and ip6_LOG into xt_LOG
- From: Richard Weinberger <richard@xxxxxx>
- Re: [PATCH 1/3] netfilter: Fix copy_to_user too small size parametre.
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/3] netfilter: Fix copy_to_user too small size parametre.
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/4] Netfilter: Merge ipt_LOG and ip6_LOG into xt_LOG
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH] netfilter: bridge: fix module autoload in compat case
- From: pablo@xxxxxxxxxxxxx
- [PATCH] netfilter updates for 3.3-rc5
- From: pablo@xxxxxxxxxxxxx
- Re: [PATCH 1/3] netfilter: Fix copy_to_user too small size parametre.
- From: santosh prasad nayak <santoshprasadnayak@xxxxxxxxx>
- Re: [PATCH 3/3] netfilter: Remove redundant code.
- From: santosh prasad nayak <santoshprasadnayak@xxxxxxxxx>
- Re: [PATCH 2/3] netfilter: potential null derefence.
- From: santosh prasad nayak <santoshprasadnayak@xxxxxxxxx>
- Re: [PATCH 3/3] netfilter: Remove redundant code.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] netfilter: potential null derefence.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] netfilter: Fix copy_to_user too small size parametre.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 1/3] netfilter: Fix copy_to_user too small size parametre.
- From: santosh nayak <santoshprasadnayak@xxxxxxxxx>
- [PATCH 2/3] netfilter: potential null derefence.
- From: santosh nayak <santoshprasadnayak@xxxxxxxxx>
- [PATCH 3/3] netfilter: Remove redundant code.
- From: santosh nayak <santoshprasadnayak@xxxxxxxxx>
- Re: patch in bugzilla
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Make nfct_catch return control to original thread
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Make nfct_catch return control to original thread
- From: "Jeremy/starcraft.man" <starcraft.man@xxxxxxxxxx>
- Re: patch in bugzilla
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: libnetfilter_cttimeout: misc cleanup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 5/6] const-ify arguments of functions
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- [PATCH 1/6] Add .gitignore
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- [PATCH 4/6] Properly NUL-terminate name in nfct_timeout_attr_set
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- [PATCH 6/6] Add extern "C" guard for C++ compilation mode
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- libnetfilter_cttimeout: misc cleanup
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- [PATCH 3/6] Add stdint header and type corrections
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- [PATCH 2/6] const-ify static data objects
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: [Patch] netfilter: remove ipt_SAME.h and ipt_realm.h too
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 7/7] netfilter: xt_CT: allow to attach timeout policy + glue code
- From: pablo@xxxxxxxxxxxxx
- [PATCH 4/7] netfilter: nf_conntrack: pass timeout array to l4->new and l4->packet
- From: pablo@xxxxxxxxxxxxx
- [PATCH 2/7] netfilter: nf_ct_tcp: move retransmission and unacknowledged timeout to array
- From: pablo@xxxxxxxxxxxxx
- [PATCH 5/7] netfilter: add cttimeout infrastructure for fine timeout tuning
- From: pablo@xxxxxxxxxxxxx
- [PATCH 6/7] netfilter: nf_ct_ext: add timeout extension
- From: pablo@xxxxxxxxxxxxx
- [PATCH 3/7] netfilter: nf_ct_gre: add unsigned int array to define timeouts
- From: pablo@xxxxxxxxxxxxx
- [PATCH 1/7] netfilter: nf_ct_udp[lite]: convert UDP[lite] timeouts to array
- From: pablo@xxxxxxxxxxxxx
- [PATCH 0/7] [RFC] new cttimeout infrastructure
- From: pablo@xxxxxxxxxxxxx
- Re: [PATCH] DHCPv6 connection tracker helper
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] iptables: Merge libip6t_LOG and libipt_LOG into libxt_LOG
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] iptables: Merge libip6t_LOG and libipt_LOG into libxt_LOG
- From: Dave Taht <dave.taht@xxxxxxxxx>
- Re: [PATCH 1/2] iptables: Merge libip6t_LOG and libipt_LOG into libxt_LOG
- From: Richard Weinberger <richard@xxxxxx>
- Re: patch in bugzilla
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: patch in bugzilla
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- patch in bugzilla
- From: Jonh Wendell <jonh.wendell@xxxxxxxxxxx>
- Re: [Patch] netfilter: remove ipt_SAME.h and ipt_realm.h too
- From: Jan Ceuleers <jan.ceuleers@xxxxxxxxxxxx>
- Re: [Patch] netfilter: remove ipt_SAME.h and ipt_realm.h too
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: [PATCH] DHCPv6 connection tracker helper
- From: Darren Willis <djw@xxxxxxxxxx>
- Re: [PATCH 3/3] netfilter: ctnetlink: support kernel-space dump filtering by ctmark
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] netlink: allow to pass data pointer to netlink_dump_start() callback
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] netlink: add netlink_dump_control structure for netlink_dump_start()
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [RFC] SSDP (UPnP) conntrack helper
- From: Ian Pilcher <arequipeno@xxxxxxxxx>
- Re: [PATCH 1/2] iptables: Merge libip6t_LOG and libipt_LOG into libxt_LOG
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [RFC] SSDP (UPnP) conntrack helper
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] bridge: netfilter: fix module autoload in compat case
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] netfilter: ctnetlink: support kernel-space dump filterings
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] netlink: add netlink_dump_control structure for netlink_dump_start()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] netlink: add netlink_dump_control structure for netlink_dump_start()
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: [PATCH 2/2] netfilter: ctnetlink: support kernel-space dump filterings
- From: Jan Engelhardt <jengelh@xxxxxxxxxx>
- Re: [PATCH 3/3] netfilter: ctnetlink: support kernel-space dump filtering by ctmark
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 2/3] netlink: allow to pass data pointer to netlink_dump_start() callback
- From: pablo@xxxxxxxxxxxxx
- [PATCH 3/3] netfilter: ctnetlink: support kernel-space dump filtering by ctmark
- From: pablo@xxxxxxxxxxxxx
- [PATCH 1/3] netlink: add netlink_dump_control structure for netlink_dump_start()
- From: pablo@xxxxxxxxxxxxx
- [PATCH 0/3] netlink: netlink_dump_start takes pointer to data
- From: pablo@xxxxxxxxxxxxx
- Re: [PATCH 1/2] netlink: netlink_dump_start may take data pointer for callbacks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] netlink: netlink_dump_start may take data pointer for callbacks
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 0/2] netfilter updates for net tree
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 2/2] netfilter: ctnetlink: fix soft lockup when netlink adds new entries (v2)
- From: pablo@xxxxxxxxxxxxx
- [PATCH 1/2] Revert "netfilter: ctnetlink: fix soft lockup when netlink adds new entries"
- From: pablo@xxxxxxxxxxxxx
- [PATCH 0/2] netfilter updates for net tree
- From: pablo@xxxxxxxxxxxxx
- [PATCH 2/2] netfilter: ctnetlink: support kernel-space dump filterings
- From: pablo@xxxxxxxxxxxxx
- [PATCH 1/2] netlink: netlink_dump_start may take data pointer for callbacks
- From: pablo@xxxxxxxxxxxxx
[Index of Archives]
[LARTC]
[Berkeley Packet Filter]
[Bugtraq]
[Yosemite News]
[Samba]