Yes, it should be rintNoDataYet(); not printNotAvailable("No data (yet)");I'll commit the fix. -----Burton > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf > Of Markus Rehbach > Sent: Friday, February 27, 2004 2:46 PM > To: [EMAIL PROTECTED] > Subject: Re: [Ntop-dev] ntop segfaults (netflow interface active, > clicking 'local IP / Active TCP Sessions') > > > Ok, solved. And the message appearing is > > The requested data is not available when ntop is > started with the command line flag No data (yet) > > Sessions on eth0 were showed normally. > > Markus > ____________________________ > > On Friday 27 February 2004 15:10, Burton M. Strauss III wrote: > > Markus - try this and let me know... > > > > $ cat BMS0463-ActiveTCPSessions.patch > > --- ntop/report.c 2004-02-24 22:50:39.000000000 -0600 > > +++ ntop/report.c 2004-02-27 07:53:34.000000000 -0600 > > @@ -2919,6 +2931,12 @@ > > return; > > } > > > > + if((myGlobals.device[actualDeviceId].tcpSession == NULL) || > > + (myGlobals.device[actualDeviceId].numTcpSessions == 0)) { > > + printNotAvailable("No data (yet)"); > > + return; > > + } > > + > > /* > > Due to the way sessions are handled, sessions before those to > > display need to be skipped > > > ========================================================================== > > > > (either patch it in manually or copy the lines after the cat > not including > > the ===s and use patch. > > > > ------Burton > > > > > -----Original Message----- > > > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] Behalf > > > Of Markus Rehbach > > > Sent: Tuesday, February 24, 2004 4:00 PM > > > To: [EMAIL PROTECTED] > > > Subject: Re: [Ntop-dev] ntop segfaults (netflow interface active, > > > clicking 'local IP / Active TCP Sessions') > > > > > > > > > Frist try with gdb, please inform me which additional information > > > is needed. > > > > > > The system segfaulting is based on a Suse 9.0, I tried the same > > > on a system > > > based on as Suse 8.0 where ntop did not showed this behaviour. Both > > > system have modified kernels but I changed the kernel version at the > > > system segfaulting. > > > > > > Markus > > > > > > ** > > > > > > Program received signal SIGSEGV, Segmentation fault. > > > [Switching to Thread 98311 (LWP 2508)] > > > 0x400460bd in printActiveTCPSessions (actualDeviceId=1, pageNum=0, > > > el=0x0) at report.c:2925 > > > 2925 > > > if(myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx > > > ] != NULL) > > > { > > > (gdb) list > > > 2920 > > > 2921 #ifdef CFG_MULTITHREADED > > > 2922 accessMutex(&myGlobals.tcpSessionsMutex, > > > "printActiveTCPSessions"); > > > 2923 #endif > > > 2924 > > > 2925 > > > if(myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx > > > ] != NULL) > > > { > > > 2926 char *sport, *dport; > > > 2927 Counter dataSent, dataRcvd; > > > 2928 IPSession *session = > > > myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx]; > > > 2929 > > > (gdb) info stack > > > #0 0x400460bd in printActiveTCPSessions (actualDeviceId=1, pageNum=0, > > > el=0x0) at report.c:2925 > > > #1 0x40036ed9 in returnHTTPPage (pageName=0xbedff4fd > "NetNetstat.html", > > > postLen=-1, from=0xbedff71c, httpRequestedAt=0xbedff0b4, > > > usedFork=0xbedff0b0, > > > agent=0xbedff3bc "Mozilla/5.0 (compatible; Konqueror/3.1; Linux)", > > > referer=0xbedff2bc "http://127.0.0.1:3000/Local.html") at > http.c:2069 > > > #2 0x40038767 in handleHTTPrequest (from= > > > {hostFamily = 10, addr = {_hostIp4Address = > {s_addr = 0}, > > > _hostIp6Address = {in6_u = {u6_addr8 = > > > "\000\000\000\000\000\000\000\000��߾ > > > \0 34\200:A", u6_addr16 = {0, 0, 0, 0, 64212, > 48863, 32796, > > > 16698}, u6_addr32 = {0, 0, 3202349780, > 1094352924}}}}}) at > > > http.c:3063 > > > #3 0x4007d0ec in handleSingleWebConnection (fdmask=0xa) > > > at webInterface.c:8220 > > > #4 0x4007ced5 in handleWebConnections (notUsed=0x0) > > > at webInterface.c:8069 > > > #5 0x412290f0 in pthread_start_thread () from /lib/libpthread.so.0 > > > #6 0x4122916f in pthread_start_thread_event () from > /lib/libpthread.so.0 > > > #7 0x413aec77 in clone () from /lib/libc.so.6 > > > (gdb) print > > > myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx] > > > Cannot access memory at address 0x4 > > > (gdb) print myGlobals.device[myGlobals.actualReportDeviceId] > > > $1 = {name = 0x80c6f20 "NetFlow-device", > > > humanFriendlyName = 0x80eb778 "NetFlow-device", flags = 0, addr = 0, > > > ipdot = 0x0, fqdn = 0x0, network = {s_addr = 169090600}, netmask = { > > > s_addr = 4294967040}, numHosts = 256, ifAddr = {s_addr = > 169090600}, > > > v6Addrs = 0x0, started = 0, firstpkt = 0, lastpkt = 0, > pcapPtr = 0x0, > > > pcapDumper = 0x0, pcapErrDumper = 0x0, pcapOtherDumper = 0x0, > > > virtualDevice = 0 '\0', activeDevice = 1 '\001', > > > dummyDevice = 1 '\001', deviceSpeed = 0, snaplen = 0, datalink = 1, > > > mtuSize = 0, headerSize = 0, filter = 0x0, fd = 0, receivedPkts = { > > > value = 0, modified = 0 '\0'}, droppedPkts = {value = 0, > > > modified = 0 '\0'}, ethernetPkts = {value = 0, modified = 0 '\0'}, > > > broadcastPkts = {value = 0, modified = 0 '\0'}, multicastPkts = { > > > value = 0, modified = 0 '\0'}, ipPkts = {value = 0, > > > modified = 0 '\0'}, fcPkts = {value = 0, modified = 0 '\0'}, > > > fcEofaPkts = {value = 0, modified = 0 '\0'}, fcEofAbnormalPkts = { > > > value = 0, modified = 0 '\0'}, fcAbnormalPkts = {value = 0, > > > modified = 0 '\0'}, fcBroadcastPkts = {value = 0, > modified = 0 '\0'}, > > > ethernetBytes = {value = 0, modified = 0 '\0'}, ipBytes = > {value = 0, > > > modified = 0 '\0'}, fragmentedIpBytes = {value = 0, > > > modified = 0 '\0'}, tcpBytes = {value = 0, modified = 0 '\0'}, > > > udpBytes = {value = 0, modified = 0 '\0'}, otherIpBytes = > {value = 0, > > > modified = 0 '\0'}, icmpBytes = {value = 0, modified = 0 '\0'}, > > > dlcBytes = {value = 0, modified = 0 '\0'}, ipxBytes = {value = 0, > > > modified = 0 '\0'}, stpBytes = {value = 0, modified = 0 '\0'}, > > > decnetBytes = {value = 0, modified = 0 '\0'}, netbiosBytes = { > > > value = 0, modified = 0 '\0'}, arpRarpBytes = {value = 0, > > > modified = 0 '\0'}, atalkBytes = {value = 0, modified = 0 '\0'}, > > > egpBytes = {value = 0, modified = 0 '\0'}, osiBytes = {value = 0, > > > modified = 0 '\0'}, ipv6Bytes = {value = 0, modified = 0 '\0'}, > > > icmp6Bytes = {value = 0, modified = 0 '\0'}, otherBytes = > {value = 0, > > > modified = 0 '\0'}, ipProtosList = 0x80e9268, fcBytes = > {value = 0, > > > modified = 0 '\0'}, fragmentedFcBytes = {value = 0, > > > modified = 0 '\0'}, fcFcpBytes = {value = 0, modified = 0 '\0'}, > > > fcFiconBytes = {value = 0, modified = 0 '\0'}, fcIpfcBytes = { > > > value = 0, modified = 0 '\0'}, fcSwilsBytes = {value = 0, > > > modified = 0 '\0'}, fcDnsBytes = {value = 0, modified = 0 '\0'}, > > > fcElsBytes = {value = 0, modified = 0 '\0'}, otherFcBytes = > {value = 0, > > > modified = 0 '\0'}, fcBroadcastBytes = {value = 0, > > > modified = 0 '\0'}, class2Bytes = {value = 0, modified = 0 '\0'}, > > > class3Bytes = {value = 0, modified = 0 '\0'}, classFBytes = > {value = 0, > > > modified = 0 '\0'}, ipPorts = {0x0 <repeats 65534 times>}, > > > lastMinEthernetBytes = {value = 0, modified = 0 '\0'}, > > > lastFiveMinsEthernetBytes = {value = 0, modified = 0 '\0'}, > > > lastMinEthernetPkts = {value = 0, modified = 0 '\0'}, > > > lastFiveMinsEthernetPkts = {value = 0, modified = 0 '\0'}, > > > lastNumEthernetPkts = {value = 0, modified = 0 '\0'}, > > > lastEthernetPkts = {value = 0, modified = 0 '\0'}, lastTotalPkts = { > > > value = 0, modified = 0 '\0'}, lastBroadcastPkts = {value = 0, > > > modified = 0 '\0'}, lastMulticastPkts = {value = 0, > > > modified = 0 '\0'}, lastEthernetBytes = {value = 0, > > > modified = 0 '\0'}, lastIpBytes = {value = 0, modified = 0 '\0'}, > > > ---Type <return> to continue, or q <return> to quit--- > > > lastNonIpBytes = {value = 0, modified = 0 '\0'}, rcvdPktStats = { > > > upTo64 = {value = 0, modified = 0 '\0'}, upTo128 = {value = 0, > > > modified = 0 '\0'}, upTo256 = {value = 0, modified = 0 '\0'}, > > > upTo512 = {value = 0, modified = 0 '\0'}, upTo1024 = {value = 0, > > > modified = 0 '\0'}, upTo1518 = {value = 0, modified = 0 '\0'}, > > > above1518 = {value = 0, modified = 0 '\0'}, shortest = {value = 0, > > > modified = 0 '\0'}, longest = {value = 0, modified = 0 '\0'}, > > > badChecksum = {value = 0, modified = 0 '\0'}, tooLong = > {value = 0, > > > modified = 0 '\0'}}, rcvdFcPktStats = {upTo36 = {value = 0, > > > modified = 0 '\0'}, upTo48 = {value = 0, modified = 0 '\0'}, > > > upTo52 = {value = 0, modified = 0 '\0'}, upTo68 = {value = 0, > > > modified = 0 '\0'}, upTo104 = {value = 0, modified = 0 '\0'}, > > > upTo548 = {value = 0, modified = 0 '\0'}, upTo1060 = {value = 0, > > > modified = 0 '\0'}, upTo2136 = {value = 0, modified = 0 '\0'}, > > > above2136 = {value = 0, modified = 0 '\0'}, shortest = {value = 0, > > > modified = 0 '\0'}, longest = {value = 0, modified = 0 '\0'}, > > > badCRC = {value = 0, modified = 0 '\0'}, tooLong = {value = 0, > > > modified = 0 '\0'}}, rcvdPktTTLStats = {upTo32 = {value = 0, > > > modified = 0 '\0'}, upTo64 = {value = 0, modified = 0 '\0'}, > > > upTo96 = {value = 0, modified = 0 '\0'}, upTo128 = {value = 0, > > > modified = 0 '\0'}, upTo160 = {value = 0, modified = 0 '\0'}, > > > upTo192 = {value = 0, modified = 0 '\0'}, upTo224 = {value = 0, > > > modified = 0 '\0'}, upTo255 = {value = 0, modified = 0 '\0'}}, > > > peakThroughput = 0, actualThpt = 0, lastMinThpt = 0, > > > lastFiveMinsThpt = 0, peakPacketThroughput = 0, actualPktsThpt = 0, > > > lastMinPktsThpt = 0, lastFiveMinsPktsThpt = 0, > > > lastThptUpdate = 1077608005, lastMinThptUpdate = 1077608005, > > > lastHourThptUpdate = 1077608005, lastFiveMinsThptUpdate = > 1077608005, > > > throughput = 0, packetThroughput = 0, numThptSamples = 0, > > > last60MinutesThpt = {{trafficValue = 0, topHostSentSerial = { > > > serialType = 0 '\0', value = { > > > ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, secondHostSentSerial = { > > > serialType = 0 '\0', value = { > > > ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, thirdHostSentSerial = { > > > serialType = 0 '\0', value = { > > > ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > ---Type <return> to continue, or q <return> to quit--- > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, topSentTraffic = > {value = 0, > > > modified = 0 '\0'}, secondSentTraffic = {value = 0, > > > modified = 0 '\0'}, thirdSentTraffic = {value = 0, > > > modified = 0 '\0'}, topHostRcvdSerial = {serialType = 0 '\0', > > > value = {ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, secondHostRcvdSerial = { > > > serialType = 0 '\0', value = { > > > ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, thirdHostRcvdSerial = { > > > serialType = 0 '\0', value = { > > > ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, topRcvdTraffic = > {value = 0, > > > modified = 0 '\0'}, secondRcvdTraffic = {value = 0, > > > modified = 0 '\0'}, thirdRcvdTraffic = {value = 0, > > > modified = 0 '\0'}} <repeats 60 times>}, last24HoursThpt = {{ > > > trafficValue = 0, topHostSentSerial = {serialType = 0 '\0', > > > value = {ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, secondHostSentSerial = { > > > serialType = 0 '\0', value = { > > > ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, thirdHostSentSerial = { > > > serialType = 0 '\0', value = { > > > ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > ---Type <return> to continue, or q <return> to quit--- > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, topSentTraffic = > {value = 0, > > > modified = 0 '\0'}, secondSentTraffic = {value = 0, > > > modified = 0 '\0'}, thirdSentTraffic = {value = 0, > > > modified = 0 '\0'}, topHostRcvdSerial = {serialType = 0 '\0', > > > value = {ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, secondHostRcvdSerial = { > > > serialType = 0 '\0', value = { > > > ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, thirdHostRcvdSerial = { > > > serialType = 0 '\0', value = { > > > ethAddress = "\000\000\000\000\000", ipAddress = { > > > hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0}, > > > _hostIp6Address = {in6_u = { > > > u6_addr8 = '\0' <repeats 15 times>, > u6_addr16 = {0, 0, > > > 0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}}, > > > fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0', > > > port = 0 '\0'}, vsanId = 0}}}, topRcvdTraffic = > {value = 0, > > > modified = 0 '\0'}, secondRcvdTraffic = {value = 0, > > > modified = 0 '\0'}, thirdRcvdTraffic = {value = 0, > > > modified = 0 '\0'}} <repeats 24 times>}, last30daysThpt = { > > > 0 <repeats 30 times>}, last60MinutesThptIdx = 0, > > > last24HoursThptIdx = 0, last30daysThptIdx = 0, > tcpGlobalTrafficStats = > > > { local = {value = 0, modified = 0 '\0'}, local2remote = {value = 0, > > > modified = 0 '\0'}, remote = {value = 0, modified = 0 '\0'}, > remote2local > > > = {value = 0, modified = 0 '\0'}, lastLocal = { value = 0, > modified = 0 > > > '\0'}, lastLocal2remote = {value = 0, modified = 0 '\0'}, lastRem = > > > {value = 0, modified = 0 '\0'}, lastRem2local = {value = 0, > modified = 0 > > > '\0'}}, > > > udpGlobalTrafficStats = {local = {value = 0, modified = 0 '\0'}, > > > local2remote = {value = 0, modified = 0 '\0'}, remote = > {value = 0, > > > modified = 0 '\0'}, remote2local = {value = 0, modified > = 0 '\0'}, > > > lastLocal = {value = 0, modified = 0 '\0'}, lastLocal2remote = { > > > value = 0, modified = 0 '\0'}, lastRem = {value = 0, > > > modified = 0 '\0'}, lastRem2local = {value = 0, > > > modified = 0 '\0'}}, icmpGlobalTrafficStats = {local = > {value = 0, > > > modified = 0 '\0'}, local2remote = {value = 0, modified > = 0 '\0'}, > > > remote = {value = 0, modified = 0 '\0'}, remote2local = > {value = 0, > > > ---Type <return> to continue, or q <return> to quit--- > > > modified = 0 '\0'}, lastLocal = {value = 0, modified = 0 '\0'}, > > > lastLocal2remote = {value = 0, modified = 0 '\0'}, lastRem = { > > > value = 0, modified = 0 '\0'}, lastRem2local = {value = 0, > > > modified = 0 '\0'}}, ipProtoStats = 0x85de3b8, securityPkts = { > > > synPkts = {value = 0, modified = 0 '\0'}, rstPkts = {value = 0, > > > modified = 0 '\0'}, rstAckPkts = {value = 0, modified = 0 '\0'}, > > > synFinPkts = {value = 0, modified = 0 '\0'}, finPushUrgPkts = { > > > value = 0, modified = 0 '\0'}, nullPkts = {value = 0, > > > modified = 0 '\0'}, rejectedTCPConn = {value = 0, > > > modified = 0 '\0'}, establishedTCPConn = {value = 0, > > > modified = 0 '\0'}, terminatedTCPConn = {value = 0, > > > modified = 0 '\0'}, ackXmasFinSynNullScan = {value = 0, > > > modified = 0 '\0'}, udpToClosedPort = {value = 0, > > > modified = 0 '\0'}, udpToDiagnosticPort = {value = 0, > > > modified = 0 '\0'}, tcpToDiagnosticPort = {value = 0, > > > modified = 0 '\0'}, tinyFragment = {value = 0, modified > = 0 '\0'}, > > > icmpFragment = {value = 0, modified = 0 '\0'}, > overlappingFragment = > > > { value = 0, modified = 0 '\0'}, closedEmptyTCPConn = {value = 0, > > > modified = 0 '\0'}, malformedPkts = {value = 0, modified = 0 '\0'}, > > > icmpPortUnreach = {value = 0, modified = 0 '\0'}, > > > icmpHostNetUnreach = {value = 0, modified = 0 '\0'}, > > > icmpProtocolUnreach = {value = 0, modified = 0 '\0'}, > > > icmpAdminProhibited = {value = 0, modified = 0 '\0'}}, > > > numEstablishedTCPConnections = {value = 0, modified = 0 '\0'}, > > > pcapDispatchThreadId = 0, hostsno = 1, actualHashSize = 16384, > > > hash_hostTraffic = 0x88325c0, hashListMaxLookups = 0, > vsanHash = 0x0, > > > fragmentList = 0x0, tcpSession = 0x0, numTcpSessions = 0, > > > maxNumTcpSessions = 0, ipTrafficMatrix = 0x417d8008, > > > ipTrafficMatrixHosts = 0x85dea80, ipTrafficMatrixPromiscHosts = { > > > __fds_bits = {0 <repeats 32 times>}}, fcSession = 0x0, > > > numFcSessions = 0, maxNumFcSessions = 0, fcTrafficMatrix = 0x0, > > > fcTrafficMatrixHosts = 0x0, exportNetFlow = 0 '\0'} > > > (gdb) > > > > > > On Monday 23 February 2004 21:24, Burton M. Strauss III wrote: > > > > Don't think any of my recent changes should have altered that > > > > > > behavior, so > > > > > > > yes, please do collect the gdb data. > > > > > > > > -----Burton > > > > > > > > > -----Original Message----- > > > > > From: [EMAIL PROTECTED] > > > > [mailto:[EMAIL PROTECTED] Behalf > > > > > > Of Markus Rehbach > > > > Sent: Monday, February 23, 2004 11:50 AM > > > > To: [EMAIL PROTECTED] > > > > Subject: [Ntop-dev] ntop segfaults (netflow interface > active, clicking > > > > 'local IP / Active TCP Sessions') > > > > > > > > > > > > Hi all, > > > > > > > > the 'local IP, Active TCP Sessions' is working with eth0, but not > > > > with the > > > > Netflow device, where ntop segfaults. But it is questionable whether > > > > this > > > > > > function makes sense on the netflow device...... > > > > > > > > If necessary I could try to send a gdb output. > > > > > > > > Cheers > > > > > > > > Markus > > > > > > > > _______________________________________________ > > > > Ntop-dev mailing list > > > > [EMAIL PROTECTED] > > > > http://listgateway.unipi.it/mailman/listinfo/ntop-dev > > > > > > _______________________________________________ > > > Ntop-dev mailing list > > > [EMAIL PROTECTED] > > > http://listgateway.unipi.it/mailman/listinfo/ntop-dev > > > > _______________________________________________ > > Ntop-dev mailing list > > [EMAIL PROTECTED] > > http://listgateway.unipi.it/mailman/listinfo/ntop-dev > > > > _______________________________________________ > > Ntop-dev mailing list > > [EMAIL PROTECTED] > > http://listgateway.unipi.it/mailman/listinfo/ntop-dev > > _______________________________________________ > Ntop-dev mailing list > [EMAIL PROTECTED] > http://listgateway.unipi.it/mailman/listinfo/ntop-dev > _______________________________________________ Ntop-dev mailing list [EMAIL PROTECTED] http://listgateway.unipi.it/mailman/listinfo/ntop-dev
