aboutsummaryrefslogtreecommitdiff
path: root/sys/security
diff options
context:
space:
mode:
authorMatthew D Fleming <mdf@FreeBSD.org>2010-09-10 16:42:16 +0000
committerMatthew D Fleming <mdf@FreeBSD.org>2010-09-10 16:42:16 +0000
commit4d369413e19e5195fe4babcb74980c4cff21df03 (patch)
treee9bea66185b980482df09793bce47717d6df59f2 /sys/security
parent6a4e245b76e19c5a09b70face2ea9f9e34347469 (diff)
downloadsrc-4d369413e19e5195fe4babcb74980c4cff21df03.tar.gz
src-4d369413e19e5195fe4babcb74980c4cff21df03.zip
Replace sbuf_overflowed() with sbuf_error(), which returns any error
code associated with overflow or with the drain function. While this function is not expected to be used often, it produces more information in the form of an errno that sbuf_overflowed() did.
Notes
Notes: svn path=/head/; revision=212425
Diffstat (limited to 'sys/security')
-rw-r--r--sys/security/audit/audit_bsm_klib.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/security/audit/audit_bsm_klib.c b/sys/security/audit/audit_bsm_klib.c
index c8d40356cfe8..f26f86cabc94 100644
--- a/sys/security/audit/audit_bsm_klib.c
+++ b/sys/security/audit/audit_bsm_klib.c
@@ -548,7 +548,7 @@ audit_canon_path(struct thread *td, char *path, char *cpath)
* the supplied buffer being overflowed. Check to see if this is the
* case.
*/
- if (sbuf_overflowed(&sbf) != 0) {
+ if (sbuf_error(&sbf) != 0) {
cpath[0] = '\0';
return;
}