aboutsummaryrefslogtreecommitdiffstats
path: root/net/ipv4/tcp_input.c
diff options
context:
space:
mode:
authorStephen Hemminger <shemminger@linux-foundation.org>2007-10-09 04:59:42 -0400
committerDavid S. Miller <davem@sunset.davemloft.net>2007-10-10 19:54:48 -0400
commitcfcabdcc2d5a810208e5bb3974121b7ed60119aa (patch)
tree1aed711eeecc5a303b57f1fc47e1b5746e8a72c2 /net/ipv4/tcp_input.c
parentde83c058af25aa97ed4864abab11e90e8dead6e2 (diff)
[NET]: sparse warning fixes
Fix a bunch of sparse warnings. Mostly about 0 used as NULL pointer, and shadowed variable declarations. One notable case was that hash size should have been unsigned. Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.org> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv4/tcp_input.c')
-rw-r--r--net/ipv4/tcp_input.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c
index 4268cd13ff9a..e8c39488cf58 100644
--- a/net/ipv4/tcp_input.c
+++ b/net/ipv4/tcp_input.c
@@ -2704,7 +2704,7 @@ static int tcp_clean_rtx_queue(struct sock *sk, s32 *seq_rtt_p)
2704 BUG_TRAP((int)tp->lost_out >= 0); 2704 BUG_TRAP((int)tp->lost_out >= 0);
2705 BUG_TRAP((int)tp->retrans_out >= 0); 2705 BUG_TRAP((int)tp->retrans_out >= 0);
2706 if (!tp->packets_out && tcp_is_sack(tp)) { 2706 if (!tp->packets_out && tcp_is_sack(tp)) {
2707 const struct inet_connection_sock *icsk = inet_csk(sk); 2707 icsk = inet_csk(sk);
2708 if (tp->lost_out) { 2708 if (tp->lost_out) {
2709 printk(KERN_DEBUG "Leak l=%u %d\n", 2709 printk(KERN_DEBUG "Leak l=%u %d\n",
2710 tp->lost_out, icsk->icsk_ca_state); 2710 tp->lost_out, icsk->icsk_ca_state);