Displaying 20 results from an estimated 2000 matches similar to: "[Bug 1382] New: nftables.py cmd leaking memory when ruleset contain mapping ip length to range with high limit 65535"
2019 Dec 04
4
[Bug 1386] New: nftables.py cmd doesn't read updated counter values after first read
https://bugzilla.netfilter.org/show_bug.cgi?id=1386
Bug ID: 1386
Summary: nftables.py cmd doesn't read updated counter values
after first read
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: major
Priority: P5
Component:
2017 Sep 22
13
[Bug 1185] New: counter flag proposal for sets and maps
https://bugzilla.netfilter.org/show_bug.cgi?id=1185
Bug ID: 1185
Summary: counter flag proposal for sets and maps
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2020 Apr 08
5
[Bug 1417] New: mapping to adjacent ranges is causing error in kernel 5.6, kernel 5.5 works fine
https://bugzilla.netfilter.org/show_bug.cgi?id=1417
Bug ID: 1417
Summary: mapping to adjacent ranges is causing error in kernel
5.6, kernel 5.5 works fine
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: critical
Priority: P5
2017 Mar 08
13
[Bug 1127] New: running nft command creates lag for forwarded packets
https://bugzilla.netfilter.org/show_bug.cgi?id=1127
Bug ID: 1127
Summary: running nft command creates lag for forwarded packets
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at
2017 Sep 21
11
[Bug 1184] New: disable implicit concatenating of elements of sets with flag interval
https://bugzilla.netfilter.org/show_bug.cgi?id=1184
Bug ID: 1184
Summary: disable implicit concatenating of elements of sets
with flag interval
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component:
2016 Oct 13
1
[Bug 1091] New: named set with flag interval: delete multiple items in one command bug
https://bugzilla.netfilter.org/show_bug.cgi?id=1091
Bug ID: 1091
Summary: named set with flag interval: delete multiple items in
one command bug
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: major
Priority: P5
Component:
2017 Oct 17
3
[Bug 1190] New: adding element to map with stateful object and flag interval raise SIGSEGV
https://bugzilla.netfilter.org/show_bug.cgi?id=1190
Bug ID: 1190
Summary: adding element to map with stateful object and flag
interval raise SIGSEGV
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: normal
Priority: P5
Component:
2020 Feb 28
3
[Bug 1411] New: add elements with counter to dynamic sets with
https://bugzilla.netfilter.org/show_bug.cgi?id=1411
Bug ID: 1411
Summary: add elements with counter to dynamic sets with
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2017 Aug 26
5
[Bug 1180] New: Can't create a set with both timeout and interval flags at the same time
https://bugzilla.netfilter.org/show_bug.cgi?id=1180
Bug ID: 1180
Summary: Can't create a set with both timeout and interval
flags at the same time
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Debian GNU/Linux
Status: NEW
Severity: enhancement
Priority: P5
2017 Apr 01
6
[Bug 1140] New: nft dump invalid (flow table)
https://bugzilla.netfilter.org/show_bug.cgi?id=1140
Bug ID: 1140
Summary: nft dump invalid (flow table)
Product: nftables
Version: unspecified
Hardware: x86_64
OS: other
Status: NEW
Severity: major
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2018 Jul 02
3
[Bug 1267] New: unable to use limit with counter in meters
https://bugzilla.netfilter.org/show_bug.cgi?id=1267
Bug ID: 1267
Summary: unable to use limit with counter in meters
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at
2008 Feb 29
2
while loop syntax help
Dear list,
I'm trying to write my first looping function in R. After many hours of searching help files and previous posts, I'm at wits end. Please forgive my programming ignorance...any help is greatly appreciated.
I need to sort through a vector (x) and identify the point at which 2 successive values become smaller than the previous value.
I've written a "while"
2005 Feb 17
1
fast reads, slow writes
We have two SUSE SLES 9.0 x86-64 servers on gigabit network, one with
RAID1 and samba 3.0.4,
and one with RAID10 upgraded to samba 3.0.9. Both have the same problem:
when you copy from
server to client, speeds are on big files about 40MB/s for RAID1 and
about 60MB/s for RAID10.
But when you copy to server, speed are about 8MB/s. I have set up ftp
servers on them just to try
ftp protocol
2009 Jun 29
0
FW: re: Asterisk Outbound with Failover, alarm notification, dial status and hangupcause capturing to CDR from Dialplan
Managed to implement this on asterisk v1.4.24.1,
Also, Hangupcause updating to user field.
However, this only works on the edge of my voice network (demarcation
point)
It does not work on my internal routing boxes as I use IAX to route
between remote sites.
I was thinking of using some sort of SIP variables to transport these
results over the IAX trunk..
Any bright ideas folks???
2014 Feb 21
12
[LLVMdev] asan coverage
>
>
>
> We may need some additional info.
What kind of additional info?
> I haven't put a ton of thought into
> this, but I'm hoping we can either (a) use debug info as is or add some
> extra (valid) debug info to support this, or (b) add an extra
> debug-info-like section to instrumented binaries with the information we
> need.
>
I'd try this data
2006 Apr 09
0
Simultaneous iptables calls
Run this as one process:
#!/bin/sh
while [ 1 = 1 ]; do
iptables -t mangle -F chain1
iptables -t mangle -X chain1
iptables -t mangle -N chain1 || exit 1
done
Run this as another process:
#!/bin/sh
while [ 1 = 1 ]; do
iptables -t mangle -F chain2
iptables -t mangle -X chain2
iptables -t mangle -N chain2 || exit 1
done
and you get:
iptables: No chain/target/match by that
2003 Mar 23
12
Shorewall 1.4.1
This is a minor release of Shorewall.
WARNING: This release introduces incompatibilities with prior releases.
See http://www.shorewall.net/upgrade_issues.htm.
Changes are:
a) There is now a new NONE policy specifiable in
/etc/shorewall/policy. This policy will cause Shorewall to assume that
there will never be any traffic between the source and destination
zones.
b) Shorewall no longer
1997 Apr 30
1
R-beta: Re: S Compatibility
Bill Venables writes:
> Are the scoping differences between R and S set out precisely and
> definitively somewhere? This would be useful.
In the source code perhaps? :-)
You can find a pretty precise description in the article Robert and I
did in JCGS.
Actually its pretty simple. Functions have access to the variables
which were in effect when the function was defined.
f <-
2011 Jan 01
3
Plot symbols: How to plot (and save) a graphic symbols originating from a table
Dear all,
Please, I have a doubt regarding symbol plotting
with data originating from a table.
Please, see below:
I have a tab delimited file called table1.txt with 4 columns:
ypos animal var1 var2
5 cat gina <= lady gina \u2264 lady
7 dog bill >= tony bill \u2265 tony
9 fish dude <= bro dude \u2264 bro
#I then load in the data to R:
table1<-read.table("table1.txt",
2019 Mar 07
6
[Bug 1325] New: Reproducible NULL ptr deref upon checking trivial nftables ruleset in Linux 5.0
https://bugzilla.netfilter.org/show_bug.cgi?id=1325
Bug ID: 1325
Summary: Reproducible NULL ptr deref upon checking trivial
nftables ruleset in Linux 5.0
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5