* netfilter 00/03: netfilter fixes
@ 2008-11-24 13:44 Patrick McHardy
2008-11-24 13:44 ` netfilter 01/03: ctnetlink: fix conntrack creation race Patrick McHardy
` (2 more replies)
0 siblings, 3 replies; 18+ messages in thread
From: Patrick McHardy @ 2008-11-24 13:44 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
the following three patches for 2.6.28 fix a couple of netfilter issues:
- a conntrack creation race in ctnetlink that can cause NULL pointer
dereferences in ctnetlink and duplicate conntrack entries.
- a missing const qualifier that got lost during the encapsulation of
iptables target parameters
- a crash with bridge netfilter and GRE caused by a missing update_pmtu()
function for the fake dst_entry.
Please apply, thanks.
include/linux/netfilter/x_tables.h | 2 +-
net/bridge/br_netfilter.c | 13 +++++++++++++
net/netfilter/nf_conntrack_core.c | 2 --
net/netfilter/nf_conntrack_netlink.c | 5 +++--
4 files changed, 17 insertions(+), 5 deletions(-)
Herbert Xu (1):
bridge: netfilter: fix update_pmtu crash with GRE
Jan Engelhardt (1):
netfilter: xtables: add missing const qualifier to xt_tgchk_param
Patrick McHardy (1):
netfilter: ctnetlink: fix conntrack creation race
^ permalink raw reply [flat|nested] 18+ messages in thread* netfilter 01/03: ctnetlink: fix conntrack creation race
2008-11-24 13:44 netfilter 00/03: netfilter fixes Patrick McHardy
@ 2008-11-24 13:44 ` Patrick McHardy
2008-11-25 0:05 ` David Miller
2008-11-24 13:44 ` netfilter 02/03: xtables: add missing const qualifier to xt_tgchk_param Patrick McHardy
2008-11-24 13:44 ` bridge 03/03: netfilter: fix update_pmtu crash with GRE Patrick McHardy
2 siblings, 1 reply; 18+ messages in thread
From: Patrick McHardy @ 2008-11-24 13:44 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
commit 580a1b74505dae8b650c7acee28cf8d2fa1b1b8a
Author: Patrick McHardy <kaber@trash.net>
Date: Wed Nov 19 13:42:03 2008 +0100
netfilter: ctnetlink: fix conntrack creation race
Conntrack creation through ctnetlink has two races:
- the timer may expire and free the conntrack concurrently, causing an
invalid memory access when attempting to put it in the hash tables
- an identical conntrack entry may be created in the packet processing
path in the time between the lookup and hash insertion
Hold the conntrack lock between the lookup and insertion to avoid this.
Reported-by: Zoltan Borbely <bozo@andrews.hu>
Signed-off-by: Patrick McHardy <kaber@trash.net>
diff --git a/net/netfilter/nf_conntrack_core.c b/net/netfilter/nf_conntrack_core.c
index 622d7c6..233fdd2 100644
--- a/net/netfilter/nf_conntrack_core.c
+++ b/net/netfilter/nf_conntrack_core.c
@@ -305,9 +305,7 @@ void nf_conntrack_hash_insert(struct nf_conn *ct)
hash = hash_conntrack(&ct->tuplehash[IP_CT_DIR_ORIGINAL].tuple);
repl_hash = hash_conntrack(&ct->tuplehash[IP_CT_DIR_REPLY].tuple);
- spin_lock_bh(&nf_conntrack_lock);
__nf_conntrack_hash_insert(ct, hash, repl_hash);
- spin_unlock_bh(&nf_conntrack_lock);
}
EXPORT_SYMBOL_GPL(nf_conntrack_hash_insert);
diff --git a/net/netfilter/nf_conntrack_netlink.c b/net/netfilter/nf_conntrack_netlink.c
index a040d46..3b009a3 100644
--- a/net/netfilter/nf_conntrack_netlink.c
+++ b/net/netfilter/nf_conntrack_netlink.c
@@ -1090,7 +1090,7 @@ ctnetlink_create_conntrack(struct nlattr *cda[],
struct nf_conn_help *help;
struct nf_conntrack_helper *helper;
- ct = nf_conntrack_alloc(&init_net, otuple, rtuple, GFP_KERNEL);
+ ct = nf_conntrack_alloc(&init_net, otuple, rtuple, GFP_ATOMIC);
if (ct == NULL || IS_ERR(ct))
return -ENOMEM;
@@ -1212,13 +1212,14 @@ ctnetlink_new_conntrack(struct sock *ctnl, struct sk_buff *skb,
atomic_inc(&master_ct->ct_general.use);
}
- spin_unlock_bh(&nf_conntrack_lock);
err = -ENOENT;
if (nlh->nlmsg_flags & NLM_F_CREATE)
err = ctnetlink_create_conntrack(cda,
&otuple,
&rtuple,
master_ct);
+ spin_unlock_bh(&nf_conntrack_lock);
+
if (err < 0 && master_ct)
nf_ct_put(master_ct);
^ permalink raw reply related [flat|nested] 18+ messages in thread* Re: netfilter 01/03: ctnetlink: fix conntrack creation race
2008-11-24 13:44 ` netfilter 01/03: ctnetlink: fix conntrack creation race Patrick McHardy
@ 2008-11-25 0:05 ` David Miller
0 siblings, 0 replies; 18+ messages in thread
From: David Miller @ 2008-11-25 0:05 UTC (permalink / raw)
To: kaber; +Cc: netdev, netfilter-devel
From: Patrick McHardy <kaber@trash.net>
Date: Mon, 24 Nov 2008 14:44:36 +0100 (MET)
> netfilter: ctnetlink: fix conntrack creation race
>
> Conntrack creation through ctnetlink has two races:
>
> - the timer may expire and free the conntrack concurrently, causing an
> invalid memory access when attempting to put it in the hash tables
>
> - an identical conntrack entry may be created in the packet processing
> path in the time between the lookup and hash insertion
>
> Hold the conntrack lock between the lookup and insertion to avoid this.
>
> Reported-by: Zoltan Borbely <bozo@andrews.hu>
> Signed-off-by: Patrick McHardy <kaber@trash.net>
>
Applied.
^ permalink raw reply [flat|nested] 18+ messages in thread
* netfilter 02/03: xtables: add missing const qualifier to xt_tgchk_param
2008-11-24 13:44 netfilter 00/03: netfilter fixes Patrick McHardy
2008-11-24 13:44 ` netfilter 01/03: ctnetlink: fix conntrack creation race Patrick McHardy
@ 2008-11-24 13:44 ` Patrick McHardy
2008-11-25 0:06 ` David Miller
2008-11-24 13:44 ` bridge 03/03: netfilter: fix update_pmtu crash with GRE Patrick McHardy
2 siblings, 1 reply; 18+ messages in thread
From: Patrick McHardy @ 2008-11-24 13:44 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
commit 511bb54d5b276711ce08ab7e63f53226890b0e35
Author: Jan Engelhardt <jengelh@medozas.de>
Date: Wed Nov 19 13:47:24 2008 +0100
netfilter: xtables: add missing const qualifier to xt_tgchk_param
When entryinfo was a standalone parameter to functions, it used to be
"const void *". Put the const back in.
Signed-off-by: Jan Engelhardt <jengelh@medozas.de>
Signed-off-by: Patrick McHardy <kaber@trash.net>
diff --git a/include/linux/netfilter/x_tables.h b/include/linux/netfilter/x_tables.h
index be41b60..e52ce47 100644
--- a/include/linux/netfilter/x_tables.h
+++ b/include/linux/netfilter/x_tables.h
@@ -251,7 +251,7 @@ struct xt_target_param {
*/
struct xt_tgchk_param {
const char *table;
- void *entryinfo;
+ const void *entryinfo;
const struct xt_target *target;
void *targinfo;
unsigned int hook_mask;
^ permalink raw reply related [flat|nested] 18+ messages in thread* bridge 03/03: netfilter: fix update_pmtu crash with GRE
2008-11-24 13:44 netfilter 00/03: netfilter fixes Patrick McHardy
2008-11-24 13:44 ` netfilter 01/03: ctnetlink: fix conntrack creation race Patrick McHardy
2008-11-24 13:44 ` netfilter 02/03: xtables: add missing const qualifier to xt_tgchk_param Patrick McHardy
@ 2008-11-24 13:44 ` Patrick McHardy
2008-11-25 0:07 ` David Miller
2 siblings, 1 reply; 18+ messages in thread
From: Patrick McHardy @ 2008-11-24 13:44 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
commit 1e8768f064c00a4fbb42e87bc42b371bd9ca01c0
Author: Herbert Xu <herbert@gondor.apana.org.au>
Date: Mon Nov 24 13:31:14 2008 +0100
bridge: netfilter: fix update_pmtu crash with GRE
As GRE tries to call the update_pmtu function on skb->dst and
bridge supplies an skb->dst that has a NULL ops field, all is
not well.
This patch fixes this by giving the bridge device an ops field
with an update_pmtu function. For the moment I've left all
other fields blank but we can fill them in later should the
need arise.
Based on report and patch by Philip Craig.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Patrick McHardy <kaber@trash.net>
diff --git a/net/bridge/br_netfilter.c b/net/bridge/br_netfilter.c
index fa5cda4..45f61c3 100644
--- a/net/bridge/br_netfilter.c
+++ b/net/bridge/br_netfilter.c
@@ -101,6 +101,18 @@ static inline __be16 pppoe_proto(const struct sk_buff *skb)
pppoe_proto(skb) == htons(PPP_IPV6) && \
brnf_filter_pppoe_tagged)
+static void fake_update_pmtu(struct dst_entry *dst, u32 mtu)
+{
+}
+
+static struct dst_ops fake_dst_ops = {
+ .family = AF_INET,
+ .protocol = __constant_htons(ETH_P_IP),
+ .update_pmtu = fake_update_pmtu,
+ .entry_size = sizeof(struct rtable),
+ .entries = ATOMIC_INIT(0),
+};
+
/*
* Initialize bogus route table used to keep netfilter happy.
* Currently, we fill in the PMTU entry because netfilter
@@ -117,6 +129,7 @@ void br_netfilter_rtable_init(struct net_bridge *br)
rt->u.dst.path = &rt->u.dst;
rt->u.dst.metrics[RTAX_MTU - 1] = 1500;
rt->u.dst.flags = DST_NOXFRM;
+ rt->u.dst.ops = &fake_dst_ops;
}
static inline struct rtable *bridge_parent_rtable(const struct net_device *dev)
^ permalink raw reply related [flat|nested] 18+ messages in thread* Re: bridge 03/03: netfilter: fix update_pmtu crash with GRE
2008-11-24 13:44 ` bridge 03/03: netfilter: fix update_pmtu crash with GRE Patrick McHardy
@ 2008-11-25 0:07 ` David Miller
0 siblings, 0 replies; 18+ messages in thread
From: David Miller @ 2008-11-25 0:07 UTC (permalink / raw)
To: kaber; +Cc: netdev, netfilter-devel
From: Patrick McHardy <kaber@trash.net>
Date: Mon, 24 Nov 2008 14:44:39 +0100 (MET)
> bridge: netfilter: fix update_pmtu crash with GRE
>
> As GRE tries to call the update_pmtu function on skb->dst and
> bridge supplies an skb->dst that has a NULL ops field, all is
> not well.
>
> This patch fixes this by giving the bridge device an ops field
> with an update_pmtu function. For the moment I've left all
> other fields blank but we can fill them in later should the
> need arise.
>
> Based on report and patch by Philip Craig.
>
> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
> Signed-off-by: Patrick McHardy <kaber@trash.net>
Applied.
^ permalink raw reply [flat|nested] 18+ messages in thread
* netfilter 00/03: netfilter fixes
@ 2010-02-19 17:02 Patrick McHardy
2010-02-19 20:46 ` David Miller
0 siblings, 1 reply; 18+ messages in thread
From: Patrick McHardy @ 2010-02-19 17:02 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
following are three netfilter fixes for net-next, fixing:
- the NAT issue reported by Stephen, which was caused by inverted logic
in NF_HOOK_COND(), causing it to skip the POST_ROUTING hook invocation
- an assertion in ct_extend, caused by invalid ordering in ctnetlink
when setting up new conntracks. Additionally it is invalid to
attach helpers to existing conntracks, which is disabled by this
patch.
- an skb leak in nf_queue when userspace returns NF_STOLEN as verdict
Please apply or pull from:
git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-next-2.6.git master
Thanks!
include/linux/netfilter.h | 5 +++--
net/netfilter/nf_conntrack_netlink.c | 22 +++++++++++-----------
net/netfilter/nf_queue.c | 2 +-
3 files changed, 15 insertions(+), 14 deletions(-)
Eric Dumazet (1):
netfilter: nf_queue: fix NF_STOLEN skb leak
Pablo Neira Ayuso (1):
netfilter: ctnetlink: fix creation of conntrack with helpers
Patrick McHardy (1):
netfilter: restore POST_ROUTING hook in NF_HOOK_COND
^ permalink raw reply [flat|nested] 18+ messages in thread* netfilter 00/03: netfilter fixes
@ 2009-07-16 12:26 Patrick McHardy
2009-07-17 0:37 ` David Miller
0 siblings, 1 reply; 18+ messages in thread
From: Patrick McHardy @ 2009-07-16 12:26 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
following are two netfilter fixes for 2.6.31 and a MAINTAINERS update:
- a fix for the nf_conntrack_alloc() race from Eric
- a fix for incorrect invocation of nf_log_packet() in the new osf match
- a patch to add my netfilter git tree to MAINTAINERS
Please apply or pull from:
git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master
Thanks!
Documentation/RCU/rculist_nulls.txt | 7 ++++++-
MAINTAINERS | 1 +
net/netfilter/nf_conntrack_core.c | 21 ++++++++++++++++++---
net/netfilter/xt_osf.c | 5 +++--
4 files changed, 28 insertions(+), 6 deletions(-)
Eric Dumazet (1):
netfilter: nf_conntrack: nf_conntrack_alloc() fixes
Joe Perches (1):
netfilter: add netfilter git to MAINTAINERS
Patrick McHardy (1):
netfilter: xt_osf: fix nf_log_packet() arguments
^ permalink raw reply [flat|nested] 18+ messages in thread* Re: netfilter 00/03: netfilter fixes
2009-07-16 12:26 Patrick McHardy
@ 2009-07-17 0:37 ` David Miller
0 siblings, 0 replies; 18+ messages in thread
From: David Miller @ 2009-07-17 0:37 UTC (permalink / raw)
To: kaber; +Cc: netdev, netfilter-devel
From: Patrick McHardy <kaber@trash.net>
Date: Thu, 16 Jul 2009 14:26:44 +0200 (MEST)
> following are two netfilter fixes for 2.6.31 and a MAINTAINERS update:
>
> - a fix for the nf_conntrack_alloc() race from Eric
> - a fix for incorrect invocation of nf_log_packet() in the new osf match
> - a patch to add my netfilter git tree to MAINTAINERS
>
> Please apply or pull from:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git master
Pulled, thanks a lot Patrick!
^ permalink raw reply [flat|nested] 18+ messages in thread
* netfilter 00/03: netfilter fixes
@ 2009-04-16 17:16 Patrick McHardy
2009-04-16 23:33 ` David Miller
0 siblings, 1 reply; 18+ messages in thread
From: Patrick McHardy @ 2009-04-16 17:16 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
the following three patches fix two netfilter bugs introduced during the merge
window and re-add support for a feature that accidentally got dropped with the
SAME target removal:
- a missing list initialization of the nf_log logger lists
- a missing conversion to use the hlist_nulls list function in connection tracking
helper unregistration
- support for persistent multi-range NAT mappings
Please apply or pull from:
git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git
Thanks!
include/net/netfilter/nf_nat.h | 1 +
net/ipv4/netfilter/nf_nat_core.c | 3 ++-
net/netfilter/nf_conntrack_helper.c | 2 +-
net/netfilter/nf_log.c | 4 ++++
4 files changed, 8 insertions(+), 2 deletions(-)
Eric Dumazet (1):
netfilter: nf_log regression fix
Patrick McHardy (2):
netfilter: nf_conntrack: fix crash when unloading helpers
netfilter: nf_nat: add support for persistent mappings
^ permalink raw reply [flat|nested] 18+ messages in thread* Re: netfilter 00/03: netfilter fixes
2009-04-16 17:16 Patrick McHardy
@ 2009-04-16 23:33 ` David Miller
0 siblings, 0 replies; 18+ messages in thread
From: David Miller @ 2009-04-16 23:33 UTC (permalink / raw)
To: kaber; +Cc: netdev, netfilter-devel
From: Patrick McHardy <kaber@trash.net>
Date: Thu, 16 Apr 2009 19:16:22 +0200 (MEST)
> the following three patches fix two netfilter bugs introduced during the merge
> window and re-add support for a feature that accidentally got dropped with the
> SAME target removal:
>
> - a missing list initialization of the nf_log logger lists
>
> - a missing conversion to use the hlist_nulls list function in connection tracking
> helper unregistration
>
> - support for persistent multi-range NAT mappings
>
> Please apply or pull from:
>
> git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git
Pulled, thanks a lot!
^ permalink raw reply [flat|nested] 18+ messages in thread
* netfilter 00/03: netfilter fixes
@ 2009-04-08 16:52 Patrick McHardy
2009-04-08 20:43 ` David Miller
0 siblings, 1 reply; 18+ messages in thread
From: Patrick McHardy @ 2009-04-08 16:52 UTC (permalink / raw)
To: davem; +Cc: netdev, Patrick McHardy, netfilter-devel
Hi Dave,
the following patches fix three netfilter bugs:
- an incorrect dependency for the new LED target, added by myself to fix
the compilation problem reported one or two weeks ago
- a fix for the ip6_tables "lock free counters" regression caused by a
missing return statement
- a fix for a regression in .29, causing conntrack expectation refresh to
create a new expectation instead of refreshing the existing one.
Please apply or pull from:
git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-2.6.git
Please note that the git tree will bring in a merge commit of Linus'
tree from 2 days ago.
Thanks!
include/net/netfilter/nf_conntrack_expect.h | 5 +++-
net/ipv6/netfilter/ip6_tables.c | 2 +
net/netfilter/Kconfig | 2 +-
net/netfilter/nf_conntrack_expect.c | 30 +++++---------------------
4 files changed, 13 insertions(+), 26 deletions(-)
Alex Riesen (1):
netfilter: fix selection of "LED" target in netfilter
Eric Dumazet (1):
netfilter: ip6tables regression fix
Pablo Neira Ayuso (1):
netfilter: ctnetlink: fix regression in expectation handling
^ permalink raw reply [flat|nested] 18+ messages in thread* netfilter 00/03: netfilter fixes
@ 2008-10-14 14:48 Patrick McHardy
0 siblings, 0 replies; 18+ messages in thread
From: Patrick McHardy @ 2008-10-14 14:48 UTC (permalink / raw)
To: davem; +Cc: Patrick McHardy, netfilter-devel
Hi Dave,
following are some netfilter fixes for 2.6.28, containing:
- restauration of a lost #ifdef to fix user-triggerable WARN_ONs in the
NAT code. Also queued for -stable.
- restauration of ebtables dependencies that got lost during a Kconfig
restructuring
- a slightly more involved patch from Pablo to remove the bogus NAT module
dependencies from ctnetlink. It could be argued whether this qualifies as
a real bugfix since its mainly a "it shouldn't be like this" thing and
everything works properly, in my opinion it does though because of all
the side effects that even just loading the NAT module causes. A somewhat
fitting analogy would be an IPv6 module dependency in, lets say, TCP :)
Please apply, thanks.
include/linux/netfilter/nfnetlink.h | 3 +
include/net/netfilter/nf_nat_core.h | 8 ++
net/bridge/netfilter/Kconfig | 1 +
net/ipv4/netfilter/nf_defrag_ipv4.c | 3 +-
net/ipv4/netfilter/nf_nat_core.c | 97 ++++++++++++++++++++++
net/netfilter/nf_conntrack_core.c | 7 ++
net/netfilter/nf_conntrack_netlink.c | 151 ++++++++++++++--------------------
net/netfilter/nfnetlink.c | 12 ++-
8 files changed, 188 insertions(+), 94 deletions(-)
Pablo Neira Ayuso (1):
netfilter: ctnetlink: remove bogus module dependency between ctnetlink and nf_nat
Patrick McHardy (2):
netfilter: restore lost #ifdef guarding defrag exception
netfilter: fix ebtables dependencies
^ permalink raw reply [flat|nested] 18+ messages in thread* netfilter 00/03: netfilter fixes
@ 2008-06-17 14:03 Patrick McHardy
2008-06-17 22:53 ` David Miller
0 siblings, 1 reply; 18+ messages in thread
From: Patrick McHardy @ 2008-06-17 14:03 UTC (permalink / raw)
To: davem; +Cc: Patrick McHardy, netfilter-devel
Hi Dave,
following are three fixes for netfilter:
- fix for NAT RCU races related to ct_extend
- fix for a memory leak in a H.323 module init error path
- fix for a crash when unloading the H.323 module while H.245 expectation
or connections are active
Please apply, thanks.
include/net/netfilter/nf_conntrack_extend.h | 1 +
net/ipv4/netfilter/nf_nat_core.c | 3 +--
net/netfilter/nf_conntrack_extend.c | 9 ++++++++-
net/netfilter/nf_conntrack_h323_main.c | 22 +++++++++++++++-------
4 files changed, 25 insertions(+), 10 deletions(-)
Patrick McHardy (3):
netfilter: nf_nat: fix RCU races
netfilter: nf_conntrack_h323: fix memory leak in module initialization error path
netfilter: nf_conntrack_h323: fix module unload crash
^ permalink raw reply [flat|nested] 18+ messages in thread* Re: netfilter 00/03: netfilter fixes
2008-06-17 14:03 Patrick McHardy
@ 2008-06-17 22:53 ` David Miller
0 siblings, 0 replies; 18+ messages in thread
From: David Miller @ 2008-06-17 22:53 UTC (permalink / raw)
To: kaber; +Cc: netfilter-devel
From: Patrick McHardy <kaber@trash.net>
Date: Tue, 17 Jun 2008 16:03:51 +0200 (MEST)
> following are three fixes for netfilter:
>
> - fix for NAT RCU races related to ct_extend
> - fix for a memory leak in a H.323 module init error path
> - fix for a crash when unloading the H.323 module while H.245 expectation
> or connections are active
>
> Please apply, thanks.
Applied to net-2.6, and I'll push back out to kernel.org after some
build sanity checks.
Thanks!
^ permalink raw reply [flat|nested] 18+ messages in thread
end of thread, other threads:[~2010-02-19 20:45 UTC | newest]
Thread overview: 18+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-11-24 13:44 netfilter 00/03: netfilter fixes Patrick McHardy
2008-11-24 13:44 ` netfilter 01/03: ctnetlink: fix conntrack creation race Patrick McHardy
2008-11-25 0:05 ` David Miller
2008-11-24 13:44 ` netfilter 02/03: xtables: add missing const qualifier to xt_tgchk_param Patrick McHardy
2008-11-25 0:06 ` David Miller
2008-11-24 13:44 ` bridge 03/03: netfilter: fix update_pmtu crash with GRE Patrick McHardy
2008-11-25 0:07 ` David Miller
-- strict thread matches above, loose matches on Subject: below --
2010-02-19 17:02 netfilter 00/03: netfilter fixes Patrick McHardy
2010-02-19 20:46 ` David Miller
2009-07-16 12:26 Patrick McHardy
2009-07-17 0:37 ` David Miller
2009-04-16 17:16 Patrick McHardy
2009-04-16 23:33 ` David Miller
2009-04-08 16:52 Patrick McHardy
2009-04-08 20:43 ` David Miller
2008-10-14 14:48 Patrick McHardy
2008-06-17 14:03 Patrick McHardy
2008-06-17 22:53 ` David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).