patch-2.1.53 linux/net/ipv4/ip_fragment.c
Next file: linux/net/ipv4/ip_output.c
Previous file: linux/net/ipv4/icmp.c
Back to the patch index
Back to the overall index
- Lines: 39
- Date:
Thu Sep 4 15:42:20 1997
- Orig file:
v2.1.52/linux/net/ipv4/ip_fragment.c
- Orig date:
Mon Aug 4 16:25:41 1997
diff -u --recursive --new-file v2.1.52/linux/net/ipv4/ip_fragment.c linux/net/ipv4/ip_fragment.c
@@ -5,7 +5,7 @@
*
* The IP fragmentation functionality.
*
- * Version: $Id: ip_fragment.c,v 1.23 1997/05/31 12:36:35 freitag Exp $
+ * Version: $Id: ip_fragment.c,v 1.25 1997/08/17 05:56:07 freitag Exp $
*
* Authors: Fred N. van Kempen <waltje@uWalt.NL.Mugnet.ORG>
* Alan Cox <Alan.Cox@linux.org>
@@ -313,8 +313,8 @@
len = qp->ihlen + qp->len;
if(len>65535) {
- printk(KERN_INFO "Oversized IP packet from %s.\n",
- in_ntoa(qp->iph->saddr));
+ printk(KERN_INFO "Oversized IP packet from %I.\n",
+ &qp->iph->saddr);
ip_statistics.IpReasmFails++;
ip_free(qp);
return NULL;
@@ -360,7 +360,6 @@
skb->pkt_type = qp->fragments->skb->pkt_type;
skb->protocol = qp->fragments->skb->protocol;
-
/* We glued together all fragments, so remove the queue entry. */
ip_free(qp);
@@ -437,8 +436,8 @@
/* Attempt to construct an oversize packet. */
if(ntohs(iph->tot_len)+(int)offset>65535) {
- printk(KERN_INFO "Oversized packet received from %s\n",
- in_ntoa(iph->saddr));
+ printk(KERN_INFO "Oversized packet received from %I\n",
+ &iph->saddr);
frag_kfree_skb(skb, FREE_READ);
ip_statistics.IpReasmFails++;
return NULL;
FUNET's LINUX-ADM group, linux-adm@nic.funet.fi
TCL-scripts by Sam Shen, slshen@lbl.gov