search for: verdicts

Displaying 20 results from an estimated 133 matches for "verdicts".

Did you mean: verdict
2024 Feb 13
16
[Bug 1736] New: nftables - dynamic update for verdict map from the packet path
https://bugzilla.netfilter.org/show_bug.cgi?id=1736 Bug ID: 1736 Summary: nftables - dynamic update for verdict map from the packet path Product: nftables Version: 1.0.x Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft
2024 Apr 03
10
[Bug 1742] New: using nfqueue breaks SCTP connection (tracking)
https://bugzilla.netfilter.org/show_bug.cgi?id=1742 Bug ID: 1742 Summary: using nfqueue breaks SCTP connection (tracking) Product: libnetfilter_queue Version: unspecified Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: libnetfilter_queue Assignee:
2020 Aug 27
0
[Bug 1455] New: Queue verdict cannot be used in vmap
https://bugzilla.netfilter.org/show_bug.cgi?id=1455 Bug ID: 1455 Summary: Queue verdict cannot be used in vmap Product: nftables Version: unspecified Hardware: arm OS: Ubuntu Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org
2007 Apr 18
3
[Bridge] Re: do_IRQ: stack overflow: 872..
On Fri, 07 Jan 2005 17:05:59 +0000 David Woodhouse <dwmw2@infradead.org> wrote: > On Sat, 2004-12-18 at 08:50 +0100, Andi Kleen wrote: > > It's not really an oops, just a warning that stack space got quiet > > tight. > > > > The problem seems to be that the br netfilter code is nesting far too > > deeply and recursing several times. Looks like a design
2007 Apr 18
1
[Bridge] [PATCH/RFC] Reduce call chain length in netfilter (take 2)
Hi, This is a second try to fix the long chain call lengths in netfilter. The difference with the previous patch is that I got rid of the extra argument. I somehow didn't see it could be done without using the 'int *ret2' argument. A comment on the number of arguments to nf_hook_slow: I don't think the number of arguments should be decreased. For the bridge-nf code, f.e., the
2018 Jun 12
1
[Bug 1261] New: nft trace crash with msg "BUG: invalid verdict value 2"
https://bugzilla.netfilter.org/show_bug.cgi?id=1261 Bug ID: 1261 Summary: nft trace crash with msg "BUG: invalid verdict value 2" Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: nft
2012 Apr 25
1
forwarding packets to service in same host without using loopback network
This question is not about linux usage. But still i think user list is a good crowd for linux programmer. So here it goes. I have this libnetfilter_queue application which receives packets from kernel based on some iptables rule. Before going straight to my problem, i'm giving a sample workable code and other tools to set up a test environment so that We problem definition and possible
2020 Sep 23
1
[Bug 1471] New: consider quick accept verdict and delayed drop policy
https://bugzilla.netfilter.org/show_bug.cgi?id=1471 Bug ID: 1471 Summary: consider quick accept verdict and delayed drop policy Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at
2023 Apr 14
5
[Bug 1673] New: bug egress hook virtio interface with VLAN
https://bugzilla.netfilter.org/show_bug.cgi?id=1673 Bug ID: 1673 Summary: bug egress hook virtio interface with VLAN Product: nftables Version: 1.0.x Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: kernel Assignee: pablo at netfilter.org
2023 Apr 14
3
[Bug 1672] New: bug egress hook virtio interface with VLAN
https://bugzilla.netfilter.org/show_bug.cgi?id=1672 Bug ID: 1672 Summary: bug egress hook virtio interface with VLAN Product: nftables Version: 1.0.x Hardware: All OS: other Status: NEW Severity: normal Priority: P5 Component: kernel Assignee: pablo at netfilter.org
2015 Dec 01
3
[PATCH 0/2] Do not use the "red zone" on EFI
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On Sun, Nov 29, 2015 at 06:15:11AM +0200 > > Thank you for the replies. I do appreciate it. > I appreciate a verdict/judgement/decision on patches. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQIcBAEBCAAGBQJWXTGWAAoJECE10SPYwZvsi+oQAJwRreo5RlzmhbMQ/me5j3l+
2019 Jul 24
4
[Bug 1356] New: adding element to map inverts byte order
https://bugzilla.netfilter.org/show_bug.cgi?id=1356 Bug ID: 1356 Summary: adding element to map inverts byte order Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at
2011 Mar 07
2
[Bug 708] New: Some accepted packets get lost
http://bugzilla.netfilter.org/show_bug.cgi?id=708 Summary: Some accepted packets get lost Product: libnetfilter_queue Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: normal Priority: P3 Component: libnetfilter_queue AssignedTo: netfilter-buglog at
2016 Oct 28
2
[Bug 1096] New: Kernel oops when inserting an element into a map
https://bugzilla.netfilter.org/show_bug.cgi?id=1096 Bug ID: 1096 Summary: Kernel oops when inserting an element into a map Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: critical Priority: P5 Component: kernel Assignee: pablo at
2020 Mar 12
3
[Bug 1413] New: Inconsistent EBUSY errors when adding a duplicate element to a map
https://bugzilla.netfilter.org/show_bug.cgi?id=1413 Bug ID: 1413 Summary: Inconsistent EBUSY errors when adding a duplicate element to a map Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: normal Priority: P5
2020 Jan 07
4
[Bug 1396] New: When rule with 3 concat elements are added, nft list shows only 2
https://bugzilla.netfilter.org/show_bug.cgi?id=1396 Bug ID: 1396 Summary: When rule with 3 concat elements are added, nft list shows only 2 Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: critical Priority: P5 Component: nft
2006 Feb 11
5
acts_as_taggable : plugin vs gem
Googling for acts_as_taggable is a little confusing: gem, plugin?! What are the differences? Which one to choose? Where is the best doc? Alain
2014 Dec 16
0
[ANNOUNCE] nftables 0.4 release
Hi! The Netfilter project proudly presents: nftables 0.4 This release contains a lot of bug fixes and new features contained up to the recent 3.18 kernel release (and some features coming up in the yet unreleased 3.19-rc). New features ============ * Add support for global ruleset operations (available since 3.18). Get rid of all tables, chains, and rules in one go: # nft
2024 Jul 13
2
[Bug 1758] New: Design flaw in chain traversal
https://bugzilla.netfilter.org/show_bug.cgi?id=1758 Bug ID: 1758 Summary: Design flaw in chain traversal Product: nftables Version: unspecified Hardware: x86_64 OS: Ubuntu Status: NEW Severity: major Priority: P5 Component: kernel Assignee: pablo at netfilter.org
2020 Jan 08
3
Phabricator -> GitHub PRs?
What was the verdict? Any plans to move? I hate coding anything knowing that I'll have to use Phabricator. It's like nails on a chalkboard. -bw On Tue, Jan 7, 2020 at 4:13 PM Finkel, Hal J. <hfinkel at anl.gov> wrote: > > On 1/7/20 6:03 PM, Bill Wendling via llvm-dev wrote: > > Now that we're on GitHub, can we *please* move to GitHub PRs? As much as I > hate