cvs commit: src/sys/net if_spppsubr.c src/sys/netinet ip_fw2.c tcp_hostcache.c tcp_input.c src/sys/netinet6 frag6.c icmp6.c in6.c in6_gif.c in6_src.c in6_var.h ip6_forward.c ip6_input.c ip6_mroute.c ipsec.c mld6.c nd6.c nd6_nbr.c nd6_rtr.c scope6.c ...

Max Laier max at love2party.net
Tue Dec 12 05:40:30 PST 2006


On Tuesday 12 December 2006 13:17, Bjoern A. Zeeb wrote:
> bz          2006-12-12 12:17:58 UTC
>
>   FreeBSD src repository
>
>   Modified files:
>     sys/net              if_spppsubr.c
>     sys/netinet          ip_fw2.c tcp_hostcache.c tcp_input.c
>     sys/netinet6         frag6.c icmp6.c in6.c in6_gif.c in6_src.c
>                          in6_var.h ip6_forward.c ip6_input.c
>                          ip6_mroute.c ipsec.c mld6.c nd6.c
>                          nd6_nbr.c nd6_rtr.c scope6.c
>                          udp6_usrreq.c
>     sys/netipsec         ipsec.c ipsec_input.c
>     sys/nfsserver        nfs_syscalls.c
>   Log:
>   MFp4: 92972, 98913 + one more change
>
>   In ip6_sprintf no longer use and return one of eight static buffers
>   for printing/logging ipv6 addresses.
>   The caller now has to hand in a sufficiently large buffer as first
>   argument.

PR kern/104738 is in part concerned with this problem.  I'm still not 
entirely happy with throwing buffers on the stack like this.  Some parts 
of KAME exercise function nesting quite extensively - are we sure we 
don't overflow kernel stack space somewhere?  If we don't find any other 
possibility, I should follow up with the inet_ntoa changes, however.

>   Revision  Changes    Path
>   1.126     +10 -6     src/sys/net/if_spppsubr.c
>   1.155     +6 -4      src/sys/netinet/ip_fw2.c
>   1.11      +4 -1      src/sys/netinet/tcp_hostcache.c
>   1.311     +7 -3      src/sys/netinet/tcp_input.c
>   1.30      +5 -2      src/sys/netinet6/frag6.c
>   1.73      +18 -9     src/sys/netinet6/icmp6.c
>   1.66      +21 -20    src/sys/netinet6/in6.c
>   1.27      +2 -1      src/sys/netinet6/in6_gif.c
>   1.41      +4 -3      src/sys/netinet6/in6_src.c
>   1.30      +1 -1      src/sys/netinet6/in6_var.h
>   1.36      +7 -6      src/sys/netinet6/ip6_forward.c
>   1.89      +4 -2      src/sys/netinet6/ip6_input.c
>   1.39      +60 -38    src/sys/netinet6/ip6_mroute.c
>   1.48      +8 -4      src/sys/netinet6/ipsec.c
>   1.28      +3 -2      src/sys/netinet6/mld6.c
>   1.73      +12 -6     src/sys/netinet6/nd6.c
>   1.42      +35 -23    src/sys/netinet6/nd6_nbr.c
>   1.34      +47 -30    src/sys/netinet6/nd6_rtr.c
>   1.16      +2 -1      src/sys/netinet6/scope6.c
>   1.70      +6 -4      src/sys/netinet6/udp6_usrreq.c
>   1.19      +5 -1      src/sys/netipsec/ipsec.c
>   1.13      +10 -2     src/sys/netipsec/ipsec_input.c
>   1.109     +13 -9     src/sys/nfsserver/nfs_syscalls.c

-- 
/"\  Best regards,                      | mlaier at freebsd.org
\ /  Max Laier                          | ICQ #67774661
 X   http://pf4freebsd.love2party.net/  | mlaier at EFnet
/ \  ASCII Ribbon Campaign              | Against HTML Mail and News
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 187 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/cvs-src/attachments/20061212/a9a934b0/attachment.pgp


More information about the cvs-src mailing list