Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 07 Apr 2015 12:16:08 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-ports-bugs@FreeBSD.org
Subject:   [Bug 199263] security/bruteblock: Latest patch (from bug id 194381 2014-10-15) breaks i386 compatibility
Message-ID:  <bug-199263-13@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199263

            Bug ID: 199263
           Summary: security/bruteblock: Latest patch (from bug id 194381
                    2014-10-15) breaks i386 compatibility
           Product: Ports & Packages
           Version: Latest
          Hardware: i386
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: Individual Port(s)
          Assignee: amdmi3@FreeBSD.org
          Reporter: fesse@mail.ru
          Assignee: amdmi3@FreeBSD.org
             Flags: maintainer-feedback?(amdmi3@FreeBSD.org)

Latest patch from BugId 194381 breaks i386 compatibility. IPFW on i386 needs
32-bit values to be used as optional table field (used to store time), but
patched version introduces 'long long', and ipfw table entry timeout goes to
far far future, prevents them to be removed by bruteblockd. Without patching
'bruteblock.c' port works well. I think patching 'bruteblock.c' should not be
done on i386. May be conditional Makefile?

-- 
You are receiving this mail because:
You are the assignee for the bug.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-199263-13>