[Dnsmasq-discuss] dnsmasq-2.56 - the start of the process.

Jan Seiffert kaffeemonster at googlemail.com
Wed Jan 12 22:30:37 GMT 2011


2011/1/12 Simon Kelley <simon at thekelleys.org.uk>:
> It's six months since the last stable release of dnsmasq, and quite a
> lot of work has accumulated since, so I'm starting to work towards the
> release version of version 2.56.
>
> Hence I've made available
>
> http://www.thekelleys.org.uk/dnsmasq/release-candidates/dnsmasq-2.56rc1.tar.gz
>
> Please could everyone who can, try this out and report any problems.

Looks like HAVE_BROKEN_RTC is broken since test19 or something like that:

=== modified file 'src/cache.c'
--- src/cache.c 2011-01-12 22:23:35 +0000
+++ src/cache.c 2011-01-12 22:26:25 +0000
@@ -1109,7 +1109,7 @@
                         cache->flags & F_NXDOMAIN ? "X" : " ",
                         cache->flags & F_HOSTS ? "H" : " ");
 #ifdef HAVE_BROKEN_RTC
-f          p += sprintf(p, "%lu", cache->flags & F_IMMORTAL ? 0:
(unsigned long)(cache->ttd - now));
+           p += sprintf(p, "%lu", cache->flags & F_IMMORTAL ? 0:
(unsigned long)(cache->ttd - now));
 #else
            p += sprintf(p, "%s", cache->flags & F_IMMORTAL ? "\n" :
ctime(&(cache->ttd)));
            /* ctime includes trailing \n - eat it */


And since gmail eats patches: there is a stray 'f' in cache.c under
ifdef HAVE_BROKEN_RTC

Greetings
Jan


-- 
Murphy's Law of Combat
Rule #3: "Never forget that your weapon was manufactured by the
lowest bidder"



More information about the Dnsmasq-discuss mailing list