Linux TCP/IP Netfilter Devel
[Prev Page][Next Page]
- Re: [PATCH nft] src: delete the old cache when dumping is interrupted
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft 04/10] tests: fix up meta l4proto change for ip6 family
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 1/1] iptables: Fix crash on malformed iptables-restore
- From: Oliver Ford <ojford@xxxxxxxxx>
- Re: linux-next: build failure after merge of the netfilter tree
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- [PATCH nf] xtables: fix build failure from COMPAT_XT_ALIGN outside CONFIG_COMPAT
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- [PATCH nf-next] netfilter: clusterip: switch to nf_register_net_hook
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: linux-next: build failure after merge of the netfilter tree
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- linux-next: build failure after merge of the netfilter tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [Bug 1145] nft 0.7: expression.c:966: range_expr_value_low: Assertion '0' failed.
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nft 04/10] tests: fix up meta l4proto change for ip6 family
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nft 07/10] tests: add ip reject with tcp and check for mark too
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nft 09/10] src: ip: switch implicit dependencies to meta l4proto too
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft 07/10] tests: add ip reject with tcp and check for mark too
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft 03/10] src: treat ip6 nexthdr as a protocol
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft 04/10] tests: fix up meta l4proto change for ip6 family
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft 02/10] src: ipv6: switch implicit dependencies to meta l4proto
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft 01/10] src: allow update of net base w. meta l4proto icmpv6
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re:Re: [PATCH nf v2] ebtables: arpreply: Add the standard target sanity check
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: Re: [PATCH nf v2] ebtables: arpreply: Add the standard target sanity check
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v2] ebtables: arpreply: Add the standard target sanity check
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v2] ebtables: arpreply: Add the standard target sanity check
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: crash on >= 4.9.0 kernel seems nf related
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: crash on >= 4.9.0 kernel seems nf related
- From: Bjørnar Ness <bjornar.ness@xxxxxxxxx>
- [PATCH nf v2] ebtables: arpreply: Add the standard target sanity check
- From: gfree.wind@xxxxxxxxxxx
- Re:Re: [PATCH nf] ebtables: arpreply: Add the standard target sanity check
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [PATCH ulogd2 1/2] ulogd.conf: harmonize log file options with module default values
- From: Eric Leblond <eric@xxxxxxxxx>
- Re: [PATCH] netfilter: synproxy: fix conntrackd interaction
- From: Eric Leblond <eric@xxxxxxxxx>
- Re: [PATCH] netfilter: synproxy: fix conntrackd interaction
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nf-next PATCH] netfilter: nf_tables: Report transactions' process info to user space
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v6 2/3] netfilter: nat_helper: Register one nf_ct_nat_helper each proto nat module
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v3] expression: print sets and maps in pretty format
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] netlink_delink_delinearize: don't store dependency unless relop checks is eq check
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_tables: can't assume lock is acquired when dumping set elems
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] ebtables: arpreply: Add the standard target sanity check
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] ebtables: arpreply: Add the standard target sanity check
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: synproxy: fix conntrackd interaction
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] xtables: zero padding in data_to_user
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: don't setup nat info for confirmed ct
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [GIT PULL 0/1] IPVS Fixes for v4.12
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nf-next PATCH] netfilter: nf_tables: Report transactions' process info to user space
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nf V2 2/2] netfilter: nfnl_cthelper: reject del request if helper obj is in use
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf V2 1/2] netfilter: introduce nf_conntrack_helper_put helper function
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: don't setup nat info for confirmed ct
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 2/2] netfilter: nf_tables: revisit chain/object refcounting from elements
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/2] netfilter: nf_tables: missing sanitization in data from userspace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 2/2] conntrackd: request resync at startup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 1/2] conntrackd: consolidate more code to use resync_send()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nf-next PATCH] netfilter: nf_tables: Report transactions' process info to user space
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [nft PATCH 1/2] include: Add proc_info symbols to nf_tables.h
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 0/2] monitor: Support printing processes which caused the event
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 2/2] monitor: Support printing processes which caused the event
- From: Phil Sutter <phil@xxxxxx>
- [nf-next PATCH] netfilter: nf_tables: Report transactions' process info to user space
- From: Phil Sutter <phil@xxxxxx>
- Re: [Bug 1145] nft 0.7: expression.c:966: range_expr_value_low: Assertion '0' failed.
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH xtables-addons] build: support for Linux 4.12
- From: Ralph Sennhauser <ralph.sennhauser@xxxxxxxxx>
- [PATCH nf] netfilter: nf_tables: can't assume lock is acquired when dumping set elems
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nft] src: delete the old cache when dumping is interrupted
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH] netfilter: Remove duplicated rcu_read_lock.
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- [PATCH nf] ebtables: arpreply: Add the standard target sanity check
- From: gfree.wind@xxxxxxxxxxx
- [PATCH] net: netfilter: netlink: delete extra spaces
- From: linzhang <xiaolou4617@xxxxxxxxx>
- [PATCH] netfilter: synproxy: fix conntrackd interaction
- From: Eric Leblond <eric@xxxxxxxxx>
- Re: [PATCH] netfilter: synproxy: fix conntrackd interaction
- From: Jesper Dangaard Brouer <brouer@xxxxxxxxxx>
- [PATCH] netfilter: synproxy: fix conntrackd interaction
- From: Eric Leblond <eric@xxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Florian Westphal <fw@xxxxxxxxx>
- RFC: Ideas about possible solutions for nfbz#949
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Florian Westphal <fw@xxxxxxxxx>
- [nft PATCH RFC] monitor: Support printing processes which caused the event
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH v2] List handles of added rules if requested
- From: Phil Sutter <phil@xxxxxx>
- [PATCH nf] xtables: zero padding in data_to_user
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- [PATCH nft 04/10] tests: fix up meta l4proto change for ip6 family
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 09/10] src: ip: switch implicit dependencies to meta l4proto too
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 10/10] tests: fix up meta l4proto change for ip family
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 08/10] src: add a comment wrt. reject dependency insertion
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 03/10] src: treat ip6 nexthdr as a protocol
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 07/10] tests: add ip reject with tcp and check for mark too
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 02/10] src: ipv6: switch implicit dependencies to meta l4proto
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 06/10] netlink_delinearize: reject: remove dependency for tcp-resets
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 05/10] tests: meta: add icmpv6 test case
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 01/10] src: allow update of net base w. meta l4proto icmpv6
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft 00/10] switch l4 dependency to meta l4proto
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nft] netlink_delink_delinearize: don't store dependency unless relop checks is eq check
- From: Florian Westphal <fw@xxxxxxxxx>
- [conntrack-tools PATCH 2/2] conntrackd: request resync at startup
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [conntrack-tools PATCH 1/2] conntrackd: consolidate more code to use resync_send()
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: .config for iptables icmp rule delete failure
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: .config for iptables icmp rule delete failure
- From: Willem de Bruijn <willemb@xxxxxxxxxx>
- Re: .config for iptables icmp rule delete failure
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: .config for iptables icmp rule delete failure
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: Changing destination ip and port of TEE'ed udp
- From: Sergey Yermakov <sergey@xxxxxxxxxx>
- Re: Changing destination ip and port of TEE'ed udp
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Changing destination ip and port of TEE'ed udp
- From: Sergey Yermakov <sergey@xxxxxxxxxx>
- Re: .config for iptables icmp rule delete failure
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nft] netlink_delinearize: don't kill dependencies accross statements
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH 1/1] libxtables: Display weird character warning for wildcards
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] netlink_delinearize: don't kill dependencies accross statements
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH] conntrackd: request resync at startup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 3/4] conntrackd: factorize resync operations
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 1/4] conntrackd: factorice tx_queue functions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 4/4] conntrackd: introduce RequestResync option
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH] List handles of added rules if requested
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v2] List handles of added rules if requested
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH -stable 0/3] ipvs: patches for stable
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT PULL 0/1] IPVS Fixes for v4.12
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH] ipvs: SNAT packet replies only for NATed connections
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH nft] netlink_delinearize: don't kill dependencies accross statements
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: How to reinject a packet (skb) at some later point in time
- From: Pavel Vajarov <pavel@xxxxxxxx>
- .config for iptables icmp rule delete failure
- From: Richard Guy Briggs <rgb@xxxxxxxxxx>
- [PATCH nf V2 0/2] netfilter: reject cthelper del request if it is in use
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nf V2 2/2] netfilter: nfnl_cthelper: reject del request if helper obj is in use
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nf V2 1/2] netfilter: introduce nf_conntrack_helper_put helper function
- From: Liping Zhang <zlpnobody@xxxxxxx>
- Re: How to reinject a packet (skb) at some later point in time
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf] netfilter: don't setup nat info for confirmed ct
- From: Florian Westphal <fw@xxxxxxxxx>
- How to reinject a packet (skb) at some later point in time
- From: Pavel Vajarov <pavel@xxxxxxxx>
- [PATCH nf] netfilter: don't setup nat info for confirmed ct
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [nft PATCH v2] List handles of added rules if requested
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] List handles of added rules if requested
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH] List handles of added rules if requested
- From: "Puustinen, Ismo" <ismo.puustinen@xxxxxxxxx>
- [PATCH 1/1] libxtables: Display weird character warning for wildcards
- From: Oliver Ford <ojford@xxxxxxxxx>
- Re: [nft PATCH] List handles of added rules if requested
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re:Re: [PATCH nf v6 3/3] netfilter: nat_helper: Remove the expectations when its module is unloaded
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [PATCH nf v6 3/3] netfilter: nat_helper: Remove the expectations when its module is unloaded
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- [PATCH nf v6 1/3] netfilter: helper: Rename struct nf_ct_helper_expectfn to nf_ct_nat_helper
- From: gfree.wind@xxxxxxxxxxx
- [PATCH nf v6 3/3] netfilter: nat_helper: Remove the expectations when its module is unloaded
- From: gfree.wind@xxxxxxxxxxx
- [PATCH nf v6 2/3] netfilter: nat_helper: Register one nf_ct_nat_helper each proto nat module
- From: gfree.wind@xxxxxxxxxxx
- Re: [nft PATCH] List handles of added rules if requested
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] List handles of added rules if requested
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH -stable 0/3] ipvs: patches for stable
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH nft] parser: allow listing sets in one table
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] parser: allow listing sets in one table
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH] List handles of added rules if requested
- From: Thomas Woerner <twoerner@xxxxxxxxxx>
- Re: [nf-next PATCH] netfilter: nf_tables: Return info of added rules back to user space
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH -stable 0/3] ipvs: patches for stable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: net: possible deadlock in skb_queue_tail
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [nft PATCH] List handles of added rules if requested
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: net: possible deadlock in skb_queue_tail
- From: Andrey Konovalov <andreyknvl@xxxxxxxxxx>
- Re: [nft PATCH] List handles of added rules if requested
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH] List handles of added rules if requested
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nf-next PATCH] netfilter: nf_tables: Return info of added rules back to user space
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [nft PATCH] List handles of added rules if requested
- From: Phil Sutter <phil@xxxxxx>
- [nf-next PATCH] netfilter: nf_tables: Return info of added rules back to user space
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH] nft.8: Enhance NAT documentation
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH] nft.8: Enhance NAT documentation
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [PATCH iptables] iptables: support insisting that the lock is held
- From: Lorenzo Colitti <lorenzo@xxxxxxxxxx>
- Re: [PATCH iptables] iptables: support insisting that the lock is held
- From: Lorenzo Colitti <lorenzo@xxxxxxxxxx>
- Re: [PATCH iptables] iptables: support insisting that the lock is held
- From: Lorenzo Colitti <lorenzo@xxxxxxxxxx>
- Re: [PATCH iptables] iptables: support insisting that the lock is held
- From: Aaron Conole <aconole@xxxxxxxxxx>
- Re: [PATCH iptables] iptables: support insisting that the lock is held
- From: Aaron Conole <aconole@xxxxxxxxxx>
- Re: [PATCH 00/16] Netfilter/IPVS/OVS fixes for net
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: Force inlining of build check to prevent build failure
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: Force inlining of build check to prevent build failure
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: Force inlining of build check to prevent build failure
- From: Arnd Bergmann <arnd@xxxxxxxx>
- Re: [PATCH] netfilter: conntrack: Force inlining of build check to prevent build failure
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: Force inlining of build check to prevent build failure
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] netfilter: conntrack: Force inlining of build check to prevent build failure
- From: Arnd Bergmann <arnd@xxxxxxxx>
- [PATCH] netfilter: conntrack: Force inlining of build check to prevent build failure
- From: Geert Uytterhoeven <geert@xxxxxxxxxxxxxx>
- crash on >= 4.9.0 kernel seems nf related
- From: Bjørnar Ness <bjornar.ness@xxxxxxxxx>
- Re: .nf_ct_iterate_cleanup panic
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH iptables] iptables: support insisting that the lock is held
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- .nf_ct_iterate_cleanup panic
- From: dalin liu <kendodada@xxxxxxxxx>
- [PATCH 09/16] netfilter: xt_socket: Fix broken IPv6 handling
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 00/16] Netfilter/IPVS/OVS fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 04/16] netfilter: nft_set_bitmap: free dummy elements when destroy the set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 03/16] netfilter: nf_ct_helper: permit cthelpers with different names via nfnetlink
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 13/16] ipvs: explicitly forbid ipv6 service/dest creation if ipv6 mod is disabled
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 15/16] netfilter: update MAINTAINERS file
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 14/16] netfilter: x_tables: unlock on error in xt_find_table_lock()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 16/16] netfilter: nf_tables: check if same extensions are set when adding elements
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 07/16] netfilter: ctnetlink: make it safer when updating ct->status
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 08/16] netfilter: ctnetlink: acquire ct->lock before operating nf_ct_seqadj
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 12/16] netfilter: Wrong icmp6 checksum for ICMPV6_TIME_EXCEED in reverse SNATv6 path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 10/16] bridge: ebtables: fix reception of frames DNAT-ed to bridge device/port
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 05/16] netfilter: ctnetlink: drop the incorrect cthelper module request
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 11/16] netfilter: nft_dynset: continue to next expr if _OP_ADD succeeded
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 06/16] netfilter: ctnetlink: fix deadlock due to acquire _expect_lock twice
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 01/16] netfilter: xt_CT: fix refcnt leak on error path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 02/16] openvswitch: Delete conntrack entry clashing with an expectation.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [nft PATCH] nft.8: Enhance NAT documentation
- From: Phil Sutter <phil@xxxxxx>
- Re: [conntrack-tools PATCH 2/4] conntrackd: warn users about queue allocation errors
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 2/4] conntrackd: warn users about queue allocation errors
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [nft PATCH v3] expression: print sets and maps in pretty format
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- migrating from iptables to nftables
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [conntrack-tools PATCH 2/4] conntrackd: warn users about queue allocation errors
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [conntrack-tools PATCH 4/4] conntrackd: introduce RequestResync option
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [PATCH nf-next 0/3] netfilter: speed up netns cleanup
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- Re: [PATCH 00/53] Netfilter/IPVS updates for net-next
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH 00/53] Netfilter/IPVS updates for net-next
- From: David Miller <davem@xxxxxxxxxxxxx>
- [PATCH -stable 0/3] ipvs: patches for stable
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH 4.4.65 -stable 3/3] ipvs: SNAT packet replies only for NATed connections
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH 3.10.105,3.12.73,3.16.43,4.1.39 -stable 2/3] ipvs: SNAT packet replies only for NATed connections
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH 3.2.88,3.4.113 -stable 1/3] ipvs: SNAT packet replies only for NATed connections
- From: Julian Anastasov <ja@xxxxxx>
- [PATCH nf] netfilter: nf_tables: check if same extensions are set when adding elements
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2 1/4] netfilter: nf_tables: get rid of jump label to return
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 00/53] Netfilter/IPVS updates for net-next
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 07/53] netfilter: nat: nf_nat_mangle_{udp,tcp}_packet returns boolean
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 08/53] netfilter: nat: avoid use of nf_conn_nat extension
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 09/53] netfilter: ctnetlink: Expectations must have a conntrack helper area
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 27/53] netfilter: helper: add build-time asserts for helper data size
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 22/53] netfilter: ecache: Refine the nf_ct_deliver_cached_events
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 19/53] netfilter: nf_conntrack: remove double assignment
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 16/53] netfilter: udplite: Remove duplicated udplite4/6 declaration
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 15/53] netfilter: ip6_tables: Remove unneccessary comments
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 14/53] netfilter: Remove exceptional & on function name
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 18/53] netfilter: nf_tables: remove double return statement
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 17/53] netfilter: nat: remove rcu_read_lock in __nf_nat_decode_session.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 25/53] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 24/53] netfilter: remove nf_ct_is_untracked
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 31/53] netfilter: conntrack: use u8 for extension sizes again
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 30/53] netfilter: remove last traces of variable-sized extensions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 29/53] netfilter: helpers: remove data_len usage for inkernel helpers
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 26/53] netfilter: conntrack: move helper struct to nf_conntrack_helper.h
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 28/53] netfilter: nfnetlink_cthelper: reject too large userspace allocation requests
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 34/53] netfilter: ipvs: fix incorrect conflict resolution
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 32/53] netfilter: allow early drop of assured conntracks
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 36/53] netfilter: synproxy: only register hooks when needed
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 21/53] netfilter: nf_nat: Fix return NF_DROP in nfnetlink_parse_nat_setup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 33/53] nefilter: eache: reduce struct size from 32 to 24 byte
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 35/53] netfilter: tcp: Use TCP_MAX_WSCALE instead of literal 14
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 37/53] ipvs: convert to use pernet nf_hook api
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 38/53] netfilter: decnet: only register hooks in init namespace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 39/53] ebtables: remove nf_hook_register usage
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 40/53] netfilter: SYNPROXY: Return NF_STOLEN instead of NF_DROP during handshaking
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 44/53] netfilter: masquerade: attach nat extension if not present
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 23/53] netfilter: kill the fake untracked conntrack objects
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 41/53] netfilter: conntrack: remove prealloc support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 43/53] netfilter: conntrack: handle initial extension alloc via krealloc
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 42/53] netfilter: conntrack: mark extension structs as const
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 45/53] netfilter: pptp: attach nat extension when needed
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 46/53] netfilter: don't attach a nat extension by default
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 47/53] ipvs: remove unused function ip_vs_set_state_timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 48/53] ipvs: change comparison on sync_refresh_period
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 53/53] netfilter: nf_ct_ext: invoke destroy even when ext is not attached
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 51/53] netfilter: nf_queue: only call synchronize_net twice if nf_queue is active
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 52/53] netfilter: snmp: avoid stack size warning
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 49/53] netfilter: batch synchronize_net calls during hook unregister
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 50/53] netfilter: nf_log: don't call synchronize_rcu in nf_log_unset
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 20/53] ipset: remove unused function __ip_set_get_netlink
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 11/53] netfilter: Remove unnecessary cast on void pointer
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 10/53] netfilter: Add nfnl_msg_type() helper function
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 13/53] net: netfilter: Use list_{next/prev}_entry instead of list_entry
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 12/53] netfilter: Use seq_puts()/seq_putc() where possible
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 06/53] netfilter: nf_ct_expect: Add nf_ct_remove_expect()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 03/53] ipvs: remove unused variable
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 04/53] netfilter: nf_tables: add nft_is_base_chain() helper
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 05/53] netfilter: expect: Make sure the max_expected limit is effective
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 02/53] netfilter: ipvs: Replace kzalloc with kcalloc.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 01/53] netfilter: ipvs: don't check for presence of nat extension
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 00/53] Netfilter/IPVS updates for net-next
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: nf_ct_ext: invoke destroy even when ext is not attached
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [GIT PULL 0/2] Third Round of IPVS Updates for v4.12
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: snmp: avoid stack size warning
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 0/3] netfilter: speed up netns cleanup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 4/4] conntrackd: introduce RequestResync option
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next v2 2/4] netfilter: nf_tables: simplify nft_set_elem_destroy()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next v2 4/4] netfilter: nf_tables: revisit chain/object refcounting from elements
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next v2 1/4] netfilter: nf_tables: get rid of jump label to return
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next 3/4] netfilter: nf_tables: missing sanitization in data from userspace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: nf_ct_ext: invoke destroy even when ext is not attached
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next] netfilter: nf_ct_ext: invoke destroy even when ext is not attached
- From: Liping Zhang <zlpnobody@xxxxxxx>
- Re: [nft PATCH 2/2] masquerade: Complain if no prerouting chain exists
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH nf] netfilter: update MAINTAINERS file
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft PATCH 2/2] masquerade: Complain if no prerouting chain exists
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] netfilter: update MAINTAINERS file
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [GIT PULL v2 0/1] IPVS Fixes for v4.11
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft PATCH v2] expression: print sets and maps in pretty format
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: x_tables: unlock on error in xt_find_table_lock()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next 4/4] netfilter: nf_tables: revisit chain/object refcounting from elements
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next 3/4] netfilter: nf_tables: simplify nft_set_elem_destroy()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next 2/4] netfilter: nf_tables: remove nft_data_uninit() on NFT_DATA_VALUE
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next 1/4] netfilter: nf_tables: get rid of jump label to return
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft] tests: shell: delete element and chain in transaction
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: x_tables: unlock on error in xt_find_table_lock()
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH] netfilter: x_tables: unlock on error in xt_find_table_lock()
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH 2/2] ipvs: change comparison on sync_refresh_period
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 1/2] ipvs: remove unused function ip_vs_set_state_timeout
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT PULL 0/2] Third Round of IPVS Updates for v4.12
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 1/1] ipvs: explicitly forbid ipv6 service/dest creation if ipv6 mod is disabled
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT PULL v2 0/1] IPVS Fixes for v4.11
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [GIT 0/1] IPVS Fixes for v4.11
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT 0/1] IPVS Fixes for v4.11
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 1/1] ipvs: explicitly forbid ipv6 service/dest creation if ipv6 mod is disabled
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [nft PATCH 2/2] masquerade: Complain if no prerouting chain exists
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [nft PATCH 2/2] masquerade: Complain if no prerouting chain exists
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH 2/2] masquerade: Complain if no prerouting chain exists
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [nft PATCH 2/2] masquerade: Complain if no prerouting chain exists
- From: Phil Sutter <phil@xxxxxx>
- Re: [nft PATCH 2/2] masquerade: Complain if no prerouting chain exists
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [PATCH nf-next] netfilter: snmp: avoid stack size warning
- From: Florian Westphal <fw@xxxxxxxxx>
- [nft PATCH 1/2] erec: Make __stmt_binary_error a little more versatile
- From: Phil Sutter <phil@xxxxxx>
- [nft PATCH 2/2] masquerade: Complain if no prerouting chain exists
- From: Phil Sutter <phil@xxxxxx>
- Re: [PATCH next] iptables: on revision mismatch, do not call print/save
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH next] iptables: on revision mismatch, do not call print/save
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH next] iptables: on revision mismatch, do not call print/save
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- Re: [PATCH next] iptables: on revision mismatch, do not call print/save
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH next] iptables: on revision mismatch, do not call print/save
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [conntrack-tools PATCH 4/4] conntrackd: introduce RequestResync option
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [nft PATCH v2] expression: print sets and maps in pretty format
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [nft RFC PATCH] expression: print sets and maps in pretty format
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [nft RFC PATCH] expression: print sets and maps in pretty format
- From: "Pablo M. Bermudo Garay" <pablombg@xxxxxxxxx>
- Re: [conntrack-tools PATCH 4/4] conntrackd: introduce RequestResync option
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 2/4] conntrackd: warn users about queue allocation errors
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 4/4] conntrackd: introduce RequestResync option
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [conntrack-tools PATCH 2/4] conntrackd: warn users about queue allocation errors
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [nft RFC PATCH] expression: print sets and maps in pretty format
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [conntrack-tools PATCH 4/4] conntrackd: introduce RequestResync option
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [conntrack-tools PATCH 2/4] conntrackd: warn users about queue allocation errors
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft RFC PATCH] rule: introduce new option to print set elements per line
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft RFC PATCH] rule: introduce new option to print set elements per line
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft RFC PATCH] rule: introduce new option to print set elements per line
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [nft RFC PATCH] rule: introduce new option to print set elements per line
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- Re: [nft RFC PATCH] rule: introduce new option to print set elements per line
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [nft,RFC] rule: introduce new option to print set elements per line
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] netfilter: Wrong icmp6 checksum for ICMPV6_TIME_EXCEED in reverse SNATv6 path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nft_dynset: continue to next expr if _OP_ADD succeeded
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net v3] bridge: ebtables: fix reception of frames DNAT-ed to bridge device/port
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: xt_socket: Fix broken IPv6 handling
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 0/4] netfilter: ctnetlink: fix some bugs related to ct update
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nft_set_bitmap: free dummy elements when destroy the set
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf V3] netfilter: nf_ct_helper: permit cthelpers with different names via nfnetlink
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v3] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v3] netfilter: xt_CT: fix refcnt leak on error path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables 2/2] tests: xlate: check if it is being run as root
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables 1/2] tests: xlate: remove python 3.5 dependency
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCHo nf-next v2] netfilter: nf_log: don't call synchronize_rcu in nf_log_unset
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf-next 2/3] netfilter: nf_log: don't call synchronize_rcu in nf_log_unset
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [PATCH nf v3] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Jarno Rajahalme <jarno@xxxxxxx>
- [PATCH nf-next 3/3] netfilter: nf_queue: only call synchronize_net twice if nf_queue is active
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 2/3] netfilter: nf_log: don't call synchronize_rcu in nf_log_unset
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 1/3] netfilter: batch synchronize_net calls during hook unregister
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 0/3] netfilter: speed up netns cleanup
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] netfilter: Wrong icmp6 checksum for ICMPV6_TIME_EXCEED in reverse SNATv6 path
- From: Dave Johnson <dave-kernel@xxxxxxxxxxxxxxx>
- Re: [PATCH] netfilter: Wrong icmp6 checksum for ICMPV6_TIME_EXCEED in reverse SNATv6 path
- From: Dave Johnson <dave-kernel@xxxxxxxxxxxxxxx>
- Re: [PATCH] ipvs: explicitly forbid ipv6 service/dest creation if ipv6 mod is disabled
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH] netfilter: Wrong icmp6 checksum for ICMPV6_TIME_EXCEED in reverse SNATv6 path
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 0/3] netfilter: extensions: don't add nat by default
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2 nf-next 0/3] netfilter: conntrack: removal prealloc support
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] ebtables: remove nf_hook_register usage
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: decnet: only register hooks in init namespace
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] ipvs: explicitly forbid ipv6 service/dest creation if ipv6 mod is disabled
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH] ipvs: explicitly forbid ipv6 service/dest creation if ipv6 mod is disabled
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH nf] netfilter: nft_dynset: continue to next expr if _OP_ADD succeeded
- From: Liping Zhang <zlpnobody@xxxxxxx>
- Re: [PATCH] ipvs: explicitly forbid ipv6 service/dest creation if ipv6 mod is disabled
- From: Julian Anastasov <ja@xxxxxx>
- Re: [PATCH next] iptables: on revision mismatch, do not call print/save
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH next] iptables: on revision mismatch, do not call print/save
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [nft RFC PATCH] rule: introduce new option to print set elements per line
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- RE: [PATCH nf-next] netfilter: tcp: Use TCP_MAX_WSCALE instead of literal 14
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [PATCH net] netfilter: xt_TCPMSS: add more sanity tests on tcph->doff
- From: Denys Fedoryshchenko <nuclearcat@xxxxxxxxxxxxxx>
- [conntrack-tools PATCH 1/4] conntrackd: factorice tx_queue functions
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [conntrack-tools PATCH 4/4] conntrackd: introduce RequestResync option
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [conntrack-tools PATCH 3/4] conntrackd: factorize resync operations
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [conntrack-tools PATCH 2/4] conntrackd: warn users about queue allocation errors
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [conntrack-tools PATCH 4/4] conntrackd: introduce RequestResync option
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [conntrack-tools PATCH 3/4] conntrackd: factorize resync operations
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [conntrack-tools PATCH 2/4] conntrackd: warn users about queue allocation errors
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [conntrack-tools PATCH 1/4] conntrackd: factorice tx_queue functions
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [conntrack-tools PATCH] conntrackd: request resync at startup
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [PATCH] netfilter: Wrong icmp6 checksum for ICMPV6_TIME_EXCEED in reverse SNATv6 path
- From: Dave Johnson <dave-kernel@xxxxxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: tcp: Use TCP_MAX_WSCALE instead of literal 14
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- [PATCH] ipvs: explicitly forbid ipv6 service/dest creation if ipv6 mod is disabled
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- [PATCH iptables] iptables: support insisting that the lock is held
- From: Lorenzo Colitti <lorenzo@xxxxxxxxxx>
- Re: nfqueue buf size for recv()
- From: Oleg <lego12239@xxxxxxxxx>
- [PATCH nf] MAINTAINERS: add Florian Westphal as netfilter maintainer
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 3/3] netfilter: don't attach a nat extension by default
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 1/3] netfilter: masquerade: attach nat extension if not present
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 2/3] netfilter: pptp: attach nat extension when needed
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 0/3] netfilter: extensions: don't add nat by default
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf-next 3/3] netfilter: conntrack: handle initial extension alloc via krealloc
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf-next 2/3] netfilter: conntrack: mark extension structs as const
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf-next 1/3] netfilter: conntrack: remove prealloc support
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v2 nf-next 0/3] netfilter: conntrack: removal prealloc support
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next v3] netfilter: SYNPROXY: Return NF_STOLEN instead of NF_DROP during handshaking
- From: gfree.wind@xxxxxxxxxxx
- Re: [PATCH nf-next 3/3] netfilter: conntrack: handle initial extension alloc via krealloc
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH libmnl] nlmsg: introduce mnl_nlmsg_batch_rest to get the rest length
- From: Ken-ichirou MATSUZAWA <chamaken@xxxxxxxxx>
- RE: [PATCH nf-next] netfilter: tcp: Use TCP_MAX_WSCALE instead of literal 14
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- [PATCH nf-next] ebtables: remove nf_hook_register usage
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next] netfilter: decnet: only register hooks in init namespace
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: nfqueue buf size for recv()
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 3/3] netfilter: conntrack: handle initial extension alloc via krealloc
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 2/3] netfilter: conntrack: mark extension structs as const
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 1/3] netfilter: conntrack: remove prealloc support
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 0/3] netfilter: conntrack: removal prealloc support
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf-next] netfilter: tcp: Use TCP_MAX_WSCALE instead of literal 14
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: tcp: Use TCP_MAX_WSCALE instead of literal 14
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v3] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Jarno Rajahalme <jarno@xxxxxxx>
- [PATCH net v3] bridge: ebtables: fix reception of frames DNAT-ed to bridge device/port
- From: Linus Lüssing <linus.luessing@xxxxxxxxx>
- Re: [PATCH] netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch
- From: Joe Perches <joe@xxxxxxxxxxx>
- [PATCH] netfilter: ctnetlink: Make some parameters integer to avoid enum mismatch
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- nfqueue buf size for recv()
- From: Oleg <lego12239@xxxxxxxxx>
- [PATCH nf-next] ipvs: convert to use pernet nf_hook api
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf-next] netfilter: tcp: Use TCP_MAX_WSCALE instead of literal 14
- From: Eric Dumazet <eric.dumazet@xxxxxxxxx>
- Re: [PATCH nf-next] netfilter: synproxy: only register hooks when needed
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next] netfilter: synproxy: only register hooks when needed
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH] netfilter: xt_socket: Fix broken IPv6 handling
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH iptables 2/2] tests: xlate: check if it is being run as root
- From: "Pablo M. Bermudo Garay" <pablombg@xxxxxxxxx>
- [PATCH iptables 1/2] tests: xlate: remove python 3.5 dependency
- From: "Pablo M. Bermudo Garay" <pablombg@xxxxxxxxx>
- Re: [PATCH iptables v3] iptables-restore/save: exit when given an unknown option
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: tcp: Use TCP_MAX_WSCALE instead of literal 14
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2 1/1] netfilter: SYNPROXY: Return NF_STOLEN instead of NF_DROP during handshaking
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: ipvs: fix incorrect conflict resolution
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v3 nf-next] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 0/6] netfilter: remove support for variably-sized extensions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v3] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: Doubt about CTA_EXPECT_* values passed to ctnetlink_parse_tuple()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Mixing tables for NFQUEUE target
- From: Michael Bailey <strictlymike@xxxxxxxxx>
- Wrong icmp6 checksum for ICMPV6_TIME_EXCEED in reverse SNATv6 path
- From: Dave Johnson <dave-kernel@xxxxxxxxxxxxxxx>
- [PATCH nf-next] netfilter: tcp: Use TCP_MAX_WSCALE instead of literal 14
- From: gfree.wind@xxxxxxxxxxx
- Re: Doubt about CTA_EXPECT_* values passed to ctnetlink_parse_tuple()
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- Re: Doubt about CTA_EXPECT_* values passed to ctnetlink_parse_tuple()
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- Re: [PATCH nf v3] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Joe Stringer <joe@xxxxxxx>
- Re: [PATCH nf v3] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Joe Stringer <joe@xxxxxxx>
- Re: [PATCH nf v3] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Jarno Rajahalme <jarno@xxxxxxx>
- [PATCH] netfilter: xt_socket: Fix broken IPv6 handling
- From: Peter Tirsek <peter@xxxxxxxxxx>
- [PATCH nf-next] netfilter: ipvs: fix incorrect conflict resolution
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next] nefilter: eache: reduce struct size from 32 to 24 byte
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: Doubt about CTA_EXPECT_* values passed to ctnetlink_parse_tuple()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Doubt about CTA_EXPECT_* values passed to ctnetlink_parse_tuple()
- From: Matthias Kaehlcke <mka@xxxxxxxxxxxx>
- Re: [PATCH v2] bridge: ebtables: fix reception of frames DNAT-ed to bridge device
- From: Linus Lüssing <linus.luessing@xxxxxxxxx>
- Re: [PATCH nf-next] netfilter: allow early drop of assured conntracks
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [PATCH nf 4/4] netfilter: ctnetlink: acquire ct->lock before operating nf_ct_seqadj
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nf 3/4] netfilter: ctnetlink: make it safer when updating ct->status
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nf 1/4] netfilter: ctnetlink: drop the incorrect cthelper module request
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nf 2/4] netfilter: ctnetlink: fix deadlock due to acquire _expect_lock twice
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nf 0/4] netfilter: ctnetlink: fix some bugs related to ct update
- From: Liping Zhang <zlpnobody@xxxxxxx>
- RE: [PATCH nf v5 2/3] netfilter: nat_helper: Make sure every proto nat module uses its nat_helper
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [PATCH nf-next] ipvs: remove unused function ip_vs_set_state_timeout
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH nf-next] netfilter: allow early drop of assured conntracks
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 6/6] netfilter: conntrack: use u8 for extension sizes again
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 5/6] netfilter: remove last traces of variable-sized extensions
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 4/6] netfilter: helpers: remove data_len usage for inkernel helpers
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 2/6] netfilter: helper: add build-time asserts for helper data size
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 3/6] netfilter: nfnetlink_cthelper: reject too large userspace allocation requests
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 1/6] netfilter: conntrack: move helper struct to nf_conntrack_helper.h
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 0/6] netfilter: remove support for variably-sized extensions
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH v3 nf-next] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH v2 nf-next] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf] netfilter: nft_set_bitmap: free dummy elements when destroy the set
- From: Liping Zhang <zlpnobody@xxxxxxx>
- Re: [PATCH v2 nf-next] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- [PATCH nf V3] netfilter: nf_ct_helper: permit cthelpers with different names via nfnetlink
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH v2 nf-next] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH iptables v3] iptables-restore/save: exit when given an unknown option
- From: Vincent Bernat <vincent@xxxxxxxxx>
- Re: [PATCH nf-next 1/3] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/2] netfilter: kill the fake untracked conntrack objects
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/2] netfilter: kill the fake untracked conntrack objects
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/3] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf-next 1/2] netfilter: kill the fake untracked conntrack objects
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf V2] netfilter: nf_ct_helper: permit cthelpers with different names via nfnetlink
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [PATCH nft V2] hash: generate a random seed if seed option is empty
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/1] netfilter: ecache: Refine the nf_ct_deliver_cached_events
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf V2] netfilter: nf_ct_helper: permit cthelpers with different names via nfnetlink
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft V2] hash: generate a random seed if seed option is empty
- From: Liping Zhang <zlpnobody@xxxxxxx>
- Re: [PATCH nf-next 1/2] netfilter: kill the fake untracked conntrack objects
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/3] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 1/1] netfilter: nf_nat: Fix return NF_DROP in nfnetlink_parse_nat_setup
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [GIT 0/3] Second Round of IPVS Updates for v4.12
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables v2] iptables-restore/save: exit when given an unknown option
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] ipset: remove unused function __ip_set_get_netlink
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nft 3/3] ct: add conntrack event mask support
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH libnftnl 2/3] src: ct eventmask support
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 1/3] netfilter: nft_ct: allow to set ctnetlink event types of a connection
- From: Florian Westphal <fw@xxxxxxxxx>
- netfilter: nftables: ctnetlink event type set support
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf v3] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Jarno Rajahalme <jarno@xxxxxxx>
- [PATCH nf-next 2/2] netfilter: remove nf_ct_is_untracked
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next 1/2] netfilter: kill the fake untracked conntrack objects
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nf v2] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Jarno Rajahalme <jarno@xxxxxxx>
- Re: [PATCH 0/9] Netfilter fixes for net
- From: David Miller <davem@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] ipset: remove unused function __ip_set_get_netlink
- From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx>
- [PATCH iptables v2] iptables-restore/save: exit when given an unknown option
- From: Vincent Bernat <vincent@xxxxxxxxx>
- RE: [PATCH nf-next v2 1/1] netfilter: SYNPROXY: Return NF_STOLEN instead of NF_DROP during handshaking
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [PATCH nf v2] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [PATCH nf V2] netfilter: ctnetlink: make it safer when updating ct->status
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- RE: [PATCH nf v2] netfilter: cttimeout: Fix one possible use-after-free issue
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- [PATCH nf v3] netfilter: xt_CT: fix refcnt leak on error path
- From: gfree.wind@xxxxxxxxxxx
- Re: [libnetfilter_queue][PATCH 2/2] Declare the define visivility attribute together
- From: Khem Raj <raj.khem@xxxxxxxxx>
- Re: [libnetfilter_queue][PATCH 2/2] Declare the define visivility attribute together
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v2] netfilter: cttimeout: Fix one possible use-after-free issue
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [libnetfilter_queue][PATCH 2/2] Declare the define visivility attribute together
- From: Khem Raj <raj.khem@xxxxxxxxx>
- [PATCH nf v2] netfilter: cttimeout: Fix one possible use-after-free issue
- From: gfree.wind@xxxxxxxxxxx
- Re: [PATCH nf v5 2/3] netfilter: nat_helper: Make sure every proto nat module uses its nat_helper
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- RE: [PATCH nf] netfilter: xt_CT: fix cthelper module's refcnt leak
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- RE: [PATCH nf v5 2/3] netfilter: nat_helper: Make sure every proto nat module uses its nat_helper
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- [PATCH 2/9] netfilter: ctnetlink: using bit to represent the ct event
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 5/9] netfilter: make it safer during the inet6_dev->addr_list traversal
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 7/9] netfilter: nf_ct_expect: use proper RCU list traversal/update APIs
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 3/9] netfilter: helper: Add the rcu lock when call __nf_conntrack_helper_find
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 4/9] netfilter: ctnetlink: make it safer when checking the ct helper name
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 8/9] netfilter: nft_hash: do not dump the auto generated seed
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 6/9] netfilter: ctnetlink: skip dumping expect when nfct_help(ct) is NULL
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 9/9] netfilter: ipt_CLUSTERIP: Fix wrong conntrack netns refcnt usage
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 0/9] Netfilter fixes for net
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH 1/9] netfilter: xt_TCPMSS: add more sanity tests on tcph->doff
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] ipvs: remove unused function ip_vs_set_state_timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v5 2/3] netfilter: nat_helper: Make sure every proto nat module uses its nat_helper
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [GIT 0/3] Second Round of IPVS Updates for v4.12
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf V2] netfilter: nf_ct_helper: permit cthelpers with different names via nfnetlink
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [GIT 0/3] Second Round of IPVS Updates for v4.12
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH nf V2] netfilter: nf_ct_helper: permit cthelpers with different names via nfnetlink
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [libnetfilter_queue][PATCH 2/2] Declare the define visivility attribute together
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 2/2] netfilter: nfnl_cthelper: reject del request if helper obj is in use
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 2/2] netfilter: nfnl_cthelper: reject del request if helper obj is in use
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 2/2] netfilter: nfnl_cthelper: reject del request if helper obj is in use
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [libnetfilter_queue][PATCH 2/2] Declare the define visivility attribute together
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [libnetfilter_queue][PATCH 1/2] Correct typo in the location of internal.h in #include
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] ipset: remove unused function __ip_set_get_netlink
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] nf_conntrack: remove double assignment
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] nf_tables: remove double return statement
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf V2] netfilter: ctnetlink: make it safer when updating ct->status
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 2/2] netfilter: nfnl_cthelper: reject del request if helper obj is in use
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf v2] net/openvswitch: Delete conntrack entry clashing with an expectation.
- From: Jarno Rajahalme <jarno@xxxxxxx>
- Re: [PATCH nft] hash: generate a random seed if seed option is empty
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [PATCH nf-next v2 1/1] netfilter: SYNPROXY: Return NF_STOLEN instead of NF_DROP during handshaking
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: xt_CT: fix cthelper module's refcnt leak
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [PATCH 2/2 v2] iptables-restore.8: document -w/-W options
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/2 v2] iptables-restore/ip6tables-restore: add --version/-V argument
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- RE: [PATCH nf-next v2 1/1] netfilter: SYNPROXY: Return NF_STOLEN instead of NF_DROP during handshaking
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [PATCH nf] datapath: Delete conntrack entry clashing with an expectation.
- From: Jarno Rajahalme <jarno@xxxxxxx>
- Re: [GIT 0/3] Second Round of IPVS Updates for v4.12
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf] datapath: Delete conntrack entry clashing with an expectation.
- From: Jarno Rajahalme <jarno@xxxxxxx>
- Re: [PATCH nf-next 1/1] netfilter: cttimeout: Refine cttimeout_del_timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 1/1] netfilter: cttimeout: Fix one possible use-after-free issue
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- RE: [PATCH nf 1/1] netfilter: cttimeout: Fix one possible use-after-free issue
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [PATCH nf] netfilter: xt_CT: fix cthelper module's refcnt leak
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf V2] netfilter: nf_ct_helper: permit cthelpers with different names via nfnetlink
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH libmnl] nlmsg: introduce mnl_nlmsg_batch_rest to get the rest length
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v2 1/1] netfilter: xt_CT: Fix one possible memleak of timeout
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- RE: [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: nf_conntrack: make nf_conntrack_max as an unsigned int knob
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: remove unnecessary nf_conntrack_expect_lock protection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2 1/1] netfilter: SYNPROXY: Return NF_STOLEN instead of NF_DROP during handshaking
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: remove unnecessary nf_conntrack_expect_lock protection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 1/1] netfilter: cttimeout: Fix one possible use-after-free issue
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf 1/1] netfilter: CLUSTERIP: Fix one wrong refcnt usage
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables v1] iptables-restore/save: exit when given an unknown option
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] hash: generate a random seed if seed option is empty
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] hash: generate a random seed if seed option is empty
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nft_hash: do not dump the auto generated seed
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nat: remove rcu_read_lock in __nf_nat_decode_session.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf V2] netfilter: ctnetlink: make it safer when updating ct->status
- From: Liping Zhang <zlpnobody@xxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: make it safer when updating ct->status
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- RE: [PATCH nf] netfilter: ctnetlink: make it safer when updating ct->status
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: make it safer when updating ct->status
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- RE: [PATCH nf] netfilter: ctnetlink: make it safer when updating ct->status
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- RE: [PATCH nf] netfilter: ctnetlink: make it safer when updating ct->status
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- [PATCH nf-next 1/1] netfilter: ecache: Refine the nf_ct_deliver_cached_events
- From: gfree.wind@xxxxxxxxxxx
- Re: [PATCH nf] netfilter: nft_hash: do not dump the auto generated seed
- From: Laura García Liébana <laura.garcia@xxxxxxxxxxx>
- Re: [PATCH nf-next] ip_vs_sync: change comparison on sync_refresh_period
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nft_hash: do not dump the auto generated seed
- From: Florian Westphal <fw@xxxxxxxxx>
- [PATCH nf-next] ip_vs_sync: change comparison on sync_refresh_period
- From: Aaron Conole <aconole@xxxxxxxxxx>
- [PATCH nf-next] nf_conntrack: remove double assignment
- From: Aaron Conole <aconole@xxxxxxxxxx>
- [PATCH nf-next] nf_tables: remove double return statement
- From: Aaron Conole <aconole@xxxxxxxxxx>
- [PATCH nf] netfilter: ctnetlink: make it safer when updating ct->status
- From: Liping Zhang <zlpnobody@xxxxxxx>
- Re: [PATCH ulogd2 1/2] ulogd.conf: harmonize log file options with module default values
- From: Kaarle Ritvanen <kaarle.ritvanen@xxxxxxxxxxxxx>
- [PATCH nf 1/1] netfilter: nf_nat: Fix return NF_DROP in nfnetlink_parse_nat_setup
- From: gfree.wind@xxxxxxxxxxx
- [PATCH nf-next v2 1/1] netfilter: SYNPROXY: Return NF_STOLEN instead of NF_DROP during handshaking
- From: gfree.wind@xxxxxxxxxxx
- Re: [PATCH nf-next] ipvs: remove unused function ip_vs_set_state_timeout
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH iptables] extensions: libxt_hashlimit: fix 64-bit printf formats
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf-next 1/1] netfilter: SYNPROXY: Return NF_STOLEN instead of NF_DROP during handshaking
- From: gfree.wind@xxxxxxxxxxx
- RE: [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- RE: [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: 高峰 <fgao@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- RE: [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: 高峰 <fgao@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
- [libnetfilter-acct][PATCH] Declare the define visibility attribute together
- From: Khem Raj <raj.khem@xxxxxxxxx>
- [libnftnl][PATCH] Declare the define visivility attribute together
- From: Khem Raj <raj.khem@xxxxxxxxx>
- [libnetfilter_queue][PATCH 2/2] Declare the define visivility attribute together
- From: Khem Raj <raj.khem@xxxxxxxxx>
- [libnetfilter_queue][PATCH 1/2] Correct typo in the location of internal.h in #include
- From: Khem Raj <raj.khem@xxxxxxxxx>
- [PATCH nf-next] ipset: remove unused function __ip_set_get_netlink
- From: Aaron Conole <aconole@xxxxxxxxxx>
- [PATCH nf-next] ipvs: remove unused function ip_vs_set_state_timeout
- From: Aaron Conole <aconole@xxxxxxxxxx>
- [PATCH 2/2 v2] iptables-restore.8: document -w/-W options
- From: Dan Williams <dcbw@xxxxxxxxxx>
- [PATCH 1/2 v2] iptables-restore/ip6tables-restore: add --version/-V argument
- From: Dan Williams <dcbw@xxxxxxxxxx>
- [PATCH 2/3] netfilter: ipvs: Replace kzalloc with kcalloc.
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 3/3] ipvs: remove unused variable
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [PATCH 1/3] netfilter: ipvs: don't check for presence of nat extension
- From: Simon Horman <horms@xxxxxxxxxxxx>
- [GIT 0/3] Second Round of IPVS Updates for v4.12
- From: Simon Horman <horms@xxxxxxxxxxxx>
- Re: [PATCH iptables] extensions: libxt_hashlimit: fix 64-bit printf formats
- From: Jan Engelhardt <jengelh@xxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: remove unnecessary nf_conntrack_expect_lock protection
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [PATCH] netfilter: nat: remove rcu_read_lock in __nf_nat_decode_session.
- From: Taehee Yoo <ap420073@xxxxxxxxx>
- Re: [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: remove unnecessary nf_conntrack_expect_lock protection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] iptables-restore/ip6tables-restore: add --version/-V argument
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] net: netfilter: ipvs: Replace explicit NULL comparison
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] net: netfilter: Replace explicit NULL comparisons
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- [PATCH nf 1/1] netfilter: seqadj: Fix possible non-linear data access for TCP header
- From: gfree.wind@xxxxxxxxxxx
- Re: [PATCH iptables] extensions: libxt_hashlimit: fix 64-bit printf formats
- From: James Cowgill <James.Cowgill@xxxxxxxxxx>
- Re: [PATCH] net: netfilter: Replace explicit NULL comparisons
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [PATCH] net: netfilter: Replace explicit NULL comparisons
- From: Jan Engelhardt <jengelh@xxxxxxx>
- [PATCH nf 2/2] netfilter: nfnl_cthelper: reject del request if helper obj is in use
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nf 0/2] netfilter: reject cthelper del request if it is in use
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nf 1/2] netfilter: introduce nf_conntrack_helper_put helper function
- From: Liping Zhang <zlpnobody@xxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: remove unnecessary nf_conntrack_expect_lock protection
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [PATCH] iptables-restore/ip6tables-restore: add --version/-V argument
- From: Dan Williams <dcbw@xxxxxxxxxx>
- Re: [PATCH] net: netfilter: ipvs: Replace explicit NULL comparison
- From: kbuild test robot <lkp@xxxxxxxxx>
- Re: [PATCH] libnfnetlink: Add API support for passing bound file descriptor
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2 1/1] netfilter: udplite: Remove duplicated udplite4/6 declaration
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] iptables-restore/ip6tables-restore: add --version/-V argument
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: nf_ct_expect: use proper RCU list traversal/update APIs
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: skip dumping expect when nfct_help(ct) is NULL
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: make it safer during the inet6_dev->addr_list traversal
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: remove unnecessary nf_conntrack_expect_lock protection
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf] netfilter: ctnetlink: make it safer when checking the ct helper name
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v3 1/1] netfilter: helper: Add the rcu lock when call __nf_conntrack_helper_find
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables] extensions: libxt_hashlimit: fix 64-bit printf formats
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH net] netfilter: xt_TCPMSS: add more sanity tests on tcph->doff
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] net: netfilter: Replace explicit NULL comparisons
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] net: ipv6: Remove unneccessary comments
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] net: netfilter: Replace explicit NULL comparisons
- From: Jan Engelhardt <jengelh@xxxxxxx>
- [PATCH] net: netfilter: Replace explicit NULL comparisons
- From: Arushi Singhal <arushisinghal19971997@xxxxxxxxx>
- [PATCH] net: netfilter: ipvs: Replace explicit NULL comparison
- From: Arushi Singhal <arushisinghal19971997@xxxxxxxxx>
- [PATCH] net: ipv6: Remove unneccessary comments
- From: Arushi Singhal <arushisinghal19971997@xxxxxxxxx>
- [PATCH nf-next] netfilter: nf_conntrack: make nf_conntrack_max as an unsigned int knob
- From: Liping Zhang <zlpnobody@xxxxxxx>
- [PATCH nf] netfilter: xt_CT: fix cthelper module's refcnt leak
- From: Liping Zhang <zlpnobody@xxxxxxx>
- Re: [PATCH nf] netfilter: nft_hash: do not dump the auto generated seed
- From: Liping Zhang <zlpnobody@xxxxxxxxx>
- Re: [PATCH nf] netfilter: nft_hash: do not dump the auto generated seed
- From: Laura García Liébana <laura.garcia@xxxxxxxxxxx>
- Re: [RFC v2] extensions: libxt_TOS: Add translation to nft
- From: Gargi Sharma <gs051095@xxxxxxxxx>
- Re: [RFC v2] extensions: libxt_TOS: Add translation to nft
- From: Gargi Sharma <gs051095@xxxxxxxxx>
- Re: [PATCH 2/2] iptables: iptables: Constify option struct
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] net: ipv6: Removed unnecessary parenthesis
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] net: netfilter:Remove exceptional & on function name
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [Outreachy kernel] [PATCH] net: ipv6: netfilter: Format block comments.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH 1/4] iptables: iptables: Add blank line after declaration
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [Outreachy kernel] [PATCH] iptables: libiptc: Use list_{next/prev}_entry instead of list_entry
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables] tests: add regression tests for xtables-translate
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [Outreachy kernel] [PATCH] iptables: libiptc: Use list_{next/prev}_entry instead of list_entry
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] net: netfilter: Use list_{next/prev}_entry instead of list_entry
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] net: netfilter: Use seq_puts()/seq_putc() where possible
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2] net: Remove unnecessary cast on void pointer
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables] extensions: libxt_hashlimit: fix 64-bit printf formats
- From: Arturo Borrero Gonzalez <arturo@xxxxxxxxxx>
- [PATCH iptables] extensions: libxt_hashlimit: fix 64-bit printf formats
- From: James Cowgill <James.Cowgill@xxxxxxxxxx>
- [PATCH nf-next 1/1] netfilter: cttimeout: Refine cttimeout_del_timeout
- From: gfree.wind@xxxxxxxxxxx
- Re: [PATCH iptables] tests: add regression tests for xtables-translate
- From: "Pablo M. Bermudo Garay" <pablombg@xxxxxxxxx>
- Re: [PATCH] net: ipv4: netfilter: Remove unused function nf_nat_need_gre()
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH iptables] tests: add regression tests for xtables-translate
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] exthdr: avoid crash with older kernels
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] src: fix build warning on i686
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [Outreachy kernel] [PATCH] net: netfilter: Remove typedef from "typedef struct bitstr_t".
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] tests: nft removes required payload protocol expressions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [RFC v2] extensions: libxt_TOS: Add translation to nft
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/1] netfilter: ctlink: Return error directly when create expect without help
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [RFC v2] extensions: libxt_TOS: Add translation to nft
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- RE: [PATCH nf-next v2 1/1] netfilter: nat: Correct the return value check for nat mangled packet
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- RE: [PATCH nf-next 1/1] netfilter: ctlink: Return error directly when create expect without help
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- RE: [PATCH nf-next v2 1/1] netfilter: nat: Correct the return value check for nat mangled packet
- From: "Gao Feng" <gfree.wind@xxxxxxxxxxx>
- Re: [Outreachy kernel] [PATCH v3] net: netfilter: Add nfnl_msg_type() helper function
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next] netfilter: nat: avoid use of nf_conn_nat extension
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/1] netfilter: ctlink: Return error directly when create expect without help
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH] netfilter: nat: remove rcu_read_lock in __nf_nat_decode_session.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH v2] net: netfilter: Remove multiple assignment.
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2 1/1] netfilter: nat: Correct the return value check for nat mangled packet
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next v2 1/1] netfilter: nat: Correct the return value check for nat mangled packet
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nft] tests: nft removes required payload protocol expressions
- From: Florian Westphal <fw@xxxxxxxxx>
- Re: [PATCH nft] tests: nft removes required payload protocol expressions
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf-next 1/1] netfilter: expect: Add one common func nf_ct_remove_expect to simplify codes
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
- Re: [PATCH nf v2 1/1] netfilter: expect: Make sure the max_expected limit is effective
- From: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>
[Index of Archives]
[LARTC]
[Berkeley Packet Filter]
[Bugtraq]
[Yosemite News]
[Samba]