diff options
author | Matthew D Fleming <mdf@FreeBSD.org> | 2010-09-10 16:42:16 +0000 |
---|---|---|
committer | Matthew D Fleming <mdf@FreeBSD.org> | 2010-09-10 16:42:16 +0000 |
commit | 4d369413e19e5195fe4babcb74980c4cff21df03 (patch) | |
tree | e9bea66185b980482df09793bce47717d6df59f2 /sys/security | |
parent | 6a4e245b76e19c5a09b70face2ea9f9e34347469 (diff) | |
download | src-4d369413e19e5195fe4babcb74980c4cff21df03.tar.gz src-4d369413e19e5195fe4babcb74980c4cff21df03.zip |
Replace sbuf_overflowed() with sbuf_error(), which returns any error
code associated with overflow or with the drain function. While this
function is not expected to be used often, it produces more information
in the form of an errno that sbuf_overflowed() did.
Notes
Notes:
svn path=/head/; revision=212425
Diffstat (limited to 'sys/security')
-rw-r--r-- | sys/security/audit/audit_bsm_klib.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/security/audit/audit_bsm_klib.c b/sys/security/audit/audit_bsm_klib.c index c8d40356cfe8..f26f86cabc94 100644 --- a/sys/security/audit/audit_bsm_klib.c +++ b/sys/security/audit/audit_bsm_klib.c @@ -548,7 +548,7 @@ audit_canon_path(struct thread *td, char *path, char *cpath) * the supplied buffer being overflowed. Check to see if this is the * case. */ - if (sbuf_overflowed(&sbf) != 0) { + if (sbuf_error(&sbf) != 0) { cpath[0] = '\0'; return; } |