Date: Tue, 07 Apr 2015 12:16:08 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 199263] security/bruteblock: Latest patch (from bug id 194381 2014-10-15) breaks i386 compatibility Message-ID: <bug-199263-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199263 Bug ID: 199263 Summary: security/bruteblock: Latest patch (from bug id 194381 2014-10-15) breaks i386 compatibility Product: Ports & Packages Version: Latest Hardware: i386 OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: amdmi3@FreeBSD.org Reporter: fesse@mail.ru Assignee: amdmi3@FreeBSD.org Flags: maintainer-feedback?(amdmi3@FreeBSD.org) Latest patch from BugId 194381 breaks i386 compatibility. IPFW on i386 needs 32-bit values to be used as optional table field (used to store time), but patched version introduces 'long long', and ipfw table entry timeout goes to far far future, prevents them to be removed by bruteblockd. Without patching 'bruteblock.c' port works well. I think patching 'bruteblock.c' should not be done on i386. May be conditional Makefile? -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-199263-13>