messages from 2016-01-27 15:46:06 to 2016-02-16 17:04:20 UTC [more...]
[PATCH 0/6] Netfilter fixes for net
2016-02-16 17:02 UTC (6+ messages)
` [PATCH 1/6] netfilter: conntrack: resched in nf_ct_iterate_cleanup
` [PATCH 2/6] netfilter: nfnetlink: use original skbuff when acking batches
` [PATCH 3/6] netfilter: cttimeout: fix deadlock due to erroneous unlock/lock conversion
` [PATCH 4/6] netfilter: nfnetlink: correctly validate length of batch messages
` [PATCH 5/6] netfilter: tee: select NF_DUP_IPV6 unconditionally
[PATCH nft 0/3] meta: random match for statistic sampling
2016-02-16 16:28 UTC (17+ messages)
` [PATCH nft 1/3] evaluate: move default op lookup into helper
` [PATCH nft 2/3] meta: add prandom matching
` [PATCH nft 3/3] tests: add test cases for meta random
[RFC nftables PATCH] nft: add bash completion script
2016-02-16 16:26 UTC (6+ messages)
[PATCH nf-next v2] netfilter: meta: add PRANDOM support
2016-02-16 16:24 UTC
[PATCH nf-next] netfilter: meta: add PRANDOM support
2016-02-16 14:09 UTC (5+ messages)
[PATCH] extensions: libxt_tos: Add translation to nft
2016-02-16 11:26 UTC (2+ messages)
[PATCH] comment: Add translation to nft
2016-02-16 11:18 UTC (2+ messages)
[PATCH V6] netfilter: h323: avoid potential attack
2016-02-15 19:59 UTC (2+ messages)
[PATCH v4] extensions: libxt_NFQUEUE: Add translation to nft
2016-02-15 19:49 UTC (2+ messages)
[PATCH] iptables: nft-ipv6: Fix ipv6 flags
2016-02-15 19:47 UTC (2+ messages)
[PATCH nf-next v2 0/2] netfilter: bridge: add queuing to userspace for AF_
2016-02-15 19:45 UTC (6+ messages)
` [PATCH nf-next v2 1/2] netfilter: bridge: add nf_afinfo to enable queuing to userspace
` [PATCH nf-next v2 2/2] netfilter: bridge: pass L2 header and VLAN as netlink attributes in queues "
[PATCH nf] netfilter: nfnetlink: correctly validate length of batch messages
2016-02-15 19:27 UTC (2+ messages)
[PATCH] netfilter: nft_counter: fix erroneous return values
2016-02-15 18:27 UTC (2+ messages)
[PATCH] netfilter: tee: select NF_DUP_IPV6 unconditionally
2016-02-15 18:14 UTC (2+ messages)
[PATCH 0/7] fix IS_ERR_VALUE usage
2016-02-15 14:35 UTC (2+ messages)
` [PATCH 1/7] netfilter: "
[PATCH 0/6] Namespacify various ip sysctl knobs
2016-02-15 10:11 UTC (7+ messages)
` [PATCH 1/6] ipv4: Namespaceify ip_default_ttl sysctl knob
` [PATCH 2/6] igmp: net: Move igmp namespace init to correct file
` [PATCH 3/6] ipv4: Namespacify ip_dynaddr sysctl knob
` [PATCH 4/6] ipv4: namespacify ip_early_demux "
` [PATCH 5/6] ipv4: namespacify ip fragment max dist "
` [PATCH 6/6] net: Export ip fragment sysctl to unprivileged users
[PATCH 0/6] Namespacify various ip sysctl knobs
2016-02-15 10:03 UTC (7+ messages)
` [PATCH 1/6] ipv4: Namespaceify ip_default_ttl sysctl knob
` [PATCH 2/6] igmp: net: Move igmp namespace init to correct file
` [PATCH 3/6] ipv4: Namespacify ip_dynaddr sysctl knob
` [PATCH 4/6] ipv4: namespacify ip_early_demux "
` [PATCH 5/6] ipv4: namespacify ip fragment max dist "
` [PATCH 6/6] net: Export ip fragment sysctl to unprivileged users
Клиентские базы! Тел\Viber\Whatsapp:+79139393506 Skype:prodawez389 Email:mnoskova760@gmail.com Узнайте подробнее!!!
2016-02-10 7:28 UTC
Supply Of Your Products
2016-02-13 12:54 UTC
[PATCHSET v4] netfilter, cgroup: implement cgroup2 path match in xt_cgroup
2016-02-12 16:05 UTC (4+ messages)
` [PATCH 8/8] netfilter: implement xt_cgroup cgroup2 path match
Good day
2016-02-10 18:33 UTC
Business Partnership
2016-02-11 1:30 UTC
Business Partnership
2016-02-11 1:02 UTC
kernel BUG at net/netfilter/nf_nat_core.c:395
2016-02-10 17:34 UTC
[RFC] a software based on ulogd
2016-02-10 2:05 UTC (10+ messages)
` [PATCH ulogd 1/7] ipfix: add flowDirection IE
` [PATCH ulogd 2/7] nfct/ipfix: introduce new vendor id
` [PATCH ulogd 3/7] nfct/ipfix: introduce NAT entries
` [PATCH ulogd 4/7] filter: add new filter for Netflow ICMP_TYPE
` [PATCH ulogd 5/7] filter: add new filter for IPFIX time
` [PATCH ulogd 6/7] ulogd: update calling stop callback condition
` [PATCH ulogd 7/7] nflow9: introduce new NetFlow v9 output plugin
[PATCH iproute2 v2 21/21] iplink: bridge: add support for netfilter call attributes
2016-02-09 12:00 UTC
[PATCH v2] extensions: libxt_NFQUEUE: Add translation to nft
2016-02-09 8:51 UTC (5+ messages)
header conflict introduced by change to netfilter_ipv4/ip_tables.h
2016-02-08 13:59 UTC (7+ messages)
` [PATCH] uapi glibc compat: fix cases where glibc net/if.h is included before linux/if.h
` Kernel uapi and glibc header conflicts (was Re: header conflict introduced by change to netfilter_ipv4/ip_tables.h )
[PATCH v3] extensions: libxt_NFQUEUE: Add translation to nft
2016-02-07 15:06 UTC
[PATCH nf-next v7 0/7] openvswitch: NAT support
2016-02-06 1:41 UTC (8+ messages)
` [PATCH nf-next v7 1/7] netfilter: Remove IP_CT_NEW_REPLY definition
` [PATCH nf-next v7 2/7] netfilter: Allow calling into nat helper without skb_dst
` [PATCH nf-next v7 3/7] openvswitch: Update the CT state key only after nf_conntrack_in()
` [PATCH nf-next v7 4/7] openvswitch: Find existing conntrack entry after upcall
` [PATCH nf-next v7 5/7] openvswitch: Handle NF_REPEAT in conntrack action
` [PATCH nf-next v7 6/7] openvswitch: Delay conntrack helper call for new connections
` [PATCH nf-next v7 7/7] openvswitch: Interface with NAT
[PATCH 1/2] set: Implement new buffer of TLV objects
2016-02-05 14:32 UTC (4+ messages)
` [PATCH 2/2] Rule comment is now stored into a TLV attribute
[PATCH] ulogd: Restructures signal handling by self-pipe trick
2016-02-05 10:57 UTC
Rendszergazda
2016-02-05 9:09 UTC
[ANNOUNCE] NetDev 1.1 schedule is out
2016-02-04 0:07 UTC
[PATCH nf-next] netfilter: nf_defrag_ipv4: Drop redundant ip_send_check()
2016-02-03 18:00 UTC
[ANNOUNCE] 12th Netfilter Workshop in Amsterdam, Netherlands
2016-02-02 22:26 UTC
mirrors of nftable repo
2016-02-02 18:24 UTC (2+ messages)
[PATCH conntrack 1/5] conntrack: support delete by label
2016-02-02 16:34 UTC (13+ messages)
` [PATCH conntrack 2/5] conntrack: consolidate filtering
` [PATCH conntrack 3/5] conntrack: cleanup: use switch statements for family checks
` [PATCH conntrack 4/5 v2] conntrack: add support for netmask filtering
[PATCH V5] netfilter: h323: avoid potential attack
2016-02-02 10:55 UTC (2+ messages)
[PATCH] netfilter: nft_ct: define nft_ct_get_eval_counter() only when needed
2016-02-02 4:19 UTC (2+ messages)
net-next is OPEN
2016-02-02 4:13 UTC
[PATCH RESEND] bridge:Fix concurrent access issue in the function brnf_get_logical_dev
2016-02-02 3:19 UTC
[PATCH V4] netfilter: h323: avoid potential attack
2016-02-02 3:11 UTC
[PATCH nft] meta: fix error checks in tc handle parser
2016-02-01 20:02 UTC (3+ messages)
[PATCH] comment: Add translation to nft
2016-02-01 18:44 UTC (2+ messages)
[PATCH 1/3 iptables,xlate4] libxtables: fix leak in xt_buf object
2016-02-01 18:43 UTC (3+ messages)
` [PATCH 2/3 iptables,xlate4] extensions: rename xt_buf to xt_xlate
` [PATCH 3/3 iptables,xlate4] xtables: add xt_xlate_add_comment()
[PATCH V3] netfilter: h323: avoid potential attack
2016-02-01 18:12 UTC (3+ messages)
[PATCH nf] netfilter: cttimeout: fix deadlock due to erroneous unlock/lock conversion
2016-02-01 17:39 UTC (2+ messages)
[PATCH nf] netfilter: conntrack: resched in nf_ct_iterate_cleanup
2016-02-01 17:38 UTC (2+ messages)
[PATCH net-next] netfilter: nf_conntrack: remove the unneed check for *bucket
2016-02-01 16:39 UTC (4+ messages)
[PATCH] src: netlink_linearize: Fix bug for redirect target
2016-02-01 14:09 UTC (2+ messages)
[PATCH nft] proto: use parameter-problem for icmpv6 type
2016-02-01 13:51 UTC
[PATCH nft] netlink_delinearize: prune implicit binop before payload_match_postprocess()
2016-02-01 13:50 UTC (2+ messages)
[PATCH conntrack 1/4] conntrack: split up nfct_set_addr_from_opt()
2016-02-01 13:30 UTC (4+ messages)
` [PATCH conntrack 2/4 v2] conntrack: extend parse_addr() with CIDR support
` [PATCH conntrack 3/4 v2] conntrack: add support for CIDR notation
` [PATCH conntrack 4/4] tests: conntrack: add tests "
Клиентские базы!!! Тел\Viber\Whatsapp:+79133913837 Skype:prodawez389 Email:zradionova92@gmail.com Узнайте подробнее!!!
2016-02-01 4:22 UTC
[PATCH net] nftables: use list_for_each_entry_safe_reverse to traversal commit_list in nf_tables_abort
2016-02-01 11:08 UTC (6+ messages)
[PATCH conntrack 1/4] tests: conntrack: run testfiles in the correct order
2016-02-01 11:00 UTC (8+ messages)
` [PATCH conntrack 2/4] tests: conntrack: flush stdout to keep sync
` [PATCH conntrack 3/4] tests: conntrack: ignore dot files in testdir
` [PATCH conntrack 4/4] tests: conntrack: use local conntrack binary
[PATCH nft 00/11] revisiting protocol conflict resolution
2016-01-28 21:25 UTC (12+ messages)
` [PATCH nft 01/11] evaluate: resolve_protocol_conflict() should return int
` [PATCH nft 02/11] evaluate: move inet/netdev protocol context supersede logic to supersede_dep()
` [PATCH nft 03/11] evaluate: check if we have to resolve a conflict in first place
` [PATCH nft 04/11] evaluate: don't adjust offset from resolve_protocol_conflict()
` [PATCH nft 05/11] evaluate: only try to replace dummy protocol from link-layer context
` [PATCH nft 06/11] evaluate: assert on invalid base in resolve_protocol_conflict()
` [PATCH nft 07/11] evaluate: wrap protocol context debunk into function
` [PATCH nft 08/11] evaluate: generate ether type payload after meta iiftype
` [PATCH nft 09/11] proto: proto_dev_type() returns interface type for base protocols too
` [PATCH nft 10/11] src: annotate follow up dependency just after killing another
` [PATCH nft 11/11] tests/py: test vlan on ingress
[PATCH V2] netfilter: h323: avoid potential attack
2016-01-28 15:13 UTC (9+ messages)
` "
[PATCH 1/2] netfilter: ipvs: avoid unused variable warnings
2016-01-28 12:28 UTC (7+ messages)
` [PATCH 2/2] netfilter: ipvs/SIP: handle ip_vs_fill_iph_skb_off failure
NEW ARRIVALS, CISCO,CPU's,Memory, LAPTOP AND AVAYA
2016-01-27 6:19 UTC
[PATCH 1/1] netfilter: h323: avoid potential attack
2016-01-27 15:57 UTC (2+ messages)
[PATCH nft] netlink_delinearize: only remove protocol if equal cmp is used
2016-01-27 15:45 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).