From owner-freebsd-ports-bugs@FreeBSD.ORG Tue Apr 7 12:16:08 2015 Return-Path: Delivered-To: freebsd-ports-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id C4EF7239 for ; Tue, 7 Apr 2015 12:16:08 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id AA9F6779 for ; Tue, 7 Apr 2015 12:16:08 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id t37CG8cs034362 for ; Tue, 7 Apr 2015 12:16:08 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 199263] security/bruteblock: Latest patch (from bug id 194381 2014-10-15) breaks i386 compatibility Date: Tue, 07 Apr 2015 12:16:08 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Ports & Packages X-Bugzilla-Component: Individual Port(s) X-Bugzilla-Version: Latest X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Many People X-Bugzilla-Who: fesse@mail.ru X-Bugzilla-Status: New X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: amdmi3@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: maintainer-feedback? X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter flagtypes.name Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 07 Apr 2015 12:16:08 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=199263 Bug ID: 199263 Summary: security/bruteblock: Latest patch (from bug id 194381 2014-10-15) breaks i386 compatibility Product: Ports & Packages Version: Latest Hardware: i386 OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: amdmi3@FreeBSD.org Reporter: fesse@mail.ru Assignee: amdmi3@FreeBSD.org Flags: maintainer-feedback?(amdmi3@FreeBSD.org) Latest patch from BugId 194381 breaks i386 compatibility. IPFW on i386 needs 32-bit values to be used as optional table field (used to store time), but patched version introduces 'long long', and ipfw table entry timeout goes to far far future, prevents them to be removed by bruteblockd. Without patching 'bruteblock.c' port works well. I think patching 'bruteblock.c' should not be done on i386. May be conditional Makefile? -- You are receiving this mail because: You are the assignee for the bug.