Displaying 20 results from an estimated 133 matches for "verdicts".
Did you mean:
verdict
2024 Feb 13
16
[Bug 1736] New: nftables - dynamic update for verdict map from the packet path
https://bugzilla.netfilter.org/show_bug.cgi?id=1736
Bug ID: 1736
Summary: nftables - dynamic update for verdict map from the
packet path
Product: nftables
Version: 1.0.x
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2024 Apr 03
10
[Bug 1742] New: using nfqueue breaks SCTP connection (tracking)
https://bugzilla.netfilter.org/show_bug.cgi?id=1742
Bug ID: 1742
Summary: using nfqueue breaks SCTP connection (tracking)
Product: libnetfilter_queue
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: libnetfilter_queue
Assignee:
2020 Aug 27
0
[Bug 1455] New: Queue verdict cannot be used in vmap
https://bugzilla.netfilter.org/show_bug.cgi?id=1455
Bug ID: 1455
Summary: Queue verdict cannot be used in vmap
Product: nftables
Version: unspecified
Hardware: arm
OS: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2007 Apr 18
3
[Bridge] Re: do_IRQ: stack overflow: 872..
On Fri, 07 Jan 2005 17:05:59 +0000
David Woodhouse <dwmw2@infradead.org> wrote:
> On Sat, 2004-12-18 at 08:50 +0100, Andi Kleen wrote:
> > It's not really an oops, just a warning that stack space got quiet
> > tight.
> >
> > The problem seems to be that the br netfilter code is nesting far too
> > deeply and recursing several times. Looks like a design
2007 Apr 18
1
[Bridge] [PATCH/RFC] Reduce call chain length in netfilter (take 2)
Hi,
This is a second try to fix the long chain call lengths in netfilter.
The difference with the previous patch is that I got rid of the extra
argument. I somehow didn't see it could be done without using the 'int
*ret2' argument.
A comment on the number of arguments to nf_hook_slow: I don't think the
number of arguments should be decreased. For the bridge-nf code, f.e.,
the
2018 Jun 12
1
[Bug 1261] New: nft trace crash with msg "BUG: invalid verdict value 2"
https://bugzilla.netfilter.org/show_bug.cgi?id=1261
Bug ID: 1261
Summary: nft trace crash with msg "BUG: invalid verdict value
2"
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
2012 Apr 25
1
forwarding packets to service in same host without using loopback network
This question is not about linux usage. But still i think user list
is a good crowd for linux programmer. So here it goes.
I have this libnetfilter_queue application which receives packets from
kernel based on some iptables rule. Before going straight to my
problem, i'm giving a sample workable code and other tools to set up a
test environment so that We problem definition and possible
2020 Sep 23
1
[Bug 1471] New: consider quick accept verdict and delayed drop policy
https://bugzilla.netfilter.org/show_bug.cgi?id=1471
Bug ID: 1471
Summary: consider quick accept verdict and delayed drop policy
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2023 Apr 14
5
[Bug 1673] New: bug egress hook virtio interface with VLAN
https://bugzilla.netfilter.org/show_bug.cgi?id=1673
Bug ID: 1673
Summary: bug egress hook virtio interface with VLAN
Product: nftables
Version: 1.0.x
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
2023 Apr 14
3
[Bug 1672] New: bug egress hook virtio interface with VLAN
https://bugzilla.netfilter.org/show_bug.cgi?id=1672
Bug ID: 1672
Summary: bug egress hook virtio interface with VLAN
Product: nftables
Version: 1.0.x
Hardware: All
OS: other
Status: NEW
Severity: normal
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
2015 Dec 01
3
[PATCH 0/2] Do not use the "red zone" on EFI
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
On Sun, Nov 29, 2015 at 06:15:11AM +0200
>
> Thank you for the replies. I do appreciate it.
>
I appreciate a verdict/judgement/decision on patches.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iQIcBAEBCAAGBQJWXTGWAAoJECE10SPYwZvsi+oQAJwRreo5RlzmhbMQ/me5j3l+
2019 Jul 24
4
[Bug 1356] New: adding element to map inverts byte order
https://bugzilla.netfilter.org/show_bug.cgi?id=1356
Bug ID: 1356
Summary: adding element to map inverts byte order
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
Component: nft
Assignee: pablo at
2011 Mar 07
2
[Bug 708] New: Some accepted packets get lost
http://bugzilla.netfilter.org/show_bug.cgi?id=708
Summary: Some accepted packets get lost
Product: libnetfilter_queue
Version: unspecified
Platform: x86_64
OS/Version: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P3
Component: libnetfilter_queue
AssignedTo: netfilter-buglog at
2016 Oct 28
2
[Bug 1096] New: Kernel oops when inserting an element into a map
https://bugzilla.netfilter.org/show_bug.cgi?id=1096
Bug ID: 1096
Summary: Kernel oops when inserting an element into a map
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: critical
Priority: P5
Component: kernel
Assignee: pablo at
2020 Mar 12
3
[Bug 1413] New: Inconsistent EBUSY errors when adding a duplicate element to a map
https://bugzilla.netfilter.org/show_bug.cgi?id=1413
Bug ID: 1413
Summary: Inconsistent EBUSY errors when adding a duplicate
element to a map
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: normal
Priority: P5
2020 Jan 07
4
[Bug 1396] New: When rule with 3 concat elements are added, nft list shows only 2
https://bugzilla.netfilter.org/show_bug.cgi?id=1396
Bug ID: 1396
Summary: When rule with 3 concat elements are added, nft list
shows only 2
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: critical
Priority: P5
Component: nft
2006 Feb 11
5
acts_as_taggable : plugin vs gem
Googling for acts_as_taggable is a little confusing: gem, plugin?!
What are the differences?
Which one to choose?
Where is the best doc?
Alain
2014 Dec 16
0
[ANNOUNCE] nftables 0.4 release
Hi!
The Netfilter project proudly presents:
nftables 0.4
This release contains a lot of bug fixes and new features contained up
to the recent 3.18 kernel release (and some features coming up in the
yet unreleased 3.19-rc).
New features
============
* Add support for global ruleset operations (available since 3.18).
Get rid of all tables, chains, and rules in one go:
# nft
2024 Jul 13
2
[Bug 1758] New: Design flaw in chain traversal
https://bugzilla.netfilter.org/show_bug.cgi?id=1758
Bug ID: 1758
Summary: Design flaw in chain traversal
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Ubuntu
Status: NEW
Severity: major
Priority: P5
Component: kernel
Assignee: pablo at netfilter.org
2020 Jan 08
3
Phabricator -> GitHub PRs?
What was the verdict? Any plans to move? I hate coding anything knowing
that I'll have to use Phabricator. It's like nails on a chalkboard.
-bw
On Tue, Jan 7, 2020 at 4:13 PM Finkel, Hal J. <hfinkel at anl.gov> wrote:
>
> On 1/7/20 6:03 PM, Bill Wendling via llvm-dev wrote:
>
> Now that we're on GitHub, can we *please* move to GitHub PRs? As much as I
> hate