patch-2.1.53 linux/net/ipv4/ip_fragment.c

Next file: linux/net/ipv4/ip_output.c
Previous file: linux/net/ipv4/icmp.c
Back to the patch index
Back to the overall index

diff -u --recursive --new-file v2.1.52/linux/net/ipv4/ip_fragment.c linux/net/ipv4/ip_fragment.c
@@ -5,7 +5,7 @@
  *
  *		The IP fragmentation functionality.
  *		
- * Version:	$Id: ip_fragment.c,v 1.23 1997/05/31 12:36:35 freitag Exp $
+ * Version:	$Id: ip_fragment.c,v 1.25 1997/08/17 05:56:07 freitag Exp $
  *
  * Authors:	Fred N. van Kempen <waltje@uWalt.NL.Mugnet.ORG>
  *		Alan Cox <Alan.Cox@linux.org>
@@ -313,8 +313,8 @@
 	len = qp->ihlen + qp->len;
 	
 	if(len>65535) {
-		printk(KERN_INFO "Oversized IP packet from %s.\n",
-		       in_ntoa(qp->iph->saddr));
+		printk(KERN_INFO "Oversized IP packet from %I.\n", 
+		       &qp->iph->saddr);
 		ip_statistics.IpReasmFails++;
 		ip_free(qp);
 		return NULL;
@@ -360,7 +360,6 @@
 
 	skb->pkt_type = qp->fragments->skb->pkt_type;
 	skb->protocol = qp->fragments->skb->protocol;
-
 	/* We glued together all fragments, so remove the queue entry. */
 	ip_free(qp);
 
@@ -437,8 +436,8 @@
 	
 	/* Attempt to construct an oversize packet. */
 	if(ntohs(iph->tot_len)+(int)offset>65535) {
-		printk(KERN_INFO "Oversized packet received from %s\n",
-		       in_ntoa(iph->saddr));
+		printk(KERN_INFO "Oversized packet received from %I\n",
+		       &iph->saddr);
 		frag_kfree_skb(skb, FREE_READ);
 		ip_statistics.IpReasmFails++;
 		return NULL;

FUNET's LINUX-ADM group, linux-adm@nic.funet.fi
TCL-scripts by Sam Shen, slshen@lbl.gov