summaryrefslogtreecommitdiff
path: root/docs/internals
diff options
context:
space:
mode:
authorEric Blake <eblake@redhat.com>2011-02-04 11:16:35 -0700
committerEric Blake <eblake@redhat.com>2011-02-09 11:18:06 -0700
commit1652fa2fd21a0985113b2fd69089e5c90e71464c (patch)
treea220dfc0aed64582d1a27f57d0509f5b7ed12f65 /docs/internals
parent7a4bc156c1c4258a1f3ab321fd80f8ae9f63b625 (diff)
downloadlibvirt-1652fa2fd21a0985113b2fd69089e5c90e71464c.tar.gz
maint: whitespace cleanup
* .dir-locals.el (html-mode): Let emacs help out. * cfg.mk (sc_TAB_in_indentation): Check more files. * docs/internals/command.html.in: Fix offenders. * docs/formatdomain.html.in: Likewise. * docs/internals.html.in: Likewise. Reported by Jiri Denemark.
Diffstat (limited to 'docs/internals')
-rw-r--r--docs/internals/command.html.in32
1 files changed, 16 insertions, 16 deletions
diff --git a/docs/internals/command.html.in b/docs/internals/command.html.in
index 95d2b815df..27dcf9c4d8 100644
--- a/docs/internals/command.html.in
+++ b/docs/internals/command.html.in
@@ -20,27 +20,27 @@
<ul>
<li><code>fork+exec</code>: The lowest &amp; most flexible
- level, but very hard to use correctly / safely. It
- is easy to leak file descriptors, have unexpected
- signal handler behaviour and not handle edge cases.
- Furthermore, it is not portable to mingw.
- </li>
+ level, but very hard to use correctly / safely. It
+ is easy to leak file descriptors, have unexpected
+ signal handler behaviour and not handle edge cases.
+ Furthermore, it is not portable to mingw.
+ </li>
<li><code>system</code>: Convenient if you don't care
- about capturing command output, but has the serious
- downside that the command string is interpreted by
- the shell. This makes it very dangerous to use, because
- improperly validated user input can lead to exploits
- via shell meta characters.
+ about capturing command output, but has the serious
+ downside that the command string is interpreted by
+ the shell. This makes it very dangerous to use, because
+ improperly validated user input can lead to exploits
+ via shell meta characters.
</li>
<li><code>popen</code>: Inherits the flaws of
- <code>system</code>, and has no option for bi-directional
- communication.
+ <code>system</code>, and has no option for bi-directional
+ communication.
</li>
<li><code>posix_spawn</code>: A half-way house between
- simplicity of system() and the flexibility of fork+exec.
- It does not allow for a couple of important features
- though, such as running a hook between the fork+exec
- stage, or closing all open file descriptors.</li>
+ simplicity of system() and the flexibility of fork+exec.
+ It does not allow for a couple of important features
+ though, such as running a hook between the fork+exec
+ stage, or closing all open file descriptors.</li>
</ul>
<p>