From e7aa25d215a9d4baa95643f2d19e44036e57af72 Mon Sep 17 00:00:00 2001 From: Ben Kaduk Date: Wed, 27 Jun 2012 16:00:16 -0400 Subject: Use consistent types for overflow comparison Unsigned long might not be 32-bits, in which case the overflow check fails for a 32-bit kdb_sno_t. Cast from -1 explicitly as a more robust check. --- src/lib/kdb/kdb_log.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'src/lib/kdb/kdb_log.c') diff --git a/src/lib/kdb/kdb_log.c b/src/lib/kdb/kdb_log.c index 625c71a3ee..0153375ea7 100644 --- a/src/lib/kdb/kdb_log.c +++ b/src/lib/kdb/kdb_log.c @@ -204,7 +204,7 @@ ulog_add_update(krb5_context context, kdb_incr_update_t *upd) * We need to overflow our sno, replicas will do full * resyncs once they see their sno > than the masters. */ - if (cur_sno == ULONG_MAX) + if (cur_sno == (kdb_sno_t)-1) cur_sno = 1; else cur_sno++; -- cgit