From 7e0bbcf238961e33bf2325f435a32d3c58f6f450 Mon Sep 17 00:00:00 2001 From: gallatin Date: Sun, 27 Jan 2002 20:39:01 +0000 Subject: Prevent the kernel from generating an unaligned sysctl data buffer on 64-bit platforms. The unaligned access is caused by struct ifa_msghdr not being a multiple of 8-bytes in size. If an interface has an odd number of addresses, this causes the next interface to generate an unaligned access in the user-level app walking the interfaces (ifconfig). Submitted by: Bernd Walter --- sys/net/rtsock.c | 1 + 1 file changed, 1 insertion(+) (limited to 'sys/net/rtsock.c') diff --git a/sys/net/rtsock.c b/sys/net/rtsock.c index 3ad9ee6..2a08540 100644 --- a/sys/net/rtsock.c +++ b/sys/net/rtsock.c @@ -679,6 +679,7 @@ again: } len += dlen; } + len = ALIGN(len); if (cp == 0 && w != NULL && !second_time) { register struct walkarg *rw = w; -- cgit v1.1