Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/trunk]: src/sys/kern Cosmetic; just replace whitespaces by tabs



details:   https://anonhg.NetBSD.org/src/rev/8a5855b868e7
branches:  trunk
changeset: 326781:8a5855b868e7
user:      maxv <maxv%NetBSD.org@localhost>
date:      Mon Feb 17 19:29:46 2014 +0000

description:
Cosmetic; just replace whitespaces by tabs

diffstat:

 sys/kern/exec_script.c |  26 +++++++++++++-------------
 sys/kern/kern_exec.c   |  30 +++++++++++++++---------------
 2 files changed, 28 insertions(+), 28 deletions(-)

diffs (159 lines):

diff -r 58e7a47541c1 -r 8a5855b868e7 sys/kern/exec_script.c
--- a/sys/kern/exec_script.c    Mon Feb 17 13:41:20 2014 +0000
+++ b/sys/kern/exec_script.c    Mon Feb 17 19:29:46 2014 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: exec_script.c,v 1.67 2013/09/19 18:50:59 christos Exp $        */
+/*     $NetBSD: exec_script.c,v 1.68 2014/02/17 19:29:46 maxv Exp $    */
 
 /*
  * Copyright (c) 1993, 1994, 1996 Christopher G. Demetriou
@@ -31,7 +31,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: exec_script.c,v 1.67 2013/09/19 18:50:59 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: exec_script.c,v 1.68 2014/02/17 19:29:46 maxv Exp $");
 
 #if defined(SETUIDSCRIPTS) && !defined(FDSCRIPTS)
 #define FDSCRIPTS              /* Need this for safe set-id scripts. */
@@ -95,7 +95,7 @@
 
        default:
                return ENOTTY;
-        }
+       }
 }
 
 /*
@@ -345,10 +345,10 @@
 #endif
 
        /* kill the opened file descriptor, else close the file */
-        if (epp->ep_flags & EXEC_HASFD) {
-                epp->ep_flags &= ~EXEC_HASFD;
-                fd_close(epp->ep_fd);
-        } else if (scriptvp) {
+       if (epp->ep_flags & EXEC_HASFD) {
+               epp->ep_flags &= ~EXEC_HASFD;
+               fd_close(epp->ep_fd);
+       } else if (scriptvp) {
                vn_lock(scriptvp, LK_EXCLUSIVE | LK_RETRY);
                VOP_CLOSE(scriptvp, FREAD, l->l_cred);
                vput(scriptvp);
@@ -363,11 +363,11 @@
                kmem_free(shellargp, shellargp_len);
        }
 
-        /*
-         * free any vmspace-creation commands,
-         * and release their references
-         */
-        kill_vmcmds(&epp->ep_vmcmds);
+       /*
+        * free any vmspace-creation commands,
+        * and release their references
+        */
+       kill_vmcmds(&epp->ep_vmcmds);
 
-        return error;
+       return error;
 }
diff -r 58e7a47541c1 -r 8a5855b868e7 sys/kern/kern_exec.c
--- a/sys/kern/kern_exec.c      Mon Feb 17 13:41:20 2014 +0000
+++ b/sys/kern/kern_exec.c      Mon Feb 17 19:29:46 2014 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: kern_exec.c,v 1.375 2014/02/14 16:35:40 christos Exp $ */
+/*     $NetBSD: kern_exec.c,v 1.376 2014/02/17 19:29:46 maxv Exp $     */
 
 /*-
  * Copyright (c) 2008 The NetBSD Foundation, Inc.
@@ -59,7 +59,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: kern_exec.c,v 1.375 2014/02/14 16:35:40 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: kern_exec.c,v 1.376 2014/02/17 19:29:46 maxv Exp $");
 
 #include "opt_exec.h"
 #include "opt_execfmt.h"
@@ -516,7 +516,7 @@
            SCARG(uap, envp), execve_fetch_element);
 }
 
-int   
+int
 sys_fexecve(struct lwp *l, const struct sys_fexecve_args *uap,
     register_t *retval)
 {
@@ -571,9 +571,9 @@
        list = (nexecs == 0 ? native : compat);
        for (i = 0; list[i] != NULL; i++) {
                if (module_autoload(list[i], MODULE_CLASS_EXEC) != 0) {
-                       continue;
+                       continue;
                }
-               yield();
+               yield();
        }
 #endif
 }
@@ -593,7 +593,7 @@
        KASSERT(data != NULL);
 
        p = l->l_proc;
-       modgen = 0;
+       modgen = 0;
 
        SDT_PROBE(proc,,,exec, path, 0, 0, 0, 0);
 
@@ -951,8 +951,8 @@
                    data->ed_pack.ep_flags & EXEC_TOPDOWN_VM);
 
        /* record proc's vnode, for use by procfs and others */
-        if (p->p_textvp)
-                vrele(p->p_textvp);
+       if (p->p_textvp)
+               vrele(p->p_textvp);
        vref(data->ed_pack.ep_vp);
        p->p_textvp = data->ed_pack.ep_vp;
 
@@ -1885,8 +1885,8 @@
                                }
                                error = fd_open(fae->fae_path, fae->fae_oflag,
                                    fae->fae_mode, &newfd);
-                               if (error)
-                                       break;
+                               if (error)
+                                       break;
                                if (newfd != fae->fae_fildes) {
                                        error = dodup(l, newfd,
                                            fae->fae_fildes, 0, &retval);
@@ -2022,8 +2022,8 @@
        return;
 
  report_error:
-       if (have_reflock) {
-               /*
+       if (have_reflock) {
+               /*
                 * We have not passed through execve_runproc(),
                 * which would have released the p_reflock and also
                 * taken ownership of the sed_exec part of spawn_data,
@@ -2423,14 +2423,14 @@
        return error;
 
  error_exit:
-       if (have_exec_lock) {
+       if (have_exec_lock) {
                execve_free_data(&spawn_data->sed_exec);
                rw_exit(&p1->p_reflock);
-               rw_exit(&exec_lock);
+               rw_exit(&exec_lock);
        }
        mutex_exit(&spawn_data->sed_mtx_child);
        spawn_exec_data_release(spawn_data);
- 
+
        return error;
 }
 



Home | Main Index | Thread Index | Old Index