---
datapath-windows/ovsext/Netlink.c | 16 +++++++++-------
1 files changed, 9 insertions(+), 7 deletions(-)
diff --git a/datapath-windows/ovsext/Netlink.c
b/datapath-windows/ovsext/Netlink.c
index 1c8d054..7b50221 100644
--- a/datapath-windows/ovsext/Netlink.c
+++ b/datapath-windows/ovsext/Netlink.c
@@ -251,8 +251,8 @@ NlAttrGet(const PNL_ATTR nla)
* first byte of the payload.
* ---------------------------------------------------------------------------
*/
-const
-PVOID NlAttrGetUnspec(const PNL_ATTR nla, UINT32 size)
+const PVOID
+NlAttrGetUnspec(const PNL_ATTR nla, UINT32 size)
{
UNREFERENCED_PARAMETER(size);
ASSERT(nla->nlaLen >= NLA_HDRLEN + size);
@@ -408,20 +408,22 @@ NlAttrFindNested(const PNL_ATTR nla, UINT16 type)
* attribute type validation parameters.
* 'nla_offset' should be NLMSG_HDRLEN + GENL_HDRLEN + OVS_HEADER
*
- * Returns NDIS_STATUS_SUCCESS normally. Fails only if packet data cannot be
accessed
+ * Returns NDIS_STATUS_SUCCESS normally. Fails only if packet data cannot
+ * be accessed
* (e.g. if Pkt_CopyBytesOut() returns an error).
*----------------------------------------------------------------------------
*/
-BOOLEAN NlAttrParse(const PNL_MSG_HDR nlMsg, UINT32 attrOffset,
- const NL_POLICY policy[],
- PNL_ATTR attrs[], UINT32 n_attrs)
+BOOLEAN
+NlAttrParse(const PNL_MSG_HDR nlMsg, UINT32 attrOffset,
+ const NL_POLICY policy[],
+ PNL_ATTR attrs[], UINT32 n_attrs)
{
PNL_ATTR nla;
UINT32 left;
UINT32 iter;
BOOLEAN ret = FALSE;
- memset(attrs, 0, n_attrs * sizeof *attrs);
+ RtlZeroMemory(attrs, n_attrs * sizeof *attrs);
if ((NlMsgSize(nlMsg) < attrOffset) || (!(NlMsgAttrLen(nlMsg)))) {
OVS_LOG_WARN("No attributes in nlMsg: %p at offset: %d",
--
1.7.4.1
_______________________________________________
dev mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/dev