From 295732ea1e44ff314f1d1e38e5a02857edcb244e Mon Sep 17 00:00:00 2001 From: Christopher Faylor Date: Thu, 6 Feb 2003 20:37:55 +0000 Subject: [PATCH] whitespace cleanup --- gdb/win32-nat.c | 10 +++++----- gdb/windows-nat.c | 10 +++++----- 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/gdb/win32-nat.c b/gdb/win32-nat.c index 90a255ace90..350a9957319 100644 --- a/gdb/win32-nat.c +++ b/gdb/win32-nat.c @@ -749,7 +749,7 @@ child_clear_solibs (void) solib_end = &solib_start; max_dll_name_len = sizeof ("DLL Name") - 1; } - + /* Get the loaded address of all sections, given that .text was loaded at text_load. Assumes that all sections are subject to the same relocation offset. Returns NULL if problems occur or if the @@ -802,7 +802,7 @@ get_relocated_section_addrs (bfd *abfd, CORE_ADDR text_load) return result; } - + /* Add DLL symbol information. */ static struct objfile * solib_symbols_add (char *name, int from_tty, CORE_ADDR load_addr) @@ -1501,12 +1501,12 @@ set_process_privilege (const char *privilege, BOOL enable) AdjustTokenPrivileges = GetProcAddress (advapi32, "AdjustTokenPrivileges"); if (!OpenProcessToken || !LookupPrivilegeValue || !AdjustTokenPrivileges) - { + { advapi32 = NULL; goto out; } } - + if (!OpenProcessToken (GetCurrentProcess (), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, &token_hdl)) @@ -1520,7 +1520,7 @@ set_process_privilege (const char *privilege, BOOL enable) new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0; if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv, - sizeof orig_priv, &orig_priv, &size)) + sizeof orig_priv, &orig_priv, &size)) goto out; #if 0 /* Disabled, otherwise every `attach' in an unprivileged user session diff --git a/gdb/windows-nat.c b/gdb/windows-nat.c index 90a255ace90..350a9957319 100644 --- a/gdb/windows-nat.c +++ b/gdb/windows-nat.c @@ -749,7 +749,7 @@ child_clear_solibs (void) solib_end = &solib_start; max_dll_name_len = sizeof ("DLL Name") - 1; } - + /* Get the loaded address of all sections, given that .text was loaded at text_load. Assumes that all sections are subject to the same relocation offset. Returns NULL if problems occur or if the @@ -802,7 +802,7 @@ get_relocated_section_addrs (bfd *abfd, CORE_ADDR text_load) return result; } - + /* Add DLL symbol information. */ static struct objfile * solib_symbols_add (char *name, int from_tty, CORE_ADDR load_addr) @@ -1501,12 +1501,12 @@ set_process_privilege (const char *privilege, BOOL enable) AdjustTokenPrivileges = GetProcAddress (advapi32, "AdjustTokenPrivileges"); if (!OpenProcessToken || !LookupPrivilegeValue || !AdjustTokenPrivileges) - { + { advapi32 = NULL; goto out; } } - + if (!OpenProcessToken (GetCurrentProcess (), TOKEN_QUERY | TOKEN_ADJUST_PRIVILEGES, &token_hdl)) @@ -1520,7 +1520,7 @@ set_process_privilege (const char *privilege, BOOL enable) new_priv.Privileges[0].Attributes = enable ? SE_PRIVILEGE_ENABLED : 0; if (!AdjustTokenPrivileges (token_hdl, FALSE, &new_priv, - sizeof orig_priv, &orig_priv, &size)) + sizeof orig_priv, &orig_priv, &size)) goto out; #if 0 /* Disabled, otherwise every `attach' in an unprivileged user session -- 2.30.2