similar to: [Bug 474] New: nf_conntrack marks all packets as INVALID on sparc64 (probably endianness bug)

Displaying 20 results from an estimated 7000 matches similar to: "[Bug 474] New: nf_conntrack marks all packets as INVALID on sparc64 (probably endianness bug)"

2006 May 11
5
[Bug 474] nf_conntrack marks all packets as INVALID on sparc64 (probably endianness bug)
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=474 jan.oravec@6com.sk changed: What |Removed |Added ---------------------------------------------------------------------------- OS/Version|All |Gentoo Platform|All |sparc64 ------- Additional Comments From jan.oravec@6com.sk
2007 Jan 07
0
[Bug 529] New: OOPS in nf_conntrack_ipv6 with fragmented UDPv6
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=529 Summary: OOPS in nf_conntrack_ipv6 with fragmented UDPv6 Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: critical Priority: P2 Component: nf_conntrack AssignedTo:
2007 Jan 09
0
[Bug 530] New: loading nf_nat verision of the iptable_nat module kills existing connections
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=530 Summary: loading nf_nat verision of the iptable_nat module kills existing connections Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component:
2006 Dec 22
0
[ADMINISTRATIVE] bugzilla.netfilter.org running again
Hi! After bugzilla.netfilter.org went down on October 24 due to mysql database corruption during a system update, I have now finally found some spare time to investigate and fix the problem. I'm deeply sorry that it has taken that long, but my time to spend on netfilter is close to zero at this point (will increase in Q1/2007!) I'd like to also use this opportunity to thank the active
2003 Aug 19
0
[Bug 108] strange text response for illegal ipv6 ip numbers in rules
https://bugzilla.netfilter.org/cgi-bin/bugzilla/show_bug.cgi?id=108 laforge@netfilter.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WORKSFORME ------- Additional Comments From
2003 Nov 02
0
[ANNOUNCE] Release of iptables-1.2.9
--5uhzMJlTksuFv+PE Content-Type: multipart/mixed; boundary="9A1A73/U17WN0PFw" Content-Disposition: inline --9A1A73/U17WN0PFw Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Hi! The netfilter coreteam proudly presents: iptables version 1.2.9 1.2.9 is (like most other 1.2.x releases) a maintainance release,
2014 Dec 12
2
[Bug 991] New: Exactly after 24h of uptime system hungs
https://bugzilla.netfilter.org/show_bug.cgi?id=991 Bug ID: 991 Summary: Exactly after 24h of uptime system hungs Product: netfilter/iptables Version: unspecified Hardware: sparc64 OS: Debian GNU/Linux Status: NEW Severity: blocker Priority: P5 Component: ip_tables (kernel)
2007 Jul 11
3
[ANNOUNCE] iproute2 2.6.22-070710
This is an update to iproute2 utilities including bug fixes and features related to 2.6.22 kernel. This package tries to be source compatible across releases. The same source should build on older systems, but obviously the newer kernel features won''t be available. It can be downloaded from: http://developer.osdl.org/dev/iproute2/download/iproute2-2.6.22-070710.tar.gz Repository:
2006 Sep 14
5
[Bug 508] ip6tables conntrack marks all incoming packets as INVALID
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=508 ------- Additional Comments From kaber@trash.net 2006-09-14 13:18 MET ------- Did you enable nf_conntrack and the ipv6 connection tracking module? -- Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You reported the bug, or are watching the
2011 Jun 28
10
[Bug 726] New: Oops in nf_conntrack.
http://bugzilla.netfilter.org/show_bug.cgi?id=726 Summary: Oops in nf_conntrack. Product: netfilter/iptables Version: linux-2.6.x Platform: x86_64 OS/Version: Ubuntu Status: NEW Severity: critical Priority: P5 Component: ip_conntrack AssignedTo: netfilter-buglog at lists.netfilter.org
2013 Nov 20
1
[releng_10 tinderbox] failure on sparc64/sparc64
TB --- 2013-11-19 23:00:41 - tinderbox 2.20 running on worker01.tb.des.no TB --- 2013-11-19 23:00:41 - FreeBSD worker01.tb.des.no 9.1-RELEASE-p4 FreeBSD 9.1-RELEASE-p4 #0: Mon Jun 17 11:42:37 UTC 2013 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64 TB --- 2013-11-19 23:00:41 - starting RELENG_10 tinderbox run for sparc64/sparc64 TB --- 2013-11-19 23:00:41 - cleaning the
2006 Jun 26
0
[klibc 36/43] sparc64 support for klibc
The parts of klibc specific to the sparc64 architecture. Signed-off-by: H. Peter Anvin <hpa at zytor.com> --- commit f30fa3db62972125afa68d3b53d03cdb843d3bbd tree f2d942e281dce8bb98d4fa84b7e431c7beaddfc4 parent 1b5c93603ed3460ed1fba9e5d453a6fa54d0ccce author H. Peter Anvin <hpa at zytor.com> Sun, 25 Jun 2006 16:58:50 -0700 committer H. Peter Anvin <hpa at zytor.com> Sun, 25 Jun
2019 Nov 03
1
CentOS-8 not loading nf_conntrack module
Hi, On my CentOS-8 box firewalld will not start. It appears to be because the nf_conntrack module cannot be loaded. I saw on the net that a similar issue occurred on C7, but I couldn't find the solution. What is going wrong? Any ideas? Adrian -- Adri P. van Bloois "Elegance is not a dispensable luxury but a factor that decides between success and failure." Edsger W.
2008 Jul 29
1
[releng_7 tinderbox] failure on sparc64/sparc64
TB --- 2008-07-29 09:37:14 - tinderbox 2.3 running on freebsd-stable.sentex.ca TB --- 2008-07-29 09:37:14 - starting RELENG_7 tinderbox run for sparc64/sparc64 TB --- 2008-07-29 09:37:14 - cleaning the object tree TB --- 2008-07-29 09:37:32 - cvsupping the source tree TB --- 2008-07-29 09:37:32 - /usr/bin/csup -r 3 -g -L 1 -h localhost -s /tinderbox/RELENG_7/sparc64/sparc64/supfile TB ---
2008 Jun 03
0
[releng_6 tinderbox] failure on sparc64/sparc64
TB --- 2008-06-03 09:06:24 - tinderbox 2.3 running on freebsd-legacy.sentex.ca TB --- 2008-06-03 09:06:24 - starting RELENG_6 tinderbox run for sparc64/sparc64 TB --- 2008-06-03 09:06:24 - cleaning the object tree TB --- 2008-06-03 09:06:55 - cvsupping the source tree TB --- 2008-06-03 09:06:55 - /usr/bin/csup -r 3 -g -L 1 -h localhost -s /tinderbox/RELENG_6/sparc64/sparc64/supfile TB ---
2018 Feb 22
0
Auth SEGV on sparc64, alignment problem?
On Tue, Feb 20, 2018 at 19:08:27 -0500, Chris Ross wrote: > > Apologies first for using two addresses, but I can?t currently read my email at distal.com. :-) > > I was previously running dovecot2-2.2.29.1_2 on FreeBSD 11 on sparc64. > Trying to debug a problem I was having with one of my clients, I > upgraded to dovecot-2.2.33.2_4 on that same server. However, I
2012 Apr 08
0
[releng_9 tinderbox] failure on sparc64/sparc64
TB --- 2012-04-08 08:26:29 - tinderbox 2.9 running on freebsd-stable.sentex.ca TB --- 2012-04-08 08:26:29 - FreeBSD freebsd-stable.sentex.ca 8.2-STABLE FreeBSD 8.2-STABLE #4: Wed Sep 28 13:48:49 UTC 2011 mdtancsa@freebsd-stable.sentex.ca:/usr/obj/usr/src/sys/server amd64 TB --- 2012-04-08 08:26:29 - starting RELENG_9 tinderbox run for sparc64/sparc64 TB --- 2012-04-08 08:26:29 - cleaning the
2010 Apr 26
2
[LLVMdev] llvm for freebsd on sparc64
I am trying to build llvm on freebsd-8.0 on sparc64 CPU. I patched sources because 'sparc' enum value in include/llvm/ADT/Triple.h conflicts with gcc typedef 'sparc'. This allowed llvm itself to build successfully. But there is an error during gcc frontend compile: Did not get a target machine! Triplet is sparc64-unknown-freebsd8.0 I think this is because in many places, like in
2018 Feb 21
0
Auth SEGV on sparc64, alignment problem?
Your core dump looks a bit broken. Since it seems to die instantly, can you try gdb /path/to/auth and just run it? Aki On 21.02.2018 02:08, Chris Ross wrote: > Apologies first for using two addresses, but I can?t currently read my email at distal.com. :-) > > I was previously running dovecot2-2.2.29.1_2 on FreeBSD 11 on sparc64. Trying to debug a problem I was having with one of
2006 Jun 26
0
[klibc 16/43] sparc64: transmit arch-specific options to kinit via /arch.cmd
Sparc64 has support for a bunch of architecture-specific options taken from the PROM. Convert them to kernel command line form and write the file /arch.cmd in the rootfs, which can be recovered by kinit and processed. The kinit support has already been committed. Signed-off-by: H. Peter Anvin <hpa at zytor.com> --- commit c6e5c5a77681f5bf6f9fea55d031115e9f58ada6 tree