Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit 2444844c authored by Florian Westphal's avatar Florian Westphal Committed by David S. Miller
Browse files

[SCTP]: Replace char msg[] with static const char[].



133886    2004     220  136110   213ae sctp.new/sctp.o
134018    2004     220  136242   21432 sctp.old/sctp.o

Signed-off-by: default avatarFlorian Westphal <fw@strlen.de>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 3d3b2d25
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -1782,7 +1782,7 @@ static int sctp_process_inv_paramlength(const struct sctp_association *asoc,
					const struct sctp_chunk *chunk,
					struct sctp_chunk **errp)
{
	char		error[] = "The following parameter had invalid length:";
	static const char error[] = "The following parameter had invalid length:";
	size_t		payload_len = WORD_ROUND(sizeof(error)) +
						sizeof(sctp_paramhdr_t);

+4 −4
Original line number Diff line number Diff line
@@ -4219,7 +4219,7 @@ static sctp_disposition_t sctp_sf_violation_chunklen(
				     void *arg,
				     sctp_cmd_seq_t *commands)
{
	char err_str[]="The following chunk had invalid length:";
	static const char err_str[]="The following chunk had invalid length:";

	return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str,
					sizeof(err_str));
@@ -4236,7 +4236,7 @@ static sctp_disposition_t sctp_sf_violation_paramlen(
				     const sctp_subtype_t type,
				     void *arg,
				     sctp_cmd_seq_t *commands) {
	char err_str[] = "The following parameter had invalid length:";
	static const char err_str[] = "The following parameter had invalid length:";

	return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str,
					sizeof(err_str));
@@ -4255,7 +4255,7 @@ static sctp_disposition_t sctp_sf_violation_ctsn(
				     void *arg,
				     sctp_cmd_seq_t *commands)
{
	char err_str[]="The cumulative tsn ack beyond the max tsn currently sent:";
	static const char err_str[]="The cumulative tsn ack beyond the max tsn currently sent:";

	return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str,
					sizeof(err_str));
@@ -4274,7 +4274,7 @@ static sctp_disposition_t sctp_sf_violation_chunk(
				     void *arg,
				     sctp_cmd_seq_t *commands)
{
	char err_str[]="The following chunk violates protocol:";
	static const char err_str[]="The following chunk violates protocol:";

	if (!asoc)
		return sctp_sf_violation(ep, asoc, type, arg, commands);