Linux TCP/IP Netfilter Devel
[Prev Page][Next Page]
- Re: [PATCH nft] INSTALL: provide examples to install python bindings
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH conntrack] conntrack: skip ENOENT when -U/-D finds a stale conntrack entry
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH conntrack] conntrack: unbreak -U command, use correct family
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: GC transaction race with abort path
- From: "Liu, Yujie" <yujie.liu@xxxxxxxxx>
- Re: libnetfilter_queue patch ping
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH nft] INSTALL: provide examples to install python bindings
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: libnetfilter_queue patch ping
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v3 0/3] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- libnetfilter_queue patch ping
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- Re: [nft PATCH v3 0/3] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [nft PATCH v2] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [nft PATCH v2] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v3 0/3] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v2] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH xtables-addons] doc: fix version number in xtables-addons.8
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [PATCH] json: use strtok_r() instead of strtok()
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH xtables-addons 3/5] build: update `AM_V_*` definitions to match autotools
- From: Jan Engelhardt <jengelh@xxxxxxx>
- [PATCH] json: use strtok_r() instead of strtok()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [PATCH xtables-addons] doc: fix version number in xtables-addons.8
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [nft PATCH v2] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v3 0/3] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v3 2/3] nftutils: add wrappers for getprotoby{name,number}_r(), getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v3 3/3] src: use wrappers for getprotoby{name,number}_r(), getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v3 1/3] nftutils: add new internal file for general utilities
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [PATCH] landlock: Fix and test network AF inconsistencies
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- Re: [PATCH v11.1] selftests/landlock: Add 11 new test suites dedicated to network
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- [PATCH xtables-addons 1/5] build: use `$(top_srcdir)` when including Makefile.extra
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH xtables-addons 2/5] build: replace `AM_V_silent` with `AM_V_at`
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH xtables-addons 0/5] Autoools silent-rules fixes
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH xtables-addons 5/5] build: define `AM_V_GEN` where it is needed
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH xtables-addons 4/5] build: don't hard-code `AM_DEFAULT_VERBOSITY` in Makefile.iptrules
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH xtables-addons 3/5] build: update `AM_V_*` definitions to match autotools
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [nft PATCH v2] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v4 6/6] py: add Nftables.{get,set}_input() API
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v5 6/6] py: add Nftables.{get,set}_input_flags() API
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v5 5/6] py: extract flags helper functions for set_debug()/get_debug()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v5 4/6] py: fix exception during cleanup of half-initialized Nftables
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v5 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v5 3/6] src: add input flag NFT_CTX_INPUT_JSON to enable JSON parsing
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v5 1/6] src: add input flags for nft_ctx
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v5 0/6] add input flags and "no-dns"/"json" flags
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v2] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: GC transaction race with abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: GC transaction race with abort path
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: GC transaction race with abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: flush pending destroy work before netlink notifier
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: validate all pending tables
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCHv2 nf] netfilter: set default timeout to 3 secs for sctp shutdown send and recv state
- From: Marcelo Ricardo Leitner <marcelo.leitner@xxxxxxxxx>
- Re: [PATCH] landlock: Fix and test network AF inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v11.1] selftests/landlock: Add 11 new test suites dedicated to network
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v11.1] selftests/landlock: Add 11 new test suites dedicated to network
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH] landlock: Fix and test network AF inconsistencies
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- Re: [PATCH v11.1] selftests/landlock: Add 11 new test suites dedicated to network
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- Re: [PATCH v11.1] selftests/landlock: Add 11 new test suites dedicated to network
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- [PATCH] landlock: Fix and test network AF inconsistencies
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v11.1] selftests/landlock: Add 11 new test suites dedicated to network
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v4] Bluetooth: Fix for ACL disconnect when pairing fails
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH RFC net-next 01/14] rculist_bl: add hlist_bl_for_each_entry_continue_rcu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: [nft PATCH] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v4 6/6] py: add Nftables.{get,set}_input() API
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH v4 5/6] py: extract flags helper functions for set_debug()/get_debug()
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH v4 4/6] py: fix exception during cleanup of half-initialized Nftables
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH RFC net-next 01/14] rculist_bl: add hlist_bl_for_each_entry_continue_rcu
- From: Julian Anastasov <ja@xxxxxx>
- Re: [nft PATCH v4 3/6] src: add input flag NFT_CTX_INPUT_JSON to enable JSON parsing
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH v4 1/6] src: add input flags for nft_ctx
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH net-next v2] netfilter: ebtables: replace zero-length array members
- From: Gong Ruiqi <gongruiqi1@xxxxxxxxxx>
- Re: [PATCH net-next v2] netfilter: ebtables: replace zero-length array members
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH net 1/9] netfilter: nf_tables: fix false-positive lockdep splat
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH net-next v2] netfilter: ebtables: replace zero-length array members
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- [PATCH net-next v4] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- [PATCH RFC net-next 09/14] ipvs: switch to per-net connection table
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 08/14] ipvs: use resizable hash table for services
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 12/14] ipvs: use more keys for connection hashing
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 13/14] ipvs: add ip_vs_status info
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 06/14] ipvs: use more counters to avoid service lookups
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 07/14] ipvs: add resizable hash tables
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 11/14] ipvs: no_cport and dropentry counters can be per-net
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 05/14] ipvs: do not keep dest_dst after dest is removed
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 10/14] ipvs: show the current conn_tab size to users
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 14/14] ipvs: add conn_lfactor and svc_lfactor sysctl vars
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH net 9/9] netfilter: nft_dynset: disallow object maps
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 8/9] netfilter: nf_tables: GC transaction race with netns dismantle
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 5/9] netfilter: set default timeout to 3 secs for sctp shutdown send and recv state
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 4/9] netfilter: nf_tables: don't fail inserts if duplicate has expired
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 7/9] netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 1/9] netfilter: nf_tables: fix false-positive lockdep splat
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 0/9] netfilter fixes for net
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 3/9] netfilter: nf_tables: deactivate catchall elements in next generation
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 6/9] ipvs: fix racy memcpy in proc_do_sync_threshold
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 2/9] netfilter: nf_tables: fix kdoc warnings after gc rework
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v3 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH RFC net-next 01/14] rculist_bl: add hlist_bl_for_each_entry_continue_rcu
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- [PATCHv2 nf] netfilter: set default timeout to 3 secs for sctp shutdown send and recv state
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH RFC net-next 03/14] ipvs: some service readers can use RCU
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 04/14] ipvs: use single svc table
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 02/14] ipvs: make ip_vs_svc_table and ip_vs_svc_fwm_table per netns
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 00/14] ipvs: per-net tables and optimizations
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH RFC net-next 01/14] rculist_bl: add hlist_bl_for_each_entry_continue_rcu
- From: Julian Anastasov <ja@xxxxxx>
- [iptables PATCH] Revert --compat option related commits
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nf] netfilter: set default timeout to 3 secs for sctp shutdown send and recv state
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH nf 3/3] netfilter: nft_dynset: disallow object maps
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 2/3] netfilter: nf_tables: GC transaction race with netns dismantle
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/3] netfilter: nf_tables: fix GC transaction races with netns and netlink event exit path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] tests: add transaction stress test with parallel delete/add/flush and netns deletion
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 2/2] selftests: netfilter: test nat source port clash resolution interaction with tcp early demux
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 1/2] netfilter: nf_nat: undo erroneous tcp edemux lookup after port clash
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 0/2] netfilter: nf_nat: fix yet another bizarre early demux corner case
- From: Florian Westphal <fw@xxxxxxxxx>
- RE: [PATCH nf] netfilter: set default timeout to 3 secs for sctp shutdown send and recv state
- From: Sriram Yagnaraman <sriram.yagnaraman@xxxxxxxx>
- Re: [PATCH nf] netfilter: set default timeout to 3 secs for sctp shutdown send and recv state
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH] ipvs: fix racy memcpy in proc_do_sync_threshold
- From: Julian Anastasov <ja@xxxxxx>
- LPC 2023 Networking and BPF Track CFP (Reminder)
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH 5.4 32/39] netfilter: nf_tables: report use refcount overflow
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 59/68] netfilter: nf_tables: report use refcount overflow
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 76/89] netfilter: nf_tables: report use refcount overflow
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 25/33] netfilter: nf_tables: bogus EBUSY when deleting flowtable after flush
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 26/33] netfilter: nf_tables: report use refcount overflow
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 20/26] netfilter: nf_tables: report use refcount overflow
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v11.1] selftests/landlock: Add 11 new test suites dedicated to network
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- [PATCH nf] netfilter: set default timeout to 3 secs for sctp shutdown send and recv state
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH -stable,4.14 0/1] netfilter stable fix for 4.14
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH -stable,4.14 1/1] netfilter: nf_tables: report use refcount overflow
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,4.14 0/1] netfilter stable fix for 4.14
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,4.19 2/2] netfilter: nf_tables: report use refcount overflow
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,4.19 1/2] netfilter: nf_tables: bogus EBUSY when deleting flowtable after flush
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,4.19 0/2] netfilter stable fixes for 4.19
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.4 1/1] netfilter: nf_tables: report use refcount overflow
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.4 0/1] netfilter stable fix for 5.4
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 1/1] netfilter: nf_tables: report use refcount overflow
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 0/1] netfilter stable fix for 5.10
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.15 1/1] netfilter: nf_tables: report use refcount overflow
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.15 0/1] netfilter stable fix for 5.15
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,6.1 1/1] netfilter: nf_tables: report use refcount overflow
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,6.1 0/1] netfilter stable fix for 6.1
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: don't fail inserts if duplicate has expired
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v11.1] selftests/landlock: Add 11 new test suites dedicated to network
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- Re: [PATCH] ipvs: fix racy memcpy in proc_do_sync_threshold
- From: Simon Horman <horms@xxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: deactivate catchall elements in next generation
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v11.1] selftests/landlock: Add 11 new test suites dedicated to network
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- Re: [iptables PATCH v2 0/4] Implement a best-effort forward compat solution
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [nft PATCH] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: fix kdoc warnings after gc rework
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [PATCH v3] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH] netfilter: ebtables: replace zero-length array members
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [PATCH nft] tests: add test with concatenation, vmap and timeout
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [iptables PATCH v2 1/4] nft: Pass nft_handle to add_{target,action}()
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 4/4] tests: Test compat mode
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 0/4] Implement a best-effort forward compat solution
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 3/4] Add --compat option to *tables-nft and *-nft-restore commands
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 2/4] nft: Introduce and use bool nft_handle::compat
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH net 1/5] netfilter: nf_tables: don't skip expired elements during walk
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: Fwd: kernel: WARNING: CPU: 0 PID: 16269 at net/netfilter/nf_conntrack_core.c:1210
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net 0/5] Netfilter fixes for net
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Fwd: kernel: WARNING: CPU: 0 PID: 16269 at net/netfilter/nf_conntrack_core.c:1210
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- [nft PATCH] src: use reentrant getprotobyname_r()/getprotobynumber_r()/getservbyport_r()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [iptables PATCH v2 0/3] Chain counter fixes here and there
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH] Use SOCK_CLOEXEC/O_CLOEXEC where available
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH] tests: iptables-test: Fix command segfault reports
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH] tests: iptables-test: Fix command segfault reports
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH v2 1/2] nft-ruleparse: Introduce nft_create_target()
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH] Use SOCK_CLOEXEC/O_CLOEXEC where available
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 2/3] Revert "libiptc: fix wrong maptype of base chain counters on restore"
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 3/3] tests: shell: Test chain policy counter behaviour
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 0/3] Chain counter fixes here and there
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 1/3] nft: Create builtin chains with counters enabled
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH net 0/5] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [PATCH net 0/5] Netfilter fixes for net
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nft 0/2] doc: fix cleaning of man-pages
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 1/5] netfilter: nf_tables: don't skip expired elements during walk
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 2/5] netfilter: nf_tables: GC transaction API to avoid race with control plane
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 5/5] netfilter: nf_tables: remove busy mark and gc batch API
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 3/5] netfilter: nf_tables: adapt set backend to use GC transaction API
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 0/5] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 4/5] netfilter: nft_set_hash: mark set element as dead when deleting from packet path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH v2 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [PATCH v2 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH next-next 1/5] netfilter: gre: Remove unused function declaration nf_ct_gre_keymap_flush()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v2 5/7] netfilter: nft_osf: refactor deprecated strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 7/7] netfilter: xtables: refactor deprecated strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 6/7] netfilter: x_tables: refactor deprecated strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [PATCH nf 3/5] netfilter: nf_tables: adapt set backend to use GC transaction API
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH nf 3/5] netfilter: nf_tables: adapt set backend to use GC transaction API
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 2/5] netfilter: nf_tables: GC transaction API to avoid race with control plane
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 5/5] netfilter: nf_tables: remove busy mark and gc batch API
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 4/5] netfilter: nft_set_hash: mark set element as dead when deleting from packet path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/5] netfilter: nf_tables: don't skip expired elements during walk
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
- From: Simon Horman <horms@xxxxxxxxxx>
- [PATCH 4.19 133/323] netfilter: nf_tables: fix scheduling-while-atomic splat
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 132/323] netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 131/323] netfilter: nf_tables: reject unbound anonymous set before commit phase
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 130/323] netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 129/323] netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 128/323] netfilter: nf_tables: use net_generic infra for transaction data
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 127/323] netfilter: add helper function to set up the nfnetlink header and use it
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 126/323] netfilter: nftables: add helper function to set the base sequence number
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 125/323] netfilter: nf_tables: add rescheduling points during loop detection walks
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.19 124/323] netfilter: nf_tables: fix nat hook table deletion
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 088/204] netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 089/204] netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 4.14 087/204] netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: ebtables: replace zero-length array members
- From: Phil Sutter <phil@xxxxxx>
- [PATCH v3 14/14] sysctl: Use ctl_table_size as stopping criteria for list macro
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 12/14] vrf: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 13/14] sysctl: SIZE_MAX->ARRAY_SIZE in register_net_sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 11/14] networking: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 10/14] netfilter: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 04/14] sysctl: Add size argument to init_header
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 03/14] sysctl: Add ctl_table_size to ctl_table_header
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 08/14] sysctl: Add size to register_net_sysctl function
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 09/14] ax.25: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 07/14] sysctl: Add size arg to __register_sysctl_init
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 05/14] sysctl: Add a size arg to __register_sysctl_table
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 06/14] sysctl: Add size to register_sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 02/14] sysctl: Use ctl_table_header in list_for_each_table_entry
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 01/14] sysctl: Prefer ctl_table_header in proc_sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v3 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- Re: [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Phil Sutter <phil@xxxxxx>
- [PATCH] netfilter: ebtables: replace zero-length array members
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- [PATCH v3] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] netfilter: ebtables: fix fortify warnings
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: [PATCH v2] netfilter: ebtables: fix fortify warnings
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] netfilter: ebtables: fix fortify warnings
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: ebtables: fix fortify warnings
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- [PATCH v2 4/7] netfilter: nft_meta: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH v2 5/7] netfilter: nft_osf: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH v2 6/7] netfilter: x_tables: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH v2 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH v2 3/7] netfilter: nf_tables: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH v2 7/7] netfilter: xtables: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH v2 2/7] netfilter: nf_tables: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH v2 0/7] netfilter: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH 2/7] netfilter: nf_tables: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- Re: [PATCH 6/7] netfilter: x_tables: refactor deprecated strncpy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 6/7] netfilter: x_tables: refactor deprecated strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 2/7] netfilter: nf_tables: refactor deprecated strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 7/7] netfilter: xtables: refactor deprecated strncpy
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [PATCH 3/7] netfilter: nf_tables: refactor deprecated strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2] netfilter: ebtables: fix fortify warnings
- From: Kees Cook <kees@xxxxxxxxxx>
- Re: [PATCH v2] netfilter: ebtables: fix fortify warnings
- From: Kees Cook <kees@xxxxxxxxxx>
- [PATCH 7/7] netfilter: xtables: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH 5/7] netfilter: nft_osf: refactor deprecated strncpy to strscpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH 2/7] netfilter: nf_tables: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH 4/7] netfilter: nft_meta: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH 3/7] netfilter: nf_tables: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH 6/7] netfilter: x_tables: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH 1/7] netfilter: ipset: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH 0/7] netfilter: refactor deprecated strncpy
- From: Justin Stitt <justinstitt@xxxxxxxxxx>
- [PATCH v2] netfilter: ebtables: fix fortify warnings
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- Re: [nft PATCH v4 6/6] py: add Nftables.{get,set}_input() API
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: fix false-positive lockdep splat
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2] netfilter: ebtables: fix fortify warnings
- From: "Gustavo A. R. Silva" <gustavoars@xxxxxxxxxx>
- Re: [PATCH v2 11/14] networking: Update to register_net_sysctl_sz
- From: Przemek Kitszel <przemyslaw.kitszel@xxxxxxxxx>
- [PATCH next-next 1/5] netfilter: gre: Remove unused function declaration nf_ct_gre_keymap_flush()
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net-next 0/5] netfilter updates for net-next
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH next-next 3/5] netfilter: conntrack: Remove unused function declarations
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH next-next 5/5] netfilter: nfnetlink_log: always add a timestamp
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH next-next 2/5] netfilter: helper: Remove unused function declarations
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 11/14] networking: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH next-next 4/5] netfilter: h323: Remove unused function declarations
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] netfilter: ebtables: fix fortify warnings
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 11/14] networking: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- Re: [PATCH] netfilter: ebtables: fix fortify warnings
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH v4 6/6] py: add Nftables.{get,set}_input() API
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Chris Maness <christopher.maness@xxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Chris Maness <christopher.maness@xxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH] netfilter: ebtables: fix fortify warnings
- From: "GONG, Ruiqi" <gongruiqi@xxxxxxxxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH net-next] netfilter: h323: Remove unused function declarations
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH nft 2/2] doc: move man-pages to `MAINTAINERCLEANFILES`
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nft 1/2] doc: move man-pages to `dist_man_MANS`
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nft 0/2] doc: fix cleaning of man-pages
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: Remove unused function declarations
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [iptables PATCH] extensions: libip6t_icmp: Add names for mld-listener types
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH] nft: move processing logic out of asserts
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH v2 00/15] Man pages review
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 1/2] nft-ruleparse: Introduce nft_create_target()
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 2/2] nft-ruleparse: parse meta mark set as MARK target
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH netfilter] netfilter: nfnetlink_log: always add a timestamp
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH netfilter] netfilter: nfnetlink_log: always add a timestamp
- From: Maciej Żenczykowski <maze@xxxxxxxxxx>
- Re: [PATCH iptables] nft-ruleparse: parse meta mark set as MARK target
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH iptables] nft-ruleparse: parse meta mark set as MARK target
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH 1/3] extensions: libipt_icmp: Fix confusion between 255/255 and any
- From: Phil Sutter <phil@xxxxxx>
- [PATCH net-next] netfilter: conntrack: Remove unused function declarations
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: nftables: syntax ambiguity with objref map and ct helper objects
- From: Florian Westphal <fw@xxxxxxxxx>
- [nft PATCH v4 6/6] py: add Nftables.{get,set}_input() API
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v4 5/6] py: extract flags helper functions for set_debug()/get_debug()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v4 4/6] py: fix exception during cleanup of half-initialized Nftables
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v4 3/6] src: add input flag NFT_CTX_INPUT_JSON to enable JSON parsing
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v4 2/6] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v4 1/6] src: add input flags for nft_ctx
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft PATCH v4 0/6] add input flags and "no-dns"/"json" flags
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [PATCH iptables] nft-ruleparse: parse meta mark set as MARK target
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [iptables PATCH 1/3] extensions: libipt_icmp: Fix confusion between 255/255 and any
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: Solution Bugzilla Issue 1659 - iptables-nft v1.8.9 Error: meta sreg key not supported
- From: Florian Westphal <fw@xxxxxxxxx>
- Solution Bugzilla Issue 1659 - iptables-nft v1.8.9 Error: meta sreg key not supported
- From: Robert <robert.smith51@xxxxxxxxxxxxxx>
- [iptables PATCH] Revert "libiptc: fix wrong maptype of base chain counters on restore"
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH] extensions: libip6t_icmp: Add names for mld-listener types
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH] nft: move processing logic out of asserts
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH] Makefile: Support 'make tags' and 'make cscope'
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH 1/2] iptables-restore: Drop dead code
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH v11 08/12] landlock: Add network rules and TCP hooks support
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- Re: [PATCH v11 08/12] landlock: Add network rules and TCP hooks support
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [nft PATCH v2] tests: shell: Review test-cases for destroy command
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH 1/3] extensions: libipt_icmp: Fix confusion between 255/255 and any
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH v2] tests: shell: Review test-cases for destroy command
- From: "Fernando F. Mancera" <ffmancera@xxxxxxxxxx>
- [nft PATCH v2] tests: shell: Review test-cases for destroy command
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] tests: shell: Review test-cases for destroy command
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nft 0/3] Python Build Modernization
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH] doc: document add chain device parameter
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH] tests: shell: Review test-cases for destroy command
- From: "Fernando F. Mancera" <ffmancera@xxxxxxxxxx>
- [nft PATCH] doc: document add chain device parameter
- From: Brennan Paciorek <bpaciore@xxxxxxxxxx>
- Re: [PATCH net-next] netfilter: helper: Remove unused function declarations
- From: Simon Horman <horms@xxxxxxxxxx>
- [iptables PATCH v2 06/15] man: iptables.8: Trivial font fixes
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 15/15] man: iptables-save.8: Start paragraphs in upper-case
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 13/15] man: iptables-save.8: Clarify 'available tables'
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 04/15] man: iptables.8: Clarify --goto description
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 08/15] man: iptables-restore.8: Consistently document -w option
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 05/15] man: Use HTTPS for links to netfilter.org
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 01/15] man: iptables.8: Extend exit code description
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 03/15] man: iptables.8: Fix intra page reference
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 09/15] man: iptables-restore.8: Drop -W option from synopsis
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 10/15] man: iptables-restore.8: Put 'file' in italics in synopsis
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 02/15] man: iptables.8: Trivial spelling fixes
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 14/15] man: iptables-save.8: Fix --modprobe description
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 12/15] man: Trivial: Missing space after comma
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 11/15] man: iptables-restore.8: Start paragraphs in upper-case
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 07/15] man: iptables-restore.8: Fix --modprobe description
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH v2 00/15] Man pages review
- From: Phil Sutter <phil@xxxxxx>
- [PATCH nft] parser: deduplicate map with data interval
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] parser: allow ct timeouts to use time_spec values
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] tests: fix inet nat prio tests
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] tests: add dynmap datapath add/delete test case
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net-next] netfilter: helper: Remove unused function declarations
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- [PATCH net-next] netfilter: gre: Remove unused function declaration nf_ct_gre_keymap_flush()
- From: Yue Haibing <yuehaibing@xxxxxxxxxx>
- Re: [iptables PATCH 06/16] man: iptables.8: Trivial font fixes
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: ulogd2 patch ping
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [iptables PATCH 06/16] man: iptables.8: Trivial font fixes
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH 14/16] man: iptables-save.8: Fix --modprobe description
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [iptables PATCH 07/16] man: iptables-restore.8: Fix --modprobe description
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [iptables PATCH 06/16] man: iptables.8: Trivial font fixes
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [iptables PATCH 1/3] extensions: libipt_icmp: Fix confusion between 255/255 and any
- From: Jan Engelhardt <jengelh@xxxxxxx>
- [iptables PATCH 1/3] extensions: libipt_icmp: Fix confusion between 255/255 and any
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 3/3] tests: libipt_icmp.t: Enable tests with numeric output
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 2/3] extensions: libipt_icmp: --icmp-type is not mandatory
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 02/16] man: iptables.8: Trivial spelling fixes
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 12/16] man: iptables-restore.8: Trivial: Missing space after comma
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 08/16] man: iptables-restore.8: Consistently document -w option
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 04/16] man: iptables.8: Clarify --goto description
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 05/16] man: Use HTTPS for links to netfilter.org
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 00/16] Man pages review
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 14/16] man: iptables-save.8: Fix --modprobe description
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 13/16] man: iptables-save.8: Clarify 'available tables'
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 15/16] man: iptables-save.8: Start paragraphs in upper-case
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 09/16] man: iptables-restore.8: Drop -W option from synopsis
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 11/16] man: iptables-restore.8: Start paragraphs in upper-case
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 07/16] man: iptables-restore.8: Fix --modprobe description
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 16/16] man: iptables-save.8: Trivial: Missing space in enumeration
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 10/16] man: iptables-restore.8: Put 'file' in italics in synopsis
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 01/16] man: iptables.8: Extend exit code description
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 03/16] man: iptables.8: Fix intra page reference
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 06/16] man: iptables.8: Trivial font fixes
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH] netfilter: bpf_link: avoid unused-function warning
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [PATCH] netfilter: bpf_link: avoid unused-function warning
- From: "Arnd Bergmann" <arnd@xxxxxxxx>
- [iptables PATCH] Makefile: Support 'make tags' and 'make cscope'
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH] netfilter: bpf_link: avoid unused-function warning
- From: Daniel Xu <dxu@xxxxxxxxx>
- [iptables PATCH 1/2] iptables-restore: Drop dead code
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 2/2] iptables-apply: Eliminate shellcheck warnings
- From: Phil Sutter <phil@xxxxxx>
- [PATCH] netfilter: bpf_link: avoid unused-function warning
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH v3 net-next] net: flow_dissector: Use 64bits for used_keys
- From: Alexander Lobakin <aleksander.lobakin@xxxxxxxxx>
- [nft PATCH] tests: shell: Review test-cases for destroy command
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH v2 03/14] sysctl: Add ctl_table_size to ctl_table_header
- From: Joel Granados <joel.granados@xxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- Re: ulogd2 patch ping
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [PATCH v2 10/14] netfilter: Update to register_net_sysctl_sz
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH] netfilter: bpf: Only define get_proto_defrag_hook() if necessary
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH] netfilter: bpf: Only define get_proto_defrag_hook() if necessary
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: ulogd2 patch ping
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH] netfilter: bpf: Only define get_proto_defrag_hook() if necessary
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- Re: [PATCH v2 03/14] sysctl: Add ctl_table_size to ctl_table_header
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v2 03/14] sysctl: Add ctl_table_size to ctl_table_header
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: nftables: syntax ambiguity with objref map and ct helper objects
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: nftables: syntax ambiguity with objref map and ct helper objects
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: nftables: syntax ambiguity with objref map and ct helper objects
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 0/3] Python Build Modernization
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nft 3/3] py: add pyproject.toml to support PEP-517-compatible build-systems
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nft 2/3] py: use setup.cfg to configure setuptools
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nft 1/3] py: move package source into src directory
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nft] libnftables: Drop cache in -c/--check mode
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 net-next] net: flow_dissector: Use 64bits for used_keys
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH v2 13/14] sysctl: SIZE_MAX->ARRAY_SIZE in register_net_sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 14/14] sysctl: Use ctl_table_size as stopping criteria for list macro
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 09/14] ax.25: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 04/14] sysctl: Add size argument to init_header
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 06/14] sysctl: Add size to register_sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 02/14] sysctl: Use ctl_table_header in list_for_each_table_entry
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 12/14] vrf: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 05/14] sysctl: Add a size arg to __register_sysctl_table
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 11/14] networking: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 03/14] sysctl: Add ctl_table_size to ctl_table_header
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 07/14] sysctl: Add size arg to __register_sysctl_init
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 10/14] netfilter: Update to register_net_sysctl_sz
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 08/14] sysctl: Add size to register_net_sysctl function
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 00/14] sysctl: Add a size argument to register functions in sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- [PATCH v2 01/14] sysctl: Prefer ctl_table_header in proc_sysctl
- From: Joel Granados <joel.granados@xxxxxxxxx>
- Re: [PATCH v3 net-next] net: flow_dissector: Use 64bits for used_keys
- From: Vladimir Oltean <vladimir.oltean@xxxxxxx>
- Re: [PATCH bpf-next v6 0/5] Support defragmenting IPv(4|6) packets in BPF
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH v3 net-next] net: flow_dissector: Use 64bits for used_keys
- From: Ratheesh Kannoth <rkannoth@xxxxxxxxxxx>
- nftables: syntax ambiguity with objref map and ct helper objects
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] ct expectation: fix 'list object x' vs. 'list objects in table' confusion
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] rule: allow src/dstnat prios in input and output
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [iptables PATCH 1/4] *tables-restore: Enforce correct counters syntax if present
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nft 2/2] py: remove setup.py integration with autotools
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nft 1/2] update INSTALL file
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nft 2/2] py: remove setup.py integration with autotools
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- [iptables PATCH 1/4] *tables-restore: Enforce correct counters syntax if present
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 3/4] ebtables: Improve invalid chain name detection
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 2/4] *tables: Reject invalid chain names when renaming
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 4/4] tests: shell: Fix and extend chain rename test
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH v2 net-next] dissector: Use 64bits for used_keys
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v6 2/5] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [iptables PATCH 0/3] Follow-up on dangling set fix
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH 1/2] nft: Special casing for among match in compare_matches()
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH bpf-next v6 1/5] netfilter: defrag: Add glue hooks for enabling/disabling defrag
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 net-next] dissector: Use 64bits for used_keys
- From: Martin Habets <habetsm.xilinx@xxxxxxxxx>
- Re: [PATCH bpf-next v6 2/5] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [PATCH net-next 1/5] nf_conntrack: fix -Wunused-const-variable=
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net-next 1/5] nf_conntrack: fix -Wunused-const-variable=
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH net-next 1/5] nf_conntrack: fix -Wunused-const-variable=
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH v2 net-next] dissector: Use 64bits for used_keys
- From: Ratheesh Kannoth <rkannoth@xxxxxxxxxxx>
- Re: [PATCH bpf-next v6 2/5] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [nft v3 PATCH 4/4] py: add Nftables.input_{set,get}_flags() API
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft v3 PATCH 3/4] src: add input flag NFT_CTX_INPUT_JSON to enable JSON parsing
- From: Phil Sutter <phil@xxxxxx>
- Re: [nvt v3 PATCH 2/4] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH netfilter] netfilter: nfnetlink_log: always add a timestamp
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net-next 5/5] lib/ts_bm: add helper to reduce indentation and improve readability
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net-next 4/5] netfilter: conntrack: validate cta_ip via parsing
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net-next 3/5] netfilter: nf_tables: use NLA_POLICY_MASK to test for valid flag options
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net-next 2/5] netlink: allow be16 and be32 types in all uint policy checks
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net-next 1/5] nf_conntrack: fix -Wunused-const-variable=
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net-next 0/5] netfilter updates for net-next
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Netfilter -stable patches for 6.1.y
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [syzbot] [netfilter?] WARNING in __nf_conntrack_confirm
- From: syzbot <syzbot+ff6e85a2812073da0a36@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net 1/3] netfilter: nft_set_rbtree: fix overlap expiration walk
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: Netfilter -stable patches for 6.1.y
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Netfilter -stable patches for 6.1.y
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 10/14] netfilter: Update to register_net_sysctl_sz
- From: Luis Chamberlain <mcgrof@xxxxxxxxxx>
- [PATCH net 3/3] netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 2/3] netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 1/3] netfilter: nft_set_rbtree: fix overlap expiration walk
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 0/3] netfilter fixes for net
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: ulogd2 patch ping
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH 10/14] netfilter: Update to register_net_sysctl_sz
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: Kernel oops with 6.4.4 - flow offloads - NULL pointer deref
- From: Ian Kumlien <ian.kumlien@xxxxxxxxx>
- Re: [PATCH -next] nf_conntrack: fix -Wunused-const-variable=
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: Kernel oops with 6.4.4 - flow offloads - NULL pointer deref
- From: Ian Kumlien <ian.kumlien@xxxxxxxxx>
- [PATCH -next] nf_conntrack: fix -Wunused-const-variable=
- From: Zhu Wang <wangzhu9@xxxxxxxxxx>
- Re: Kernel oops with 6.4.4 - flow offloads - NULL pointer deref
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: ulogd2 patch ping
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] netlink: delinearize: copy set keytype if needed
- From: Florian Westphal <fw@xxxxxxxxx>
- ulogd2 patch ping
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH 5.4 185/313] netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 188/313] netfilter: nf_tables: fix scheduling-while-atomic splat
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 187/313] netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 186/313] netfilter: nf_tables: reject unbound anonymous set before commit phase
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 181/313] netfilter: add helper function to set up the nfnetlink header and use it
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 179/313] netfilter: nf_tables: fix nat hook table deletion
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 182/313] netfilter: nf_tables: use net_generic infra for transaction data
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 183/313] netfilter: nf_tables: add rescheduling points during loop detection walks
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 180/313] netfilter: nftables: add helper function to set the base sequence number
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.4 184/313] netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 315/509] netfilter: nf_tables: fix chain binding transaction logic
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 320/509] netfilter: nf_tables: drop map element references from preparation phase
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 312/509] netfilter: nf_tables: use net_generic infra for transaction data
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 321/509] netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 317/509] netfilter: nf_tables: reject unbound anonymous set before commit phase
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 322/509] netfilter: nf_tables: fix scheduling-while-atomic splat
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 318/509] netfilter: nf_tables: reject unbound chain set before commit phase
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 319/509] netfilter: nftables: rename set element data activation/deactivation functions
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 316/509] netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 313/509] netfilter: nf_tables: add rescheduling points during loop detection walks
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.10 314/509] netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH netfilter] netfilter: nfnetlink_log: always add a timestamp
- From: "Maciej Żenczykowski" <maze@xxxxxxxxxx>
- Re: Kernel oops with 6.4.4 - flow offloads - NULL pointer deref
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v3 net-next] ipvs: make ip_vs_svc_table and ip_vs_svc_fwm_table per netns
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH v3 net-next] ipvs: make ip_vs_svc_table and ip_vs_svc_fwm_table per netns
- From: Dust Li <dust.li@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 net-next] ipvs: make ip_vs_svc_table and ip_vs_svc_fwm_table per netns
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH v2 net-next] ipvs: make ip_vs_svc_table and ip_vs_svc_fwm_table per netns
- From: Dust Li <dust.li@xxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 net-next] ipvs: make ip_vs_svc_table and ip_vs_svc_fwm_table per netns
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH v2 net-next] ipvs: make ip_vs_svc_table and ip_vs_svc_fwm_table per netns
- From: Dust Li <dust.li@xxxxxxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf,v2] netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH ipset] bash-completion: fix syntax error
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH bpf-next v6 4/5] bpf: selftests: Support custom type and proto for client sockets
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v6 0/5] Support defragmenting IPv(4|6) packets in BPF
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v6 3/5] bpf: selftests: Support not connecting client socket
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v6 2/5] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v6 5/5] bpf: selftests: Add defrag selftests
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v6 1/5] netfilter: defrag: Add glue hooks for enabling/disabling defrag
- From: Daniel Xu <dxu@xxxxxxxxx>
- [iptables PATCH 2/2] nft: More verbose extension comparison debugging
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 1/2] nft: Special casing for among match in compare_matches()
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH bpf-next v5 2/5] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [iptables PATCH 1/3] extensions: libebt_among: Fix for false positive match comparison
- From: Phil Sutter <phil@xxxxxx>
- Re: [ANNOUNCE] nftables 1.0.8 release
- From: Leah Neukirchen <leah@xxxxxxxx>
- Re: [ANNOUNCE] nftables 1.0.8 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [iptables PATCH 1/3] extensions: libebt_among: Fix for false positive match comparison
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [iptables PATCH 1/3] extensions: libebt_among: Fix for false positive match comparison
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH bpf-next v5 2/5] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR and _COMMIT
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH bpf-next v5 5/5] bpf: selftests: Add defrag selftests
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 4/5] bpf: selftests: Support custom type and proto for client sockets
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 3/5] bpf: selftests: Support not connecting client socket
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 2/5] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 1/5] netfilter: defrag: Add glue hooks for enabling/disabling defrag
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 0/5] Support defragmenting IPv(4|6) packets in BPF
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [PATCH net 1/5] netfilter: nf_tables: fix spurious set element insertion failure
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH nf] netfilter: nft_set_rbtree: fix overlap expiration walk
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 1/5] netfilter: nf_tables: fix spurious set element insertion failure
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 5/5] netfilter: nf_tables: skip bound chain on rule flush
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 4/5] netfilter: nf_tables: skip bound chain in netns release path
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 3/5] netfilter: nft_set_pipapo: fix improper element removal
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 2/5] netfilter: nf_tables: can't schedule in nft_chain_validate
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 1/5] netfilter: nf_tables: fix spurious set element insertion failure
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 0/5] Netfilter fixes for net:
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [ANNOUNCE] nftables 1.0.8 release
- From: Leah Neukirchen <leah@xxxxxxxx>
- [nvt v3 PATCH 2/4] src: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft v3 PATCH 4/4] py: add Nftables.input_{set,get}_flags() API
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft v3 PATCH 3/4] src: add input flag NFT_CTX_INPUT_JSON to enable JSON parsing
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft v3 PATCH 1/4] src: add input flags for nft_ctx
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft v3 PATCH 0/4] add input flags and "no-dns"/"json" flags
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [PATCH nft] tests: shell: auto-run kmemleak if its available
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH] tests: monitor: Summarize failures per test case
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH] tests: monitor: Summarize failures per test case
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nf] netfilter: nft_set_pipapo: fix improper element removal
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [syzbot] [btrfs?] [netfilter?] BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2)
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: skip bound chain on rule flush
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR and _COMMIT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [syzbot] [btrfs?] [netfilter?] BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2)
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [syzbot] [btrfs?] [netfilter?] BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2)
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: fix spurious set element insertion failure
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: nft_set_pipapo: fix improper element removal
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: skip bound chain in netns release path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [syzbot] [btrfs?] [netfilter?] BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2)
- From: Aleksandr Nogikh <nogikh@xxxxxxxxxx>
- Re: [syzbot] [btrfs?] [netfilter?] BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2)
- From: syzbot <syzbot+9bbbacfbf1e04d5221f7@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [btrfs?] [netfilter?] BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2)
- From: David Sterba <dsterba@xxxxxxx>
- Re: [iptables PATCH] tests: shell: Sanitize nft-only/0009-needless-bitwise_0
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH] tests: shell: Sanitize nft-only/0009-needless-bitwise_0
- From: Phil Sutter <phil@xxxxxx>
- Re: libnftnl adding element to a set of type ipv4_addr or ipv6_addr
- From: Easynet <devel@xxxxxxxxxxx>
- Re: libnftnl adding element to a set of type ipv4_addr or ipv6_addr
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] py: return boolean value from Nftables.__[gs]et_output_flag()
- From: Phil Sutter <phil@xxxxxx>
- Re: [syzbot] [btrfs?] [netfilter?] BUG: MAX_LOCKDEP_CHAIN_HLOCKS too low! (2)
- From: syzbot <syzbot+9bbbacfbf1e04d5221f7@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/2] netlink: allow be16 and be32 types in all uint policy checks
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/2] netlink: allow be16 and be32 types in all uint policy checks
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH nf-next 1/2] netlink: allow be16 and be32 types in all uint policy checks
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] meta: stash context statement length when generating payload/meta dependency
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 2/6] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Daniel Xu <dxu@xxxxxxxxx>
- libnftnl adding element to a set of type ipv4_addr or ipv6_addr
- From: Easynet <devel@xxxxxxxxxxx>
- Re: [PATCH nf-next 1/2] netlink: allow be16 and be32 types in all uint policy checks
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH nft 2/2] py: remove setup.py integration with autotools
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 1/2] update INSTALL file
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [nft PATCH] py: return boolean value from Nftables.__[gs]et_output_flag()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [nft v2 PATCH 1/3] nftables: add input flags for nft_ctx
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [nft v2 PATCH 3/3] py: add input_{set,get}_flags() API to helpers
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [nft v2 PATCH 1/3] nftables: add input flags for nft_ctx
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft v2 PATCH 2/3] nftables: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking getaddrinfo()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [nft v2 PATCH 1/3] nftables: add input flags for nft_ctx
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [PATCH nf-next 1/2] netlink: allow be16 and be32 types in all uint policy checks
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 2/2] netfilter: nf_tables: use NLA_POLICY_MASK to test for valid flag options
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 0/2] netfilter: nf_tables: use NLA_POLICY_MASK instead of manual checks
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: can't schedule in nft_chain_validate
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [iptables PATCH 1/3] extensions: libebt_among: Fix for false positive match comparison
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] tests/build/run-tests.sh: fix issues reported by shellcheck
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [iptables PATCH 1/3] extensions: libebt_among: Fix for false positive match comparison
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [ANNOUNCE] nftables 1.0.8 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [ANNOUNCE] nftables 1.0.8 release
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [ANNOUNCE] libnftnl 1.2.6 release
- From: Jan Engelhardt <jengelh@xxxxxxx>
- [nft PATCH] tests/build/run-tests.sh: fix issues reported by shellcheck
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [ANNOUNCE] libnftnl 1.2.6 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [ANNOUNCE] libnftnl 1.2.6 release
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [PATCH -stable,4.14 0/3] stable fixes for 4.14
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -stable,4.19 00/10] stable fixes for 4.19
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -stable,5.4 00/10] stable fixes for 5.4
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -stable,5.10 v3 01/11] netfilter: nf_tables: use net_generic infra for transaction data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -stable,5.10 v3 01/11] netfilter: nf_tables: use net_generic infra for transaction data
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH -stable,5.15 2/2] netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [iptables PATCH 3/3] nft: Include sets in debug output
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 0/3] Follow-up on dangling set fix
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 2/3] nft: Do not pass nft_rule_ctx to add_nft_among()
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 1/3] extensions: libebt_among: Fix for false positive match comparison
- From: Phil Sutter <phil@xxxxxx>
- [PATCH nft] exthdr: prefer raw_type instead of desc->type
- From: Florian Westphal <fw@xxxxxxxxx>
- [ANNOUNCE] nftables 1.0.8 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft v2 PATCH 1/3] nftables: add input flags for nft_ctx
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft v2 PATCH 2/3] nftables: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking getaddrinfo()
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft v2 PATCH 3/3] py: add input_{set,get}_flags() API to helpers
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH bpf-next v4 2/6] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Florian Westphal <fw@xxxxxxxxx>
- [nft v2 PATCH 2/3] nftables: add input flag NFT_CTX_INPUT_NO_DNS to avoid blocking getaddrinfo()
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft v2 PATCH 3/3] py: add input_{set,get}_flags() API to helpers
- From: Thomas Haller <thaller@xxxxxxxxxx>
- [nft v2 PATCH 1/3] nftables: add input flags for nft_ctx
- From: Thomas Haller <thaller@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 2/6] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [PATCH bpf-next v4 2/6] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [nft PATCH 0/3] Implement 'reset {set,map,element}' commands
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH v2] netfilter: conntrack: validate cta_ip via parsing
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH v9 00/12] Network support for Landlock - allowed list of protocols
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH v9 00/12] Network support for Landlock - allowed list of protocols
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- Re: [PATCH iptables] nft-bridge: pass context structure to ops->add() to improve anonymous set support
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH v9 00/12] Network support for Landlock - allowed list of protocols
- From: "Konstantin Meskhidze (A)" <konstantin.meskhidze@xxxxxxxxxx>
- Re: [PATCH iptables] nft-bridge: pass context structure to ops->add() to improve anonymous set support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables] nft-bridge: pass context structure to ops->add() to improve anonymous set support
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH v1] netfilter: conntrack: validate cta_ip via parsing
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 10/11] netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 11/11] netfilter: nf_tables: fix scheduling-while-atomic splat
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 09/11] netfilter: nf_tables: drop map element references from preparation phase
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 08/11] netfilter: nftables: rename set element data activation/deactivation functions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 06/11] netfilter: nf_tables: reject unbound anonymous set before commit phase
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 05/11] netfilter: nf_tables: add NFT_TRANS_PREPARE_ERROR to deal with bound set/chain
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 07/11] netfilter: nf_tables: reject unbound chain set before commit phase
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 03/11] netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 00/11] Netfilter stable fixes for 5.10
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 02/11] netfilter: nf_tables: add rescheduling points during loop detection walks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 01/11] netfilter: nf_tables: use net_generic infra for transaction data
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10 v3 04/11] netfilter: nf_tables: fix chain binding transaction logic
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.15 v2 2/2] netfilter: nf_tables: unbind non-anonymous set if rule construction fails
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.15 v2 0/2] netfilter stable fixes for 5.15
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.15 v2 1/2] netfilter: nf_tables: drop map element references from preparation phase
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 2/6] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [PATCH bpf-next v4 2/6] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v4 2/6] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [PATCH bpf-next v4 2/6] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH bpf-next v4 6/6] bpf: selftests: Add defrag selftests
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v4 5/6] bpf: selftests: Support custom type and proto for client sockets
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v4 4/6] bpf: selftests: Support not connecting client socket
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v4 3/6] netfilter: bpf: Prevent defrag module unload while link active
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v4 2/6] netfilter: bpf: Support BPF_F_NETFILTER_IP_DEFRAG in netfilter link
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v4 1/6] netfilter: defrag: Add glue hooks for enabling/disabling defrag
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v4 0/6] Support defragmenting IPv(4|6) packets in BPF
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [PATCH iptables] nft-bridge: pass context structure to ops->add() to improve anonymous set support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables] nft-bridge: pass context structure to ops->add() to improve anonymous set support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH v2] netfilter: conntrack: validate cta_ip via parsing
- From: Lin Ma <linma@xxxxxxxxxx>
- Re: [PATCH v1] netfilter: conntrack: validate cta_ip via parsing
- From: "Lin Ma" <linma@xxxxxxxxxx>
- Re: [PATCH v1] netfilter: conntrack: validate cta_ip via parsing
- From: Simon Horman <simon.horman@xxxxxxxxxxxx>
- Re: [PATCH v9 00/12] Network support for Landlock - allowed list of protocols
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Re: [PATCH iptables] nft-bridge: pass context structure to ops->add() to improve anonymous set support
- From: Igor Raits <igor@xxxxxxxxxxxx>
[Index of Archives]
[LARTC]
[Berkeley Packet Filter]
[Bugtraq]
[Yosemite News]
[Samba]