|
@@ -4219,7 +4219,7 @@ static sctp_disposition_t sctp_sf_violation_chunklen(
|
|
|
void *arg,
|
|
|
sctp_cmd_seq_t *commands)
|
|
|
{
|
|
|
- char err_str[]="The following chunk had invalid length:";
|
|
|
+ static const char err_str[]="The following chunk had invalid length:";
|
|
|
|
|
|
return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str,
|
|
|
sizeof(err_str));
|
|
@@ -4236,7 +4236,7 @@ static sctp_disposition_t sctp_sf_violation_paramlen(
|
|
|
const sctp_subtype_t type,
|
|
|
void *arg,
|
|
|
sctp_cmd_seq_t *commands) {
|
|
|
- char err_str[] = "The following parameter had invalid length:";
|
|
|
+ static const char err_str[] = "The following parameter had invalid length:";
|
|
|
|
|
|
return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str,
|
|
|
sizeof(err_str));
|
|
@@ -4255,7 +4255,7 @@ static sctp_disposition_t sctp_sf_violation_ctsn(
|
|
|
void *arg,
|
|
|
sctp_cmd_seq_t *commands)
|
|
|
{
|
|
|
- char err_str[]="The cumulative tsn ack beyond the max tsn currently sent:";
|
|
|
+ static const char err_str[]="The cumulative tsn ack beyond the max tsn currently sent:";
|
|
|
|
|
|
return sctp_sf_abort_violation(ep, asoc, arg, commands, err_str,
|
|
|
sizeof(err_str));
|
|
@@ -4274,7 +4274,7 @@ static sctp_disposition_t sctp_sf_violation_chunk(
|
|
|
void *arg,
|
|
|
sctp_cmd_seq_t *commands)
|
|
|
{
|
|
|
- char err_str[]="The following chunk violates protocol:";
|
|
|
+ static const char err_str[]="The following chunk violates protocol:";
|
|
|
|
|
|
if (!asoc)
|
|
|
return sctp_sf_violation(ep, asoc, type, arg, commands);
|