diff options
author | mdf <mdf@FreeBSD.org> | 2010-09-10 16:42:16 +0000 |
---|---|---|
committer | mdf <mdf@FreeBSD.org> | 2010-09-10 16:42:16 +0000 |
commit | ab3a8b533a824bceba3baf79642745d2b57f4c9d (patch) | |
tree | e9bea66185b980482df09793bce47717d6df59f2 /sys/security | |
parent | d0cd039a30daea0e7c8a5089793befb261d13de1 (diff) | |
download | FreeBSD-src-ab3a8b533a824bceba3baf79642745d2b57f4c9d.zip FreeBSD-src-ab3a8b533a824bceba3baf79642745d2b57f4c9d.tar.gz |
Replace sbuf_overflowed() with sbuf_error(), which returns any error
code associated with overflow or with the drain function. While this
function is not expected to be used often, it produces more information
in the form of an errno that sbuf_overflowed() did.
Diffstat (limited to 'sys/security')
-rw-r--r-- | sys/security/audit/audit_bsm_klib.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/security/audit/audit_bsm_klib.c b/sys/security/audit/audit_bsm_klib.c index c8d4035..f26f86c 100644 --- a/sys/security/audit/audit_bsm_klib.c +++ b/sys/security/audit/audit_bsm_klib.c @@ -548,7 +548,7 @@ audit_canon_path(struct thread *td, char *path, char *cpath) * the supplied buffer being overflowed. Check to see if this is the * case. */ - if (sbuf_overflowed(&sbf) != 0) { + if (sbuf_error(&sbf) != 0) { cpath[0] = '\0'; return; } |