similar to: [Bug 700] provide better errors for nfq_bind_pf()

Displaying 20 results from an estimated 30000 matches similar to: "[Bug 700] provide better errors for nfq_bind_pf()"

2016 Apr 15
0
[Bug 1032] nftables-0.5 fails to import ip6 tables when loopback address provided as both src and dst addr
https://bugzilla.netfilter.org/show_bug.cgi?id=1032 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |fw at strlen.de Assignee|pablo at netfilter.org |fw at strlen.de --- Comment #2 from Florian
2013 Apr 21
2
[Bug 812] addrtype with limit-iface-in in ip6tables/nat/PREROUTING messes up the route cache
https://bugzilla.netfilter.org/show_bug.cgi?id=812 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |fw at strlen.de --- Comment #1 from Florian Westphal <fw at strlen.de> 2013-04-21 16:48:04 CEST ---
2013 Apr 11
1
[Bug 778] NFQUEUE --queue-bypass accepts all packets when no userspace application is available
https://bugzilla.netfilter.org/show_bug.cgi?id=778 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED CC| |fw at strlen.de --- Comment #1 from Florian Westphal
2019 Sep 16
0
[Bug 1015] ip6tables-save and "-p all" or no specification of protocol.
https://bugzilla.netfilter.org/show_bug.cgi?id=1015 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED CC| |fw
2013 Apr 12
3
[Bug 814] rpfilter blocks broadcast packets
https://bugzilla.netfilter.org/show_bug.cgi?id=814 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |fw at strlen.de --- Comment #1 from Florian Westphal <fw at strlen.de> 2013-04-12 10:24:14 CEST --- (In reply
2018 Jan 30
5
[Bug 1220] New: Reverse path filtering using "fib" needs better documentation
https://bugzilla.netfilter.org/show_bug.cgi?id=1220 Bug ID: 1220 Summary: Reverse path filtering using "fib" needs better documentation Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: minor Priority: P5 Component: nft
2016 Apr 19
0
[Bug 1032] nftables-0.5 fails to import ip6 tables when loopback address provided as both src and dst addr
https://bugzilla.netfilter.org/show_bug.cgi?id=1032 Florian Westphal <fw at strlen.de> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED -- You are receiving this mail because: You are
2013 May 17
0
[Bug 712] iptables-save does not save correcly rateest bps parameter
https://bugzilla.netfilter.org/show_bug.cgi?id=712 Pablo Neira Ayuso <pablo at netfilter.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED CC| |pablo at netfilter.org Resolution|
2023 Sep 08
1
[Bridge] [PATCH AUTOSEL 4.14 6/8] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 6.5 33/45] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 6.1 20/26] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 6.4 30/41] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 5.10 11/14] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Sep 08
0
[Bridge] [PATCH AUTOSEL 5.15 12/15] netfilter: ebtables: fix fortify warnings in size_entry_mwt()
From: "GONG, Ruiqi" <gongruiqi1 at huawei.com> [ Upstream commit a7ed3465daa240bdf01a5420f64336fee879c09d ] When compiling with gcc 13 and CONFIG_FORTIFY_SOURCE=y, the following warning appears: In function ?fortify_memcpy_chk?, inlined from ?size_entry_mwt? at net/bridge/netfilter/ebtables.c:2118:2: ./include/linux/fortify-string.h:592:25: error: call to
2023 Mar 24
1
[PATCH 1/1] nbd/server: push pending frames after sending reply
On Fri, Mar 24, 2023 at 11:47:20AM +0100, Florian Westphal wrote: > qemu-nbd doesn't set TCP_NODELAY on the tcp socket. > > Kernel waits for more data and avoids transmission of small packets. > Without TLS this is barely noticeable, but with TLS this really shows. > > Booting a VM via qemu-nbd on localhost (with tls) takes more than > 2 minutes on my system. tcpdump
2012 Dec 25
0
[ANNOUNCE] iptables 1.4.17 release
Hi! The Netfilter project proudly presents: iptables 1.4.17 More relevantly, this release includes the IPv6 NAT extensions from Patrick McHardy, the ignore day transition from Florian Westphal and a couple of fixes. See ChangeLog that comes attached to this email for more details. You can download it from: http://www.netfilter.org/projects/iptables/downloads.html
2012 Mar 27
0
[ANNOUNCE] Netfilter releases: iptables 1.4.13, nfacct 1.0.0 and libnetfilter_acct 1.0.0
Hi! The Netfilter project proudly presents: iptables 1.4.13 nfacct 1.0.0 libnetfilter_acct 1.0.0 Changes in iptables include: * rpfilter support from Florian Westphal. * IPv6 ECN capable version from Patrick McHardy. * a couple of fixes for internal libiptc library. * fix leaking file descriptor to avoid annoying log messsages in SELinux from Maciej enczykowski. * nfacct match
2018 Feb 02
0
[ANNOUNCE] iptables 1.6.2 release
Hi! The Netfilter project proudly presents: iptables 1.6.2 iptables is the userspace command line program used to configure the Linux 2.4.x and later packet filtering ruleset. It is targeted towards system administrators. This update contains accumulated bugfixes, a few new extensions and lots of translations via iptables-translate to ease migration to nftables. See ChangeLog that comes
2020 Oct 14
0
[Bug 1476] New: xtables-monitor --trace segfaults running inside a container
https://bugzilla.netfilter.org/show_bug.cgi?id=1476 Bug ID: 1476 Summary: xtables-monitor --trace segfaults running inside a container Product: bugzilla Version: other Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: netfilter
2014 Nov 02
0
[Bug 977] ulogd_inppkt_NFLOG.c:503 forcing unbind of existing log handler for protocol
https://bugzilla.netfilter.org/show_bug.cgi?id=977 --- Comment #6 from Netbug <b1b30ee4 at opayq.com> --- I upgraded to ulogd 2.0.4 & kernel 3.17.2 but these did not make a difference, here's how the output looks now; Sat Nov 1 17:07:03 2014 <5> ulogd.c:843 building new pluginstance stack: