Linux TCP/IP Netfilter Devel
[Prev Page][Next Page]
- Re: [PATCH net] netfilter: check for out-of-bounds while copying compat entries
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf-next v2 2/2] nf_conncount: Support count only use case
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf-next v2 1/2] netfilter: Refactor nf_conncount
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net] netfilter: check for out-of-bounds while copying compat entries
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- BUG: unable to handle kernel paging request in compat_copy_entries
- From: syzbot <syzbot+5705ba91388d7bc30828@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Akshat Kakkar <akshat.1984@xxxxxxxxx>
- [PATCH nf-next v2 2/2] nf_conncount: Support count only use case
- From: Yi-Hung Wei <yihung.wei@xxxxxxxxx>
- [PATCH nf-next v2 1/2] netfilter: Refactor nf_conncount
- From: Yi-Hung Wei <yihung.wei@xxxxxxxxx>
- Re: Contribute to Net-filter Development && G-Soc 2018
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 0/2] ebtables: add support for ICMP and IGMP type/code matching
- From: Matthias Schiffer <mschiffer@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH nf-next 0/2] ebtables: add support for ICMP and IGMP type/code matching
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 2/2] ebtables: add support for matching IGMP type
- From: Matthias Schiffer <mschiffer@xxxxxxxxxxxxxxxxxxxx>
- [PATCH ebtables 3/4] ebt_ip: add support for matching ICMP type and code
- From: Matthias Schiffer <mschiffer@xxxxxxxxxxxxxxxxxxxx>
- [PATCH ebtables 2/4] Move ICMP type handling functions from ebt_ip6 to useful_functions.c
- From: Matthias Schiffer <mschiffer@xxxxxxxxxxxxxxxxxxxx>
- [PATCH ebtables 1/4] include: sync linux/netfilter_bridge/ebt_ip.h with kernel
- From: Matthias Schiffer <mschiffer@xxxxxxxxxxxxxxxxxxxx>
- [PATCH ebtables 4/4] ebt_ip: add support for matching IGMP type
- From: Matthias Schiffer <mschiffer@xxxxxxxxxxxxxxxxxxxx>
- [PATCH nf-next 1/2] ebtables: add support for matching ICMP type and code
- From: Matthias Schiffer <mschiffer@xxxxxxxxxxxxxxxxxxxx>
- [PATCH nf-next 0/2] ebtables: add support for ICMP and IGMP type/code matching
- From: Matthias Schiffer <mschiffer@xxxxxxxxxxxxxxxxxxxx>
- [PATCH nft,v2] src: add variable expression and use it to allow redefinitions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 1/2] src: add variable expression and use it to allow redefinitions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 2/2] tests: shell: redefine and undefine
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Contribute to Net-filter Development && G-Soc 2018
- From: Himanshu Sagar <himanshu14046@xxxxxxxxxxx>
- [ANNOUNCE] nftables 0.8.3 release
- From: Florian Westphal <fw@xxxxxxxxx>
- [ANNOUNCE] ipset 6.36 released
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH nf-next 2/2] nf_conncount: Support count only use case
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] src: datatype: prefer sscanf, avoid strncpy
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 nft] libnftables: Print error and exit for empty string
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nft] configure: misc updates
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] netlink: remove non-batching routines
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] configure: misc updates
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH v2 nft] libnftables: Print error and exit for empty string
- From: Harsha Sharma <harshasharmaiitr@xxxxxxxxx>
- Re: [PATCH 00/14] Netfilter/IPVS fixes for net
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 02/14] netfilter: ipt_CLUSTERIP: put config instead of freeing it
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 01/14] netfilter: ipt_CLUSTERIP: put config struct if we can't increment ct refcount
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 03/14] netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 06/14] netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 04/14] netfilter: bridge: ebt_among: add missing match size checks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 08/14] netfilter: increase IPSTATS_MIB_CSUMERRORS stat
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 13/14] netfilter: nf_tables: use the right index from flowtable error path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 05/14] netfilter: ebtables: convert BUG_ONs to WARN_ONs
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 10/14] netfilter: use skb_to_full_sk in ip6_route_me_harder
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 14/14] ipvs: remove IPS_NAT_MASK check to fix passive FTP
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 11/14] netfilter: nf_tables: return EBUSY if device already belongs to flowtable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 12/14] netfilter: nf_tables: missing attribute validation in nf_tables_delflowtable()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 09/14] netfilter: don't set F_IFACE on ipv6 fib lookups
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 07/14] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 00/14] Netfilter/IPVS fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] fix integer type size to be used as a key for sets and maps
- From: Laura Garcia Liebana <nevola@xxxxxxxxx>
- Re: [PATCH nft] fix integer type size to be used as a key for sets and maps
- From: Phil Sutter <phil@xxxxxx>
- [PATCH nft] fix integer type size to be used as a key for sets and maps
- From: Laura Garcia Liebana <nevola@xxxxxxxxx>
- [PATCH trivial resend]] netfilter: xt_limit: Spelling s/maxmum/maximum/
- From: Geert Uytterhoeven <geert+renesas@xxxxxxxxx>
- Re: [PATCH nft] parser: support of maps with timeout
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [PATCH nft] parser: support of maps with timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH 0/6] A number of covscan-induced fixes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] parser: support of maps with timeout
- From: Laura Garcia Liebana <nevola@xxxxxxxxx>
- Re: [Patch nf-next] netfilter: make xt_rateest hash table per net
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [Patch nf-next] netfilter: make xt_rateest hash table per net
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: [PATCH nf-next 2/2] nf_conncount: Support count only use case
- From: Yi-Hung Wei <yihung.wei@xxxxxxxxx>
- Re: [PATCH nf-next 1/2] netfilter: nf_conncount: Refactor nf_conncount
- From: Yi-Hung Wei <yihung.wei@xxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Akshat Kakkar <akshat.1984@xxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [nft PATCH 5/6] netlink: Complain if setting O_NONBLOCK fails
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 1/6] cli: Drop pointless check in cli_append_multiline()
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 2/6] erec: Avoid passing negative offset to fseek()
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 3/6] evaluate: Fix memleak in stmt_reject_gen_dependency()
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH v2 6/6] netlink_delinearize: Fix resource leaks
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 0/6] A number of covscan-induced fixes
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 4/6] hash: Fix potential null-pointer dereference in hash_expr_cmp()
- From: Phil Sutter <phil@xxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Akshat Kakkar <akshat.1984@xxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [PATCH iptables 3/3] xtables: Introduce and use common function to print val[/mask] arguments
- From: Serhey Popovych <serhe.popovych@xxxxxxxxx>
- [PATCH iptables 1/3] extensions: Initialize linear mapping of symbols in _init() of extension
- From: Serhey Popovych <serhe.popovych@xxxxxxxxx>
- [PATCH iptables 2/3] xtables: Introduce and use common function to parse val[/mask] arguments
- From: Serhey Popovych <serhe.popovych@xxxxxxxxx>
- [PATCH iptables 0/3] iptables: Unify val[/mask] parsing and printing routines
- From: Serhey Popovych <serhe.popovych@xxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Akshat Kakkar <akshat.1984@xxxxxxxxx>
- Re: [PATCH nf-next 2/2] nf_conncount: Support count only use case
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf-next 1/2] netfilter: nf_conncount: Refactor nf_conncount
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 2/2] nf_conncount: Support count only use case
- From: Yi-Hung Wei <yihung.wei@xxxxxxxxx>
- [PATCH nf-next 1/2] netfilter: nf_conncount: Refactor nf_conncount
- From: Yi-Hung Wei <yihung.wei@xxxxxxxxx>
- [PATCH nft] tests: shell: regression test for bugzilla 1228
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] ipvs: remove IPS_NAT_MASK check to fix passive FTP
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] extensions: libxt_bpf: Fix build with old kernel versions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH 0/2] Review monitor code for output_fp conformity
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH] Review switch statements for unmarked fall through cases
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH] Review switch statements for unmarked fall through cases
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] Review switch statements for unmarked fall through cases
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net] ipvs: remove IPS_NAT_MASK check to fix passive FTP
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [nft PATCH] Review switch statements for unmarked fall through cases
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH] netlink_delinearize: Fix resource leaks
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 2/2] monitor: Make JSON/XML output respect output_fp
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 0/2] Review monitor code for output_fp conformity
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 1/2] monitor: Make trace events respect output_fp
- From: Phil Sutter <phil@xxxxxx>
- [PATCH nft] doc: add example for rule add/delete
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Akshat Kakkar <akshat.1984@xxxxxxxxx>
- [nft] nftables: Adding support for segment routing header 'srh'
- From: Ahmed Abdelsalam <amsalam20@xxxxxxxxx>
- Re: [nft] nftables: Fixing Bug 1219 - handle rt0 and rt2 properly
- From: Ahmed Abdelsalam <amsalam20@xxxxxxxxx>
- [PATCH nft] doc: remove ipv6 address FIXME
- From: Florian Westphal <fw@xxxxxxxxx>
- WARNING in xt_cluster_mt
- From: syzbot <syzbot+0346441ae0545cfcea3a@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH nf-next 11/11] netfilter: x_tables: ensure last rule in base chain matches underflow/policy
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 10/11] netfilter: x_tables: make sure compat af mutex is held
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 09/11] netfilter: compat: reject huge allocation requests
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 08/11] netfilter: compat: prepare xt_compat_init_offsets to return errors
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 07/11] netfilter: x_tables: add counters allocation wrapper
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 06/11] netfilter: x_tables: limit allocation requests for blob rule heads
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 05/11] netfilter: x_tables: cap allocations at 512 mbyte
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 04/11] netfilter: x_tables: enforce unique and ascending entry points
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 03/11] netfilter: x_tables: move hook entry checks into core
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 02/11] netfilter: x_tables: check error target size too
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 01/11] netfilter: x_tables: check standard verdicts in core
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 00/11] netfilter: x_tables: add more checks on rule blob format
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft] nftables: Fixing Bug 1219 - handle rt0 and rt2 properly
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft] nftables: Fixing Bug 1219 - handle rt0 and rt2 properly
- From: Ahmed Abdelsalam <amsalam20@xxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: use the right index from flowtable error path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 1/2 nf,v2] netfilter: nf_tables: return EBUSY if device already belongs to flowtable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft] nftables: Fixing Bug 1219 - handle rt0 and rt2 properly
- From: Florian Westphal <fw@xxxxxxxxx>
- [nft] nftables: Fixing Bug 1219 - handle rt0 and rt2 properly
- From: Ahmed Abdelsalam <amsalam20@xxxxxxxxx>
- [nf-next] netfilter: nf_tables: Fixing Bug 1219 - handle rt0 and rt2 properly
- From: Ahmed Abdelsalam <amsalam20@xxxxxxxxx>
- [PATCH] extensions: libxt_bpf: Fix build with old kernel versions
- From: Hauke Mehrtens <hauke@xxxxxxxxxx>
- [PATCH nft] doc: mention meta l4proto and ipv6 nexthdr issue wrt. extension headers
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: PROBLEM: "netfilter: on sockopt() acquire sock lock only in the required scope" breaks at least sshuttle
- From: Florian Westphal <fw@xxxxxxxxx>
- PROBLEM: "netfilter: on sockopt() acquire sock lock only in the required scope" breaks at least sshuttle
- From: Luke Bratch <luke@xxxxxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Akshat Kakkar <akshat.1984@xxxxxxxxx>
- [PATCH 1/2] net: Allow to and from offsets to be equal in skb_find_text
- From: Bernie Harris <bernie.harris@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] ebtables: Add string filter
- From: Bernie Harris <bernie.harris@xxxxxxxxxxxxxxxxxxx>
- [ebtables PATCH] Add string filter to ebtables
- From: Bernie Harris <bernie.harris@xxxxxxxxxxxxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Michal Kubecek <mkubecek@xxxxxxx>
- Re: question about UNDEFINE/REDEFINE
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 5/5] tests: add raw payload test cases.
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 1/5] payload: use integer_type when initializing a raw expression
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 4/5] doc: document raw protocol expression
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 3/5] src: make raw payloads work
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 2/5] payload: don't resolve expressions using the inet pseudoheader
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 0/5] payload: make raw protocl expressions work
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 2/2] netfilter: nf_tables: missing attribute validation in nf_tables_delflowtable()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/2] netfilter: nf_tables: return EBUSY if device already belongs to flowtable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Akshat Kakkar <akshat.1984@xxxxxxxxx>
- [PATCH v3 03/17] ipv6: make ip6_dst_mtu_forward inline
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 14/17] netfilter: nf_flow_table: add a new flow state for tearing down offloading
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 09/17] netfilter: nf_flow_table: relax mixed ipv4/ipv6 flowtable dependencies
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 07/17] netfilter: nf_flow_table: move ip header check out of nf_flow_exceeds_mtu
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 0/17] netfilter: nf_flow_table: refactoring, TCP state tracking, sending flows to slow path
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 06/17] netfilter: nf_flow_table: move ipv4 offload hook code to nf_flow_table
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 13/17] netfilter: nf_flow_table: make flow_offload_dead inline
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 16/17] netfilter: nf_flow_table: add support for sending flows back to the slow path
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 11/17] netfilter: nf_flow_table: fix priv pointer for netdev hook
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 15/17] netfilter: nf_flow_table: in flow_offload_lookup, skip entries being deleted
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 10/17] netfilter: nf_flow_table: move init code to nf_flow_table_core.c
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 12/17] netfilter: nf_flow_table: track flow tables in nf_flow_table directly
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 17/17] netfilter: nf_flow_table: tear down TCP flows if RST or FIN was seen
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 05/17] netfilter: nf_flow_table: rename nf_flow_table.c to nf_flow_table_core.c
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 04/17] netfilter: nf_flow_table: cache mtu in struct flow_offload_tuple
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 08/17] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 02/17] netfilter: nf_flow_table: clean up flow_offload_alloc
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v3 01/17] netfilter: nf_flow_table: use IP_CT_DIR_* values for FLOW_OFFLOAD_DIR_*
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] src: allow to specify flowtable maximum size
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH libnftnl] flowtable: allow to specify size
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH nf-next] netfilter: nf_tables: set maximum flowtable size
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH v2 3/6] netfilter: nf_flow_table: in flow_offload_lookup, skip entries being deleted
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH v2 4/6] netfilter: nf_flow_table: add support for sending flows back to the slow path
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [nft PATCH] meta: introduce datatype ifname_type
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ipvs: flag ct as needing s/dnat in original direction
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH net] ipvs: remove IPS_NAT_MASK check to fix passive FTP
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH v2 3/6] netfilter: nf_flow_table: in flow_offload_lookup, skip entries being deleted
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 4/6] netfilter: nf_flow_table: add support for sending flows back to the slow path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ipvs: flag ct as needing s/dnat in original direction
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf] netfilter: ipvs: flag ct as needing s/dnat in original direction
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH] extensions: add tests for comp match options
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: don't set F_IFACE on ipv6 fib lookups
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: increase IPSTATS_MIB_CSUMERRORS stat
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ipvs: flag ct as needing s/dnat in original direction
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ebtables: convert BUG_ONs to WARN_ONs
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: bridge: ebt_among: add missing match size checks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 0/2] netfilter: ipt_CLUSTERIP: two more fixes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] xtables-compat-multi.c: Allow symlink of ebtables
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v2 3/3] files: add load balance example
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v3 2/3] examples: add ct helper examples
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v2 1/3] nftables: rearrange files and examples
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 5/6] netfilter: nf_flow_table: tear down TCP flows if RST or FIN was seen
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [iptables PATCH] iptables: add xtables-compat.8 manpage
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] src: Print error and exit for empty string
- From: Florian Westphal <fw@xxxxxxxxx>
- [iptables PATCH] iptables: add xtables-compat.8 manpage
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [PATCH] src: Print error and exit for empty string
- From: Harsha Sharma <harshasharmaiitr@xxxxxxxxx>
- [nft PATCH v3 2/3] examples: add ct helper examples
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- [nft PATCH] meta: introduce datatype ifname_type
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- [PATCH v2 6/6] netfilter: nf_flow_table: fix checksum when handling DNAT
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v2 1/6] netfilter: nf_flow_table: make flow_offload_dead inline
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v2 4/6] netfilter: nf_flow_table: add support for sending flows back to the slow path
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v2 2/6] netfilter: nf_flow_table: add a new flow state for tearing down offloading
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v2 3/6] netfilter: nf_flow_table: in flow_offload_lookup, skip entries being deleted
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v2 5/6] netfilter: nf_flow_table: tear down TCP flows if RST or FIN was seen
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH v2 0/6] netfilter: nf_flow_table: TCP state tracking and bumping of flows to slow path
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH] xtables-compat-multi.c: Allow symlink of ebtables
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- [PATCH 1/5] netfilter: nf_flow_table: make flow_offload_dead inline
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 0/5] netfilter: nf_flow_table: TCP state tracking and bumping of flows to slow path
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 4/5] netfilter: nf_flow_table: add support for sending flows back to the slow path
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 5/5] netfilter: nf_flow_table: tear down TCP flows if RST or FIN was seen
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 3/5] netfilter: nf_flow_table: in flow_offload_lookup, skip entries being deleted
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 2/5] netfilter: nf_flow_table: add a new flow state for tearing down offloading
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH] xtables-compat-multi.c: Allow symlink of ebtables
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- Re: [nft PATCH v2 1/3] nftables: rearrange files and examples
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH v2 1/3] nftables: rearrange files and examples
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [nft PATCH v2 2/3] examples: add ct helper examples
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH v2 1/3] nftables: rearrange files and examples
- From: Florian Westphal <fw@xxxxxxxxx>
- [nft PATCH v2 3/3] files: add load balance example
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- [nft PATCH v2 2/3] examples: add ct helper examples
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- [nft PATCH v2 1/3] nftables: rearrange files and examples
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: ipvs: flag ct as needing s/dnat in original direction
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [NFT PATCH 1/3] nftables: rearrange files and examples
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] segtree: check for overlapping elements at insertion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [NFT PATCH 1/3] nftables: rearrange files and examples
- From: Florian Westphal <fw@xxxxxxxxx>
- [NFT PATCH 3/3] files: add load balance example
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- [NFT PATCH 2/3] examples: add ct helper examples
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- [NFT PATCH 1/3] nftables: rearrange files and examples
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: nft/bpf interpreters and spectre2. Was: [PATCH RFC 0/4] net: add bpfilter
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: nft/bpf interpreters and spectre2. Was: [PATCH RFC 0/4] net: add bpfilter
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: nft/bpf interpreters and spectre2. Was: [PATCH RFC 0/4] net: add bpfilter
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [ANNOUNCE] ipset 6.28 released
- From: Akshat Kakkar <akshat.1984@xxxxxxxxx>
- nft/bpf interpreters and spectre2. Was: [PATCH RFC 0/4] net: add bpfilter
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH RFC PoC 0/3] nftables meets bpf
- From: Jakub Kicinski <kubakici@xxxxx>
- Re: [PATCH RFC PoC 0/3] nftables meets bpf
- From: Florian Fainelli <f.fainelli@xxxxxxxxx>
- Re: [PATCH RFC PoC 0/3] nftables meets bpf
- From: Jakub Kicinski <kubakici@xxxxx>
- WARNING: ODEBUG bug in do_ipt_get_ctl
- From: syzbot <syzbot+d7deafa2c73b7a2b74ef@xxxxxxxxxxxxxxxxxxxxxxxxx>
- WARNING: ODEBUG bug in do_arpt_get_ctl
- From: syzbot <syzbot+9d1c0d941336dbc741a1@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/19] Netfilter fixes for net
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 3/3] netfilter: nf_tables: add BPF-based jit infrastructure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: WARNING: ODEBUG bug in __queue_work
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [PATCH RFC 3/3] netfilter: nf_tables: add BPF-based jit infrastructure
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- WARNING: ODEBUG bug in __queue_work
- From: syzbot <syzbot+8288e492017b059ff014@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH 08/12] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: How to retrieve original source address with FTP/NAT/TPROXY
- From: Gregory Vander Schueren <gregory.vanderschueren@xxxxxxxxxxxx>
- Re: [PATCH 08/12] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH 08/12] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 02/19] netfilter: ipt_CLUSTERIP: fix a race condition of proc file creation
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 04/19] netfilter: add back stackpointer size checks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 05/19] netfilter: ipt_CLUSTERIP: fix a refcount bug in clusterip_config_find_get()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 07/19] netfilter: x_tables: use pr ratelimiting in xt core
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 03/19] netfilter: drop outermost socket lock in getsockopt()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 06/19] netfilter: x_tables: remove pr_info where possible
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 09/19] netfilter: xt_NFQUEUE: use pr ratelimiting
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 10/19] netfilter: xt_set: use pr ratelimiting
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 11/19] netfilter: bridge: use pr ratelimiting
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 12/19] netfilter: x_tables: rate-limit table mismatch warnings
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 08/19] netfilter: xt_CT: use pr ratelimiting
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 13/19] netfilter: x_tables: use pr ratelimiting in matches/targets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 15/19] .gitignore: ignore ASN.1 auto generated files
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 14/19] netfilter: x_tables: use pr ratelimiting in all remaining spots
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 17/19] netfilter: nat: cope with negative port range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 16/19] netfilter: x_tables: fix missing timer initialization in xt_LED
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 18/19] netfilter: xt_hashlimit: fix lock imbalance
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 19/19] netfilter: IDLETIMER: be syzkaller friendly
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 01/19] netfilter: x_tables: remove size check
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 00/19] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 08/12] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH 08/12] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 12/12] netfilter: nf_flow_table: track flow tables in nf_flow_table directly
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH 12/12] netfilter: nf_flow_table: track flow tables in nf_flow_table directly
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 08/12] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: [PATCH RFC PoC 0/3] nftables meets bpf
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH 08/12] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH 12/12] netfilter: nf_flow_table: track flow tables in nf_flow_table directly
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 05/12] netfilter: nf_flow_table: rename nf_flow_table.c to nf_flow_table_core.c
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 04/12] netfilter: nf_flow_table: cache mtu in struct flow_offload_tuple
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 01/12] netfilter: nf_flow_table: use IP_CT_DIR_* values for FLOW_OFFLOAD_DIR_*
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 11/12] netfilter: nf_flow_table: fix priv pointer for netdev hook
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 03/12] ipv6: make ip6_dst_mtu_forward inline
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 06/12] netfilter: nf_flow_table: move ipv4 offload hook code to nf_flow_table
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 07/12] netfilter: nf_flow_table: move ip header check out of nf_flow_exceeds_mtu
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 09/12] netfilter: nf_flow_table: relax mixed ipv4/ipv6 flowtable dependencies
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 02/12] netfilter: nf_flow_table: clean up flow_offload_alloc
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 08/12] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 10/12] netfilter: nf_flow_table: move init code to nf_flow_table_core.c
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: shift by n bits while performing '--restore-mark'
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH RFC PoC 0/3] nftables meets bpf
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 3/3] netfilter: nf_tables: add BPF-based jit infrastructure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Michal Kubecek <mkubecek@xxxxxxx>
- Re: shift by n bits while performing '--restore-mark'
- From: Jack Ma <Jack.Ma@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH RFC PoC 0/3] nftables meets bpf
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH RFC 3/3] netfilter: nf_tables: add BPF-based jit infrastructure
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH nft v2] nftables: basic support for extended netlink errors
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: IDLETIMER: be syzkaller friendly
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables] extensions: connmark: remove non-working translation
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables] extensions: mark: prefer plain 'set' over 'set mark and'
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Phil Sutter <phil@xxxxxx>
- [PATCH RFC 1/3] netfilter: nf_tables: add infrastructure to provide intermediate representation
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH RFC PoC 0/3] nftables meets bpf
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH RFC 3/3] netfilter: nf_tables: add BPF-based jit infrastructure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH RFC 2/3] netfilter: add ast to target transformation
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH iptables] extensions: connmark: remove non-working translation
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH iptables] extensions: mark: prefer plain 'set' over 'set mark and'
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf 1/2] netfilter: ipt_CLUSTERIP: put config struct if we can't increment ct refcount
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf 1/2] netfilter: ipt_CLUSTERIP: put config struct if we can't increment ct refcount
- From: kbuild test robot <lkp@xxxxxxxxx>
- KASAN: use-after-free Write in nf_nat_ipv6_manip_pkt
- From: syzbot <syzbot+10005f4292fc9cc89de7@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH nf] netfilter: ipv6: fix use-after-free Write in nf_nat_ipv6_manip_pkt
- From: Florian Westphal <fw@xxxxxxxxx>
- KASAN: use-after-free Write in nf_nat_ipv6_manip_pkt
- From: syzbot <syzbot+10005f4292fc9cc89de7@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH nf] netfilter: bridge: ebt_among: add missing match size checks
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: ebtables: convert BUG_ONs to WARN_ONs
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- KASAN: use-after-free Write in nf_nat_ipv6_manip_pkt
- From: syzbot <syzbot+10005f4292fc9cc89de7@xxxxxxxxxxxxxxxxxxxxxxxxx>
- BUG: unable to handle kernel paging request in ebt_among_mt_check
- From: syzbot <syzbot+fe0b19af568972814355@xxxxxxxxxxxxxxxxxxxxxxxxx>
- WARNING in compat_copy_entries
- From: syzbot <syzbot+845a53d13171abf8bf29@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] doc/nft.xml: fix typo
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH] doc/nft.xml: fix typo
- From: Duncan Roe <duncan_roe@xxxxxxxxxxxxxxx>
- [PATCH nft v2] nftables: basic support for extended netlink errors
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH iptables] extenstions: ecn: add tcp ecn/cwr translation
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] nftables: basic support for extended netlink errors
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Harald Welte <laforge@xxxxxxxxxxxx>
- [RFC 4/9] netfilter: nf_flow_table: cache mtu in struct flow_offload_tuple
- From: Felix Fietkau <nbd@xxxxxxxx>
- [RFC 5/9] netfilter: nf_flow_table: rename nf_flow_table.c to nf_flow_table_core.c
- From: Felix Fietkau <nbd@xxxxxxxx>
- [RFC 6/9] netfilter: nf_flow_table: move ipv4 offload hook code to nf_flow_table
- From: Felix Fietkau <nbd@xxxxxxxx>
- [RFC 2/9] netfilter: nf_flow_table: clean up flow_offload_alloc
- From: Felix Fietkau <nbd@xxxxxxxx>
- [RFC 1/9] netfilter: nf_flow_table: use IP_CT_DIR_* values for FLOW_OFFLOAD_DIR_*
- From: Felix Fietkau <nbd@xxxxxxxx>
- [RFC 7/9] netfilter: nf_flow_table: move ip header check out of nf_flow_exceeds_mtu
- From: Felix Fietkau <nbd@xxxxxxxx>
- [RFC 8/9] netfilter: nf_flow_table: move ipv6 offload hook code to nf_flow_table
- From: Felix Fietkau <nbd@xxxxxxxx>
- [RFC 9/9] netfilter: nf_flow_table: relax mixed ipv4/ipv6 flowtable dependencies
- From: Felix Fietkau <nbd@xxxxxxxx>
- [RFC 3/9] ipv6: make ip6_dst_mtu_forward inline
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH nf] netfilter: IDLETIMER: be syzkaller friendly
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH] netfilter: increase IPSTATS_MIB_CSUMERRORS stat
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH nf-next] net: netfilter: nf_tables_api: Use id allocation.
- From: Varsha Rao <rvarsha016@xxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] inet: don't call skb_orphan if tproxy happens in layer 2
- From: Gregory Vander Schueren <gregory.vanderschueren@xxxxxxxxxxxx>
- Re: [PATCH RFC 0/4] net: add bpfilter
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf 0/2] netfilter: ipt_CLUSTERIP: two more fixes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH RFC 4/4] bpf: rough bpfilter codegen example hack
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH RFC 1/4] modules: allow insmod load regular elf binaries
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH RFC 3/4] net: initial bpfilter skeleton
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH RFC 2/4] bpf: introduce bpfilter commands
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH RFC 0/4] net: add bpfilter
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH nf 2/2] netfilter: ipt_CLUSTERIP: put config instead of freeing it
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 1/2] netfilter: ipt_CLUSTERIP: put config struct if we can't increment ct refcount
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 0/2] netfilter: ipt_CLUSTERIP: two more fixes
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v4] netfilter : add NAT support for shifted portmap ranges
- From: Thierry Du Tre <thierry@xxxxxxxxxxxx>
- Re: [PATCH] inet: don't call skb_orphan if tproxy happens in layer 2
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: unlock xt_table earlier in __do_replace
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [PATCH] inet: don't call skb_orphan if tproxy happens in layer 2
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net] netfilter: unlock xt_table earlier in __do_replace
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net] netfilter: unlock xt_table earlier in __do_replace
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [nft PATCH] Enable automerge feature for anonymous sets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft 0/6] rework dependency removal (v2)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH] inet: don't call skb_orphan if tproxy happens in layer 2
- From: Gregory Vander Schueren <gregory.vanderschueren@xxxxxxxxxxxx>
- [PATCH nft] src: bail out when exporting ruleset with unsupported output
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Userspace nft parser limitations / suggestions / help
- From: Fran Fitzpatrick <francis.x.fitzpatrick@xxxxxxxxx>
- Re: [PATCH] Spelling fixes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] payload: don't decode past last valid template
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] payload: don't decode past last valid template
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Overlapping IP networks no longer allowed?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] parser_bison: restore nft {import,export} ruleset
- From: Phil Sutter <phil@xxxxxx>
- Re: Overlapping IP networks no longer allowed?
- From: Mantas Mikulėnas <grawity@xxxxxxxxx>
- Re: shift by n bits while performing '--restore-mark'
- From: Jack Ma <Jack.Ma@xxxxxxxxxxxxxxxxxxx>
- [PATCH nf] netfilter: don't set F_IFACE on ipv6 fib lookups
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Overlapping IP networks no longer allowed?
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf RFC] netfilter: x_tables: only allow jumps to user-defined chains
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net v3] netfilter: nat: cope with negative port range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net v2] netfilter: x_tables: fix missing timer initialization in xt_LED
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] parser_bison: restore nft {import,export} ruleset
- From: Shyam Saini <mayhs11saini@xxxxxxxxx>
- Re: [PATCH v2] .gitignore: ignore ASN.1 auto generated files
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: add back stackpointer size checks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [Patch net v2] ipt_CLUSTERIP: fix a refcount bug in clusterip_config_find_get()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: netfilter: x_tables: ratelimit most printks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net v2] netfilter: drop outermost socket lock in getsockopt()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] parser_bison: restore nft {import,export} ruleset
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] parser_bison: restore nft {import,export} ruleset
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH libnftnl] set_elem: nftnl_set_elems_parse() returns 0 if set is empty
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH libnftnl] examples: nft-set-del: fix set deletion
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] parser_bison: restore nft {import,export} ruleset
- From: Shyam Saini <mayhs11saini@xxxxxxxxx>
- Re: [PATCH] configure: Make missing docbook2man an error if man build requested
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] parser_bison: restore nft {import,export} ruleset
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Overlapping IP networks no longer allowed?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] tests: add test case for sets updated from packet path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Overlapping IP networks no longer allowed?
- From: Mantas Mikulėnas <grawity@xxxxxxxxx>
- [PATCH nft] tests: add test case for sets updated from packet path
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net v3] netfilter: nat: cope with negative port range
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net v2] netfilter: nat: cope with negative port range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net v2] netfilter: nat: cope with negative port range
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH nft 3/6] src: add payload_dependency_exists()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 2/6] payload: add payload_dependency_release() helper function
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 6/6] netlink_delinearize: add meta_may_dependency_kill()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 4/6] src: get rid of __payload_dependency_kill()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 5/6] payload: add payload_may_dependency_kill()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 1/6] src: pass family to payload_dependency_kill()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 0/6] rework dependency removal (v2)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net v2] netfilter: nat: cope with negative port range
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [bisected] Forwarded packets occasionally has loopback output interface in Netfilter
- From: "Anders K. Pedersen | Cohaesio" <akp@xxxxxxxxxxxx>
- Re: [PATCH net v2] netfilter: nat: cope with negative port range
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH net v2] netfilter: nat: cope with negative port range
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH net v2] netfilter: nat: cope with negative port range
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH net v2] netfilter: nat: cope with negative port range
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net] netfilter: nat: cope with negative port range
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net] netfilter: nat: cope with negative port range
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net] netfilter: nat: cope with negative port range
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- short question for you
- From: "Peter Williams" <peter@xxxxxxxxxxxxx>
- Re: Apply "netfilter: nf_queue: Make the queue_handler pernet" to 4.4-stable
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH] netfilter: ipt_ah: return boolean instead of integer
- From: "Gustavo A. R. Silva" <garsilva@xxxxxxxxxxxxxx>
- Re: question about UNDEFINE/REDEFINE
- From: David Fabian <david.fabian@xxxxxxx>
- divide error in nf_nat_l4proto_unique_tuple
- From: syzbot <syzbot+8012e198bd037f4871e5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH nf] netfilter: nf_nat: range size must be at least 1
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH net v2] netfilter: x_tables: fix missing timer initialization in xt_LED
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- divide error in nf_nat_l4proto_unique_tuple
- From: syzbot <syzbot+8012e198bd037f4871e5@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: x_tables: fix missing timer initialization in xt_LED
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- [PATCH net] netfilter: x_tables: fix missing timer initialization in xt_LED
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- kernel BUG at kernel/time/timer.c:LINE!
- From: syzbot <syzbot+10c98dc5725c6c8fc7fb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: How to retrieve original source address with FTP/NAT/TPROXY
- From: Gregory Vander Schueren <gregory.vanderschueren@xxxxxxxxxxxx>
- Re: general protection fault in ipt_do_table
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: general protection fault in ipt_do_table
- From: Florian Westphal <fw@xxxxxxxxx>
- general protection fault in ipt_do_table
- From: syzbot <syzbot+c914fd8c6a751c4fddbd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- kernel BUG at kernel/time/timer.c:LINE!
- From: syzbot <syzbot+10c98dc5725c6c8fc7fb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- RE: [kbuild-all] [nf:master 1/9] arch/x86/tools/insn_decoder_test: warning: ffffffff817c07c3: 0f ff e9 ud0 %ecx, %ebp
- From: "Li, Philip" <philip.li@xxxxxxxxx>
- [PATCH v2] .gitignore: ignore ASN.1 auto generated files
- From: Zhu Lingshan <lszhu@xxxxxxxx>
- Re: [nf:master 1/9] arch/x86/tools/insn_decoder_test: warning: ffffffff817c07c3: 0f ff e9 ud0 %ecx,%ebp
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [PATCH] .gitignore: ignore ANS.1 auto generated files
- From: Zhu Lingshan <lszhu@xxxxxxxx>
- [PATCH] netfilter: nf_conntrack_broadcast: remove useless parameter
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH] netfilter: xt_cluster: get rid of xt_cluster_ipv6_is_multicast
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH] netfilter: nfnetlink_acct: remove useless parameter
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH] .gitignore: ignore ANS.1 auto generated files
- From: Zhu Lingshan <lszhu@xxxxxxxx>
- Apply "netfilter: nf_queue: Make the queue_handler pernet" to 4.4-stable
- From: Eric Biggers <ebiggers3@xxxxxxxxx>
- [PATCH v2 nf 9/9] netfilter: x_tables: use pr ratelimiting in all remaining spots
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf 8/9] netfilter: x_tables: use pr ratelimiting in matches/targets
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf 7/9] netfilter: x_tables: rate-limit table mismatch warnings
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf 6/9] netfilter: bridge: use pr ratelimiting
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf 5/9] netfilter: xt_set: use pr ratelimiting
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf 4/9] netfilter: xt_NFQUEUE: use pr ratelimiting
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf 3/9] netfilter: xt_CT: use pr ratelimiting
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf 2/9] netfilter: x_tables: use pr ratelimiting in xt core
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf 1/9] netfilter: x_tables: remove pr_info where possible
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf 0/9] netfilter: x_tables: use printk ratelimiting
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH] src: fix build with older glibc
- From: Baruch Siach <baruch@xxxxxxxxxx>
- Re: [Patch net v2] ipt_CLUSTERIP: fix a refcount bug in clusterip_config_find_get()
- From: Florian Westphal <fw@xxxxxxxxx>
- [Patch net v2] ipt_CLUSTERIP: fix a refcount bug in clusterip_config_find_get()
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: [Patch net] ipt_CLUSTERIP: fix a refcount bug in clusterip_config_find_get()
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: [Patch net] ipt_CLUSTERIP: fix a race condition of proc file creation
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: How to retrieve original source address with FTP/NAT/TPROXY
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH RFC 2/4] netlink: add generic object description infrastructure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: linux-next: Signed-off-by missing for commit in the netfilter tree
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net v2] netfilter: drop outermost socket lock in getsockopt()
- From: Xin Long <lucien.xin@xxxxxxxxx>
- Re: [Patch net] ipt_CLUSTERIP: fix a race condition of proc file creation
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH net v2] netfilter: drop outermost socket lock in getsockopt()
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net] netfilter: on setsockopt() acquire sock lock only in the required scope
- From: Xin Long <lucien.xin@xxxxxxxxx>
- [PATCH net] netfilter: on setsockopt() acquire sock lock only in the required scope
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [Patch net] ipt_CLUSTERIP: fix a refcount bug in clusterip_config_find_get()
- From: Florian Westphal <fw@xxxxxxxxx>
- [Patch net] ipt_CLUSTERIP: fix a refcount bug in clusterip_config_find_get()
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- [Patch net] ipt_CLUSTERIP: fix a race condition of proc file creation
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: [PATCH RFC 2/4] netlink: add generic object description infrastructure
- From: Randy Dunlap <rdunlap@xxxxxxxxxxxxx>
- linux-next: Signed-off-by missing for commit in the netfilter tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH nf 7/7] netfilter: x_tables: use pr ratelimiting in all remaining spots
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 7/7] netfilter: x_tables: use pr ratelimiting in all remaining spots
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf 2/7] netfilter: x_tables: prefer pr_debug where possible
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf 1/7] netfilter: x_tables: remove pr_info where possible
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/11] Netfilter fixes for net
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 06/11] netfilter: nft_flow_offload: no need to flush entries on module removal
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 07/11] netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insert
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 00/11] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 05/11] netfilter: nft_flow_offload: wait for garbage collector to run after cleanup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 04/11] netfilter: xt_cgroup: initialize info->priv in cgroup_mt_check_v1()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 01/11] netfilter: x_tables: make allocation less aggressive
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 08/11] netfilter: nft_flow_offload: move flowtable cleanup routines to nf_flow_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 09/11] netfilter: nf_tables: fix flowtable free
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 02/11] netfilter: ipv6: nf_defrag: Kill frag queue on RFC2460 failure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 10/11] netfilter: remove useless prototype
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 11/11] netfilter: nf_flow_offload: fix use-after-free and a resource leak
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 03/11] netfilter: flowtable infrastructure depends on NETFILTER_INGRESS
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 1/7] netfilter: x_tables: remove pr_info where possible
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 2/7] netfilter: x_tables: prefer pr_debug where possible
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 7/7] netfilter: x_tables: use pr ratelimiting in all remaining spots
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: CPU load on queued_spin_lock_slowpath
- From: Tugrul Erdogan <h.tugrul.erdogan@xxxxxxxxx>
- Re: WARNING: proc registration bug in clusterip_tg_check
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH nf 7/7] netfilter: x_tables: use pr ratelimiting in all remaining spots
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 6/7] netfilter: x_tables: use pr ratelimiting
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 5/7] netfilter: x_tables: rate-limit table mismatch warnings
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 4/7] netfilter: x_tables: rate limit pr_err warnings
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 3/7] netfilter: xt_CT: use pr ratelimiting
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 2/7] netfilter: x_tables: prefer pr_debug where possible
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf 1/7] netfilter: x_tables: remove pr_info where possible
- From: Florian Westphal <fw@xxxxxxxxx>
- netfilter: x_tables: ratelimit most printks
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf RFC] netfilter: x_tables: only allow jumps to user-defined chains
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: add back stackpointer size checks
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: WARNING: proc registration bug in clusterip_tg_check
- From: Florian Westphal <fw@xxxxxxxxx>
- WARNING: proc registration bug in clusterip_tg_check
- From: syzbot <syzbot+03218bcdba6aa76441a3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- WARNING: proc registration bug in clusterip_tg_check
- From: syzbot <syzbot+03218bcdba6aa76441a3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- WARNING: proc registration bug in clusterip_tg_check
- From: syzbot <syzbot+03218bcdba6aa76441a3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: remove useless prototype
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nf_flow_offload: fix use-after-free and a resource leak
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: WARNING: proc registration bug in clusterip_tg_check
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: WARNING: proc registration bug in clusterip_tg_check
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: WARNING: proc registration bug in clusterip_tg_check
- From: syzbot <syzbot+@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [nft PATCH] Enable automerge feature for anonymous sets
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] Enable automerge feature for anonymous sets
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [PATCH] configure: Make missing docbook2man an error if man build requested
- From: Ville Skyttä <ville.skytta@xxxxxx>
- [PATCH] Spelling fixes
- From: Ville Skyttä <ville.skytta@xxxxxx>
- [PATCH] netfilter: nf_flow_offload: fix use-after-free and a resource leak
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: WARNING: proc registration bug in clusterip_tg_check
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: WARNING: proc registration bug in clusterip_tg_check
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- [PATCH] netfilter: remove useless prototype
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [nf:master 1/9] arch/x86/tools/insn_decoder_test: warning: ffffffff817c07c3: 0f ff e9 ud0 %ecx,%ebp
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH RFC 3/4] netfilter: nfnetlink: add support for netlink descriptions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH RFC 2/4] netlink: add generic object description infrastructure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH RFC 1/4] netlink: add NLA_PAD definition
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH RFC 4/4] netfilter: nf_tables: add netlink description
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH RFC 0/4] Netlink bus descriptions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: shift by n bits while performing '--restore-mark'
- From: Florian Westphal <fw@xxxxxxxxx>
- shift by n bits while performing '--restore-mark'
- From: Jack Ma <Jack.Ma@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH] extensions: add tests for comp match options
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] extensions: add tests for comp match options
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH] Enable automerge feature for anonymous sets
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [nft PATCH] Enable automerge feature for anonymous sets
- From: Phil Sutter <phil@xxxxxx>
- [PATCH] extensions: add tests for comp match options
- From: Harsha Sharma <harshasharmaiitr@xxxxxxxxx>
- How to retrieve original source address with FTP/NAT/TPROXY
- From: Gregory Vander Schueren <gregory.vanderschueren@xxxxxxxxxxxx>
- WARNING: proc registration bug in clusterip_tg_check
- From: syzbot <syzbot+03218bcdba6aa76441a3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [Bug 1224] nft export json fails with successful return code
- From: Phil Sutter <phil@xxxxxx>
- Re: [Bug 1224] nft export json fails with successful return code
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [Bug 1224] nft export json fails with successful return code
- From: Phil Sutter <phil@xxxxxx>
- Re: [Patch net v2] xt_RATEEST: acquire xt_rateest_mutex for hash insert
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: CPU load on queued_spin_lock_slowpath
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- CPU load on queued_spin_lock_slowpath
- From: Tugrul Erdogan <h.tugrul.erdogan@xxxxxxxxx>
- [nf:flow-offload-hw-v2 6/6] net/netfilter/nf_flow_table_inet.o:undefined reference to `nf_flow_table_init'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [nf:flow-offload-hw-v2 6/6] net/netfilter/nf_flow_table_inet.o:undefined reference to `nf_flow_table_init'
- From: kbuild test robot <fengguang.wu@xxxxxxxxx>
- [PATCH nf 3/3] netfilter: nf_tables: fix flowtable free
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 2/3] netfilter: nft_flow_offload: move flowtable cleanup routines to nf_flow_table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/3] netfilter: nft_flow_offload: no need to flush entries on module removal
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: IPv6 Parameter problem with no ICMPv6 response ?
- From: David McCullough <david.mccullough@xxxxxxxxxxxxxxx>
- Re: [Patch net v2] xt_RATEEST: acquire xt_rateest_mutex for hash insert
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [Patch net v2] xt_RATEEST: acquire xt_rateest_mutex for hash insert
- From: Florian Westphal <fw@xxxxxxxxx>
- [Patch net v2] xt_RATEEST: acquire xt_rateest_mutex for hash insert
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- proc_dir_entry 'ipt_CLUSTERIP/172.20.0.170' already registered (was syzkallzer)
- From: Alexey Dobriyan <adobriyan@xxxxxxxxx>
- [PATCH 1/2] netfilter: nf_tables: fix flowtable free
- From: Felix Fietkau <nbd@xxxxxxxx>
- [PATCH 2/2] netfilter: nf_tables: fix flowtable resource leak
- From: Felix Fietkau <nbd@xxxxxxxx>
- Re: KASAN: slab-out-of-bounds Read in clusterip_tg_check
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: IPv6 Parameter problem with no ICMPv6 response ?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: IPv6 Parameter problem with no ICMPv6 response ?
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- IPv6 Parameter problem with no ICMPv6 response ?
- From: David McCullough <david.mccullough@xxxxxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: ipv6: nf_defrag: Kill frag queue on RFC2460 failure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [ANNOUNCE] nftables 0.8.2 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: xt_hashlimit: do not allow empty names
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [ANNOUNCE] iptables 1.6.2 release
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] netlink_delinearize: add assertion to prevent infinite loop
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: xt_hashlimit: do not allow empty names
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: xt_hashlimit: do not allow empty names
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [Patch net] xt_cgroup: initialize info->priv in cgroup_mt_check_v1()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: xt_hashlimit: do not allow empty names
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: xt_hashlimit: do not allow empty names
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: xt_hashlimit: do not allow empty names
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Resurrecting "does nftables support string match?"
- From: Rob Thomas <xrobau@xxxxxxxxx>
- Re: [Patch net] xt_RATEEST: acquire xt_rateest_mutex for hash insert
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [Patch net] xt_RATEEST: acquire xt_rateest_mutex for hash insert
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: [PATCH 0/6] Netfilter fixes for net
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH libnftnl] examples: do not call nftnl_batch_is_supported()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: possible deadlock in xt_find_target
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: possible deadlock in xt_find_target
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH 1/6] netfilter: x_tables: fix int overflow in xt_alloc_table_info()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 4/6] netfilter: x_tables: fix pointer leaks to userspace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 3/6] netfilter: ipset: Fix wraparound in hash:*net* types
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 2/6] netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target}
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 5/6] netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 6/6] netfilter: on sockopt() acquire sock lock only in the required scope
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 0/6] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 2/2] netfilter: nft_flow_offload: no need to flush entries on module removal
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/2] netfilter: nft_flow_offload: wait for garbage collector to run after cleanup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- BUG: unable to handle kernel paging request in cgroup_mt_destroy_v1
- From: syzbot <syzbot+eeed2602160e4cc17410@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [Patch net] xt_RATEEST: acquire xt_rateest_mutex for hash insert
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [Patch net] xt_RATEEST: acquire xt_rateest_mutex for hash insert
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- [Patch net] xt_cgroup: initialize info->priv in cgroup_mt_check_v1()
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- [PATCH nf] netfilter: flowtable infrastructure depends on NETFILTER_INGRESS
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: on sockopt() acquire sock lock only in the required scope
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: fix out-of-bounds accesses in clusterip_tg_check()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: fix pointer leaks to userspace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/1] Fix wraparound bug introduced in commit 48596a8ddc46
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next] netfilter: ipv6: nf_defrag: Kill frag queue on RFC2460 failure
- From: Subash Abhinov Kasiviswanathan <subashab@xxxxxxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [patch 1/1] net/netfilter/x_tables.c: make allocation less aggressive
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [patch 1/1] net/netfilter/x_tables.c: make allocation less aggressive
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [patch 1/1] net/netfilter/x_tables.c: make allocation less aggressive
- From: akpm@xxxxxxxxxxxxxxxxxxxx
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- [PATCH net] netfilter: on sockopt() acquire sock lock only in the required scope
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- [PATCH] netfilter: fix out-of-bounds accesses in clusterip_tg_check()
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- [PATCH v2] extensions: libipt_DNAT: support shifted portmap ranges
- From: Thierry Du Tre <thierry@xxxxxxxxxxxx>
- [PATCH v4] netfilter : add NAT support for shifted portmap ranges
- From: Thierry Du Tre <thierry@xxxxxxxxxxxx>
- Re: question about UNDEFINE/REDEFINE
- From: David Fabian <david.fabian@xxxxxxx>
- Re: question about UNDEFINE/REDEFINE
- From: David Fabian <david.fabian@xxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: possible deadlock in xt_find_revision
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: possible deadlock in xt_find_table_lock
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Michal Hocko <mhocko@xxxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2] src: parse new handle attribute for tables
- From: Harsha Sharma <harshasharmaiitr@xxxxxxxxx>
- Re: [netfilter-core] kernel panic: Out of memory and no killable processes... (2)
- From: "Kirill A. Shutemov" <kirill@xxxxxxxxxxxxx>
[Index of Archives]
[LARTC]
[Berkeley Packet Filter]
[Bugtraq]
[Yosemite News]
[Samba]