This patch corrects a problem with adding ERROR targets on architectures that don't align data structues, e.g. CRIS. Signed-off-by: Jesper Bengtsson <jesper.bengtsson@xxxxxxxx> --- Index: linux-2.6/include/linux/netfilter_ipv4/ip_tables.h =================================================================== RCS file: /usr/local/cvs/linux/os/linux-2.6/include/linux/netfilter_ipv4/ip_tables.h,v retrieving revision 1.19 diff -b -u -p -r1.19 ip_tables.h --- linux-2.6/include/linux/netfilter_ipv4/ip_tables.h 21 Aug 2008 08:40:42 -0000 1.19 +++ linux-2.6/include/linux/netfilter_ipv4/ip_tables.h 15 Oct 2008 12:55:31 -0000 @@ -259,7 +259,7 @@ struct ipt_standard struct ipt_error_target { struct ipt_entry_target target; - char errorname[IPT_FUNCTION_MAXNAMELEN]; + char errorname[IPT_TABLE_MAXNAMELEN]; }; struct ipt_error Index: linux-2.6/net/ipv4/netfilter/ip_tables.c =================================================================== RCS file: /usr/local/cvs/linux/os/linux-2.6/net/ipv4/netfilter/ip_tables.c,v retrieving revision 1.29 diff -b -u -p -r1.29 ip_tables.c --- linux-2.6/net/ipv4/netfilter/ip_tables.c 21 Aug 2008 08:41:02 -0000 1.29 +++ linux-2.6/net/ipv4/netfilter/ip_tables.c 15 Oct 2008 12:55:31 -0000 @@ -2184,7 +2184,7 @@ static struct xt_target ipt_standard_tar static struct xt_target ipt_error_target __read_mostly = { .name = IPT_ERROR_TARGET, .target = ipt_error, - .targetsize = IPT_FUNCTION_MAXNAMELEN, + .targetsize = IPT_TABLE_MAXNAMELEN, .family = AF_INET, }; -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html