[Dnsmasq-discuss] dnsmasq-2.56 - the start of the process.
Jan Seiffert
kaffeemonster at googlemail.com
Wed Jan 12 22:30:37 GMT 2011
2011/1/12 Simon Kelley <simon at thekelleys.org.uk>:
> It's six months since the last stable release of dnsmasq, and quite a
> lot of work has accumulated since, so I'm starting to work towards the
> release version of version 2.56.
>
> Hence I've made available
>
> http://www.thekelleys.org.uk/dnsmasq/release-candidates/dnsmasq-2.56rc1.tar.gz
>
> Please could everyone who can, try this out and report any problems.
Looks like HAVE_BROKEN_RTC is broken since test19 or something like that:
=== modified file 'src/cache.c'
--- src/cache.c 2011-01-12 22:23:35 +0000
+++ src/cache.c 2011-01-12 22:26:25 +0000
@@ -1109,7 +1109,7 @@
cache->flags & F_NXDOMAIN ? "X" : " ",
cache->flags & F_HOSTS ? "H" : " ");
#ifdef HAVE_BROKEN_RTC
-f p += sprintf(p, "%lu", cache->flags & F_IMMORTAL ? 0:
(unsigned long)(cache->ttd - now));
+ p += sprintf(p, "%lu", cache->flags & F_IMMORTAL ? 0:
(unsigned long)(cache->ttd - now));
#else
p += sprintf(p, "%s", cache->flags & F_IMMORTAL ? "\n" :
ctime(&(cache->ttd)));
/* ctime includes trailing \n - eat it */
And since gmail eats patches: there is a stray 'f' in cache.c under
ifdef HAVE_BROKEN_RTC
Greetings
Jan
--
Murphy's Law of Combat
Rule #3: "Never forget that your weapon was manufactured by the
lowest bidder"
More information about the Dnsmasq-discuss
mailing list