Yes, it should be rintNoDataYet(); not printNotAvailable("No data (yet)");

I'll commit the fix.

-----Burton

> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf
> Of Markus Rehbach
> Sent: Friday, February 27, 2004 2:46 PM
> To: [EMAIL PROTECTED]
> Subject: Re: [Ntop-dev] ntop segfaults (netflow interface active,
> clicking 'local IP / Active TCP Sessions')
>
>
> Ok, solved. And the message appearing is
>
> The requested data is not available when ntop is
> started with the command line flag No data (yet)
>
> Sessions on eth0 were showed normally.
>
> Markus
> ____________________________
>
> On Friday 27 February 2004 15:10, Burton M. Strauss III wrote:
> > Markus - try this and let me know...
> >
> > $ cat BMS0463-ActiveTCPSessions.patch
> > --- ntop/report.c 2004-02-24 22:50:39.000000000 -0600
> > +++ ntop/report.c 2004-02-27 07:53:34.000000000 -0600
> > @@ -2919,6 +2931,12 @@
> >      return;
> >    }
> >
> > +  if((myGlobals.device[actualDeviceId].tcpSession == NULL) ||
> > +     (myGlobals.device[actualDeviceId].numTcpSessions == 0)) {
> > +     printNotAvailable("No data (yet)");
> > +     return;
> > +  }
> > +
> >    /*
> >      Due to the way sessions are handled, sessions before those to
> >      display need to be skipped
> >
> ==========================================================================
> >
> > (either patch it in manually or copy the lines after the cat
> not including
> > the ===s and use patch.
> >
> > ------Burton
> >
> > > -----Original Message-----
> > > From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] Behalf
> > > Of Markus Rehbach
> > > Sent: Tuesday, February 24, 2004 4:00 PM
> > > To: [EMAIL PROTECTED]
> > > Subject: Re: [Ntop-dev] ntop segfaults (netflow interface active,
> > > clicking 'local IP / Active TCP Sessions')
> > >
> > >
> > > Frist try with gdb, please inform me which additional information
> > > is needed.
> > >
> > > The system segfaulting is based on a Suse 9.0, I tried the same
> > > on a system
> > > based on as Suse 8.0 where ntop did not showed this behaviour. Both
> > > system have modified kernels but I changed the kernel version at the
> > > system segfaulting.
> > >
> > > Markus
> > >
> > > **
> > >
> > > Program received signal SIGSEGV, Segmentation fault.
> > > [Switching to Thread 98311 (LWP 2508)]
> > > 0x400460bd in printActiveTCPSessions (actualDeviceId=1, pageNum=0,
> > > el=0x0) at report.c:2925
> > > 2925
> > > if(myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx
> > > ] != NULL)
> > > {
> > > (gdb) list
> > > 2920
> > > 2921    #ifdef CFG_MULTITHREADED
> > > 2922        accessMutex(&myGlobals.tcpSessionsMutex,
> > > "printActiveTCPSessions");
> > > 2923    #endif
> > > 2924
> > > 2925
> > > if(myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx
> > > ] != NULL)
> > > {
> > > 2926          char *sport, *dport;
> > > 2927          Counter dataSent, dataRcvd;
> > > 2928          IPSession *session =
> > > myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx];
> > > 2929
> > > (gdb) info stack
> > > #0  0x400460bd in printActiveTCPSessions (actualDeviceId=1, pageNum=0,
> > >     el=0x0) at report.c:2925
> > > #1  0x40036ed9 in returnHTTPPage (pageName=0xbedff4fd
> "NetNetstat.html",
> > >     postLen=-1, from=0xbedff71c, httpRequestedAt=0xbedff0b4,
> > >     usedFork=0xbedff0b0,
> > >     agent=0xbedff3bc "Mozilla/5.0 (compatible; Konqueror/3.1; Linux)",
> > >     referer=0xbedff2bc "http://127.0.0.1:3000/Local.html";) at
> http.c:2069
> > > #2  0x40038767 in handleHTTPrequest (from=
> > >               {hostFamily = 10, addr = {_hostIp4Address =
> {s_addr = 0},
> > > _hostIp6Address = {in6_u = {u6_addr8 =
> > > "\000\000\000\000\000\000\000\000��߾
> > > \0               34\200:A", u6_addr16 = {0, 0, 0, 0, 64212,
> 48863, 32796,
> > > 16698}, u6_addr32                = {0, 0, 3202349780,
> 1094352924}}}}}) at
> > > http.c:3063
> > > #3  0x4007d0ec in handleSingleWebConnection (fdmask=0xa)
> > >     at webInterface.c:8220
> > > #4  0x4007ced5 in handleWebConnections (notUsed=0x0)
> > >     at webInterface.c:8069
> > > #5  0x412290f0 in pthread_start_thread () from /lib/libpthread.so.0
> > > #6  0x4122916f in pthread_start_thread_event () from
> /lib/libpthread.so.0
> > > #7  0x413aec77 in clone () from /lib/libc.so.6
> > > (gdb) print
> > > myGlobals.device[myGlobals.actualReportDeviceId].tcpSession[idx]
> > > Cannot access memory at address 0x4
> > > (gdb) print myGlobals.device[myGlobals.actualReportDeviceId]
> > > $1 = {name = 0x80c6f20 "NetFlow-device",
> > >   humanFriendlyName = 0x80eb778 "NetFlow-device", flags = 0, addr = 0,
> > >   ipdot = 0x0, fqdn = 0x0, network = {s_addr = 169090600}, netmask = {
> > >     s_addr = 4294967040}, numHosts = 256, ifAddr = {s_addr =
> 169090600},
> > >   v6Addrs = 0x0, started = 0, firstpkt = 0, lastpkt = 0,
> pcapPtr = 0x0,
> > >   pcapDumper = 0x0, pcapErrDumper = 0x0, pcapOtherDumper = 0x0,
> > >   virtualDevice = 0 '\0', activeDevice = 1 '\001',
> > >   dummyDevice = 1 '\001', deviceSpeed = 0, snaplen = 0, datalink = 1,
> > >   mtuSize = 0, headerSize = 0, filter = 0x0, fd = 0, receivedPkts = {
> > >     value = 0, modified = 0 '\0'}, droppedPkts = {value = 0,
> > >     modified = 0 '\0'}, ethernetPkts = {value = 0, modified = 0 '\0'},
> > >   broadcastPkts = {value = 0, modified = 0 '\0'}, multicastPkts = {
> > >     value = 0, modified = 0 '\0'}, ipPkts = {value = 0,
> > >     modified = 0 '\0'}, fcPkts = {value = 0, modified = 0 '\0'},
> > >   fcEofaPkts = {value = 0, modified = 0 '\0'}, fcEofAbnormalPkts = {
> > >     value = 0, modified = 0 '\0'}, fcAbnormalPkts = {value = 0,
> > >     modified = 0 '\0'}, fcBroadcastPkts = {value = 0,
> modified = 0 '\0'},
> > >   ethernetBytes = {value = 0, modified = 0 '\0'}, ipBytes =
> {value = 0,
> > >     modified = 0 '\0'}, fragmentedIpBytes = {value = 0,
> > >     modified = 0 '\0'}, tcpBytes = {value = 0, modified = 0 '\0'},
> > >   udpBytes = {value = 0, modified = 0 '\0'}, otherIpBytes =
> {value = 0,
> > >     modified = 0 '\0'}, icmpBytes = {value = 0, modified = 0 '\0'},
> > >   dlcBytes = {value = 0, modified = 0 '\0'}, ipxBytes = {value = 0,
> > >     modified = 0 '\0'}, stpBytes = {value = 0, modified = 0 '\0'},
> > >   decnetBytes = {value = 0, modified = 0 '\0'}, netbiosBytes = {
> > >     value = 0, modified = 0 '\0'}, arpRarpBytes = {value = 0,
> > >     modified = 0 '\0'}, atalkBytes = {value = 0, modified = 0 '\0'},
> > >   egpBytes = {value = 0, modified = 0 '\0'}, osiBytes = {value = 0,
> > >     modified = 0 '\0'}, ipv6Bytes = {value = 0, modified = 0 '\0'},
> > >   icmp6Bytes = {value = 0, modified = 0 '\0'}, otherBytes =
> {value = 0,
> > >     modified = 0 '\0'}, ipProtosList = 0x80e9268, fcBytes =
> {value = 0,
> > >     modified = 0 '\0'}, fragmentedFcBytes = {value = 0,
> > >     modified = 0 '\0'}, fcFcpBytes = {value = 0, modified = 0 '\0'},
> > >   fcFiconBytes = {value = 0, modified = 0 '\0'}, fcIpfcBytes = {
> > >     value = 0, modified = 0 '\0'}, fcSwilsBytes = {value = 0,
> > >     modified = 0 '\0'}, fcDnsBytes = {value = 0, modified = 0 '\0'},
> > >   fcElsBytes = {value = 0, modified = 0 '\0'}, otherFcBytes =
> {value = 0,
> > >     modified = 0 '\0'}, fcBroadcastBytes = {value = 0,
> > >     modified = 0 '\0'}, class2Bytes = {value = 0, modified = 0 '\0'},
> > >   class3Bytes = {value = 0, modified = 0 '\0'}, classFBytes =
> {value = 0,
> > >     modified = 0 '\0'}, ipPorts = {0x0 <repeats 65534 times>},
> > >   lastMinEthernetBytes = {value = 0, modified = 0 '\0'},
> > >   lastFiveMinsEthernetBytes = {value = 0, modified = 0 '\0'},
> > >   lastMinEthernetPkts = {value = 0, modified = 0 '\0'},
> > >   lastFiveMinsEthernetPkts = {value = 0, modified = 0 '\0'},
> > >   lastNumEthernetPkts = {value = 0, modified = 0 '\0'},
> > >   lastEthernetPkts = {value = 0, modified = 0 '\0'}, lastTotalPkts = {
> > >     value = 0, modified = 0 '\0'}, lastBroadcastPkts = {value = 0,
> > >     modified = 0 '\0'}, lastMulticastPkts = {value = 0,
> > >     modified = 0 '\0'}, lastEthernetBytes = {value = 0,
> > >     modified = 0 '\0'}, lastIpBytes = {value = 0, modified = 0 '\0'},
> > > ---Type <return> to continue, or q <return> to quit---
> > >   lastNonIpBytes = {value = 0, modified = 0 '\0'}, rcvdPktStats = {
> > >     upTo64 = {value = 0, modified = 0 '\0'}, upTo128 = {value = 0,
> > >       modified = 0 '\0'}, upTo256 = {value = 0, modified = 0 '\0'},
> > >     upTo512 = {value = 0, modified = 0 '\0'}, upTo1024 = {value = 0,
> > >       modified = 0 '\0'}, upTo1518 = {value = 0, modified = 0 '\0'},
> > >     above1518 = {value = 0, modified = 0 '\0'}, shortest = {value = 0,
> > >       modified = 0 '\0'}, longest = {value = 0, modified = 0 '\0'},
> > >     badChecksum = {value = 0, modified = 0 '\0'}, tooLong =
> {value = 0,
> > >       modified = 0 '\0'}}, rcvdFcPktStats = {upTo36 = {value = 0,
> > >       modified = 0 '\0'}, upTo48 = {value = 0, modified = 0 '\0'},
> > >     upTo52 = {value = 0, modified = 0 '\0'}, upTo68 = {value = 0,
> > >       modified = 0 '\0'}, upTo104 = {value = 0, modified = 0 '\0'},
> > >     upTo548 = {value = 0, modified = 0 '\0'}, upTo1060 = {value = 0,
> > >       modified = 0 '\0'}, upTo2136 = {value = 0, modified = 0 '\0'},
> > >     above2136 = {value = 0, modified = 0 '\0'}, shortest = {value = 0,
> > >       modified = 0 '\0'}, longest = {value = 0, modified = 0 '\0'},
> > >     badCRC = {value = 0, modified = 0 '\0'}, tooLong = {value = 0,
> > >       modified = 0 '\0'}}, rcvdPktTTLStats = {upTo32 = {value = 0,
> > >       modified = 0 '\0'}, upTo64 = {value = 0, modified = 0 '\0'},
> > >     upTo96 = {value = 0, modified = 0 '\0'}, upTo128 = {value = 0,
> > >       modified = 0 '\0'}, upTo160 = {value = 0, modified = 0 '\0'},
> > >     upTo192 = {value = 0, modified = 0 '\0'}, upTo224 = {value = 0,
> > >       modified = 0 '\0'}, upTo255 = {value = 0, modified = 0 '\0'}},
> > >   peakThroughput = 0, actualThpt = 0, lastMinThpt = 0,
> > >   lastFiveMinsThpt = 0, peakPacketThroughput = 0, actualPktsThpt = 0,
> > >   lastMinPktsThpt = 0, lastFiveMinsPktsThpt = 0,
> > >   lastThptUpdate = 1077608005, lastMinThptUpdate = 1077608005,
> > >   lastHourThptUpdate = 1077608005, lastFiveMinsThptUpdate =
> 1077608005,
> > >   throughput = 0, packetThroughput = 0, numThptSamples = 0,
> > >   last60MinutesThpt = {{trafficValue = 0, topHostSentSerial = {
> > >         serialType = 0 '\0', value = {
> > >           ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, secondHostSentSerial = {
> > >         serialType = 0 '\0', value = {
> > >           ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, thirdHostSentSerial = {
> > >         serialType = 0 '\0', value = {
> > >           ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > > ---Type <return> to continue, or q <return> to quit---
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, topSentTraffic =
> {value = 0,
> > >         modified = 0 '\0'}, secondSentTraffic = {value = 0,
> > >         modified = 0 '\0'}, thirdSentTraffic = {value = 0,
> > >         modified = 0 '\0'}, topHostRcvdSerial = {serialType = 0 '\0',
> > >         value = {ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, secondHostRcvdSerial = {
> > >         serialType = 0 '\0', value = {
> > >           ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, thirdHostRcvdSerial = {
> > >         serialType = 0 '\0', value = {
> > >           ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, topRcvdTraffic =
> {value = 0,
> > >         modified = 0 '\0'}, secondRcvdTraffic = {value = 0,
> > >         modified = 0 '\0'}, thirdRcvdTraffic = {value = 0,
> > >         modified = 0 '\0'}} <repeats 60 times>}, last24HoursThpt = {{
> > >       trafficValue = 0, topHostSentSerial = {serialType = 0 '\0',
> > >         value = {ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, secondHostSentSerial = {
> > >         serialType = 0 '\0', value = {
> > >           ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, thirdHostSentSerial = {
> > >         serialType = 0 '\0', value = {
> > >           ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > > ---Type <return> to continue, or q <return> to quit---
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, topSentTraffic =
> {value = 0,
> > >         modified = 0 '\0'}, secondSentTraffic = {value = 0,
> > >         modified = 0 '\0'}, thirdSentTraffic = {value = 0,
> > >         modified = 0 '\0'}, topHostRcvdSerial = {serialType = 0 '\0',
> > >         value = {ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, secondHostRcvdSerial = {
> > >         serialType = 0 '\0', value = {
> > >           ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, thirdHostRcvdSerial = {
> > >         serialType = 0 '\0', value = {
> > >           ethAddress = "\000\000\000\000\000", ipAddress = {
> > >             hostFamily = 0, addr = {_hostIp4Address = {s_addr = 0},
> > >               _hostIp6Address = {in6_u = {
> > >                   u6_addr8 = '\0' <repeats 15 times>,
> u6_addr16 = {0, 0,
> > >                     0, 0, 0, 0, 0, 0}, u6_addr32 = {0, 0, 0, 0}}}}},
> > >           fcSerial = {fcAddress = {domain = 0 '\0', area = 0 '\0',
> > >               port = 0 '\0'}, vsanId = 0}}}, topRcvdTraffic =
> {value = 0,
> > >         modified = 0 '\0'}, secondRcvdTraffic = {value = 0,
> > >         modified = 0 '\0'}, thirdRcvdTraffic = {value = 0,
> > >         modified = 0 '\0'}} <repeats 24 times>}, last30daysThpt = {
> > >     0 <repeats 30 times>}, last60MinutesThptIdx = 0,
> > >   last24HoursThptIdx = 0, last30daysThptIdx = 0,
> tcpGlobalTrafficStats =
> > > { local = {value = 0, modified = 0 '\0'}, local2remote = {value = 0,
> > > modified = 0 '\0'}, remote = {value = 0, modified = 0 '\0'},
> remote2local
> > > = {value = 0, modified = 0 '\0'}, lastLocal = { value = 0,
> modified = 0
> > > '\0'}, lastLocal2remote = {value = 0, modified = 0 '\0'}, lastRem =
> > > {value = 0, modified = 0 '\0'}, lastRem2local = {value = 0,
> modified = 0
> > > '\0'}},
> > >   udpGlobalTrafficStats = {local = {value = 0, modified = 0 '\0'},
> > >     local2remote = {value = 0, modified = 0 '\0'}, remote =
> {value = 0,
> > >       modified = 0 '\0'}, remote2local = {value = 0, modified
> = 0 '\0'},
> > >     lastLocal = {value = 0, modified = 0 '\0'}, lastLocal2remote = {
> > >       value = 0, modified = 0 '\0'}, lastRem = {value = 0,
> > >       modified = 0 '\0'}, lastRem2local = {value = 0,
> > >       modified = 0 '\0'}}, icmpGlobalTrafficStats = {local =
> {value = 0,
> > >       modified = 0 '\0'}, local2remote = {value = 0, modified
> = 0 '\0'},
> > >     remote = {value = 0, modified = 0 '\0'}, remote2local =
> {value = 0,
> > > ---Type <return> to continue, or q <return> to quit---
> > >       modified = 0 '\0'}, lastLocal = {value = 0, modified = 0 '\0'},
> > >     lastLocal2remote = {value = 0, modified = 0 '\0'}, lastRem = {
> > >       value = 0, modified = 0 '\0'}, lastRem2local = {value = 0,
> > >       modified = 0 '\0'}}, ipProtoStats = 0x85de3b8, securityPkts = {
> > >     synPkts = {value = 0, modified = 0 '\0'}, rstPkts = {value = 0,
> > >       modified = 0 '\0'}, rstAckPkts = {value = 0, modified = 0 '\0'},
> > >     synFinPkts = {value = 0, modified = 0 '\0'}, finPushUrgPkts = {
> > >       value = 0, modified = 0 '\0'}, nullPkts = {value = 0,
> > >       modified = 0 '\0'}, rejectedTCPConn = {value = 0,
> > >       modified = 0 '\0'}, establishedTCPConn = {value = 0,
> > >       modified = 0 '\0'}, terminatedTCPConn = {value = 0,
> > >       modified = 0 '\0'}, ackXmasFinSynNullScan = {value = 0,
> > >       modified = 0 '\0'}, udpToClosedPort = {value = 0,
> > >       modified = 0 '\0'}, udpToDiagnosticPort = {value = 0,
> > >       modified = 0 '\0'}, tcpToDiagnosticPort = {value = 0,
> > >       modified = 0 '\0'}, tinyFragment = {value = 0, modified
> = 0 '\0'},
> > >     icmpFragment = {value = 0, modified = 0 '\0'},
> overlappingFragment =
> > > { value = 0, modified = 0 '\0'}, closedEmptyTCPConn = {value = 0,
> > > modified = 0 '\0'}, malformedPkts = {value = 0, modified = 0 '\0'},
> > > icmpPortUnreach = {value = 0, modified = 0 '\0'},
> > >     icmpHostNetUnreach = {value = 0, modified = 0 '\0'},
> > >     icmpProtocolUnreach = {value = 0, modified = 0 '\0'},
> > >     icmpAdminProhibited = {value = 0, modified = 0 '\0'}},
> > >   numEstablishedTCPConnections = {value = 0, modified = 0 '\0'},
> > >   pcapDispatchThreadId = 0, hostsno = 1, actualHashSize = 16384,
> > >   hash_hostTraffic = 0x88325c0, hashListMaxLookups = 0,
> vsanHash = 0x0,
> > >   fragmentList = 0x0, tcpSession = 0x0, numTcpSessions = 0,
> > >   maxNumTcpSessions = 0, ipTrafficMatrix = 0x417d8008,
> > >   ipTrafficMatrixHosts = 0x85dea80, ipTrafficMatrixPromiscHosts = {
> > >     __fds_bits = {0 <repeats 32 times>}}, fcSession = 0x0,
> > >   numFcSessions = 0, maxNumFcSessions = 0, fcTrafficMatrix = 0x0,
> > >   fcTrafficMatrixHosts = 0x0, exportNetFlow = 0 '\0'}
> > > (gdb)
> > >
> > > On Monday 23 February 2004 21:24, Burton M. Strauss III wrote:
> > > > Don't think any of my recent changes should have altered that
> > >
> > > behavior, so
> > >
> > > > yes, please do collect the gdb data.
> > > >
> > > > -----Burton
> > > >
> > > > > -----Original Message-----
> > > > > From: [EMAIL PROTECTED]
> >
> > [mailto:[EMAIL PROTECTED] Behalf
> >
> > > > Of Markus Rehbach
> > > > Sent: Monday, February 23, 2004 11:50 AM
> > > > To: [EMAIL PROTECTED]
> > > > Subject: [Ntop-dev] ntop segfaults (netflow interface
> active, clicking
> > > > 'local IP / Active TCP Sessions')
> > > >
> > > >
> > > > Hi all,
> > > >
> > > > the 'local IP, Active TCP Sessions' is working with eth0, but not
> > > > with the
> > > > Netflow device, where ntop segfaults. But it is questionable whether
> >
> > this
> >
> > > > function makes sense on the netflow device......
> > > >
> > > > If necessary I could try to send a gdb output.
> > > >
> > > > Cheers
> > > >
> > > > Markus
> > > >
> > > > _______________________________________________
> > > > Ntop-dev mailing list
> > > > [EMAIL PROTECTED]
> > > > http://listgateway.unipi.it/mailman/listinfo/ntop-dev
> > >
> > > _______________________________________________
> > > Ntop-dev mailing list
> > > [EMAIL PROTECTED]
> > > http://listgateway.unipi.it/mailman/listinfo/ntop-dev
> >
> > _______________________________________________
> > Ntop-dev mailing list
> > [EMAIL PROTECTED]
> > http://listgateway.unipi.it/mailman/listinfo/ntop-dev
> >
> > _______________________________________________
> > Ntop-dev mailing list
> > [EMAIL PROTECTED]
> > http://listgateway.unipi.it/mailman/listinfo/ntop-dev
>
> _______________________________________________
> Ntop-dev mailing list
> [EMAIL PROTECTED]
> http://listgateway.unipi.it/mailman/listinfo/ntop-dev
>

_______________________________________________
Ntop-dev mailing list
[EMAIL PROTECTED]
http://listgateway.unipi.it/mailman/listinfo/ntop-dev

Reply via email to