From owner-svn-src-head@freebsd.org Sun Nov 27 17:08:49 2016 Return-Path: Delivered-To: svn-src-head@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 8E9FAC58E3D; Sun, 27 Nov 2016 17:08:49 +0000 (UTC) (envelope-from rb743@hermes.cam.ac.uk) Received: from ppsw-40.csi.cam.ac.uk (ppsw-40.csi.cam.ac.uk [131.111.8.140]) by mx1.freebsd.org (Postfix) with ESMTP id 5B7331C4; Sun, 27 Nov 2016 17:08:49 +0000 (UTC) (envelope-from rb743@hermes.cam.ac.uk) X-Cam-AntiVirus: no malware found X-Cam-ScannerInfo: http://www.cam.ac.uk/cs/email/scanner/ Received: from sc1.bsdpad.com ([163.172.212.18]:27597) by ppsw-40.csi.cam.ac.uk (smtp.hermes.cam.ac.uk [131.111.8.158]:587) with esmtpsa (LOGIN:rb743) (TLSv1:ECDHE-RSA-AES256-SHA:256) id 1cB2wY-0000rC-jt (Exim 4.86_36-e07b163) (return-path ); Sun, 27 Nov 2016 17:08:46 +0000 Date: Sun, 27 Nov 2016 17:07:46 +0000 From: Ruslan Bukin To: Eugene Grosbein Cc: Ruslan Bukin , freebsd-mips@freebsd.org, svn-src-head@freebsd.org Subject: Re: r306186 broke ipfw for MIPS32-BE Message-ID: <20161127170746.GA92813@bsdpad.com> References: <20161127161213.GA29204@rdtc.ru> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20161127161213.GA29204@rdtc.ru> User-Agent: Mutt/1.6.1 (2016-04-27) Sender: "R. Bukin" X-BeenThere: svn-src-head@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: SVN commit messages for the src tree for head/-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 27 Nov 2016 17:08:49 -0000 On Sun, Nov 27, 2016 at 11:12:13PM +0700, Eugene Grosbein wrote: > Hi! > > Ruslan, please take a look. > > > For reference - this breaks sooptcopyin() on MIPS32 BE. Undoing this > > commit fixes things. :) > > > > (it breaks ipfw. ) > > I acknowledge this running FreeBSD 12/mips with real MIP32 big endian > hardware. ipfw show now complains: > ipfw: retrieving config failed: Invalid argument > > And there is a line in a dmesg: ipfw_ctl3 invalid option 0v0 > > "ipfw add" is broken too: > > # ipfw add 10 allow ip from any to any > ipfw: getsockopt(IP_FW_XADD): Invalid argument > > dmesg says: ipfw: ipfw_ctl3 invalid option 11521v0 > > Rollback of r306186 fixes this. > > Eugene Grosbein Hi this should be fixed already in r309018 thanks! Ruslan