similar to: [Bug 1382] New: nftables.py cmd leaking memory when ruleset contain mapping ip length to range with high limit 65535

Displaying 20 results from an estimated 2000 matches similar to: "[Bug 1382] New: nftables.py cmd leaking memory when ruleset contain mapping ip length to range with high limit 65535"

2019 Dec 04
4
[Bug 1386] New: nftables.py cmd doesn't read updated counter values after first read
https://bugzilla.netfilter.org/show_bug.cgi?id=1386 Bug ID: 1386 Summary: nftables.py cmd doesn't read updated counter values after first read Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: major Priority: P5 Component:
2017 Sep 22
13
[Bug 1185] New: counter flag proposal for sets and maps
https://bugzilla.netfilter.org/show_bug.cgi?id=1185 Bug ID: 1185 Summary: counter flag proposal for sets and maps Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at netfilter.org
2020 Apr 08
5
[Bug 1417] New: mapping to adjacent ranges is causing error in kernel 5.6, kernel 5.5 works fine
https://bugzilla.netfilter.org/show_bug.cgi?id=1417 Bug ID: 1417 Summary: mapping to adjacent ranges is causing error in kernel 5.6, kernel 5.5 works fine Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: critical Priority: P5
2017 Mar 08
13
[Bug 1127] New: running nft command creates lag for forwarded packets
https://bugzilla.netfilter.org/show_bug.cgi?id=1127 Bug ID: 1127 Summary: running nft command creates lag for forwarded packets Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: major Priority: P5 Component: nft Assignee: pablo at
2017 Sep 21
11
[Bug 1184] New: disable implicit concatenating of elements of sets with flag interval
https://bugzilla.netfilter.org/show_bug.cgi?id=1184 Bug ID: 1184 Summary: disable implicit concatenating of elements of sets with flag interval Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component:
2016 Oct 13
1
[Bug 1091] New: named set with flag interval: delete multiple items in one command bug
https://bugzilla.netfilter.org/show_bug.cgi?id=1091 Bug ID: 1091 Summary: named set with flag interval: delete multiple items in one command bug Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: major Priority: P5 Component:
2017 Oct 17
3
[Bug 1190] New: adding element to map with stateful object and flag interval raise SIGSEGV
https://bugzilla.netfilter.org/show_bug.cgi?id=1190 Bug ID: 1190 Summary: adding element to map with stateful object and flag interval raise SIGSEGV Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: normal Priority: P5 Component:
2020 Feb 28
3
[Bug 1411] New: add elements with counter to dynamic sets with
https://bugzilla.netfilter.org/show_bug.cgi?id=1411 Bug ID: 1411 Summary: add elements with counter to dynamic sets with Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at
2017 Aug 26
5
[Bug 1180] New: Can't create a set with both timeout and interval flags at the same time
https://bugzilla.netfilter.org/show_bug.cgi?id=1180 Bug ID: 1180 Summary: Can't create a set with both timeout and interval flags at the same time Product: nftables Version: unspecified Hardware: x86_64 OS: Debian GNU/Linux Status: NEW Severity: enhancement Priority: P5
2017 Apr 01
6
[Bug 1140] New: nft dump invalid (flow table)
https://bugzilla.netfilter.org/show_bug.cgi?id=1140 Bug ID: 1140 Summary: nft dump invalid (flow table) Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: major Priority: P5 Component: nft Assignee: pablo at netfilter.org
2018 Jul 02
3
[Bug 1267] New: unable to use limit with counter in meters
https://bugzilla.netfilter.org/show_bug.cgi?id=1267 Bug ID: 1267 Summary: unable to use limit with counter in meters Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at
2008 Feb 29
2
while loop syntax help
Dear list, I'm trying to write my first looping function in R. After many hours of searching help files and previous posts, I'm at wits end. Please forgive my programming ignorance...any help is greatly appreciated. I need to sort through a vector (x) and identify the point at which 2 successive values become smaller than the previous value. I've written a "while"
2005 Feb 17
1
fast reads, slow writes
We have two SUSE SLES 9.0 x86-64 servers on gigabit network, one with RAID1 and samba 3.0.4, and one with RAID10 upgraded to samba 3.0.9. Both have the same problem: when you copy from server to client, speeds are on big files about 40MB/s for RAID1 and about 60MB/s for RAID10. But when you copy to server, speed are about 8MB/s. I have set up ftp servers on them just to try ftp protocol
2009 Jun 29
0
FW: re: Asterisk Outbound with Failover, alarm notification, dial status and hangupcause capturing to CDR from Dialplan
Managed to implement this on asterisk v1.4.24.1, Also, Hangupcause updating to user field. However, this only works on the edge of my voice network (demarcation point) It does not work on my internal routing boxes as I use IAX to route between remote sites. I was thinking of using some sort of SIP variables to transport these results over the IAX trunk.. Any bright ideas folks???
2014 Feb 21
12
[LLVMdev] asan coverage
> > > > We may need some additional info. What kind of additional info? > I haven't put a ton of thought into > this, but I'm hoping we can either (a) use debug info as is or add some > extra (valid) debug info to support this, or (b) add an extra > debug-info-like section to instrumented binaries with the information we > need. > I'd try this data
2006 Apr 09
0
Simultaneous iptables calls
Run this as one process: #!/bin/sh while [ 1 = 1 ]; do iptables -t mangle -F chain1 iptables -t mangle -X chain1 iptables -t mangle -N chain1 || exit 1 done Run this as another process: #!/bin/sh while [ 1 = 1 ]; do iptables -t mangle -F chain2 iptables -t mangle -X chain2 iptables -t mangle -N chain2 || exit 1 done and you get: iptables: No chain/target/match by that
2003 Mar 23
12
Shorewall 1.4.1
This is a minor release of Shorewall. WARNING: This release introduces incompatibilities with prior releases. See http://www.shorewall.net/upgrade_issues.htm. Changes are: a) There is now a new NONE policy specifiable in /etc/shorewall/policy. This policy will cause Shorewall to assume that there will never be any traffic between the source and destination zones. b) Shorewall no longer
1997 Apr 30
1
R-beta: Re: S Compatibility
Bill Venables writes: > Are the scoping differences between R and S set out precisely and > definitively somewhere? This would be useful. In the source code perhaps? :-) You can find a pretty precise description in the article Robert and I did in JCGS. Actually its pretty simple. Functions have access to the variables which were in effect when the function was defined. f <-
2011 Jan 01
3
Plot symbols: How to plot (and save) a graphic symbols originating from a table
Dear all, Please, I have a doubt regarding symbol plotting with data originating from a table. Please, see below: I have a tab delimited file called table1.txt with 4 columns: ypos animal var1 var2 5 cat gina <= lady gina \u2264 lady 7 dog bill >= tony bill \u2265 tony 9 fish dude <= bro dude \u2264 bro #I then load in the data to R: table1<-read.table("table1.txt",
2019 Mar 07
6
[Bug 1325] New: Reproducible NULL ptr deref upon checking trivial nftables ruleset in Linux 5.0
https://bugzilla.netfilter.org/show_bug.cgi?id=1325 Bug ID: 1325 Summary: Reproducible NULL ptr deref upon checking trivial nftables ruleset in Linux 5.0 Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: normal Priority: P5