netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH 00/30] Netfilter/IPVS updates for net-next
@ 2015-09-22  9:13 Pablo Neira Ayuso
  2015-09-22  9:13 ` [PATCH 01/30] ipvs: replace ip_vs_fill_ip4hdr with ip_vs_fill_iph_skb_off Pablo Neira Ayuso
                   ` (30 more replies)
  0 siblings, 31 replies; 44+ messages in thread
From: Pablo Neira Ayuso @ 2015-09-22  9:13 UTC (permalink / raw)
  To: netfilter-devel; +Cc: davem, netdev

Hi David,

The following patchset contains Netfilter/IPVS updates for your net-next tree
in this 4.4 development cycle, they are:

1) Schedule ICMP traffic to IPVS instances, this introduces a new schedule_icmp
   proc knob to enable/disable it. By default is off to retain the old
   behaviour. Patchset from Alex Gartrell.

I'm also including what Alex originally said for the record:

"The configuration of ipvs at Facebook is relatively straightforward.  All
ipvs instances bgp advertise a set of VIPs and the network prefers the
nearest one or uses ECMP in the event of a tie.  For the uninitiated, ECMP
deterministically and statelessly load balances by hashing the packet
(usually a 5-tuple of protocol, saddr, daddr, sport, and dport) and using
that number as an index (basic hash table type logic).

The problem is that ICMP packets (which contain really important
information like whether or not an MTU has been exceeded) will get a
different hash value and may end up at a different ipvs instance.  With no
information about where to route these packets, they are dropped, creating
ICMP black holes and breaking Path MTU discovery.  Suddenly, my mom's
pictures can't load and I'm fielding midday calls that I want nothing to do
with.

To address this, this patch set introduces the ability to schedule icmp
packets which is gated by a sysctl net.ipv4.vs.schedule_icmp.  If set to 0,
the old behavior is maintained -- otherwise ICMP packets are scheduled."

2) Add another proc entry to ignore tunneled packets to avoid routing loops
   from IPVS, also from Alex.

3) Fifteen patches from Eric Biederman to:

* Stop passing nf_hook_ops as parameter to the hook and use the state hook
  object instead all around the netfilter code, so only the private data
  pointer is passed to the registered hook function.

* Now that we've got state->net, propagate the netns pointer to netfilter hook
  clients to avoid its computation over and over again. A good example of how
  this has been simplified is the former TEE target (now nf_dup infrastructure)
  since it has killed the ugly pick_net() function.

There's another round of netns updates from Eric Biederman making the line. To
avoid the patchbomb again to almost all the networking mailing list (that is 84
patches) I'd suggest we send you a pull request with no patches or let me know
if you prefer a better way.

You can pull these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git

Thanks!

----------------------------------------------------------------

The following changes since commit 47bbbb30b4331ec58a74a66a044341f0114b02b3:

  sch_dsmark: improve memory locality (2015-09-17 22:37:19 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git master

for you to fetch changes up to 0a031ac5c00d091ce1f7007f22d5881620bf0a7e:

  netfilter: Use nf_ct_net instead of dev_net(out) in nf_nat_masquerade_ipv6 (2015-09-18 22:00:28 +0200)

----------------------------------------------------------------
Alex Gartrell (15):
      ipvs: replace ip_vs_fill_ip4hdr with ip_vs_fill_iph_skb_off
      ipvs: Add hdr_flags to iphdr
      ipvs: Handle inverse and icmp headers in ip_vs_leave
      ipvs: pull out ip_vs_try_to_schedule function
      ipvs: drop inverse argument to conn_{in,out}_get
      ipvs: Make ip_vs_schedule aware of inverse iph'es
      ipvs: add schedule_icmp sysctl
      ipvs: Use outer header in ip_vs_bypass_xmit_v6
      ipvs: sh: support scheduling icmp/inverse packets consistently
      ipvs: attempt to schedule icmp packets
      ipvs: ensure that ICMP cannot be sent in reply to ICMP
      ipvs: support scheduling inverse and icmp TCP packets
      ipvs: support scheduling inverse and icmp UDP packets
      ipvs: support scheduling inverse and icmp SCTP packets
      ipvs: add sysctl to ignore tunneled packets

Eric W. Biederman (15):
      netfilter: ebtables: Simplify the arguments to ebt_do_table
      inet netfilter: Remove hook from ip6t_do_table, arp_do_table, ipt_do_table
      inet netfilter: Prefer state->hook to ops->hooknum
      netfilter: nf_tables: kill nft_pktinfo.ops
      netfilter: x_tables: Pass struct net in xt_action_param
      netfilter: x_tables: Use par->net instead of computing from the passed net devices
      netfilter: nf_tables: Pass struct net in nft_pktinfo
      netfilter: nf_tables: Use pkt->net instead of computing net from the passed net_devices
      netfilter: Pass net to nf_dup_ipv4 and nf_dup_ipv6
      act_connmark: Remember the struct net instead of guessing it.
      netfilter: nf_conntrack: Add a struct net parameter to l4_pkt_to_tuple
      ipvs: Read hooknum from state rather than ops->hooknum
      netfilter: Pass priv instead of nf_hook_ops to netfilter hooks
      netfilter: Pass net into nf_xfrm_me_harder
      netfilter: Use nf_ct_net instead of dev_net(out) in nf_nat_masquerade_ipv6

Pablo Neira Ayuso (1):
      Merge tag 'ipvs-for-v4.4' of https://git.kernel.org/.../horms/ipvs-next

 Documentation/networking/ipvs-sysctl.txt       |   10 +
 include/linux/netfilter.h                      |    2 +-
 include/linux/netfilter/x_tables.h             |    3 +-
 include/linux/netfilter_arp/arp_tables.h       |    1 -
 include/linux/netfilter_bridge/ebtables.h      |    6 +-
 include/linux/netfilter_ipv4/ip_tables.h       |    1 -
 include/linux/netfilter_ipv6/ip6_tables.h      |    1 -
 include/net/ip_vs.h                            |  120 +++++++--
 include/net/netfilter/br_netfilter.h           |    2 +-
 include/net/netfilter/ipv4/nf_dup_ipv4.h       |    2 +-
 include/net/netfilter/ipv6/nf_dup_ipv6.h       |    2 +-
 include/net/netfilter/nf_conntrack.h           |    3 +-
 include/net/netfilter/nf_conntrack_core.h      |    1 +
 include/net/netfilter/nf_conntrack_l4proto.h   |    2 +-
 include/net/netfilter/nf_nat_core.h            |    2 +-
 include/net/netfilter/nf_nat_l3proto.h         |   32 +--
 include/net/netfilter/nf_tables.h              |   14 +-
 include/net/netfilter/nf_tables_ipv4.h         |    3 +-
 include/net/netfilter/nf_tables_ipv6.h         |    3 +-
 include/net/tc_act/tc_connmark.h               |    1 +
 net/bridge/br_netfilter_hooks.c                |   14 +-
 net/bridge/br_netfilter_ipv6.c                 |    2 +-
 net/bridge/netfilter/ebt_log.c                 |    2 +-
 net/bridge/netfilter/ebt_nflog.c               |    2 +-
 net/bridge/netfilter/ebtable_broute.c          |    8 +-
 net/bridge/netfilter/ebtable_filter.c          |   10 +-
 net/bridge/netfilter/ebtable_nat.c             |   10 +-
 net/bridge/netfilter/ebtables.c                |   14 +-
 net/bridge/netfilter/nf_tables_bridge.c        |   20 +-
 net/bridge/netfilter/nft_reject_bridge.c       |   19 +-
 net/decnet/netfilter/dn_rtmsg.c                |    2 +-
 net/ipv4/netfilter/arp_tables.c                |    3 +-
 net/ipv4/netfilter/arptable_filter.c           |    5 +-
 net/ipv4/netfilter/ip_tables.c                 |    3 +-
 net/ipv4/netfilter/ipt_CLUSTERIP.c             |    2 +-
 net/ipv4/netfilter/ipt_SYNPROXY.c              |    4 +-
 net/ipv4/netfilter/ipt_rpfilter.c              |    5 +-
 net/ipv4/netfilter/iptable_filter.c            |    7 +-
 net/ipv4/netfilter/iptable_mangle.c            |   14 +-
 net/ipv4/netfilter/iptable_nat.c               |   21 +-
 net/ipv4/netfilter/iptable_raw.c               |    7 +-
 net/ipv4/netfilter/iptable_security.c          |    7 +-
 net/ipv4/netfilter/nf_conntrack_l3proto_ipv4.c |   12 +-
 net/ipv4/netfilter/nf_conntrack_proto_icmp.c   |    4 +-
 net/ipv4/netfilter/nf_defrag_ipv4.c            |    4 +-
 net/ipv4/netfilter/nf_dup_ipv4.c               |   23 +-
 net/ipv4/netfilter/nf_nat_l3proto_ipv4.c       |   42 +--
 net/ipv4/netfilter/nf_tables_arp.c             |    6 +-
 net/ipv4/netfilter/nf_tables_ipv4.c            |   10 +-
 net/ipv4/netfilter/nft_chain_nat_ipv4.c        |   22 +-
 net/ipv4/netfilter/nft_chain_route_ipv4.c      |    6 +-
 net/ipv4/netfilter/nft_dup_ipv4.c              |    2 +-
 net/ipv4/netfilter/nft_masq_ipv4.c             |    2 +-
 net/ipv4/netfilter/nft_redir_ipv4.c            |    2 +-
 net/ipv4/netfilter/nft_reject_ipv4.c           |    5 +-
 net/ipv6/netfilter/ip6_tables.c                |    3 +-
 net/ipv6/netfilter/ip6t_REJECT.c               |    2 +-
 net/ipv6/netfilter/ip6t_SYNPROXY.c             |    4 +-
 net/ipv6/netfilter/ip6t_rpfilter.c             |    6 +-
 net/ipv6/netfilter/ip6table_filter.c           |    5 +-
 net/ipv6/netfilter/ip6table_mangle.c           |   14 +-
 net/ipv6/netfilter/ip6table_nat.c              |   21 +-
 net/ipv6/netfilter/ip6table_raw.c              |    5 +-
 net/ipv6/netfilter/ip6table_security.c         |    5 +-
 net/ipv6/netfilter/nf_conntrack_l3proto_ipv6.c |   12 +-
 net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c |    3 +-
 net/ipv6/netfilter/nf_defrag_ipv6_hooks.c      |    6 +-
 net/ipv6/netfilter/nf_dup_ipv6.c               |   23 +-
 net/ipv6/netfilter/nf_nat_l3proto_ipv6.c       |   42 +--
 net/ipv6/netfilter/nf_nat_masquerade_ipv6.c    |    2 +-
 net/ipv6/netfilter/nf_tables_ipv6.c            |   10 +-
 net/ipv6/netfilter/nft_chain_nat_ipv6.c        |   22 +-
 net/ipv6/netfilter/nft_chain_route_ipv6.c      |    6 +-
 net/ipv6/netfilter/nft_dup_ipv6.c              |    2 +-
 net/ipv6/netfilter/nft_redir_ipv6.c            |    3 +-
 net/ipv6/netfilter/nft_reject_ipv6.c           |    7 +-
 net/netfilter/core.c                           |    2 +-
 net/netfilter/ipset/ip_set_core.c              |    9 +-
 net/netfilter/ipvs/ip_vs_conn.c                |   12 +-
 net/netfilter/ipvs/ip_vs_core.c                |  339 ++++++++++++++----------
 net/netfilter/ipvs/ip_vs_ctl.c                 |   15 +-
 net/netfilter/ipvs/ip_vs_pe_sip.c              |    2 +-
 net/netfilter/ipvs/ip_vs_proto_ah_esp.c        |   17 +-
 net/netfilter/ipvs/ip_vs_proto_sctp.c          |   34 ++-
 net/netfilter/ipvs/ip_vs_proto_tcp.c           |   38 ++-
 net/netfilter/ipvs/ip_vs_proto_udp.c           |   25 +-
 net/netfilter/ipvs/ip_vs_sh.c                  |   45 ++--
 net/netfilter/ipvs/ip_vs_xmit.c                |   24 +-
 net/netfilter/nf_conntrack_core.c              |   10 +-
 net/netfilter/nf_conntrack_proto_dccp.c        |    2 +-
 net/netfilter/nf_conntrack_proto_generic.c     |    2 +-
 net/netfilter/nf_conntrack_proto_gre.c         |    3 +-
 net/netfilter/nf_conntrack_proto_sctp.c        |    2 +-
 net/netfilter/nf_conntrack_proto_tcp.c         |    2 +-
 net/netfilter/nf_conntrack_proto_udp.c         |    1 +
 net/netfilter/nf_conntrack_proto_udplite.c     |    1 +
 net/netfilter/nf_nat_core.c                    |    4 +-
 net/netfilter/nf_tables_core.c                 |   10 +-
 net/netfilter/nf_tables_netdev.c               |   20 +-
 net/netfilter/nft_log.c                        |    3 +-
 net/netfilter/nft_meta.c                       |    4 +-
 net/netfilter/nft_queue.c                      |    2 +-
 net/netfilter/nft_reject_inet.c                |   19 +-
 net/netfilter/xt_LOG.c                         |    2 +-
 net/netfilter/xt_NFLOG.c                       |    2 +-
 net/netfilter/xt_TCPMSS.c                      |    2 +-
 net/netfilter/xt_TEE.c                         |    4 +-
 net/netfilter/xt_TPROXY.c                      |   24 +-
 net/netfilter/xt_addrtype.c                    |    4 +-
 net/netfilter/xt_connlimit.c                   |    4 +-
 net/netfilter/xt_ipvs.c                        |    4 +-
 net/netfilter/xt_osf.c                         |    2 +-
 net/netfilter/xt_recent.c                      |    2 +-
 net/netfilter/xt_socket.c                      |   14 +-
 net/openvswitch/conntrack.c                    |    2 +-
 net/sched/act_connmark.c                       |    5 +-
 net/sched/act_ipt.c                            |    1 +
 net/sched/em_ipset.c                           |    1 +
 security/selinux/hooks.c                       |   10 +-
 security/smack/smack_netfilter.c               |    4 +-
 120 files changed, 816 insertions(+), 653 deletions(-)

^ permalink raw reply	[flat|nested] 44+ messages in thread
* [PATCH 00/30] Netfilter/IPVS updates for net-next
@ 2018-03-12 17:58 Pablo Neira Ayuso
  2018-03-12 18:58 ` David Miller
  0 siblings, 1 reply; 44+ messages in thread
From: Pablo Neira Ayuso @ 2018-03-12 17:58 UTC (permalink / raw)
  To: netfilter-devel; +Cc: davem, netdev

Hi David,

The following patchset contains Netfilter/IPVS updates for your net-next
tree. This batch comes with more input sanitization for xtables to
address bug reports from fuzzers, preparation works to the flowtable
infrastructure and assorted updates. In no particular order, they are:

1) Make sure userspace provides a valid standard target verdict, from
   Florian Westphal.

2) Sanitize error target size, also from Florian.

3) Validate that last rule in basechain matches underflow/policy since
   userspace assumes this when decoding the ruleset blob that comes
   from the kernel, from Florian.

4) Consolidate hook entry checks through xt_check_table_hooks(),
   patch from Florian.

5) Cap ruleset allocations at 512 mbytes, 134217728 rules and reject
   very large compat offset arrays, so we have a reasonable upper limit
   and fuzzers don't exercise the oom-killer. Patches from Florian.

6) Several WARN_ON checks on xtables mutex helper, from Florian.

7) xt_rateest now has a hashtable per net, from Cong Wang.

8) Consolidate counter allocation in xt_counters_alloc(), from Florian.

9) Earlier xt_table_unlock() call in {ip,ip6,arp,eb}tables, patch
   from Xin Long.

10) Set FLOW_OFFLOAD_DIR_* to IP_CT_DIR_* definitions, patch from
    Felix Fietkau.

11) Consolidate code through flow_offload_fill_dir(), also from Felix.

12) Inline ip6_dst_mtu_forward() just like ip_dst_mtu_maybe_forward()
    to remove a dependency with flowtable and ipv6.ko, from Felix.

13) Cache mtu size in flow_offload_tuple object, this is safe for
    forwarding as f87c10a8aa1e describes, from Felix.

14) Rename nf_flow_table.c to nf_flow_table_core.o, to simplify too
    modular infrastructure, from Felix.

15) Add rt0, rt2 and rt4 IPv6 routing extension support, patch from
    Ahmed Abdelsalam.

16) Remove unused parameter in nf_conncount_count(), from Yi-Hung Wei.

17) Support for counting only to nf_conncount infrastructure, patch
    from Yi-Hung Wei.

18) Add strict NFT_CT_{SRC_IP,DST_IP,SRC_IP6,DST_IP6} key datatypes
    to nft_ct.

19) Use boolean as return value from ipt_ah and from IPVS too, patch
    from Gustavo A. R. Silva.

20) Remove useless parameters in nfnl_acct_overquota() and
    nf_conntrack_broadcast_help(), from Taehee Yoo.

21) Use ipv6_addr_is_multicast() from xt_cluster, also from Taehee Yoo.

22) Statify nf_tables_obj_lookup_byhandle, patch from Fengguang Wu.

23) Fix typo in xt_limit, from Geert Uytterhoeven.

You can pull these changes from:

  git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git

Thanks!

----------------------------------------------------------------

The following changes since commit ef3f6c256f0b4711a3ef1489797b95820be5ab01:

  Merge branch 'mvpp2-jumbo-frames-support' (2018-03-05 12:55:55 -0500)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next.git HEAD

for you to fetch changes up to 90eee0957b655339d659c0b9bba64f5c90b2233b:

  netfilter: nft_ct: add NFT_CT_{SRC,DST}_{IP,IP6} (2018-03-11 22:17:57 +0100)

----------------------------------------------------------------
Ahmed Abdelsalam (1):
      netfilter: nf_tables: handle rt0 and rt2 properly

Cong Wang (1):
      netfilter: make xt_rateest hash table per net

Felix Fietkau (5):
      netfilter: nf_flow_table: use IP_CT_DIR_* values for FLOW_OFFLOAD_DIR_*
      netfilter: nf_flow_table: clean up flow_offload_alloc
      ipv6: make ip6_dst_mtu_forward inline
      netfilter: nf_flow_table: cache mtu in struct flow_offload_tuple
      netfilter: nf_flow_table: rename nf_flow_table.c to nf_flow_table_core.c

Florian Westphal (12):
      netfilter: x_tables: check standard verdicts in core
      netfilter: x_tables: check error target size too
      netfilter: x_tables: move hook entry checks into core
      netfilter: x_tables: enforce unique and ascending entry points
      netfilter: x_tables: cap allocations at 512 mbyte
      netfilter: x_tables: limit allocation requests for blob rule heads
      netfilter: x_tables: add counters allocation wrapper
      netfilter: compat: prepare xt_compat_init_offsets to return errors
      netfilter: compat: reject huge allocation requests
      netfilter: x_tables: make sure compat af mutex is held
      netfilter: x_tables: ensure last rule in base chain matches underflow/policy
      netfilter: x_tables: fix build with CONFIG_COMPAT=n

Geert Uytterhoeven (1):
      netfilter: xt_limit: Spelling s/maxmum/maximum/

Gustavo A. R. Silva (2):
      netfilter: ipt_ah: return boolean instead of integer
      ipvs: use true and false for boolean values

Pablo Neira Ayuso (1):
      netfilter: nft_ct: add NFT_CT_{SRC,DST}_{IP,IP6}

Taehee Yoo (3):
      netfilter: nfnetlink_acct: remove useless parameter
      netfilter: xt_cluster: get rid of xt_cluster_ipv6_is_multicast
      netfilter: nf_conntrack_broadcast: remove useless parameter

Xin Long (1):
      netfilter: unlock xt_table earlier in __do_replace

Yi-Hung Wei (2):
      netfilter: Refactor nf_conncount
      netfilter: conncount: Support count only use case

kbuild test robot (1):
      netfilter: nf_tables: nf_tables_obj_lookup_byhandle() can be static

 include/linux/netfilter/nfnetlink_acct.h           |   3 +-
 include/linux/netfilter/x_tables.h                 |   5 +-
 include/net/ip6_route.h                            |  21 +++
 include/net/ipv6.h                                 |   2 -
 include/net/netfilter/nf_conntrack_count.h         |   1 -
 include/net/netfilter/nf_conntrack_helper.h        |   3 +-
 include/net/netfilter/nf_flow_table.h              |  10 +-
 include/net/netfilter/xt_rateest.h                 |   4 +-
 include/uapi/linux/netfilter/nf_tables.h           |  15 +-
 net/bridge/netfilter/ebtables.c                    |  10 +-
 net/ipv4/netfilter/arp_tables.c                    |  50 +++---
 net/ipv4/netfilter/ip_tables.c                     |  48 +++---
 net/ipv4/netfilter/ipt_ah.c                        |   2 +-
 net/ipv4/netfilter/nf_flow_table_ipv4.c            |  17 +-
 net/ipv6/ip6_output.c                              |  22 ---
 net/ipv6/netfilter/ip6_tables.c                    |  50 +++---
 net/ipv6/netfilter/nf_flow_table_ipv6.c            |  17 +-
 net/netfilter/Makefile                             |   2 +
 net/netfilter/ipvs/ip_vs_lblc.c                    |   4 +-
 net/netfilter/ipvs/ip_vs_lblcr.c                   |   4 +-
 net/netfilter/nf_conncount.c                       |  14 +-
 net/netfilter/nf_conntrack_broadcast.c             |   1 -
 net/netfilter/nf_conntrack_netbios_ns.c            |   5 +-
 net/netfilter/nf_conntrack_snmp.c                  |   5 +-
 .../{nf_flow_table.c => nf_flow_table_core.c}      |  97 +++++------
 net/netfilter/nf_tables_api.c                      |   8 +-
 net/netfilter/nfnetlink_acct.c                     |   3 +-
 net/netfilter/nft_ct.c                             |  38 +++++
 net/netfilter/nft_exthdr.c                         |   3 +
 net/netfilter/x_tables.c                           | 187 +++++++++++++++++++--
 net/netfilter/xt_RATEEST.c                         |  91 +++++++---
 net/netfilter/xt_cluster.c                         |  10 +-
 net/netfilter/xt_connlimit.c                       |   4 +-
 net/netfilter/xt_limit.c                           |   2 +-
 net/netfilter/xt_nfacct.c                          |   2 +-
 net/netfilter/xt_rateest.c                         |  10 +-
 36 files changed, 500 insertions(+), 270 deletions(-)
 rename net/netfilter/{nf_flow_table.c => nf_flow_table_core.c} (79%)

^ permalink raw reply	[flat|nested] 44+ messages in thread

end of thread, other threads:[~2018-03-16 16:41 UTC | newest]

Thread overview: 44+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-09-22  9:13 [PATCH 00/30] Netfilter/IPVS updates for net-next Pablo Neira Ayuso
2015-09-22  9:13 ` [PATCH 01/30] ipvs: replace ip_vs_fill_ip4hdr with ip_vs_fill_iph_skb_off Pablo Neira Ayuso
2015-09-22  9:13 ` [PATCH 02/30] ipvs: Add hdr_flags to iphdr Pablo Neira Ayuso
2015-09-22  9:13 ` [PATCH 03/30] ipvs: Handle inverse and icmp headers in ip_vs_leave Pablo Neira Ayuso
2015-09-22  9:13 ` [PATCH 04/30] ipvs: pull out ip_vs_try_to_schedule function Pablo Neira Ayuso
2015-09-22  9:13 ` [PATCH 05/30] ipvs: drop inverse argument to conn_{in,out}_get Pablo Neira Ayuso
2015-09-22  9:13 ` [PATCH 06/30] ipvs: Make ip_vs_schedule aware of inverse iph'es Pablo Neira Ayuso
2015-09-22  9:13 ` [PATCH 07/30] ipvs: add schedule_icmp sysctl Pablo Neira Ayuso
2015-09-22  9:13 ` [PATCH 08/30] ipvs: Use outer header in ip_vs_bypass_xmit_v6 Pablo Neira Ayuso
2015-09-22  9:13 ` [PATCH 09/30] ipvs: sh: support scheduling icmp/inverse packets consistently Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 10/30] ipvs: attempt to schedule icmp packets Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 11/30] ipvs: ensure that ICMP cannot be sent in reply to ICMP Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 12/30] ipvs: support scheduling inverse and icmp TCP packets Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 13/30] ipvs: support scheduling inverse and icmp UDP packets Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 14/30] ipvs: support scheduling inverse and icmp SCTP packets Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 15/30] ipvs: add sysctl to ignore tunneled packets Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 16/30] netfilter: ebtables: Simplify the arguments to ebt_do_table Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 17/30] inet netfilter: Remove hook from ip6t_do_table, arp_do_table, ipt_do_table Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 18/30] inet netfilter: Prefer state->hook to ops->hooknum Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 19/30] netfilter: nf_tables: kill nft_pktinfo.ops Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 20/30] netfilter: x_tables: Pass struct net in xt_action_param Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 21/30] netfilter: x_tables: Use par->net instead of computing from the passed net devices Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 22/30] netfilter: nf_tables: Pass struct net in nft_pktinfo Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 23/30] netfilter: nf_tables: Use pkt->net instead of computing net from the passed net_devices Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 24/30] netfilter: Pass net to nf_dup_ipv4 and nf_dup_ipv6 Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 25/30] act_connmark: Remember the struct net instead of guessing it Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 26/30] netfilter: nf_conntrack: Add a struct net parameter to l4_pkt_to_tuple Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 27/30] ipvs: Read hooknum from state rather than ops->hooknum Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 28/30] netfilter: Pass priv instead of nf_hook_ops to netfilter hooks Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 29/30] netfilter: Pass net into nf_xfrm_me_harder Pablo Neira Ayuso
2015-09-22  9:14 ` [PATCH 30/30] netfilter: Use nf_ct_net instead of dev_net(out) in nf_nat_masquerade_ipv6 Pablo Neira Ayuso
2015-09-22 20:12 ` [PATCH 00/30] Netfilter/IPVS updates for net-next David Miller
  -- strict thread matches above, loose matches on Subject: below --
2018-03-12 17:58 Pablo Neira Ayuso
2018-03-12 18:58 ` David Miller
2018-03-12 19:30   ` Felix Fietkau
2018-03-12 20:01     ` David Miller
2018-03-12 20:22       ` Felix Fietkau
2018-03-13 13:41       ` Florian Westphal
2018-03-13 15:34         ` David Miller
2018-03-13 15:39           ` Florian Westphal
2018-03-14 18:38           ` Pablo Neira Ayuso
2018-03-16 16:23             ` David Miller
2018-03-16 16:39   ` Guy Shattah
2018-03-16 16:41     ` David Miller

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).