Module Name:    src
Committed By:   matt
Date:           Sat Feb 19 02:22:27 UTC 2011

Modified Files:
        src/sys/net: bpf_filter.c

Log Message:
Use __CTASSERT


To generate a diff of this commit:
cvs rdiff -u -r1.42 -r1.43 src/sys/net/bpf_filter.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/net/bpf_filter.c
diff -u src/sys/net/bpf_filter.c:1.42 src/sys/net/bpf_filter.c:1.43
--- src/sys/net/bpf_filter.c:1.42	Sat Feb 19 01:12:39 2011
+++ src/sys/net/bpf_filter.c	Sat Feb 19 02:22:27 2011
@@ -1,4 +1,4 @@
-/*	$NetBSD: bpf_filter.c,v 1.42 2011/02/19 01:12:39 christos Exp $	*/
+/*	$NetBSD: bpf_filter.c,v 1.43 2011/02/19 02:22:27 matt Exp $	*/
 
 /*-
  * Copyright (c) 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
@@ -37,7 +37,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: bpf_filter.c,v 1.42 2011/02/19 01:12:39 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: bpf_filter.c,v 1.43 2011/02/19 02:22:27 matt Exp $");
 
 #if 0
 #if !(defined(lint) || defined(KERNEL))
@@ -461,7 +461,7 @@
  * The kernel needs to be able to verify an application's filter code.
  * Otherwise, a bogus program could easily crash the system.
  */
-CTASSERT(BPF_MEMWORDS == sizeof(uint16_t) * NBBY);
+__CTASSERT(BPF_MEMWORDS == sizeof(uint16_t) * NBBY);
 
 int
 bpf_validate(const struct bpf_insn *f, int signed_len)

Reply via email to