From owner-svn-src-all@FreeBSD.ORG Sun May 19 23:30:24 2013 Return-Path: Delivered-To: svn-src-all@freebsd.org Received: from mx1.freebsd.org (mx1.FreeBSD.org [8.8.178.115]) by hub.freebsd.org (Postfix) with ESMTP id AC1A92E3; Sun, 19 May 2013 23:30:24 +0000 (UTC) (envelope-from pjd@FreeBSD.org) Received: from svn.freebsd.org (svn.freebsd.org [IPv6:2001:1900:2254:2068::e6a:0]) by mx1.freebsd.org (Postfix) with ESMTP id 9EC36E3F; Sun, 19 May 2013 23:30:24 +0000 (UTC) Received: from svn.freebsd.org ([127.0.1.70]) by svn.freebsd.org (8.14.6/8.14.6) with ESMTP id r4JNUOqd091709; Sun, 19 May 2013 23:30:24 GMT (envelope-from pjd@svn.freebsd.org) Received: (from pjd@localhost) by svn.freebsd.org (8.14.6/8.14.5/Submit) id r4JNUOvA091707; Sun, 19 May 2013 23:30:24 GMT (envelope-from pjd@svn.freebsd.org) Message-Id: <201305192330.r4JNUOvA091707@svn.freebsd.org> From: Pawel Jakub Dawidek Date: Sun, 19 May 2013 23:30:24 +0000 (UTC) To: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: svn commit: r250818 - head/sys/kern X-SVN-Group: head MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-src-all@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: "SVN commit messages for the entire src tree \(except for " user" and " projects" \)" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 19 May 2013 23:30:24 -0000 Author: pjd Date: Sun May 19 23:30:24 2013 New Revision: 250818 URL: http://svnweb.freebsd.org/changeset/base/250818 Log: Style nits. Modified: head/sys/kern/kern_priv.c Modified: head/sys/kern/kern_priv.c ============================================================================== --- head/sys/kern/kern_priv.c Sun May 19 23:29:22 2013 (r250817) +++ head/sys/kern/kern_priv.c Sun May 19 23:30:24 2013 (r250818) @@ -52,7 +52,7 @@ __FBSDID("$FreeBSD$"); * uid 0 is offered no special privilege in the kernel security policy. * Setting it to zero may seriously impact the functionality of many existing * userland programs, and should not be done without careful consideration of - * the consequences. + * the consequences. */ static int suser_enabled = 1; SYSCTL_INT(_security_bsd, OID_AUTO, suser_enabled, CTLFLAG_RW, @@ -104,10 +104,10 @@ priv_check_cred(struct ucred *cred, int * mlockall(2)/munlockall(2). */ switch (priv) { - case PRIV_VM_MLOCK: - case PRIV_VM_MUNLOCK: - error = 0; - goto out; + case PRIV_VM_MLOCK: + case PRIV_VM_MUNLOCK: + error = 0; + goto out; } } @@ -132,7 +132,6 @@ priv_check_cred(struct ucred *cred, int goto out; } break; - default: if (cred->cr_uid == 0) { error = 0;