diff options
author | pjd <pjd@FreeBSD.org> | 2013-05-19 23:30:24 +0000 |
---|---|---|
committer | pjd <pjd@FreeBSD.org> | 2013-05-19 23:30:24 +0000 |
commit | 3df7f9c0a102ccf91f92902098cf98eac861a01a (patch) | |
tree | 809306d09cccfa1df10f4c8431f4adab04c2f783 | |
parent | f9459837826c728e4db04462616a4f79bfb8dded (diff) | |
download | FreeBSD-src-3df7f9c0a102ccf91f92902098cf98eac861a01a.zip FreeBSD-src-3df7f9c0a102ccf91f92902098cf98eac861a01a.tar.gz |
Style nits.
-rw-r--r-- | sys/kern/kern_priv.c | 11 |
1 files changed, 5 insertions, 6 deletions
diff --git a/sys/kern/kern_priv.c b/sys/kern/kern_priv.c index cd58adf..fcd5993 100644 --- a/sys/kern/kern_priv.c +++ b/sys/kern/kern_priv.c @@ -52,7 +52,7 @@ __FBSDID("$FreeBSD$"); * uid 0 is offered no special privilege in the kernel security policy. * Setting it to zero may seriously impact the functionality of many existing * userland programs, and should not be done without careful consideration of - * the consequences. + * the consequences. */ static int suser_enabled = 1; SYSCTL_INT(_security_bsd, OID_AUTO, suser_enabled, CTLFLAG_RW, @@ -104,10 +104,10 @@ priv_check_cred(struct ucred *cred, int priv, int flags) * mlockall(2)/munlockall(2). */ switch (priv) { - case PRIV_VM_MLOCK: - case PRIV_VM_MUNLOCK: - error = 0; - goto out; + case PRIV_VM_MLOCK: + case PRIV_VM_MUNLOCK: + error = 0; + goto out; } } @@ -132,7 +132,6 @@ priv_check_cred(struct ucred *cred, int priv, int flags) goto out; } break; - default: if (cred->cr_uid == 0) { error = 0; |