From: Gert Doering Date: Mon, 11 Mar 2013 20:03:20 +0000 (+0100) Subject: Repair "tcp server queue overflow" brokenness, more fallout. X-Git-Tag: v2.4_alpha1~595 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=0eb398501fab9c016b9b6008682c43873c4a6188;p=thirdparty%2Fopenvpn.git Repair "tcp server queue overflow" brokenness, more fallout. Return value of mbuf_len() wrong - it's returning a length value, not a yes/no value - so when the queue length approached 65 (full!), it still only returned "1", leading to MBUF overflow later on. Change from "bool" to "unsigned int", misbehaviour gone... This fixes OpenVPN trac ticket #263. Signed-off-by: Gert Doering Acked-by: Arne Schwabe Acked-by: Peter Caprioli Message-Id: <20130312100706.GN953@greenie.muc.de> URL: http://article.gmane.org/gmane.network.openvpn.devel/7396 Signed-off-by: Gert Doering --- diff --git a/src/openvpn/mbuf.h b/src/openvpn/mbuf.h index a0de679d0..1085adc7c 100644 --- a/src/openvpn/mbuf.h +++ b/src/openvpn/mbuf.h @@ -83,7 +83,7 @@ mbuf_defined (const struct mbuf_set *ms) return ms && ms->len; } -static inline bool +static inline unsigned int mbuf_len (const struct mbuf_set *ms) { return ms->len;