Commit 2444844c authored by Florian Westphal's avatar Florian Westphal Committed by David S. Miller

[SCTP]: Replace char msg[] with static const char[].

133886    2004     220  136110   213ae sctp.new/sctp.o
134018    2004     220  136242   21432 sctp.old/sctp.o
Signed-off-by: default avatarFlorian Westphal <fw@strlen.de>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 3d3b2d25
...@@ -1782,7 +1782,7 @@ static int sctp_process_inv_paramlength(const struct sctp_association *asoc, ...@@ -1782,7 +1782,7 @@ static int sctp_process_inv_paramlength(const struct sctp_association *asoc,
const struct sctp_chunk *chunk, const struct sctp_chunk *chunk,
struct sctp_chunk **errp) struct sctp_chunk **errp)
{ {
char error[] = "The following parameter had invalid length:"; static const char error[] = "The following parameter had invalid length:";
size_t payload_len = WORD_ROUND(sizeof(error)) + size_t payload_len = WORD_ROUND(sizeof(error)) +
sizeof(sctp_paramhdr_t); sizeof(sctp_paramhdr_t);
......
...@@ -4219,7 +4219,7 @@ static sctp_disposition_t sctp_sf_violation_chunklen( ...@@ -4219,7 +4219,7 @@ static sctp_disposition_t sctp_sf_violation_chunklen(
void *arg, void *arg,
sctp_cmd_seq_t *commands) sctp_cmd_seq_t *commands)
{ {
char err_str[]="The following chunk had invalid length:"; static const char err_str[]="The following chunk had invalid length:";
return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str, return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str,
sizeof(err_str)); sizeof(err_str));
...@@ -4236,7 +4236,7 @@ static sctp_disposition_t sctp_sf_violation_paramlen( ...@@ -4236,7 +4236,7 @@ static sctp_disposition_t sctp_sf_violation_paramlen(
const sctp_subtype_t type, const sctp_subtype_t type,
void *arg, void *arg,
sctp_cmd_seq_t *commands) { sctp_cmd_seq_t *commands) {
char err_str[] = "The following parameter had invalid length:"; static const char err_str[] = "The following parameter had invalid length:";
return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str, return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str,
sizeof(err_str)); sizeof(err_str));
...@@ -4255,7 +4255,7 @@ static sctp_disposition_t sctp_sf_violation_ctsn( ...@@ -4255,7 +4255,7 @@ static sctp_disposition_t sctp_sf_violation_ctsn(
void *arg, void *arg,
sctp_cmd_seq_t *commands) sctp_cmd_seq_t *commands)
{ {
char err_str[]="The cumulative tsn ack beyond the max tsn currently sent:"; static const char err_str[]="The cumulative tsn ack beyond the max tsn currently sent:";
return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str, return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str,
sizeof(err_str)); sizeof(err_str));
...@@ -4274,7 +4274,7 @@ static sctp_disposition_t sctp_sf_violation_chunk( ...@@ -4274,7 +4274,7 @@ static sctp_disposition_t sctp_sf_violation_chunk(
void *arg, void *arg,
sctp_cmd_seq_t *commands) sctp_cmd_seq_t *commands)
{ {
char err_str[]="The following chunk violates protocol:"; static const char err_str[]="The following chunk violates protocol:";
if (!asoc) if (!asoc)
return sctp_sf_violation(ep, asoc, type, arg, commands); return sctp_sf_violation(ep, asoc, type, arg, commands);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment