diff options
| author | F. Aragon <paco@voltanet.io> | 2018-07-02 17:05:17 +0200 | 
|---|---|---|
| committer | F. Aragon <paco@voltanet.io> | 2018-07-02 19:06:54 +0200 | 
| commit | a85297a7c92297af0578fac6d2b48ca8c72a6a34 (patch) | |
| tree | 973b64af63600214ca2093a3115558b353bbf043 /bgpd/bgp_label.c | |
| parent | 8d6d6b2581be7c60ab4913df1adf46098a3dc4ae (diff) | |
bgpd zebra: element overflow (PVS-Studio)
The warning given by PVS-Studio is related to per-element overflow (there is
no real overflow, because of how elements are mapped in the union). This
same warning is typically reported by Coverity, too.
Signed-off-by: F. Aragon <paco@voltanet.io>
Diffstat (limited to 'bgpd/bgp_label.c')
| -rw-r--r-- | bgpd/bgp_label.c | 2 | 
1 files changed, 1 insertions, 1 deletions
diff --git a/bgpd/bgp_label.c b/bgpd/bgp_label.c index ceca644de2..8a051b7ff0 100644 --- a/bgpd/bgp_label.c +++ b/bgpd/bgp_label.c @@ -57,7 +57,7 @@ int bgp_parse_fec_update(void)  	memset(&p, 0, sizeof(struct prefix));  	p.family = stream_getw(s);  	p.prefixlen = stream_getc(s); -	stream_get(&p.u.prefix, s, PSIZE(p.prefixlen)); +	stream_get(p.u.val, s, PSIZE(p.prefixlen));  	label = stream_getl(s);  	/* hack for the bgp instance & SAFI = have to send/receive it */  | 
