similar to: [Bug 104] Bytes/packets counters sometimes give incorrect values

Displaying 20 results from an estimated 5000 matches similar to: "[Bug 104] Bytes/packets counters sometimes give incorrect values"

2003 Jun 22
0
[Bug 104] New: Bytes/packets counters sometimes give incorrect values
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=104 Summary: Bytes/packets counters sometimes give incorrect values Product: iptables userspace Version: 1.2.8 Platform: i386 OS/Version: RedHat Linux Status: NEW Severity: major Priority: P2 Component: iptables AssignedTo:
2003 Nov 22
1
[Bug 104] Bytes/packets counters sometimes give incorrect values
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=104 ------- Additional Comments From netfilter-bugzilla@ratty.org.uk 2003-11-22 16:15 ------- I'm seeing the same problem here. We're grabbing byte counts from around 2000 rules with iptables -nvxL from a minutely cron job and occasionally the counts come back as zero or a few packets worth of bytes and then return to
2004 May 29
0
[Bug 104] Bytes/packets counters sometimes give incorrect values
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=104 ------- Additional Comments From gandalf@netfilter.org 2004-05-29 23:45 ------- iptables calls getsockopt() twice, first with SO_GET_INFO which locks the table in kernel and returns some info and then unlocks the table, among that info is the size of the table. Then iptables allocates memory and calls getsockopt() again but
2008 Apr 02
0
[Bug 104] Bytes/packets counters sometimes give incorrect values
./show_bug.cgi?id=104 kaber at trash.net changed: What |Removed |Added ---------------------------------------------------------------------------- Status|ASSIGNED |RESOLVED Resolution| |FIXED ------- Comment #7 from kaber at trash.net 2008-04-02 14:01 ------- Unfortunately we don't
2006 Feb 09
1
[Bug 437] restore can segfaults when restoring corrupt policy counters
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=437 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org 2006-02-09 15:32 MET ------- indeed, this looks like a
2006 Feb 01
1
[Bug 437] New: restore can segfaults when restoring corrupt policy counters
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=437 Summary: restore can segfaults when restoring corrupt policy counters Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: iptables-restore
2003 Jun 30
6
[Bug 47] conntrack breaks nfs, corrupted packets
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=47 ------- Additional Comments From dg@ezcom.de 2003-06-30 16:17 ------- today i replaced my 8139too with a 3c59x and the corruptions are gone ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
2003 Mar 29
1
[Bug 69] IP ID's incorrect
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=69 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Severity|major |normal Status|NEW |ASSIGNED ------- Additional Comments From
2003 Feb 16
2
[Bug 34] Redirecting udp packets to closed port gives bad icmp error
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=34 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- BugsThisDependsOn| |2 Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org
2003 Feb 14
3
[Bug 47] conntrack breaks nfs, corrupted packets
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=47 ------- Additional Comments From laforge@netfilter.org 2003-02-14 09:14 ------- did you load iptable_nat at the time the problem with wrong-destip does happen? ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.
2003 Apr 18
1
[Bug 80] Not detected packets?
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=80 ------- Additional Comments From ral928@wish.nl 2003-04-18 21:54 ------- /proc/sys/net/ipv4/conf/*/rp_filter are set to "1" /proc/sys/net/ipv4/conf/*/accept_source_route are set to "0" The first three ruls of the FORWARD chain are: Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts
2003 May 23
1
[Bug 80] Not detected packets?
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=80 ------- Additional Comments From ral928@wish.nl 2003-05-24 00:45 ------- Yes I am. It seems that this is NOT a bug. The answer to the outgoing packet, with a private destination ip, is send using a none-private ip. That's why it isnt detected. I thing that the status/resolution can be changed to closed I guess.
2009 Jan 06
1
DT race
Hi all, The space between the T and the r is not a typo. The problem is the following. I want to dtrace a process by means of its pid. When the process exits the dtrace must also exit. The problem is that by the time the dtrace probes fire, the process could already have gone, and hence the exit probe will never fire. Is there a way of checking if the process with a certain pid does still exist?
2007 May 25
1
Samba on Solaris 8
Good Morning, I would like to run a question by your technical support team. My employer is currently using Samba server (Samba 2.0.5a) Solaris 8 sun4u sparc SUNW,Ultra-4. Samba is configured to communicate through port 139. However we have been asked to change Samba configuration in order to change the communication from port 139 to 445. This configuration change is requested to improve
2006 Feb 09
8
[Bug 440] Space in filename causes Forged DCC command from x.x.x.x: 0.0.0.0:0
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=440 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From laforge@netfilter.org 2006-02-09 15:51 MET ------- In the DCC Specifcication
2006 Feb 03
4
[Bug 404] Packets stuck in netfilter_queue after heavy loading
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=404 ------- Additional Comments From dave@rem.homeip.net 2006-02-03 20:29 MET ------- Created an attachment (id=205) --> (https://bugzilla.netfilter.org/bugzilla/attachment.cgi?id=205&action=view) Description of "stuck packets", observations Still don't know WHY packets get stuck... -- Configure bugmail:
2003 Mar 04
6
[Bug 22] Linux kernel crashes when incoming/outgoing interfaces differ
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=22 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |bowles@ambisys.com Component|unknown |ip_tables (kernel) OS/Version|other
2003 Mar 06
3
[Bug 59] sparc64 conntrack issue with expecting related connections, FTP
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=59 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching
2003 Apr 19
4
[Bug 82] iptables doesn't compile if no optimization flags are set
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=82 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |rusty@netfilter.org Severity|normal |minor Status|NEW
2006 Feb 09
1
[Bug 445] ipt_account reports: sleeping function called from invalid context at mm/slab.c:2063
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=445 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- AssignedTo|laforge@netfilter.org |opensource@intra2net.com ------- Additional Comments From laforge@netfilter.org 2006-02-09 15:38 MET ------- ipt_account