Displaying 20 results from an estimated 7000 matches similar to: "[Bug 474] New: nf_conntrack marks all packets as INVALID on sparc64 (probably endianness bug)"
2006 May 11
5
[Bug 474] nf_conntrack marks all packets as INVALID on sparc64 (probably endianness bug)
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=474
jan.oravec@6com.sk changed:
What |Removed |Added
----------------------------------------------------------------------------
OS/Version|All |Gentoo
Platform|All |sparc64
------- Additional Comments From jan.oravec@6com.sk
2007 Jan 07
0
[Bug 529] New: OOPS in nf_conntrack_ipv6 with fragmented UDPv6
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=529
Summary: OOPS in nf_conntrack_ipv6 with fragmented UDPv6
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: All
Status: NEW
Severity: critical
Priority: P2
Component: nf_conntrack
AssignedTo:
2007 Jan 09
0
[Bug 530] New: loading nf_nat verision of the iptable_nat module kills existing connections
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=530
Summary: loading nf_nat verision of the iptable_nat module kills
existing connections
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component:
2006 Dec 22
0
[ADMINISTRATIVE] bugzilla.netfilter.org running again
Hi!
After bugzilla.netfilter.org went down on October 24 due to mysql
database corruption during a system update, I have now finally found
some spare time to investigate and fix the problem.
I'm deeply sorry that it has taken that long, but my time to spend on
netfilter is close to zero at this point (will increase in Q1/2007!)
I'd like to also use this opportunity to thank the active
2003 Aug 19
0
[Bug 108] strange text response for illegal ipv6 ip numbers in rules
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=108
laforge@netfilter.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WORKSFORME
------- Additional Comments From
2003 Nov 02
0
[ANNOUNCE] Release of iptables-1.2.9
--5uhzMJlTksuFv+PE
Content-Type: multipart/mixed; boundary="9A1A73/U17WN0PFw"
Content-Disposition: inline
--9A1A73/U17WN0PFw
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Hi!
The netfilter coreteam proudly presents:
iptables version 1.2.9
1.2.9 is (like most other 1.2.x releases) a maintainance release,
2014 Dec 12
2
[Bug 991] New: Exactly after 24h of uptime system hungs
https://bugzilla.netfilter.org/show_bug.cgi?id=991
Bug ID: 991
Summary: Exactly after 24h of uptime system hungs
Product: netfilter/iptables
Version: unspecified
Hardware: sparc64
OS: Debian GNU/Linux
Status: NEW
Severity: blocker
Priority: P5
Component: ip_tables (kernel)
2007 Jul 11
3
[ANNOUNCE] iproute2 2.6.22-070710
This is an update to iproute2 utilities including bug fixes and features
related to 2.6.22 kernel.
This package tries to be source compatible across releases.
The same source should build on older systems, but obviously the
newer kernel features won''t be available.
It can be downloaded from:
http://developer.osdl.org/dev/iproute2/download/iproute2-2.6.22-070710.tar.gz
Repository:
2006 Sep 14
5
[Bug 508] ip6tables conntrack marks all incoming packets as INVALID
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=508
------- Additional Comments From kaber@trash.net 2006-09-14 13:18 MET -------
Did you enable nf_conntrack and the ipv6 connection tracking module?
--
Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You reported the bug, or are watching the
2011 Jun 28
10
[Bug 726] New: Oops in nf_conntrack.
http://bugzilla.netfilter.org/show_bug.cgi?id=726
Summary: Oops in nf_conntrack.
Product: netfilter/iptables
Version: linux-2.6.x
Platform: x86_64
OS/Version: Ubuntu
Status: NEW
Severity: critical
Priority: P5
Component: ip_conntrack
AssignedTo: netfilter-buglog at lists.netfilter.org
2013 Nov 20
1
[releng_10 tinderbox] failure on sparc64/sparc64
TB --- 2013-11-19 23:00:41 - tinderbox 2.20 running on worker01.tb.des.no
TB --- 2013-11-19 23:00:41 - FreeBSD worker01.tb.des.no 9.1-RELEASE-p4 FreeBSD 9.1-RELEASE-p4 #0: Mon Jun 17 11:42:37 UTC 2013 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64
TB --- 2013-11-19 23:00:41 - starting RELENG_10 tinderbox run for sparc64/sparc64
TB --- 2013-11-19 23:00:41 - cleaning the
2006 Jun 26
0
[klibc 36/43] sparc64 support for klibc
The parts of klibc specific to the sparc64 architecture.
Signed-off-by: H. Peter Anvin <hpa at zytor.com>
---
commit f30fa3db62972125afa68d3b53d03cdb843d3bbd
tree f2d942e281dce8bb98d4fa84b7e431c7beaddfc4
parent 1b5c93603ed3460ed1fba9e5d453a6fa54d0ccce
author H. Peter Anvin <hpa at zytor.com> Sun, 25 Jun 2006 16:58:50 -0700
committer H. Peter Anvin <hpa at zytor.com> Sun, 25 Jun
2019 Nov 03
1
CentOS-8 not loading nf_conntrack module
Hi,
On my CentOS-8 box firewalld will not start. It appears to be because the
nf_conntrack module cannot be loaded.
I saw on the net that a similar issue occurred on C7, but I couldn't find
the solution.
What is going wrong? Any ideas?
Adrian
--
Adri P. van Bloois
"Elegance is not a dispensable luxury but a factor that decides between
success and failure."
Edsger W.
2008 Jul 29
1
[releng_7 tinderbox] failure on sparc64/sparc64
TB --- 2008-07-29 09:37:14 - tinderbox 2.3 running on freebsd-stable.sentex.ca
TB --- 2008-07-29 09:37:14 - starting RELENG_7 tinderbox run for sparc64/sparc64
TB --- 2008-07-29 09:37:14 - cleaning the object tree
TB --- 2008-07-29 09:37:32 - cvsupping the source tree
TB --- 2008-07-29 09:37:32 - /usr/bin/csup -r 3 -g -L 1 -h localhost -s /tinderbox/RELENG_7/sparc64/sparc64/supfile
TB ---
2008 Jun 03
0
[releng_6 tinderbox] failure on sparc64/sparc64
TB --- 2008-06-03 09:06:24 - tinderbox 2.3 running on freebsd-legacy.sentex.ca
TB --- 2008-06-03 09:06:24 - starting RELENG_6 tinderbox run for sparc64/sparc64
TB --- 2008-06-03 09:06:24 - cleaning the object tree
TB --- 2008-06-03 09:06:55 - cvsupping the source tree
TB --- 2008-06-03 09:06:55 - /usr/bin/csup -r 3 -g -L 1 -h localhost -s /tinderbox/RELENG_6/sparc64/sparc64/supfile
TB ---
2018 Feb 22
0
Auth SEGV on sparc64, alignment problem?
On Tue, Feb 20, 2018 at 19:08:27 -0500, Chris Ross wrote:
>
> Apologies first for using two addresses, but I can?t currently read my email at distal.com. :-)
>
> I was previously running dovecot2-2.2.29.1_2 on FreeBSD 11 on sparc64.
> Trying to debug a problem I was having with one of my clients, I
> upgraded to dovecot-2.2.33.2_4 on that same server. However, I
2012 Apr 08
0
[releng_9 tinderbox] failure on sparc64/sparc64
TB --- 2012-04-08 08:26:29 - tinderbox 2.9 running on freebsd-stable.sentex.ca
TB --- 2012-04-08 08:26:29 - FreeBSD freebsd-stable.sentex.ca 8.2-STABLE FreeBSD 8.2-STABLE #4: Wed Sep 28 13:48:49 UTC 2011 mdtancsa@freebsd-stable.sentex.ca:/usr/obj/usr/src/sys/server amd64
TB --- 2012-04-08 08:26:29 - starting RELENG_9 tinderbox run for sparc64/sparc64
TB --- 2012-04-08 08:26:29 - cleaning the
2010 Apr 26
2
[LLVMdev] llvm for freebsd on sparc64
I am trying to build llvm on freebsd-8.0 on sparc64 CPU.
I patched sources because 'sparc' enum value in
include/llvm/ADT/Triple.h conflicts with gcc typedef 'sparc'.
This allowed llvm itself to build successfully.
But there is an error during gcc frontend compile:
Did not get a target machine! Triplet is sparc64-unknown-freebsd8.0
I think this is because in many places, like in
2018 Feb 21
0
Auth SEGV on sparc64, alignment problem?
Your core dump looks a bit broken. Since it seems to die instantly, can
you try gdb /path/to/auth and just run it?
Aki
On 21.02.2018 02:08, Chris Ross wrote:
> Apologies first for using two addresses, but I can?t currently read my email at distal.com. :-)
>
> I was previously running dovecot2-2.2.29.1_2 on FreeBSD 11 on sparc64. Trying to debug a problem I was having with one of
2006 Jun 26
0
[klibc 16/43] sparc64: transmit arch-specific options to kinit via /arch.cmd
Sparc64 has support for a bunch of architecture-specific options
taken from the PROM. Convert them to kernel command line form and
write the file /arch.cmd in the rootfs, which can be recovered by
kinit and processed. The kinit support has already been committed.
Signed-off-by: H. Peter Anvin <hpa at zytor.com>
---
commit c6e5c5a77681f5bf6f9fea55d031115e9f58ada6
tree