Linux TCP/IP Netfilter Devel
[Prev Page][Next Page]
- Re: [RFC PATCH v1 01/10] landlock: Support socket access-control
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net 0/7] Netfilter fixes for net
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net 0/7] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net 0/7] Netfilter fixes for net
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH net 7/7] netfilter: flowtable: incorrect pppoe tuple
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 6/7] netfilter: flowtable: validate pppoe header
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 5/7] netfilter: nft_set_pipapo: do not free live element
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 3/7] netfilter: br_netfilter: skip conntrack input hook for promisc packets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 4/7] netfilter: nft_set_pipapo: walk over current view on netlink dump
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 1/7] netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 2/7] netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 0/7] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [iptables PATCH] libxtables: Attenuate effects of functions' internal static buffers
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH] xshared: Fix parsing of empty string arg in '-c' option
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH 1/2] xlate: Improve redundant l4proto match avoidance
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH net-next v2 2/3] netfilter: nfnetlink: Handle ACK flags for batch messages
- From: Donald Hunter <donald.hunter@xxxxxxxxx>
- Re: [libnftnl PATCH 00/17] obj: Introduce attribute policies
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nft 2/2] netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft 1/2] netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net 5/6] netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: complete validation of user input
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next] net: netfilter: Make ct zone id configurable for bpf ct helper functions
- From: Brad Cowie <brad@xxxxxxxxx>
- [PATCH nf,v2] netfilter: flowtable: incorrect pppoe tuple
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: flowtable: incorrect pppoe tuple in reply direction
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf,v3] netfilter: flowtable: validate pppoe header
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2 2/3] netfilter: nfnetlink: Handle ACK flags for batch messages
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net-next v2 3/3] tools/net/ynl: Add multi message support to ynl
- From: Donald Hunter <donald.hunter@xxxxxxxxx>
- [PATCH net-next v2 2/3] netfilter: nfnetlink: Handle ACK flags for batch messages
- From: Donald Hunter <donald.hunter@xxxxxxxxx>
- [PATCH net-next v2 1/3] doc/netlink/specs: Add draft nftables spec
- From: Donald Hunter <donald.hunter@xxxxxxxxx>
- [PATCH net-next v2 0/3] netlink: Add nftables spec w/ multi messages
- From: Donald Hunter <donald.hunter@xxxxxxxxx>
- [PATCH v2 nf] netfilter: nft_set_pipapo: do not free live element
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf] netfilter: nft_set_pipapo: do not free live element
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH -stable 6.1.x 0/3] Netfilter fixes for -stable
- From: Sasha Levin <sashal@xxxxxxxxxx>
- [PATCH nf] netfilter: nft_set_pipapo: walk over current view on netlink dump
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nft_set_pipapo: do not free live element
- From: Florian Westphal <fw@xxxxxxxxx>
- [nft PATCH v2] expr: make map lookup expression as an argument in vmap statement
- From: Son Dinh <dinhtrason@xxxxxxxxx>
- Re: [PATCH net] netfilter: complete validation of user input
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [iptables PATCH] libxtables: Attenuate effects of functions' internal static buffers
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [PATCH nf,v2] netfilter: flowtable: validate PPPoe header
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [iptables PATCH] libxtables: Attenuate effects of functions' internal static buffers
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nf-next 3/9] netfilter: nft_set_pipapo: prepare destroy function for on-demand clone
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH nf-next 3/9] netfilter: nft_set_pipapo: prepare destroy function for on-demand clone
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf-next 3/9] netfilter: nft_set_pipapo: prepare destroy function for on-demand clone
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- [PATCH net] netfilter: complete validation of user input
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- [PATCH nf] netfilter: flowtable: validate PPPoe header
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [iptables PATCH] xshared: Fix parsing of empty string arg in '-c' option
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 3/9] netfilter: nft_set_pipapo: prepare destroy function for on-demand clone
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: br_netfilter: skip conntrack input hook for promisc packets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [nft PATCH v3] dynset: avoid errouneous assert with ipv6 concat data
- From: Son Dinh <dinhtrason@xxxxxxxxx>
- [nft PATCH v2] dynset: avoid errouneous assert with ipv6 concat data
- From: Son Dinh <dinhtrason@xxxxxxxxx>
- Re: [PATCH -stable,5.10.x 0/3] Netfilter fixes for -stable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.4.x 5/5] netfilter: nf_tables: discard table flag update with pending basechain deletion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.4.x 4/5] netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.4.x 3/5] netfilter: nf_tables: release batch on table validation from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.4.x 2/5] netfilter: nf_tables: flush pending destroy work before exit_net release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.4.x 1/5] netfilter: nf_tables: reject new basechain after table flag update
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.4.x 0/5] Netfilter fixes for -stable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 5/5] netfilter: nf_tables: discard table flag update with pending basechain deletion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 4/5] netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 3/5] netfilter: nf_tables: release batch on table validation from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 2/5] netfilter: nf_tables: flush pending destroy work before exit_net release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 1/5] netfilter: nf_tables: reject new basechain after table flag update
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.10.x 0/3] Netfilter fixes for -stable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.15.x 3/3] netfilter: nf_tables: discard table flag update with pending basechain deletion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.15.x 1/3] netfilter: nf_tables: release batch on table validation from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.15.x 2/3] netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable,5.15.x 0/3] Netfilter fixes for -stable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable 6.1.x 3/3] netfilter: nf_tables: discard table flag update with pending basechain deletion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable 6.1.x 2/3] netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable 6.1.x 1/3] netfilter: nf_tables: release batch on table validation from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH -stable 6.1.x 0/3] Netfilter fixes for -stable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 4/4] tests: shell: check for reset tcp options support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 2/4] tests: shell: chains/{netdev_netns_gone,netdev_chain_dev_gone} require inet/ingress support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 1/4] tests: shell: payload matching requires egress support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 3/4] tests: shell: maps/{vmap_unary,named_limits} require pipapo set backend
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 0/4] add missing requirements in tests/shell
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [RFC PATCH v1 01/10] landlock: Support socket access-control
- From: "Günther Noack" <gnoack@xxxxxxxxxx>
- Re: [PATCH nf-next 8/9] netfilter: nft_set_pipapo: move cloning of match info to insert/removal path
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [PATCH nf-next 3/9] netfilter: nft_set_pipapo: prepare destroy function for on-demand clone
- From: Stefano Brivio <sbrivio@xxxxxxxxxx>
- Re: [RFC PATCH v1 00/10] Socket type control for Landlock
- From: "Günther Noack" <gnoack@xxxxxxxxxx>
- Re: [RFC PATCH v1 03/10] selftests/landlock: Create 'create' test
- From: "Günther Noack" <gnoack@xxxxxxxxxx>
- [PATCH 1/2] landlock: Add hook on socket_listen()
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] selftests/landlock: Create 'listen_zero', 'deny_listen_zero' tests
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [PATCH 0/2] Forbid illegitimate binding via listen(2)
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 09/10] selftests/landlock: Create 'ruleset_with_unknown_access' test
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 10/10] samples/landlock: Support socket protocol restrictions
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 07/10] selftests/landlock: Create 'inval' test
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 08/10] selftests/landlock: Create 'ruleset_overlap' test
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 05/10] selftests/landlock: Create 'rule_with_unknown_access' test
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 06/10] selftests/landlock: Create 'rule_with_unhandled_access' test
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 04/10] selftests/landlock: Create 'socket_access_rights' test
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 03/10] selftests/landlock: Create 'create' test
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 02/10] landlock: Add hook on socket_create()
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 01/10] landlock: Support socket access-control
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [RFC PATCH v1 00/10] Socket type control for Landlock
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2 4/4] ax.25: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [nft PATCH] expr: make map lookup expression as an argument in vmap statement
- From: Son Tra Dinh <dinhtrason@xxxxxxxxx>
- Re: [nft PATCH] dynset: avoid errouneous assert with ipv6 concat data
- From: Son Tra Dinh <dinhtrason@xxxxxxxxx>
- Re: [nft PATCH] dynset: avoid errouneous assert with ipv6 concat data
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH] expr: make map lookup expression as an argument in vmap statement
- From: Florian Westphal <fw@xxxxxxxxx>
- [nft PATCH] dynset: avoid errouneous assert with ipv6 concat data
- From: Son Dinh <dinhtrason@xxxxxxxxx>
- [PATCH nft 2/2] netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get()
- From: Ziyang Xuan <william.xuanziyang@xxxxxxxxxx>
- [PATCH nft 1/2] netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get()
- From: Ziyang Xuan <william.xuanziyang@xxxxxxxxxx>
- [PATCH nft 0/2] netfilter: nf_tables: Use rcu lock to enhance protection of the lists
- From: Ziyang Xuan <william.xuanziyang@xxxxxxxxxx>
- [nft PATCH] expr: make map lookup expression as an argument in vmap statement
- From: Son Dinh <dinhtrason@xxxxxxxxx>
- Re: [PATCH v2 4/4] ax.25: Remove the now superfluous sentinel elements from ctl_table array
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH nft v2 0/2] Support for variables in map expressions
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [PATCH bpf-next] net: netfilter: Make ct zone id configurable for bpf ct helper functions
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v2 4/4] ax.25: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: [PATCH v2 4/4] ax.25: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: [PATCH v2 4/4] ax.25: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: [syzbot] [netfilter?] KMSAN: uninit-value in nf_flow_offload_ip_hook
- From: syzbot <syzbot+b6f07e1c07ef40199081@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net 1/6] netfilter: nf_tables: release batch on table validation from abort path
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net] netfilter: validate user input for expected length
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net] netfilter: validate user input for expected length
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [syzbot] [netfilter?] KMSAN: uninit-value in nf_flow_offload_ip_hook
- From: syzbot <syzbot+b6f07e1c07ef40199081@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH net] netfilter: validate user input for expected length
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH nft v2 0/2] Support for variables in map expressions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 5/6] netfilter: nf_tables: Fix potential data-race in __nft_flowtable_type_get()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 6/6] netfilter: nf_tables: discard table flag update with pending basechain deletion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 3/6] netfilter: nf_tables: flush pending destroy work before exit_net release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 4/6] netfilter: nf_tables: reject new basechain after table flag update
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 2/6] netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 1/6] netfilter: nf_tables: release batch on table validation from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 0/6] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH] conntrackd: Fix signal handler race-condition
- From: bre Breitenberger Markus <bre@xxxxxxxx>
- static analysis results
- From: Ivan Stepchenko <sid@xxxxxxxxxx>
- [PATCH nf,v2] netfilter: nf_tables: discard table flag update with pending basechain deletion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: discard table flag update with pending basechain deletion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft v2 1/2] evaluate: handle invalid mapping expressions in stateful object statements gracefully.
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nft v2 2/2] evaluate: add support for variables in map expressions
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nft v2 0/2] Support for variables in map expressions
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nf,v2 3/4] netfilter: nf_tables: flush pending destroy work before exit_net release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf,v2 4/4] netfilter: nf_tables: reject new basechain after table flag update
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf,v2 2/4] netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf,v2 1/4] netfilter: nf_tables: release batch on table validation from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] tests: packetpath: add check for drop policy
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 1/9] netfilter: nft_set_pipapo: move prove_locking helper around
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 6/9] netfilter: nft_set_pipapo: merge deactivate helper into caller
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 9/9] netfilter: nft_set_pipapo: remove dirty flag
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 8/9] netfilter: nft_set_pipapo: move cloning of match info to insert/removal path
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 7/9] netfilter: nft_set_pipapo: prepare pipapo_get helper for on-demand clone
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 4/9] netfilter: nft_set_pipapo: prepare walk function for on-demand clone
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 3/9] netfilter: nft_set_pipapo: prepare destroy function for on-demand clone
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 5/9] netfilter: nf_tables: pass new nft_iter_type hint to walker
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 2/9] netfilter: nft_set_pipapo: make pipapo_clone helper return NULL
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 0/9] nft_set_pipapo: remove cannot-fail allocations on commit and abort
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nft v2] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: "Ziyang Xuan (William)" <william.xuanziyang@xxxxxxxxxx>
- Re: [PATCH nft v2] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nftables] evaluate: add support for variables in map expressions
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nft v2] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: Ziyang Xuan <william.xuanziyang@xxxxxxxxxx>
- Re: [PATCH nft] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: "Ziyang Xuan (William)" <william.xuanziyang@xxxxxxxxxx>
- Re: [PATCH nftables] evaluate: add support for variables in map expressions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nft] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: "Ziyang Xuan (William)" <william.xuanziyang@xxxxxxxxxx>
- Re: [PATCH nft] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: "Ziyang Xuan (William)" <william.xuanziyang@xxxxxxxxxx>
- Re: [PATCH nft] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] src: disentangle ICMP code types
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 3/3] netfilter: nf_tables: flush pending destroy work before exit_net release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 2/3] netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/3] netfilter: nf_tables: release batch on table validation from abort path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nftables] tests: shell: packetpath/flowtables: open all temporary files in /tmp
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] netfilter: nf_tables: Fix pertential data-race in __nft_flowtable_type_get()
- From: Ziyang Xuan <william.xuanziyang@xxxxxxxxxx>
- [PATCH nft] netlink_delinearize: unused code in reverse cross-day meta hour range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [BUG] kernel warning from br_nf_local_in+0x157/0x180
- From: Jianbo Liu <jianbol@xxxxxxxxxx>
- Re: (re-send): Convert libnetfilter_queue to not need libnfnetlink]
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCHv3 net-next 06/14] ipvs: use more counters to avoid service lookups
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 00/14] ipvs: per-net tables and optimizations
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 09/14] ipvs: switch to per-net connection table
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 02/14] ipvs: make ip_vs_svc_table and ip_vs_svc_fwm_table per netns
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 07/14] ipvs: add resizable hash tables
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 04/14] ipvs: use single svc table
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 03/14] ipvs: some service readers can use RCU
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 11/14] ipvs: no_cport and dropentry counters can be per-net
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 13/14] ipvs: add ip_vs_status info
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 05/14] ipvs: do not keep dest_dst after dest is removed
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 14/14] ipvs: add conn_lfactor and svc_lfactor sysctl vars
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 01/14] rculist_bl: add hlist_bl_for_each_entry_continue_rcu
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 12/14] ipvs: use more keys for connection hashing
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 10/14] ipvs: show the current conn_tab size to users
- From: Julian Anastasov <ja@xxxxxx>
- [PATCHv3 net-next 08/14] ipvs: use resizable hash table for services
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH net-next v1 2/2] tools/net/ynl: Add multi message support to ynl
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: (re-send): Convert libnetfilter_queue to not need libnfnetlink]
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2] netfilter: use NF_DROP instead of -NF_DROP
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net-next v2] netfilter: use NF_DROP instead of -NF_DROP
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [PATCH bpf-next] net: netfilter: Make ct zone id configurable for bpf ct helper functions
- From: Brad Cowie <brad@xxxxxxxxx>
- (re-send): Convert libnetfilter_queue to not need libnfnetlink]
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH v2 4/4] ax.25: Remove the now superfluous sentinel elements from ctl_table array
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- [PATCH v2 4/4] ax.25: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- [PATCH v2 3/4] appletalk: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- [PATCH v2 2/4] netfilter: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- [PATCH v2 1/4] networking: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- [PATCH v2 0/4] sysctl: Remove sentinel elements from networking
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- Re: [PATCH v2 net] inet: inet_defrag: prevent sk release while still in use
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net 1/4] netfilter: nf_tables: reject destroy command to remove basechain hooks
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH net 4/4] netfilter: arptables: Select NETFILTER_FAMILY_ARP when building arp_tables.c
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 2/4] netfilter: nf_tables: reject table flag and netdev basechain updates
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 3/4] netfilter: nf_tables: skip netdev hook unregistration if table is dormant
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 0/4] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 1/4] netfilter: nf_tables: reject destroy command to remove basechain hooks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 net] inet: inet_defrag: prevent sk release while still in use
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH v1 nf] netfilter: arptables: Select NETFILTER_FAMILY_ARP when building arp_tables.c
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH] samples/landlock: Fix incorrect free in populate_ruleset_net
- From: Mickaël Salaün <mic@xxxxxxxxxxx>
- Convert libnetfilter_queue to not need libnfnetlink
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- Re: nftables documentation improvement?
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- [nft PATCH v2 2/2] Add support for table's persist flag
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH v2 1/2] doc: nft.8: Two minor synopsis fixups
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH v2 0/2] Add support for table's persist flag
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH 2/2] Add support for table's persist flag
- From: Phil Sutter <phil@xxxxxx>
- [PATCH v2 net] inet: inet_defrag: prevent sk release while still in use
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH] samples/landlock: Fix incorrect free in populate_ruleset_net
- From: Ivanov Mikhail <ivanov.mikhail1@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 nf] netfilter: arptables: Select NETFILTER_FAMILY_ARP when building arp_tables.c
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [BUG] kernel warning from br_nf_local_in+0x157/0x180
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH 2/2] Add support for table's persist flag
- From: Quentin Deslandes <qde@xxxxxxxx>
- [PATCH net-next v2] netfilter: use NF_DROP instead of -NF_DROP
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH net-next 0/3] netfilter: use NF_DROP instead of -NF_DROP
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net-next 0/3] netfilter: use NF_DROP instead of -NF_DROP
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH net-next 0/3] netfilter: use NF_DROP instead of -NF_DROP
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net-next 2/3] netfilter: use NF_DROP in iptable_filter_table_init()
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [PATCH net-next 3/3] netfilter: use NF_DROP in ip6table_filter_table_init()
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [PATCH net-next 1/3] netfilter: using NF_DROP in test statement in nf_conntrack_in()
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [PATCH net-next 0/3] netfilter: use NF_DROP instead of -NF_DROP
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [PATCH RESEND net-next] netfilter: conntrack: dccp: try not to drop skb in conntrack
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [PATCH nftables] tests: shell: packetpath/flowtables: open all temporary files in /tmp
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- [PATCH nftables] evaluate: add support for variables in map expressions
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [PATCH iptables] libxtables: Fix xtables_ipaddr_to_numeric calls with xtables_ipmask_to_numeric
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH 1/3] leds: trigger: legtrig-bpf: Add ledtrig-bpf module
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: [PATCH iptables] libxtables: Fix xtables_ipaddr_to_numeric calls with xtables_ipmask_to_numeric
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: nftables documentation improvement?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/3] leds: trigger: legtrig-bpf: Add ledtrig-bpf module
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH iptables] libxtables: Fix xtables_ipaddr_to_numeric calls with xtables_ipmask_to_numeric
- From: Phil Sutter <phil@xxxxxx>
- Re: [BUG] kernel warning from br_nf_local_in+0x157/0x180
- From: Jianbo Liu <jianbol@xxxxxxxxxx>
- Re: [PATCH iptables] libxtables: Fix xtables_ipaddr_to_numeric calls with xtables_ipmask_to_numeric
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- nftables documentation improvement?
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- [PATCH iptables] libxtables: Fix xtables_ipaddr_to_numeric calls with xtables_ipmask_to_numeric
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- [nft PATCH] tests: shell: Avoid escape chars when printing to non-terminals
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [nft PATCH v2 1/5] json: Accept more than two operands in binary expressions
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH v2 3/5] tests: py: Fix some JSON equivalents
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH v2 0/5] json: Accept more than two operands in binary expressions
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH v2 2/5] mergesort: Avoid accidental set element reordering
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH v2 5/5] tests: py: Drop needless recorded JSON outputs
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH v2 4/5] tests: py: Warn if recorded JSON output matches the input
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 2/2] Add support for table's persist flag
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 0/2] Add support for table's persist flag
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 1/2] doc: nft.8: Two minor synopsis fixups
- From: Phil Sutter <phil@xxxxxx>
- Re: [BUG] kernel warning from br_nf_local_in+0x157/0x180
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: conntrack: fix ct-state for ICMPv6 Multicast Router Discovery
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net 1/3] netfilter: nft_set_pipapo: release elements in clone only from destroy path
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH nft] datatype: leave DTYPE_F_PREFIX only for IP address datatype
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] inet: inet_defrag: prevent sk release while still in use
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net] MAINTAINERS: step down as netfilter maintainer
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net] MAINTAINERS: step down as netfilter maintainer
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH net 2/3] netfilter: nf_tables: do not compare internal table flags on updates
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 1/3] netfilter: nft_set_pipapo: release elements in clone only from destroy path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 3/3] netfilter: nf_tables: Fix a memory leak in nf_tables_updchain
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 0/3,v2] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net 3/3] netfilter: nf_tables: Fix a memory leak in nf_tables_updchain
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net 3/3] netfilter: nf_tables: Fix a memory leak in nf_tables_updchain
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH nf 3/3] netfilter: nf_tables: skip netdev hook unregistration if table is dormant
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 2/3] netfilter: nf_tables: reject table flag and netdev basechain updates
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/3] netfilter: nf_tables: reject destroy command to remove basechain hooks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 0/3] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 1/3] netfilter: nft_set_pipapo: release elements in clone only from destroy path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 3/3] netfilter: nf_tables: Fix a memory leak in nf_tables_updchain
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 2/3] netfilter: nf_tables: do not compare internal table flags on updates
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] netlink_delinearize: restore binop syntax when listing ruleset for flags
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] json: Accept more than two operands in binary expressions
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nft] evaluate: display "Range negative size" error
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft v3] src: do not merge a set with a erroneous one
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] netlink_delinearize: restore binop syntax when listing ruleset for flags
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] netlink_delinearize: reverse cross-day meta hour range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: do not reject dormant flag update for table with owner
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH] json: Accept more than two operands in binary expressions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH] doc: libnftables-json: Drop invalid ops from match expression
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: do not compare internal table flags on updates
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [nft PATCH] doc: libnftables-json: Drop invalid ops from match expression
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] tests: shell: Fix one json-nft dump for reordered output
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH] json: Accept more than two operands in binary expressions
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH] tests: shell: Fix one json-nft dump for reordered output
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH net] inet: inet_defrag: prevent sk release while still in use
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] iptables: Fixed the issue with combining the payload in case of invert filter for tcp src and dst ports
- From: Phil Sutter <phil@xxxxxx>
- Re: xtables-addons RAWDNAT bug
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- xtables-addons RAWDNAT bug
- From: "Sagatov, Evgeniy" <esagatov@xxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 2/2] netfilter: flowtable: use UDP timeout after flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/2] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nft_set_pipapo: release elements in clone only from destroy path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH] iptables: Fixed the issue with combining the payload in case of invert filter for tcp src and dst ports
- From: Sriram Rajagopalan <bglsriram@xxxxxxxxx>
- Re: [PATCH libnetfilter_queue 00/32] Convert libnetfilter_queue to not need libnfnetlink
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH nft] tests: shell: update packetpath/flowtables after flow teardown changes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] netlink_delinearize: reverse cross-day meta hour range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] evaluate: display "Range negative size" error
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [nft PATCH 0/7] A bunch of JSON printer/parser fixes
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 03/17] flowtable: Validate NFTNL_FLOWTABLE_SIZE, too
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 12/17] obj: Call obj_ops::set with legal attributes only
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 04/17] obj: Validate NFTNL_OBJ_TYPE, too
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 14/17] obj: Enforce attr_policy compliance in nftnl_obj_set_data()
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 09/17] utils: Fix for wrong variable use in nftnl_assert_validate()
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 01/17] chain: Validate NFTNL_CHAIN_USE, too
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 16/17] obj: Respect data_len when setting attributes
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 08/17] obj: synproxy: Use memcpy() to handle potentially unaligned data
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 10/17] obj: Return value on setters
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 17/17] expr: Respect data_len when setting attributes
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 02/17] table: Validate NFTNL_TABLE_USE, too
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 13/17] obj: Introduce struct obj_ops::attr_policy
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 15/17] utils: Introduce and use nftnl_set_str_attr()
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 11/17] obj: Repurpose struct obj_ops::max_attr field
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 00/17] obj: Introduce attribute policies
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 07/17] obj: Do not call nftnl_obj_set_data() with zero data_len
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 05/17] set: Validate NFTNL_SET_ID, too
- From: Phil Sutter <phil@xxxxxx>
- [libnftnl PATCH 06/17] table: Validate NFTNL_TABLE_OWNER, too
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH] iptables: Fixed the issue with combining the payload in case of invert filter for tcp src and dst ports
- From: Phil Sutter <phil@xxxxxx>
- [PATCH net] inet: inet_defrag: prevent sk release while still in use
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net] MAINTAINERS: step down as netfilter maintainer
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] netlink_delinearize: restore binop syntax when listing ruleset for flags
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [BUG] kernel warning from br_nf_local_in+0x157/0x180
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- [PATCH nf 2/2] netfilter: flowtable: use UDP timeout after flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [BUG] kernel warning from br_nf_local_in+0x157/0x180
- From: Jianbo Liu <jianbol@xxxxxxxxxx>
- [PATCH nf] netfilter: flowtable: infer TCP state and timeout before flow teardown
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 11/11] sysctl: treewide: constify the ctl_table argument of handlers
- From: Dave Chinner <david@xxxxxxxxxxxxx>
- [PATCH 08/11] ipv6/ndisc: constify ctl_table arguments of utility function
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 09/11] ipvs: constify ctl_table arguments of utility functions
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 10/11] sysctl: constify ctl_table arguments of utility function
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 07/11] ipv6/addrconf: constify ctl_table arguments of utility functions
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 11/11] sysctl: treewide: constify the ctl_table argument of handlers
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 06/11] ipv4/sysctl: constify ctl_table arguments of utility functions
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 05/11] neighbour: constify ctl_table arguments of utility function
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 04/11] utsname: constify ctl_table arguments of utility function
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 03/11] hugetlb: constify ctl_table arguments of utility functions
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 02/11] cgroup: bpf: constify ctl_table arguments and fields
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 01/11] stackleak: don't modify ctl_table argument
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH 00/11] sysctl: treewide: constify ctl_table argument of sysctl handlers
- From: Thomas Weißschuh <linux@xxxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: do not reject dormant flag update for table with owner
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [PATCH 0/4] sysctl: Remove sentinel elements from networking
- From: Joel Granados <j.granados@xxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH] iptables: Fixed the issue with combining the payload in case of invert filter for tcp src and dst ports
- From: Sriram Rajagopalan <bglsriram@xxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: do not compare internal table flags on updates
- From: Quan Tian <tianquan23@xxxxxxxxx>
- [PATCH libnetfilter_queue 32/32] whitespace: Fix more checkpatch errors & warnings
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 31/32] src: Use a cast in place of convoluted construct
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 29/32] doc: Cater for doxygen variants w.r.t. #define stmts
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 30/32] doc: Fix list_empty() doxygen comments
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 27/32] doc: Resolve most issues with man page generated from linux_list.h
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 28/32] build: Get real & user times back to what they were
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 26/32] build: Shave some time off build
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 25/32] doc: Move nlif usage description from libnetfilter_queue.c to iftable.c
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 24/32] doc: SYNOPSIS of linux_list.h nominates libnetfilter_queue/libnetfilter_queue.h
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 23/32] doc: Get doxygen to document useful static inline functions
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 22/32] include: Remove the last remaining use of a libnfnetlink header
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 21/32] build: Remove libnfnetlink from the build
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 20/32] src: Delete rtnl.c
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 18/32] include: Use libmnl.h instead of libnfnetlink.h
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 19/32] src: Convert all nlif_* functions to use libmnl
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 17/32] whitespace: remove trailing spaces from iftable.c
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 15/32] doc: Eliminate doxygen warnings from linux_list.h
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 16/32] doc: Eliminate doxygen warnings from iftable.c
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 14/32] doc: Add linux_list.h to the doxygen system
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 13/32] include: Cherry-pick macros and functions that nlif will need
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 12/32] src: Copy nlif-related code from libnfnetlink
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 11/32] src: Fix checkpatch whitespace and block comment warnings
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 10/32] src: Convert remaining nfq_* functions to use libmnl
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 09/32] src: Convert nfq_fd() to use libmnl
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 07/32] src: Convert nfq_set_verdict() and nfq_set_verdict2() to use libmnl if there is no data
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 08/32] src: Incorporate nfnl_rcvbufsiz() in libnetfilter_queue
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 06/32] src: Convert nfq_handle_packet(), nfq_get_secctx(), nfq_get_payload() and all the nfq_get_ functions to use libmnl
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 05/32] src: Convert nfq_set_queue_flags() & nfq_set_queue_maxlen() to use libmnl
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 03/32] src: Convert nfq_close() to use libmnl
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 04/32] src: Convert nfq_create_queue(), nfq_bind_pf() & nfq_unbind_pf() to use libmnl
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 02/32] src: Convert nfq_open_nfnl() to use libmnl
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 01/32] src: Convert nfq_open() to use libmnl
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH libnetfilter_queue 00/32] Convert libnetfilter_queue to not need libnfnetlink
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- Re: [PATCH 0/4] sysctl: Remove sentinel elements from networking
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: do not compare internal table flags on updates
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 4/4] ax.25: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- [PATCH 3/4] appletalk: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- [PATCH 2/4] netfilter: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- [PATCH 1/4] networking: Remove the now superfluous sentinel elements from ctl_table array
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- [PATCH 0/4] sysctl: Remove sentinel elements from networking
- From: Joel Granados via B4 Relay <devnull+j.granados.samsung.com@xxxxxxxxxx>
- Re: Flowtable race condition error
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Flowtable race condition error
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Flowtable race condition error
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH net] netfilter: conntrack: fix ct-state for ICMPv6 Multicast Router Discovery
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net] netfilter: conntrack: fix ct-state for ICMPv6 Multicast Router Discovery
- From: Linus Lüssing <linus.luessing@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [PATCH nft] tests: py: remove meter tests
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nft] tests/py: remove flow table json test cases
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] tests: py: remove meter tests
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: fix consistent table updates being rejected
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: Flowtable race condition error
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Flowtable race condition error
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: Flowtable race condition error
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Flowtable race condition error
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] tests/py: remove flow table json test cases
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] nftables: Fixed the issue with merging the payload in case of invert filter for tcp src and dst ports
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH] iptables: Fixed the issue with combining the payload in case of invert filter for tcp src and dst ports
- From: Sriram Rajagopalan <bglsriram@xxxxxxxxx>
- Re: iptables-nft: Wrong payload merge of rule filter - "! --sport xx ! --dport xx"
- From: Sriram Rajagopalan <bglsriram@xxxxxxxxx>
- Re: iptables-nft: Wrong payload merge of rule filter - "! --sport xx ! --dport xx"
- From: Sriram Rajagopalan <bglsriram@xxxxxxxxx>
- [PATCH] nftables: Fixed the issue with merging the payload in case of invert filter for tcp src and dst ports
- From: Sriram Rajagopalan <bglsriram@xxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Flowtable race condition error
- From: Sven Auhagen <sven.auhagen@xxxxxxxxxxxx>
- Re: [PATCH v3 nf-next 1/2] netfilter: nf_tables: use struct nlattr * to store userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 nf-next 1/2] netfilter: nf_tables: use struct nlattr * to store userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [PATCH v3 nf-next 1/2] netfilter: nf_tables: use struct nlattr * to store userdata for nft_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v3 nf-next 1/2] netfilter: nf_tables: use struct nlattr * to store userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: iptables-nft: Wrong payload merge of rule filter - "! --sport xx ! --dport xx"
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: iptables-nft: Wrong payload merge of rule filter - "! --sport xx ! --dport xx"
- From: Sriram Rajagopalan <bglsriram@xxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: dccp: try not to drop skb in conntrack
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: dccp: try not to drop skb in conntrack
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2 nf-next 1/2] netfilter: nf_tables: use struct nlattr * to store userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- [PATCH v3 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- [PATCH v3 nf-next 1/2] netfilter: nf_tables: use struct nlattr * to store userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [PATCH v2 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- [PATCH nf-next v2] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: dccp: try not to drop skb in conntrack
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH v2 nf-next 1/2] netfilter: nf_tables: use struct nlattr * to store userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: fix updating/deleting devices in an existing netdev chain
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: fix updating/deleting devices in an existing netdev chain
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: fix updating/deleting devices in an existing netdev chain
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: fix updating/deleting devices in an existing netdev chain
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf-next 2/2] netfilter: nf_tables: support updating userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- [PATCH v2 nf-next 1/2] netfilter: nf_tables: use struct nlattr * to store userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [PATCH nf-next] netfilter: nf_tables: support updating userdata for nft_table
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next] netfilter: nf_tables: support updating userdata for nft_table
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [nft PATCH 1/7] tests: shell: maps/named_ct_objects: Fix for recent kernel
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH 1/7] tests: shell: maps/named_ct_objects: Fix for recent kernel
- From: Florian Westphal <fw@xxxxxxxxx>
- [nft PATCH 4/7] tests: shell: Regenerate all json-nft dumps
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 0/7] A bunch of JSON printer/parser fixes
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 6/7] parser: json: Support for synproxy objects
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 2/7] tests: shell: packetpath/flowtables: Avoid spurious EPERM
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 7/7] tests: shell: Add missing json-nft dumps
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 1/7] tests: shell: maps/named_ct_objects: Fix for recent kernel
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 5/7] json: Support maps with concatenated data
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 3/7] json: Order output like nft_cmd_expand()
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH arptables] Fix a couple of spelling errors
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH arptables] Fix a couple of spelling errors
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH v2 xtables] extensions: xt_TPROXY: add txlate support
- From: Phil Sutter <phil@xxxxxx>
- [PATCH arptables] Fix a couple of spelling errors
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net v3] netfilter: Add protection for bmp length out of range
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH xtables] extensions: xt_TPROXY: add txlate support
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 xtables] extensions: xt_TPROXY: add txlate support
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: iptables-nft: Wrong payload merge of rule filter - "! --sport xx ! --dport xx"
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH xtables] extensions: xt_TPROXY: add txlate support
- From: Phil Sutter <phil@xxxxxx>
- Re: [RFC nftables PATCH]: fix a2x: ERROR: missing --destination-dir: ./doc
- From: Phil Sutter <phil@xxxxxx>
- Re: iptables-nft: Wrong payload merge of rule filter - "! --sport xx ! --dport xx"
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH] ipvs: allow netlink configuration from non-initial user namespace
- From: Michael Weiß <michael.weiss@xxxxxxxxxxxxxxxxxxx>
- [PATCH net-next] netfilter: conntrack: using NF_DROP in test statement in nf_conntrack_in()
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [PATCH net-next] netfilter: conntrack: dccp: try not to drop skb in conntrack
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- iptables-nft: Wrong payload merge of rule filter - "! --sport xx ! --dport xx"
- From: Sriram Rajagopalan <bglsriram@xxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH] ipvs: allow netlink configuration from non-initial user namespace
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH net v3] netfilter: Add protection for bmp length out of range
- From: Lena Wang (王娜) <Lena.Wang@xxxxxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [RFC nftables PATCH]: fix a2x: ERROR: missing --destination-dir: ./doc
- From: Neels Hofmeyr <nhofmeyr@xxxxxxxxxxx>
- [PATCH] ipvs: allow netlink configuration from non-initial user namespace
- From: Michael Weiß <michael.weiss@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH nft 2/5] parser_json: move list_add into json_parse_cmd
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nft 2/5] parser_json: move list_add into json_parse_cmd
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Issues with netdev egress hooks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH nft 2/5] parser_json: move list_add into json_parse_cmd
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH nft 2/5] parser_json: move list_add into json_parse_cmd
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nft 2/5] parser_json: move list_add into json_parse_cmd
- From: Phil Sutter <phil@xxxxxx>
- [PATCH xtables] extensions: xt_TPROXY: add txlate support
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Issues with netdev egress hooks
- From: Daniel Mack <daniel@xxxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [PATCH nft 5/5] tests: shell: add more json-nft dumps
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 4/5] parser_json: defer command allocation to nft_cmd_expand
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 3/5] parser_json: add and use CMD_ERR helpers
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 2/5] parser_json: move list_add into json_parse_cmd
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 0/5] parser_json: fix up transaction ordering
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 1/5] parser_json: move some code around
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- Re: [PATCH net 1/5] netfilter: nf_tables: disallow anonymous set with timeout flag
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net] netfilter: conntrack: fix ct-state for ICMPv6 Multicast Router Discovery
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net-next] netfilter: conntrack: avoid sending RST to reply out-of-window skb
- From: Jason Xing <kerneljasonxing@xxxxxxxxx>
- [PATCH nf-next 9/9] netfilter: nf_tables: remove gc sequence counter
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 8/9] netfilter: nf_tables: remove expired elements based on key lookup only
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 7/9] netfilter: nf_tables: prepare for key-based deletion from workqueue
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 5/9] netfilter: nf_tables: condense catchall gc
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 6/9] netfilter: nf_tables: add in-kernel only query that will return expired/dead elements
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 4/9] netfilter: remove nft_trans_gc_catchall_async handling
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 3/9] netfilter: nf_tables: add lockdep assertion for chain use counter
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 2/9] netfilter: nf_tables: decrement element counters on set removal/flush
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 1/9] netfilter: nf_tables: warn if set being destroyed is still active
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 0/9] netfilter: nf_tables: rewrite gc again
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: skip netdev hook unregistration if table is dormant
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: skip netdev hook unregistration if table is dormant
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 5/5] netfilter: nf_conntrack_h323: Add protection for bmp length out of range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 4/5] netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 3/5] netfilter: nft_ct: fix l3num expectations with inet pseudo family
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 2/5] netfilter: nf_tables: reject constant set with timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 0/5] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 1/5] netfilter: nf_tables: disallow anonymous set with timeout flag
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [syzbot] [netfilter?] INFO: rcu detected stall in gc_worker (3)
- From: syzbot <syzbot+eec403943a2a2455adaa@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH nft,v2] evaluate: translate meter into dynamic set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] evaluate: translate meter into dynamic set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Issues with netdev egress hooks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net] netfilter: nf_tables: Fix a memory leak in nf_tables_updchain
- From: Quan Tian <tianquan23@xxxxxxxxx>
- Re: [PATCH xtables-nft v2] extensions: xt_socket: add txlate support for socket match
- From: Phil Sutter <phil@xxxxxx>
- Issues with netdev egress hooks
- From: Daniel Mack <daniel@xxxxxxxxxx>
- Re: [PATCH xtables-nft v2] extensions: xt_socket: add txlate support for socket match
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH xtables-nft v2] extensions: xt_socket: add txlate support for socket match
- From: Phil Sutter <phil@xxxxxx>
- Re: [libnftnl PATCH 0/6] Attribute policies for expressions
- From: Phil Sutter <phil@xxxxxx>
- [PATCH net] netfilter: conntrack: fix ct-state for ICMPv6 Multicast Router Discovery
- From: Linus Lüssing <linus.luessing@xxxxxxxxx>
- [syzbot] [netfilter?] KASAN: slab-use-after-free Read in ip_skb_dst_mtu
- From: syzbot <syzbot+e5167d7144a62715044c@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH xtables-nft v2] extensions: xt_socket: add txlate support for socket match
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH xtables-nft] extensions: xt_socket: add txlate support for sk match v3
- From: Florian Westphal <fw@xxxxxxxxx>
- [iptables PATCH 2/2] xlate: libip6t_mh: Fix and simplify plain '-m mh' match
- From: Phil Sutter <phil@xxxxxx>
- [iptables PATCH 1/2] xlate: Improve redundant l4proto match avoidance
- From: Phil Sutter <phil@xxxxxx>
- Re: [iptables PATCH] xtables-translate: Leverage stored protocol names
- From: Phil Sutter <phil@xxxxxx>
- [PATCH net v3] netfilter: Add protection for bmp length out of range
- From: Lena Wang (王娜) <Lena.Wang@xxxxxxxxxxxx>
- [PATCH nf-next] netfilter: nf_tables: remove NETDEV_CHANGENAME from netdev chain event handler
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next] netfilter: nf_tables: skip transaction if update object is not implemented
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf,v2] netfilter: nf_tables: mark set as dead when deactivating anonymous set with timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: mark set as dead when deactivating anonymous set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: mark set as dead when deactivating anonymous set
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: mark set as dead when deactivating anonymous set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH conntrack-tools v2 0/3] fix potential memory loss and exit codes
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- Re: [PATCH conntrack-tools v2 0/3] fix potential memory loss and exit codes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH conntrack-tools v2 0/3] fix potential memory loss and exit codes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH conntrack-tools 2/3] conntrackd: use size_t for element indices
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net v2] netfilter: Add protection for bmp length out of range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH conntrack-tools 1/3] conntrackd: prevent memory loss if reallocation fails
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- Re: [PATCH conntrack-tools 2/3] conntrackd: use size_t for element indices
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- [PATCH conntrack-tools v2 3/3] conntrackd: exit with failure status
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- [PATCH conntrack-tools v2 2/3] conntrackd: use size_t for element indices
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- [PATCH conntrack-tools v2 1/3] conntrackd: prevent memory loss if reallocation fails
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- [PATCH conntrack-tools v2 0/3] fix potential memory loss and exit codes
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- Re: [PATCH net v2] netfilter: Add protection for bmp length out of range
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH conntrack-tools 1/3] conntrackd: prevent memory loss if reallocation fails
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH conntrack-tools 2/3] conntrackd: use size_t for element indices
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net v2] netfilter: Add protection for bmp length out of range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH conntrack-tools 3/3] conntrackd: exit with failure status
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- [PATCH conntrack-tools 2/3] conntrackd: use size_t for element indices
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- [PATCH conntrack-tools 1/3] conntrackd: prevent memory loss if reallocation fails
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- [PATCH conntrack-tools 0/3] fix potential memory loss and exit codes
- From: Donald Yandt <donald.yandt@xxxxxxxxx>
- Re: [PATCH net v2] netfilter: Add protection for bmp length out of range
- From: Jiri Pirko <jiri@xxxxxxxxxxx>
- [PATCH net v2] netfilter: Add protection for bmp length out of range
- From: Lena Wang (王娜) <Lena.Wang@xxxxxxxxxxxx>
- [PATCH nft 3/3] tests: add test case for named ct objects
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 2/3] parser: allow to define maps that contain ct helpers
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 1/3] parser: allow to define maps that contain timeouts and expectations
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 0/3] parser: allow to define maps that contain ct objects
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf v2] netfilter: nft_ct: fix l3num expectations with inet pseudo family
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: nft_ct: fix l3num expectations with inet pseudo family
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf,v2 2/2] netfilter: nf_tables: reject constant set with timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf,v2 1/2] netfilter: nf_tables: disallow anonymous set with timeout flag
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 2/2] netfilter: nf_tables: reject constant set with timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/2] netfilter: nf_tables: disallow anonymous set with NFT_SET_{TIMEOUT,EVAL} flags
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] ipvs: generic netlink multicast event group
- From: Terin Stock <terin@xxxxxxxxxxxxxx>
- Re: [PATCH] ipvs: generic netlink multicast event group
- From: Julian Anastasov <ja@xxxxxx>
- [iptables PATCH] xtables-translate: Leverage stored protocol names
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH] ipvs: generic netlink multicast event group
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] rule: fix ASAN errors in priority to string conversion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net 1/3] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net 3/3] selftests: netfilter: add bridge conntrack + multicast test case
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH nft 3/3] tests: maps: add a test case for "limit" objref map
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 1/3] parser: allow typeof in objref maps
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 2/3] netlink: allow typeof keywords with objref maps during listing
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 0/3] nftables: add typeof support for objref maps
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net 2/3] netfilter: bridge: confirm multicast packets before passing them up the stack
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 3/3] selftests: netfilter: add bridge conntrack + multicast test case
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 1/3] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 0/3] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [iptables PATCH] nft: Fix for broken recover_rule_compat()
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH] Add protection for bmp length out of range
- From: Lena Wang (王娜) <Lena.Wang@xxxxxxxxxxxx>
- Re: [PATCH] Add protection for bmp length out of range
- From: Florian Westphal <fw@xxxxxxxxx>
- [iptables PATCH] nft: Fix for broken recover_rule_compat()
- From: Phil Sutter <phil@xxxxxx>
- [PATCH v2 nf] netfilter: bridge: confirm multicast packets before passing them up the stack
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Ulogd2 Mysql KO
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] parser: compact type/typeof set rules
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] parser: compact interval typeof rules
- From: Florian Westphal <fw@xxxxxxxxx>
- Ulogd2 Mysql KO
- From: Yves Metivier <yves@xxxxxxxxxxx>
- [PATCH libnftnl 3/3] utils: remove unused code
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH libnftnl 2/3] udata: incorrect userdata buffer size validation
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH libnftnl 1/3] expr: immediate: check for chain attribute to release chain name
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netlink: validate length of NLA_{BE16,BE32} types
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netlink: validate length of NLA_{BE16,BE32} types
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- [PATCH nf 2/2] selftests: netfilter: add bridge conntrack + multicast test case
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 1/2] netfilter: bridge: confirm multicast packets before passing them up the stack
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH 0/2] netfilter: bridge_netfilter:
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net] netlink: validate length of NLA_{BE16,BE32} types
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH net] netlink: validate length of NLA_{BE16,BE32} types
- From: Jiri Pirko <jiri@xxxxxxxxxxx>
- [PATCH nft] parser_json: allow 0 offsets again
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net] netlink: validate length of NLA_{BE16,BE32} types
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [RFC] nftables 0.9.8 -stable backports
- From: Jeremy Sowden <jeremy@xxxxxxxxxx>
- Re: [PATCH] netfilter: xtables: fix IP6_NF_IPTABLES_LEGACY typo
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH] netfilter: xtables: fix IP6_NF_IPTABLES_LEGACY typo
- From: Arnd Bergmann <arnd@xxxxxxxxxx>
- Re: [PATCH net-next 01/12] netfilter: expect: Simplify the allocation of slab caches in nf_conntrack_expect_init
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v3] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [PATCH v3] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH v3] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [PATCH net 1/5] netfilter: nf_tables: set dormant flag on hook register failure
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v2] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
- From: Ignat Korchagin <ignat@xxxxxxxxxxxxxx>
- Re: [PATCH v2] netfilter: nf_tables: allow NFPROTO_INET in nft_(match/target)_validate()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 5/5] netfilter: nf_tables: use kzalloc for hook allocation
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 1/5] netfilter: nf_tables: set dormant flag on hook register failure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 4/5] netfilter: nf_tables: register hooks last when adding new chain/flowtable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 3/5] netfilter: nft_flow_offload: release dst in case direct xmit path is used
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 2/5] netfilter: nft_flow_offload: reset dst in route object after setting up flow
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH net 0/5] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: use kzalloc for hook allocation
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: register hooks last when adding new chain/flowtable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
[Index of Archives]
[LARTC]
[Berkeley Packet Filter]
[Bugtraq]
[Yosemite News]
[Samba]