similar to: [Bug 1426] New: Inefficient command lookup on errors

Displaying 20 results from an estimated 300 matches similar to: "[Bug 1426] New: Inefficient command lookup on errors"

2017 Oct 28
5
[Bug 1199] New: nft_set_hash fast lookup broken for 2 byte keys
https://bugzilla.netfilter.org/show_bug.cgi?id=1199 Bug ID: 1199 Summary: nft_set_hash fast lookup broken for 2 byte keys Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: major Priority: P5 Component: kernel Assignee: pablo at netfilter.org
2020 Jul 19
3
[Bug 1444] New: nftables-0.9.6 crashes on some set notations:
https://bugzilla.netfilter.org/show_bug.cgi?id=1444 Bug ID: 1444 Summary: nftables-0.9.6 crashes on some set notations: Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org
2019 Sep 15
3
[Bug 1365] New: nft crashes in chain_print_declaration()
https://bugzilla.netfilter.org/show_bug.cgi?id=1365 Bug ID: 1365 Summary: nft crashes in chain_print_declaration() Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org
2014 Jul 17
1
[Bug 967] New: segfault when adding large sets
https://bugzilla.netfilter.org/show_bug.cgi?id=967 Summary: segfault when adding large sets Product: nftables Version: unspecified Platform: x86_64 OS/Version: Debian GNU/Linux Status: NEW Severity: normal Priority: P5 Component: nft AssignedTo: pablo at netfilter.org ReportedBy:
2008 Jan 04
2
[Bug 1426] New: ssh key verification hint (on remote side)
https://bugzilla.mindrot.org/show_bug.cgi?id=1426 Summary: ssh key verification hint (on remote side) Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: Other OS/Version: Linux Status: NEW Severity: enhancement Priority: P2 Component: sshd AssignedTo: bitbucket at
2018 Feb 18
5
[Bug 1228] New: [REGRESSION] nft cannot load big set anymore
https://bugzilla.netfilter.org/show_bug.cgi?id=1228 Bug ID: 1228 Summary: [REGRESSION] nft cannot load big set anymore Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: normal Priority: P5 Component: nft Assignee: pablo at netfilter.org
2016 Oct 20
2
[Bug 1092] New: nft v0.6 segfault in must_print_eq_op at expression.c:520 during 'nft monitor trace' in netdev filter
https://bugzilla.netfilter.org/show_bug.cgi?id=1092 Bug ID: 1092 Summary: nft v0.6 segfault in must_print_eq_op at expression.c:520 during 'nft monitor trace' in netdev filter Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW
2017 Nov 09
8
[Bug 1201] New: Some filters randomly do not work since version 0.8
https://bugzilla.netfilter.org/show_bug.cgi?id=1201 Bug ID: 1201 Summary: Some filters randomly do not work since version 0.8 Product: nftables Version: unspecified Hardware: x86_64 OS: Gentoo Status: NEW Severity: major Priority: P5 Component: nft Assignee: pablo at
2020 Apr 09
5
[Bug 1418] New: segfaults when running nft --file foo.nft --echo
https://bugzilla.netfilter.org/show_bug.cgi?id=1418 Bug ID: 1418 Summary: segfaults when running nft --file foo.nft --echo Product: nftables Version: unspecified Hardware: x86_64 OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at
2012 Nov 07
0
CESA-2012:1426 Moderate CentOS 6 kernel Update
CentOS Errata and Security Advisory 2012:1426 Moderate Upstream details at : https://rhn.redhat.com/errata/RHSA-2012-1426.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: aa500979ef80025fcaab323bf0ae7bca9f266d8a72232c24fd1033f0d923d9b5 kernel-2.6.32-279.14.1.el6.i686.rpm
2009 Sep 04
0
CESA-2009:1426 Important CentOS 3 i386 openoffice.org - security update
CentOS Errata and Security Advisory CESA-2009:1426 openoffice.org security update for CentOS 3 i386: https://rhn.redhat.com/errata/RHSA-2009-1426.html The following updated file has been uploaded and is currently syncing to the mirrors: i386: updates/i386/RPMS/openoffice.org-1.1.2-44.2.0.EL3.i386.rpm updates/i386/RPMS/openoffice.org-i18n-1.1.2-44.2.0.EL3.i386.rpm
2009 Sep 04
0
CESA-2009:1426 Important CentOS 3 x86_64 openoffice.org - security update
CentOS Errata and Security Advisory CESA-2009:1426 openoffice.org security update for CentOS 3 x86_64: https://rhn.redhat.com/errata/RHSA-2009-1426.html The following updated file has been uploaded and is currently syncing to the mirrors: x86_64: updates/x86_64/RPMS/openoffice.org-1.1.2-44.2.0.EL3.i386.rpm updates/x86_64/RPMS/openoffice.org-i18n-1.1.2-44.2.0.EL3.i386.rpm
2013 Oct 16
0
CESA-2013:1426 Important CentOS 6 xorg-x11-server Update
CentOS Errata and Security Advisory 2013:1426 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2013-1426.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 6317e0dcc71903e61bde63f964935c1450d5d062db164cb0e81b22de541bf812 xorg-x11-server-common-1.13.0-11.1.el6.centos.2.i686.rpm
2007 Dec 27
0
[ win32utils-Patches-16627 ] Replace inefficient busy wait loop with UDP/IP loopback socket.
Patches item #16627, was opened at 2007-12-26 21:13 You can respond by visiting: http://rubyforge.org/tracker/?func=detail&atid=413&aid=16627&group_id=85 Category: win32-service Group: Code Cleanup Status: Open Resolution: None Priority: 3 Submitted By: Nobody (None) Assigned to: Nobody (None) Summary: Replace inefficient busy wait loop with UDP/IP loopback socket. Initial Comment:
2009 Oct 26
0
[Bug 1665] New: prefix_pton is inefficient
https://bugzilla.mindrot.org/show_bug.cgi?id=1665 Summary: prefix_pton is inefficient Product: py-radix Version: -current Platform: ix86 OS/Version: Linux Status: NEW Severity: enhancement Priority: P2 Component: Default AssignedTo: unassigned-bugs at mindrot.org ReportedBy: weinholt at
2018 Feb 13
0
"search return (min)" is very inefficient
RFC 4731: " IMAP4 Extension to SEARCH Command for Controlling What Kind of Information Is Returned" https://tools.ietf.org/html/rfc4731 I do this (telnet session): """ a select proveedores/TUHS * FLAGS (\Answered \Flagged \Deleted \Seen \Draft) * OK [PERMANENTFLAGS (\Answered \Flagged \Deleted \Seen \Draft \*)] Flags permitted. * 8330 EXISTS * 0 RECENT
2003 May 14
1
Inefficient Winbind behavior? Not sure if it posted 1st time.
Hello all, I'm having an issue with Winbind and I'm not sure if it's occurring by design or not. My Samba server resides in a Windows NT domain and uses winbindd to authenticate to a mixed-mode 2003 domain over a trust relationship. Everything works the way it ought to. However, every so often my users experience delays of anywhere from 30 to 60 seconds when connecting to a share,
2002 Apr 01
1
An introduction to R (PR#1426)
(I sent this earlier, but it seems not to have come through, due to problems witkh my system) The following command from appendix A, "a sample session", isnt correct: contour(x, y, fa, nint=15) when used R protests: Warning message: parameter "nint" couldn't be set in high-level plot() function it should probably be nlevels, as used a few lines before. This is
1997 Sep 20
0
SAMBA digest 1426
samba@samba.anu.edu.au wrote: > Samba, as we know, is wonderful. I truly enjoyed my Sun PC/NFS > disk/documentation bonfire. I operate Samba on some Sparc 10's running > Solaris 2.5 and 2.6, mixed in with Win/NT 4.0 servers at SP3. Everybody > (almost) at this site uses Win95 and WinNT PCs, but needs access to > unix disk space for some other purposes. Samba bridges that
2003 May 23
1
Inefficient Winbind behavior? Not sure if it posted 1 st time.
Thanks for the response, Jerry. Is there a way for me to verify this is happening? Winbindd has been running for a few days now, and I just did a netstat and the only connections to a DC are to the off-site one, the PDC. Thanks. Sven -----Original Message----- From: Gerald (Jerry) Carter [mailto:jerry@samba.org] Sent: Thursday, May 22, 2003 10:19 PM To: SRuth@LANDAM.com Cc: