diff options
author | Christopher Faylor <me@cgf.cx> | 2005-12-22 05:57:54 +0000 |
---|---|---|
committer | Christopher Faylor <me@cgf.cx> | 2005-12-22 05:57:54 +0000 |
commit | de935f6d9feb4a671580ad0f685a810749e8ab02 (patch) | |
tree | c9df2c01bc228f9f6f5e486efe559a9f8ef56905 | |
parent | 718dee922f2a168f752a7bceb93f85d114aaceb7 (diff) | |
download | newlib-de935f6d9feb4a671580ad0f685a810749e8ab02.zip newlib-de935f6d9feb4a671580ad0f685a810749e8ab02.tar.gz newlib-de935f6d9feb4a671580ad0f685a810749e8ab02.tar.bz2 |
whitespace cleanup to force snapshot.
-rw-r--r-- | winsup/cygwin/ChangeLog | 2 | ||||
-rw-r--r-- | winsup/cygwin/exceptions.cc | 14 | ||||
-rw-r--r-- | winsup/cygwin/fhandler_disk_file.cc | 8 | ||||
-rw-r--r-- | winsup/cygwin/fhandler_floppy.cc | 6 | ||||
-rw-r--r-- | winsup/cygwin/fhandler_socket.cc | 8 | ||||
-rw-r--r-- | winsup/cygwin/fhandler_tape.cc | 6 | ||||
-rw-r--r-- | winsup/cygwin/init.cc | 6 | ||||
-rw-r--r-- | winsup/cygwin/mmap.cc | 72 | ||||
-rw-r--r-- | winsup/cygwin/net.cc | 6 | ||||
-rw-r--r-- | winsup/cygwin/path.cc | 12 | ||||
-rw-r--r-- | winsup/cygwin/pinfo.cc | 4 | ||||
-rw-r--r-- | winsup/cygwin/sysconf.cc | 2 | ||||
-rw-r--r-- | winsup/cygwin/syslog.cc | 2 |
13 files changed, 74 insertions, 74 deletions
diff --git a/winsup/cygwin/ChangeLog b/winsup/cygwin/ChangeLog index fdd452c..5a97111 100644 --- a/winsup/cygwin/ChangeLog +++ b/winsup/cygwin/ChangeLog @@ -55,7 +55,7 @@ * fhandler_disk_file.cc (fhandler_base::fstat_helper): Fix inode number debug output. - (fhandler_disk_file::fchown): Always set sensible permission values + (fhandler_disk_file::fchown): Always set sensible permission values when creating the ACL for symlinks. 2005-12-20 Corinna Vinschen <corinna@vinschen.de> diff --git a/winsup/cygwin/exceptions.cc b/winsup/cygwin/exceptions.cc index 46c742b..152210f 100644 --- a/winsup/cygwin/exceptions.cc +++ b/winsup/cygwin/exceptions.cc @@ -927,8 +927,8 @@ ctrl_c_handler (DWORD type) int sig = SIGINT; /* If intr and quit are both mapped to ^C, send SIGQUIT on ^BREAK */ if (type == CTRL_BREAK_EVENT - && t->ti.c_cc[VINTR] == 3 && t->ti.c_cc[VQUIT] == 3) - sig = SIGQUIT; + && t->ti.c_cc[VINTR] == 3 && t->ti.c_cc[VQUIT] == 3) + sig = SIGQUIT; t->last_ctrl_c = GetTickCount (); killsys (-myself->pid, sig); t->last_ctrl_c = GetTickCount (); @@ -1269,12 +1269,12 @@ _cygtls::call_signal_handler () sigfunc (thissig); } else - { + { siginfo_t thissi = infodata; - void (*sigact) (int, siginfo_t *, void *) = (void (*) (int, siginfo_t *, void *)) func; - /* no ucontext_t information provided yet */ - sigact (thissig, &thissi, NULL); - } + void (*sigact) (int, siginfo_t *, void *) = (void (*) (int, siginfo_t *, void *)) func; + /* no ucontext_t information provided yet */ + sigact (thissig, &thissi, NULL); + } incyg++; set_signal_mask (this_oldmask, myself->getsigmask ()); if (this_errno >= 0) diff --git a/winsup/cygwin/fhandler_disk_file.cc b/winsup/cygwin/fhandler_disk_file.cc index 66585f0..15d278d 100644 --- a/winsup/cygwin/fhandler_disk_file.cc +++ b/winsup/cygwin/fhandler_disk_file.cc @@ -571,7 +571,7 @@ fhandler_disk_file::fchown (__uid32_t uid, __gid32_t gid) permissions of symlinks to a sensible value which allows the world to read the symlink and only the new owner to change it. */ if (pc.issymlink ()) - attrib = S_IFLNK | STD_RBITS | STD_WBITS; + attrib = S_IFLNK | STD_RBITS | STD_WBITS; res = set_file_attribute (pc.has_acls (), get_io_handle (), pc, uid, gid, attrib); } @@ -1306,15 +1306,15 @@ fhandler_disk_file::rmdir () continue; /* On 9X ERROR_ACCESS_DENIED is returned if you try to remove a - non-empty directory. */ + non-empty directory. */ if (err == ERROR_ACCESS_DENIED && wincap.access_denied_on_delete ()) err = ERROR_DIR_NOT_EMPTY; /* ...and, that's *not* funny, when trying to remove a non-existing - directory on a share, which is hosted by a 9x machine, the error + directory on a share, which is hosted by a 9x machine, the error code ERROR_INVALID_FUNCTION is returned. */ else if (err == ERROR_INVALID_FUNCTION) - err = ERROR_FILE_NOT_FOUND; + err = ERROR_FILE_NOT_FOUND; __seterrno_from_win_error (err); diff --git a/winsup/cygwin/fhandler_floppy.cc b/winsup/cygwin/fhandler_floppy.cc index a8b99b2..ae3156b 100644 --- a/winsup/cygwin/fhandler_floppy.cc +++ b/winsup/cygwin/fhandler_floppy.cc @@ -102,7 +102,7 @@ fhandler_dev_floppy::get_drive_info (struct hd_geometry *geo) else { /* Getting the partition size by using the drive geometry information - looks wrong, but this is a historical necessity. NT4 didn't maintain + looks wrong, but this is a historical necessity. NT4 didn't maintain partition information for the whole drive (aka "partition 0"), but returned ERROR_INVALID_HANDLE instead. That got fixed in W2K. */ drive_size = di->Cylinders.QuadPart * di->TracksPerCylinder * @@ -119,7 +119,7 @@ fhandler_dev_floppy::get_drive_info (struct hd_geometry *geo) else if (pi) geo->start = pi->StartingOffset.QuadPart >> 9ULL; else - geo->start = 0; + geo->start = 0; } return 0; } @@ -461,7 +461,7 @@ fhandler_dev_floppy::ioctl (unsigned int cmd, void *buf) } case RDSETBLK: /* Just check the restriction that blocksize must be a multiple - of the sector size of the underlying volume sector size, + of the sector size of the underlying volume sector size, then fall through to fhandler_dev_raw::ioctl. */ struct rdop *op = (struct rdop *) buf; if (op->rd_parm % bytes_per_sector) diff --git a/winsup/cygwin/fhandler_socket.cc b/winsup/cygwin/fhandler_socket.cc index 57e743a..80a7c40 100644 --- a/winsup/cygwin/fhandler_socket.cc +++ b/winsup/cygwin/fhandler_socket.cc @@ -1063,9 +1063,9 @@ fhandler_socket::recvfrom (void *ptr, size_t len, int flags, return len; /* ESHUTDOWN isn't defined for recv in SUSv3. Simply EOF is returned - in this case. */ + in this case. */ if (WSAGetLastError () == WSAESHUTDOWN) - return 0; + return 0; set_winsock_errno (); } @@ -1152,9 +1152,9 @@ fhandler_socket::recvmsg (struct msghdr *msg, int flags, ssize_t tot) return len; /* ESHUTDOWN isn't defined for recv in SUSv3. Simply EOF is returned - in this case. */ + in this case. */ if (WSAGetLastError () == WSAESHUTDOWN) - return 0; + return 0; set_winsock_errno (); } diff --git a/winsup/cygwin/fhandler_tape.cc b/winsup/cygwin/fhandler_tape.cc index 0b4e537..055519b 100644 --- a/winsup/cygwin/fhandler_tape.cc +++ b/winsup/cygwin/fhandler_tape.cc @@ -1237,7 +1237,7 @@ fhandler_dev_tape::open (int flags, mode_t) TAPE_SPACE_FILEMARKS, 1, true); if (!(flags & O_DIRECT)) - { + { devbufsiz = mt->drive (driveno ())->dp ()->MaximumBlockSize; devbuf = new char [devbufsiz]; } @@ -1466,7 +1466,7 @@ fhandler_dev_tape::dup (fhandler_base *child) lock (-1); fhandler_dev_tape *fh = (fhandler_dev_tape *) child; if (!DuplicateHandle (hMainProc, mt_mtx, hMainProc, &fh->mt_mtx, 0, TRUE, - DUPLICATE_SAME_ACCESS)) + DUPLICATE_SAME_ACCESS)) { debug_printf ("dup(%s) failed, mutex handle %x, %E", get_name (), mt_mtx); @@ -1476,7 +1476,7 @@ fhandler_dev_tape::dup (fhandler_base *child) fh->mt_evt = NULL; if (mt_evt && !DuplicateHandle (hMainProc, mt_evt, hMainProc, &fh->mt_evt, 0, TRUE, - DUPLICATE_SAME_ACCESS)) + DUPLICATE_SAME_ACCESS)) { debug_printf ("dup(%s) failed, event handle %x, %E", get_name (), mt_evt); diff --git a/winsup/cygwin/init.cc b/winsup/cygwin/init.cc index 59e59cc..59a0cae 100644 --- a/winsup/cygwin/init.cc +++ b/winsup/cygwin/init.cc @@ -150,13 +150,13 @@ dll_entry (HANDLE h, DWORD reason, void *static_load) dynamically_loaded = (static_load == NULL); /* Is the stack at an unusual address? This is, an address which - is in the usual space occupied by the process image, but below + is in the usual space occupied by the process image, but below the auto load address of DLLs? Check if we're running in WOW64 on a 64 bit machine *and* are spawned by a genuine 64 bit process. If so, respawn. */ if (&is_wow64_proc >= (PBOOL) 0x400000 - && &is_wow64_proc <= (PBOOL) 0x10000000 - && IsWow64Process (GetCurrentProcess (), &is_wow64_proc) + && &is_wow64_proc <= (PBOOL) 0x10000000 + && IsWow64Process (GetCurrentProcess (), &is_wow64_proc) && is_wow64_proc) respawn_wow64_process (); diff --git a/winsup/cygwin/mmap.cc b/winsup/cygwin/mmap.cc index f613ecf..46deea3 100644 --- a/winsup/cygwin/mmap.cc +++ b/winsup/cygwin/mmap.cc @@ -216,9 +216,9 @@ CreateMapping9x (HANDLE fhdl, size_t len, _off64_t off, DWORD openflags, debug_printf ("named sharing"); DWORD access = gen_access (openflags, flags); /* Different access modes result in incompatible mappings. So we - create different maps per access mode by using different names. */ + create different maps per access mode by using different names. */ switch (access) - { + { case FILE_MAP_READ: namebuf[0] = 'R'; break; @@ -242,7 +242,7 @@ CreateMapping9x (HANDLE fhdl, size_t len, _off64_t off, DWORD openflags, high = (off + len) >> 32; low = (off + len) & UINT32_MAX; /* Auto-grow only works if the protection is PAGE_READWRITE. So, - first we call CreateFileMapping with PAGE_READWRITE, then, if the + first we call CreateFileMapping with PAGE_READWRITE, then, if the requested protection is different, we close the mapping and reopen it again with the correct protection, if auto-grow worked. */ h = CreateFileMapping (fhdl, &sec_none, PAGE_READWRITE, @@ -286,14 +286,14 @@ CreateMappingNT (HANDLE fhdl, size_t len, _off64_t off, DWORD openflags, else if (autogrow (flags)) { /* Auto-grow only works if the protection is PAGE_READWRITE. So, - first we call NtCreateSection with PAGE_READWRITE, then, if the + first we call NtCreateSection with PAGE_READWRITE, then, if the requested protection is different, we close the mapping and reopen it again with the correct protection, if auto-grow worked. */ sectionsize.QuadPart += off; ret = NtCreateSection (&h, SECTION_ALL_ACCESS, &oa, §ionsize, PAGE_READWRITE, attributes, fhdl); if (NT_SUCCESS (ret) && protect != PAGE_READWRITE) - { + { CloseHandle (h); ret = NtCreateSection (&h, SECTION_ALL_ACCESS, &oa, §ionsize, protect, attributes, fhdl); @@ -302,7 +302,7 @@ CreateMappingNT (HANDLE fhdl, size_t len, _off64_t off, DWORD openflags, else { /* Zero len creates mapping for whole file and allows - AT_EXTENDABLE_FILE mapping, if we ever use it... */ + AT_EXTENDABLE_FILE mapping, if we ever use it... */ sectionsize.QuadPart = 0; ret = NtCreateSection (&h, SECTION_ALL_ACCESS, &oa, §ionsize, protect, attributes, fhdl); @@ -361,7 +361,7 @@ MapViewNT (HANDLE h, void *addr, size_t len, DWORD openflags, { base = NULL; ret = NtMapViewOfSection (h, GetCurrentProcess (), &base, 0, commitsize, - &offset, &viewsize, ViewShare, 0, protect); + &offset, &viewsize, ViewShare, 0, protect); } if (!NT_SUCCESS (ret)) { @@ -376,7 +376,7 @@ MapViewNT (HANDLE h, void *addr, size_t len, DWORD openflags, struct mmap_func_t { HANDLE (*CreateMapping)(HANDLE, size_t, _off64_t, DWORD, int, int, - const char *); + const char *); void * (*MapView)(HANDLE, void *, size_t, DWORD, int, int, _off64_t); BOOL (*VirtualProt)(PVOID, SIZE_T, DWORD, PDWORD); BOOL (*VirtualProtEx)(HANDLE, PVOID, SIZE_T, DWORD, PDWORD); @@ -439,7 +439,7 @@ class mmap_record public: mmap_record (int nfd, HANDLE h, DWORD of, int p, int f, _off64_t o, DWORD l, - caddr_t b) : + caddr_t b) : fd (nfd), mapping_hdl (h), openflags (of), @@ -485,7 +485,7 @@ class mmap_record fhandler_base *alloc_fh (); void free_fh (fhandler_base *fh); - + DWORD gen_create_protect () const { return ::gen_create_protect (get_openflags (), get_flags ()); } DWORD gen_protect () const @@ -758,7 +758,7 @@ list::search_record (caddr_t addr, DWORD len, caddr_t &m_addr, DWORD &m_len, low = (addr >= recs[i].get_address ()) ? addr : recs[i].get_address (); high = recs[i].get_address (); if (recs[i].filler ()) - high += recs[i].get_len (); + high += recs[i].get_len (); else high += (PAGE_CNT (recs[i].get_len ()) * getpagesize ()); high = (addr + len < high) ? addr + len : high; @@ -992,7 +992,7 @@ mmap64 (void *addr, size_t len, int prot, int flags, int fd, _off64_t off) to enable remapping of formerly mapped pages. If no matching free pages exist, check addr again, this time for the real alignment. */ DWORD checkpagesize = wincap.has_mmap_alignment_bug () ? - getsystempagesize () : pagesize; + getsystempagesize () : pagesize; if (fixed (flags) && ((uintptr_t) addr % checkpagesize)) { set_errno (EINVAL); @@ -1018,14 +1018,14 @@ mmap64 (void *addr, size_t len, int prot, int flags, int fd, _off64_t off) fd = -1; flags |= MAP_ANONYMOUS; /* Anonymous mappings are always forced to pagesize length with - no offset. */ + no offset. */ len = roundup2 (len, pagesize); off = 0; } else if (fh->get_device () == FH_FS) { /* EACCES error conditions according to SUSv3. File must be opened - for reading, regardless of the requested protection, and file must + for reading, regardless of the requested protection, and file must be opened for writing when PROT_WRITE together with MAP_SHARED is requested. */ if (!(fh->get_access () & GENERIC_READ) @@ -1037,9 +1037,9 @@ mmap64 (void *addr, size_t len, int prot, int flags, int fd, _off64_t off) } /* On 9x you can't create mappings with PAGE_WRITECOPY protection if - the file isn't explicitely opened with WRITE access. */ + the file isn't explicitely opened with WRITE access. */ if (!wincap.is_winnt () && priv (flags) - && !(fh->get_access () & GENERIC_WRITE)) + && !(fh->get_access () & GENERIC_WRITE)) { HANDLE h = CreateFile (fh->get_win32_name (), fh->get_access () | GENERIC_WRITE, @@ -1059,9 +1059,9 @@ mmap64 (void *addr, size_t len, int prot, int flags, int fd, _off64_t off) } /* On NT you can't create mappings with PAGE_EXECUTE protection if - the file isn't explicitely opened with EXECUTE access. */ + the file isn't explicitely opened with EXECUTE access. */ if (wincap.is_winnt ()) - { + { HANDLE h = CreateFile (fh->get_win32_name (), fh->get_access () | GENERIC_EXECUTE, wincap.shared (), &sec_none_nih, @@ -1119,7 +1119,7 @@ mmap64 (void *addr, size_t len, int prot, int flags, int fd, _off64_t off) if (autogrow (flags)) { /* Allow mapping beyond EOF if MAP_AUTOGROW flag is set. - Check if file has been opened for writing, otherwise + Check if file has been opened for writing, otherwise MAP_AUTOGROW is invalid. */ if (!(fh->get_access () & GENERIC_WRITE)) { @@ -1148,9 +1148,9 @@ go_ahead: { caddr_t tried = map_list->try_map (addr, len, flags, off); /* try_map returns NULL if no map matched, otherwise it returns - a valid address, of MAP_FAILED in case of a fatal error. */ + a valid address, of MAP_FAILED in case of a fatal error. */ if (tried) - { + { ret = tried; goto out; } @@ -1433,7 +1433,7 @@ mprotect (void *addr, size_t len, int prot) ret = VirtualQuery (addr, &mbi, sizeof mbi); if (ret) - { + { /* If write protection is requested, check if the page was originally protected writecopy. In this case call VirtualProtect requesting PAGE_WRITECOPY, otherwise the VirtualProtect will fail @@ -1490,7 +1490,7 @@ mlock (const void *addr, size_t len) requested locking region fits in. Unfortunately I don't know any function which would return the currently locked pages of a process (no go with NtQueryVirtualMemory). - + So, except for the border cases, what we do here is something really embarrassing. We raise the working set by 64K at a time and retry, until either we fail to raise the working set size @@ -1519,7 +1519,7 @@ mlock (const void *addr, size_t len) else if (!NT_SUCCESS (status)) __seterrno_from_nt_status (status); else - ret = 0; + ret = 0; } while (status == STATUS_WORKING_SET_QUOTA); @@ -1609,7 +1609,7 @@ fhandler_dev_zero::mmap (caddr_t *addr, size_t len, int prot, if (priv (flags) && !filler (prot)) { /* Private anonymous maps are now implemented using VirtualAlloc. - This has two advantages: + This has two advantages: - VirtualAlloc has a smaller footprint than a copy-on-write anonymous map. @@ -1697,7 +1697,7 @@ fhandler_dev_zero::fixup_mmap_after_fork (HANDLE h, int prot, int flags, { DWORD alloc_type = MEM_RESERVE | (noreserve (flags) ? 0 : MEM_COMMIT); /* Always allocate R/W so that ReadProcessMemory doesn't fail - due to a non-writable target address. The protection is + due to a non-writable target address. The protection is set to the correct one anyway in the fixup loop. */ base = VirtualAlloc (address, size, alloc_type, PAGE_READWRITE); } @@ -1730,7 +1730,7 @@ fhandler_disk_file::mmap (caddr_t *addr, size_t len, int prot, } void *base = mmap_func->MapView (h, *addr, len, get_access (), - prot, flags, off); + prot, flags, off); if (!base || (fixed (flags) && base != *addr)) { if (!base) @@ -1828,13 +1828,13 @@ fhandler_dev_mem::mmap (caddr_t *addr, size_t len, int prot, } void *base = MapViewNT (h, *addr, len, get_access (), - prot, flags | MAP_ANONYMOUS, off); + prot, flags | MAP_ANONYMOUS, off); if (!base || (fixed (flags) && base != *addr)) { if (!base) - __seterrno (); + __seterrno (); else - { + { NtUnmapViewOfSection (GetCurrentProcess (), base); set_errno (EINVAL); debug_printf ("MapView: address shift with MAP_FIXED given"); @@ -1922,7 +1922,7 @@ fixup_mmaps_after_fork (HANDLE parent) if (!ret) { if (rec->attached ()) - { + { system_printf ("Warning: Fixup mapping beyond EOF failed"); continue; } @@ -1937,21 +1937,21 @@ fixup_mmaps_after_fork (HANDLE parent) address += mbi.RegionSize) { if (!VirtualQueryEx (parent, address, &mbi, sizeof mbi)) - { + { system_printf ("VirtualQueryEx failed for MAP_PRIVATE " - "address %p, %E", address); + "address %p, %E", address); return -1; } /* Just skip reserved pages. */ if (mbi.State == MEM_RESERVE) continue; /* Copy-on-write pages must be copied to the child to circumvent - a strange notion how copy-on-write is supposed to work. */ + a strange notion how copy-on-write is supposed to work. */ if (rec->priv ()) { if (rec->anonymous () && rec->noreserve () && !VirtualAlloc (address, mbi.RegionSize, - MEM_COMMIT, PAGE_READWRITE)) + MEM_COMMIT, PAGE_READWRITE)) { system_printf ("VirtualAlloc failed for MAP_PRIVATE " "address %p, %E", address); @@ -1999,7 +1999,7 @@ fixup_mmaps_after_fork (HANDLE parent) MEMORY_BASIC_INFORMATION m; VirtualQuery (address, &m, sizeof m); system_printf ("VirtualProtect failed for " - "address %p, " + "address %p, " "parentstate: 0x%x, " "state: 0x%x, " "parentprot: 0x%x, " diff --git a/winsup/cygwin/net.cc b/winsup/cygwin/net.cc index 655cb11..a3fde30 100644 --- a/winsup/cygwin/net.cc +++ b/winsup/cygwin/net.cc @@ -681,10 +681,10 @@ cygwin_setsockopt (int fd, int level, int optname, const void *optval, { /* Old applications still use the old Winsock1 IPPROTO_IP values. */ if (level == IPPROTO_IP && CYGWIN_VERSION_CHECK_FOR_USING_WINSOCK1_VALUES) - optname = convert_ws1_ip_optname (optname); + optname = convert_ws1_ip_optname (optname); /* FOR THE RECORDS: - Setting IP_TOS is disabled by default since W2K, the official + Setting IP_TOS is disabled by default since W2K, the official reason being that IP_TOS setting would interfere with Windows QOS settings. As result, setsockopt returns with WinSock error 10022, WSAEINVAL, when running under W2K or later, instead of @@ -731,7 +731,7 @@ cygwin_getsockopt (int fd, int level, int optname, void *optval, int *optlen) { /* Old applications still use the old Winsock1 IPPROTO_IP values. */ if (level == IPPROTO_IP && CYGWIN_VERSION_CHECK_FOR_USING_WINSOCK1_VALUES) - optname = convert_ws1_ip_optname (optname); + optname = convert_ws1_ip_optname (optname); res = getsockopt (fh->get_socket (), level, optname, (char *) optval, (int *) optlen); diff --git a/winsup/cygwin/path.cc b/winsup/cygwin/path.cc index 21c3b92..f2b56cf 100644 --- a/winsup/cygwin/path.cc +++ b/winsup/cygwin/path.cc @@ -247,7 +247,7 @@ normalize_posix_path (const char *src, char *dst, char *&tail) return get_errno (); tail = strchr (tail, '\0'); if (isslash (dst[0]) && isslash (dst[1])) - ++dst_start; + ++dst_start; if (*src == '.') { if (tail == dst_start + 1 && *dst_start == '/') @@ -1112,14 +1112,14 @@ normalize_win32_path (const char *src, char *dst, char *&tail) if (beg_src_slash && isdirsep (src[1])) { if (isdirsep (src[2])) - { + { /* More than two slashes are just folded into one. */ src += 2; while (isdirsep (src[1])) ++src; } else - { + { /* Two slashes start a network or device path. */ *tail++ = '\\'; src++; @@ -3717,10 +3717,10 @@ realpath (const char *path, char *resolved) { if (!resolved) { - resolved = (char *) malloc (strlen (real_path.normalized_path) + 1); - if (!resolved) + resolved = (char *) malloc (strlen (real_path.normalized_path) + 1); + if (!resolved) return NULL; - } + } return strcpy (resolved, real_path.normalized_path); } diff --git a/winsup/cygwin/pinfo.cc b/winsup/cygwin/pinfo.cc index 2cf848e..cc7cdbf 100644 --- a/winsup/cygwin/pinfo.cc +++ b/winsup/cygwin/pinfo.cc @@ -1176,14 +1176,14 @@ out: the function will exit without adding anything to the pid list. If p is "true" then we've discovered a cygwin process. - + Handle "myself" differently. Don't copy it and close/zero the handle we just opened to it. If not performing a copy, then keep the process handle open for the duration of the life of the procinfo region to potential races when a new process uses this pid. Otherwise, malloc some memory for a copy of the shared memory. - + If the malloc failed, then "oh well". Just keep the shared memory around and eventually close the handle when the winpids goes out of scope. diff --git a/winsup/cygwin/sysconf.cc b/winsup/cygwin/sysconf.cc index 7bd8cb6..bdbbb99 100644 --- a/winsup/cygwin/sysconf.cc +++ b/winsup/cygwin/sysconf.cc @@ -124,7 +124,7 @@ sysconf (int in) case _SC_TTY_NAME_MAX: return TTY_NAME_MAX; case _SC_MEMLOCK_RANGE: - return _POSIX_MEMLOCK_RANGE; + return _POSIX_MEMLOCK_RANGE; } /* Invalid input or unimplemented sysconf name */ diff --git a/winsup/cygwin/syslog.cc b/winsup/cygwin/syslog.cc index a4beaea..fc6758b 100644 --- a/winsup/cygwin/syslog.cc +++ b/winsup/cygwin/syslog.cc @@ -233,7 +233,7 @@ out: sprintf (pribuf, "<%d>", priority); struct iovec iv[2] = { - { pribuf, strlen (pribuf) }, + { pribuf, strlen (pribuf) }, { (char *) msg, len } }; |