Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/net Use __CTASSERT
details: https://anonhg.NetBSD.org/src/rev/03427edb127f
branches: trunk
changeset: 762309:03427edb127f
user: matt <matt%NetBSD.org@localhost>
date: Sat Feb 19 02:22:27 2011 +0000
description:
Use __CTASSERT
diffstat:
sys/net/bpf_filter.c | 6 +++---
1 files changed, 3 insertions(+), 3 deletions(-)
diffs (27 lines):
diff -r 215074e8975b -r 03427edb127f sys/net/bpf_filter.c
--- a/sys/net/bpf_filter.c Sat Feb 19 02:21:21 2011 +0000
+++ b/sys/net/bpf_filter.c Sat Feb 19 02:22:27 2011 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: bpf_filter.c,v 1.42 2011/02/19 01:12:39 christos Exp $ */
+/* $NetBSD: bpf_filter.c,v 1.43 2011/02/19 02:22:27 matt Exp $ */
/*-
* Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
@@ -37,7 +37,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: bpf_filter.c,v 1.42 2011/02/19 01:12:39 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: bpf_filter.c,v 1.43 2011/02/19 02:22:27 matt Exp $");
#if 0
#if !(defined(lint) || defined(KERNEL))
@@ -461,7 +461,7 @@
* The kernel needs to be able to verify an application's filter code.
* Otherwise, a bogus program could easily crash the system.
*/
-CTASSERT(BPF_MEMWORDS == sizeof(uint16_t) * NBBY);
+__CTASSERT(BPF_MEMWORDS == sizeof(uint16_t) * NBBY);
int
bpf_validate(const struct bpf_insn *f, int signed_len)
Home |
Main Index |
Thread Index |
Old Index