Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 18 Jul 2010 14:53:22 GMT
From:      Robert Watson <rwatson@FreeBSD.org>
To:        Perforce Change Reviews <perforce@freebsd.org>
Subject:   PERFORCE change 181138 for review
Message-ID:  <201007181453.o6IErMcj062724@repoman.freebsd.org>

next in thread | raw e-mail | index | archive | help
http://p4web.freebsd.org/@@181138?ac=10

Change 181138 by rwatson@rwatson_vimage_client on 2010/07/18 14:52:48

	Minor style(9) tweaks to kern_capwrap().

Affected files ...

.. //depot/projects/trustedbsd/capabilities/src/sys/kern/sys_capability.c#31 edit

Differences ...

==== //depot/projects/trustedbsd/capabilities/src/sys/kern/sys_capability.c#31 (text+ko) ====

@@ -50,7 +50,7 @@
 #include "opt_capabilities.h"
 
 #include <sys/cdefs.h>
-__FBSDID("$P4: //depot/projects/trustedbsd/capabilities/src/sys/kern/sys_capability.c#30 $");
+__FBSDID("$P4: //depot/projects/trustedbsd/capabilities/src/sys/kern/sys_capability.c#31 $");
 
 #include <sys/param.h>
 #include <sys/capability.h>
@@ -314,8 +314,9 @@
 /*
  * Create a capability to wrap around an existing file.
  */
-int kern_capwrap(struct thread *td, struct file *fp, cap_rights_t rights,
-                 struct file **cap, int *capfd)
+int
+kern_capwrap(struct thread *td, struct file *fp, cap_rights_t rights,
+    struct file **cap, int *capfd)
 {
 	struct capability *c, *c_old;
 	struct file *fp_object;
@@ -326,7 +327,6 @@
 
 	c = uma_zalloc(capability_zone, M_WAITOK | M_ZERO);
 
-
 	/*
 	 * If a new capability is being derived from an existing capability,
 	 * then the new capability rights must be a subset of the existing
@@ -378,7 +378,6 @@
 	 * Release our private reference (the proc filedesc still has one).
 	 */
 	fdrop(*cap, td);
-
 	return (0);
 
 fail:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201007181453.o6IErMcj062724>