fib_semantics.c (ca787e0b935cdb45db1715f724d859683c5de297) | fib_semantics.c (872f690341948b502c93318f806d821c56772c42) |
---|---|
1// SPDX-License-Identifier: GPL-2.0-or-later 2/* 3 * INET An implementation of the TCP/IP protocol suite for the LINUX 4 * operating system. INET is implemented using the BSD Socket 5 * interface as the means of communication with the user level. 6 * 7 * IPv4 Forwarding Information Base: semantics. 8 * --- 959 unchanged lines hidden (view full) --- 968 continue; 969 if (type > RTAX_MAX) 970 return false; 971 972 if (type == RTAX_CC_ALGO) { 973 char tmp[TCP_CA_NAME_MAX]; 974 bool ecn_ca = false; 975 | 1// SPDX-License-Identifier: GPL-2.0-or-later 2/* 3 * INET An implementation of the TCP/IP protocol suite for the LINUX 4 * operating system. INET is implemented using the BSD Socket 5 * interface as the means of communication with the user level. 6 * 7 * IPv4 Forwarding Information Base: semantics. 8 * --- 959 unchanged lines hidden (view full) --- 968 continue; 969 if (type > RTAX_MAX) 970 return false; 971 972 if (type == RTAX_CC_ALGO) { 973 char tmp[TCP_CA_NAME_MAX]; 974 bool ecn_ca = false; 975 |
976 nla_strlcpy(tmp, nla, sizeof(tmp)); | 976 nla_strscpy(tmp, nla, sizeof(tmp)); |
977 val = tcp_ca_get_key_by_name(fi->fib_net, tmp, &ecn_ca); 978 } else { 979 if (nla_len(nla) != sizeof(u32)) 980 return false; 981 val = nla_get_u32(nla); 982 } 983 984 fi_val = fi->fib_metrics->metrics[type - 1]; --- 1245 unchanged lines hidden --- | 977 val = tcp_ca_get_key_by_name(fi->fib_net, tmp, &ecn_ca); 978 } else { 979 if (nla_len(nla) != sizeof(u32)) 980 return false; 981 val = nla_get_u32(nla); 982 } 983 984 fi_val = fi->fib_metrics->metrics[type - 1]; --- 1245 unchanged lines hidden --- |