[netfilter-cvslog] r6282 -
trunk/patch-o-matic-ng/patchlets/osf/linux/net/ipv4/netfilter
kaber at netfilter.org
kaber at netfilter.org
Sun Nov 27 00:42:39 CET 2005
Author: kaber at netfilter.org
Date: 2005-11-27 00:42:38 +0100 (Sun, 27 Nov 2005)
New Revision: 6282
Modified:
trunk/patch-o-matic-ng/patchlets/osf/linux/net/ipv4/netfilter/ipt_osf.c
Log:
OSF: fix 2.4 compilation.
Bug found by Aleksey Barabanov <alekseybb mail.ru>.
Signed-off-by: Evgeniy Polyakov <johnpol at 2ka.mipt.ru>
Modified: trunk/patch-o-matic-ng/patchlets/osf/linux/net/ipv4/netfilter/ipt_osf.c
===================================================================
--- trunk/patch-o-matic-ng/patchlets/osf/linux/net/ipv4/netfilter/ipt_osf.c 2005-11-24 21:44:30 UTC (rev 6281)
+++ trunk/patch-o-matic-ng/patchlets/osf/linux/net/ipv4/netfilter/ipt_osf.c 2005-11-26 23:42:38 UTC (rev 6282)
@@ -183,11 +183,11 @@
_optp = optp = (char *)(tcp+1);
optsize = tcp->doff*4 - sizeof(struct tcphdr);
- if (optsize > sizeof(opts))
+ if (optsize > MAX_IPOPTLEN)
{
- log("%s: BUG: too big options size: optsize=%lu, max=%zu.\n",
- __func__, optsize, sizeof(opts));
- optsize = sizeof(opts);
+ log("%s: BUG: too big options size: optsize=%lu, max=%u.\n",
+ __func__, optsize, MAX_IPOPTLEN);
+ optsize = MAX_IPOPTLEN;
}
}
More information about the netfilter-cvslog
mailing list