Displaying 20 results from an estimated 100 matches similar to: "[Bug 1113] New: integer overflow in xt_TCPMSS"
2015 Sep 12
0
tinc generating invalid packet checksums?
On Thu, Sep 10, 2015 at 19:34:21 -0400, Nathan Stratton Treadway wrote:
> It seems that when the cksum is incorrect, it is always off by 1.
>
[...]
> Am I correct in concluding that this cksum problem is a bug in Tinc?
After investigating this further, I'm fairly certain that problem
originates in the following lines of the clamp_mss() function in
route.c:
[...]
csum ^=
2015 Sep 10
2
tinc generating invalid packet checksums?
We have a Zenoss server in our main office monitoring (among many other
things) an Apache server in a remote network, with a Tinc link between
the two networks. The monitoring simply involves making an HTTP request
to a URL once every 5 minutes and confirming that a response page comes
back.
Most of the requests to this particular web server succeed (and similar
requests to other web servers
2009 Apr 07
2
[Bug 590] New: iptables unknown target data
http://bugzilla.netfilter.org/show_bug.cgi?id=590
Summary: iptables unknown target data
Product: iptables
Version: CVS (please indicate timestamp)
Platform: i386
OS/Version: Ubuntu
Status: NEW
Severity: normal
Priority: P1
Component: iptables
AssignedTo: laforge at netfilter.org
ReportedBy:
2014 Feb 24
1
nut in openwrt
Just looked at your prior mail, and it was using 'usbhid' based on your output. If 'modprobe' exists on your router, what response do you get to 'modprobe usbhid'?
- Tim
On February 24, 2014 2:56:16 AM CST, Tim Dawson <tadawson at tpcsvc.com> wrote:
>Either it is not loaded, or the usb serial and/or hid drivers are not
>loaded, which appear to have been used
2014 Feb 24
0
nut in openwrt
Either it is not loaded, or the usb serial and/or hid drivers are not loaded, which appear to have been used on your Debian box.
- Tim
On February 24, 2014 1:12:36 AM CST, Josu Lazkano <josu.lazkano at gmail.com> wrote:
>Thanks again.
>
>This is the lsmod output:
>
># lsmod
>aead 4256 0
>arc4 1312 2
>b43
2014 Feb 24
3
nut in openwrt
Thanks again.
This is the lsmod output:
# lsmod
aead 4256 0
arc4 1312 2
b43 324014 0
bcma 28621 1 b43,
button_hotplug 2800 0
cfg80211 172273 2 b43,mac80211,
cifs 190077 0
compat 651 3 b43,mac80211,cfg80211,
crc16 1015 1 ext4,
crc_ccitt
2014 Sep 28
1
[Bug 84424] New: nouveau crash log [mesa-10.3.0]
https://bugs.freedesktop.org/show_bug.cgi?id=84424
Priority: medium
Bug ID: 84424
Assignee: nouveau at lists.freedesktop.org
Summary: nouveau crash log [mesa-10.3.0]
Severity: normal
Classification: Unclassified
OS: All
Reporter: reuben.m at gmail.com
Hardware: Other
Status: NEW
2011 Dec 04
0
Kernel oopses with gluster fuse on squeeze
Hi,
We've been experiencing repeated (every other day) oopses on hosts with
high load glusterfs accesses. Co-occurrent (not immediately tho, but there
is some sort of connection) are hanging nginx processes (doing the
accessing), which can not be stopped, killed and also block the shutdown of
the respective openvz instance. I think I remember at least one instance
where this occurred without
2013 Dec 11
4
[Bug 72599] New: [NVC0] null pointer dereference (nouveau_fence_wait_uevent.isra.5)
https://bugs.freedesktop.org/show_bug.cgi?id=72599
Priority: medium
Bug ID: 72599
Assignee: nouveau at lists.freedesktop.org
Summary: [NVC0] null pointer dereference
(nouveau_fence_wait_uevent.isra.5)
QA Contact: xorg-team at lists.x.org
Severity: normal
Classification: Unclassified
OS: Linux
2014 May 26
2
nwfilter usage
I'm trying to accomplish what I had hoped would be a fairly simple
filtering of traffic to my VMs, but I'm hitting a snag. The VMs are
allowing traffic when I wouldn't expect them to.
Host and Guest are both running the same platform:
Ubuntu 12.04.4 LTS
0.9.8-2ubuntu17.19
I have a basic bridge enabled on the host:
brctl addbr brdg
brctl addif brdg eth1
ip link set brdg up
The host
2013 Jun 05
0
[Bug 662] netfilters clamp-mss-to-pmtu sets bad MSS when none was set before
https://bugzilla.netfilter.org/show_bug.cgi?id=662
Phil Oester <netfilter at linuxace.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|REOPENED |RESOLVED
CC| |netfilter at linuxace.com
Resolution|
2014 May 26
0
Re: nwfilter usage
Make sure you have:
/proc/sys/net/bridge/bridge-nf-call-iptables = 1
On 5/26/2014 1:35 PM, Matt LaPlante wrote:
> I'm trying to accomplish what I had hoped would be a fairly simple
> filtering of traffic to my VMs, but I'm hitting a snag. The VMs are
> allowing traffic when I wouldn't expect them to.
>
> Host and Guest are both running the same platform:
> Ubuntu
2014 May 28
0
Re: nwfilter usage
On 5/28/2014 10:10 AM, Laine Stump wrote:
> On 05/27/2014 02:46 AM, Brian Rak wrote:
>> Make sure you have:
>>
>> /proc/sys/net/bridge/bridge-nf-call-iptables = 1
> That doesn't make sense. bridge-nf-call-iptables controls whether or not
> traffic going across a Linux host bridge device will be sent through
> iptables, but the rules created by nwfilter are applied
2014 Jan 30
2
CentOS 6.5: NFS server crashes with list_add corruption errors
Hi,
I'm running CentOS 6.5 as NFS server (v3 and v4) and exporting Ext4 and
XFS filesystem.
After many months that all works fine today the server crash:
Jan 30 09:46:13 qb-storage kernel: ------------[ cut here ]------------
Jan 30 09:46:13 qb-storage kernel: WARNING: at lib/list_debug.c:26
__list_add+0x6d/0xa0() (Not tainted)
Jan 30 09:46:13 qb-storage kernel: Hardware name: PowerEdge
2013 Jun 05
8
btrfs raid1 on 16TB goes read-only after "btrfs: block rsv returned -28"
Dear Devs,
I have x4 4TB HDDs formatted with:
mkfs.btrfs -L bu-16TB_0 -d raid1 -m raid1 /dev/sd[cdef]
/etc/fstab mounts with the options:
noatime,noauto,space_cache,inode_cache
All on kernel 3.8.13.
Upon using rsync to copy some heavily hardlinked backups from ReiserFS,
I''ve seen:
The following "block rsv returned -28" is repeated 7 times until there
is a call trace
2014 May 28
3
Re: nwfilter usage
On 05/27/2014 02:46 AM, Brian Rak wrote:
> Make sure you have:
>
> /proc/sys/net/bridge/bridge-nf-call-iptables = 1
That doesn't make sense. bridge-nf-call-iptables controls whether or not
traffic going across a Linux host bridge device will be sent through
iptables, but the rules created by nwfilter are applied to the "vnetX"
tap devices that connect the guest to the
2011 Jan 06
3
Re: [Bug 26242] New: BUG: unable to handle kernel NULL pointer dereference at (null)
(switched to email. Please respond via emailed reply-to-all, not via the
bugzilla web interface).
On Thu, 6 Jan 2011 20:59:08 GMT
bugzilla-daemon@bugzilla.kernel.org wrote:
> https://bugzilla.kernel.org/show_bug.cgi?id=26242
>
> Summary: BUG: unable to handle kernel NULL pointer dereference
> at (null)
> Product: Memory Management
>
2016 Jul 04
1
[PATCH] core/lwip: Avoid 3-second delay for a half-open connection
If lwIP encounters a half-open connection (e.g. due to a restarted
application reusing the same port numbers) it will correctly send a
RST but will not resend the SYN until one retransmission timeout later
(approximately three seconds). This can increase the time taken by
lpxelinux.0 to fetch its configuration file from a few milliseconds to
around 30 seconds.
Fix by immediately retransmitting
2007 Oct 06
7
ipp2p segmentation fault
Hi all.
On Sep 26th I decided to try and get ipp2p working on my machine that acts as a gateway for my Internet connection.
This machine is running Debian.
I performed the install by doing the following steps:
- I installed the Debian package called linux-source-2.6.22 for my Linux kernel source and unpacked the resulting tar.bz2 file.
- From the netfilter.org site I downloaded the following
2003 Aug 02
1
[SECURITY] Netfilter Security Advisory: NAT Remote DOS (SACK mangle)
--7ZAtKRhVyVSsbBD2
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Netfilter Core Team Security Advisory
=20
CVE: CAN-2003-0467
Subject:
Netfilter / NAT Remote DoS
Released:
01 Aug 2003
Effects:
Under limited circumstances, a remote user may be able to crash