Commit 5600b892789c21749898e1ef815a2b9b152f51e0
Committed by
Linus Torvalds
1 parent
bd3a8492ba
Exists in
master
and in
39 other branches
whitespace fixes: system auditing
Just removing white space at the end of lines. Signed-off-by: Daniel Walker <dwalker@mvista.com> Cc: David Woodhouse <dwmw2@infradead.org> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Showing 1 changed file with 7 additions and 7 deletions Side-by-side Diff
kernel/audit.c
... | ... | @@ -664,11 +664,11 @@ |
664 | 664 | if (sid) { |
665 | 665 | if (selinux_sid_to_string( |
666 | 666 | sid, &ctx, &len)) { |
667 | - audit_log_format(ab, | |
667 | + audit_log_format(ab, | |
668 | 668 | " ssid=%u", sid); |
669 | 669 | /* Maybe call audit_panic? */ |
670 | 670 | } else |
671 | - audit_log_format(ab, | |
671 | + audit_log_format(ab, | |
672 | 672 | " subj=%s", ctx); |
673 | 673 | kfree(ctx); |
674 | 674 | } |
... | ... | @@ -769,7 +769,7 @@ |
769 | 769 | sig_data->pid = audit_sig_pid; |
770 | 770 | memcpy(sig_data->ctx, ctx, len); |
771 | 771 | kfree(ctx); |
772 | - audit_send_reply(NETLINK_CB(skb).pid, seq, AUDIT_SIGNAL_INFO, | |
772 | + audit_send_reply(NETLINK_CB(skb).pid, seq, AUDIT_SIGNAL_INFO, | |
773 | 773 | 0, 0, sig_data, sizeof(*sig_data) + len); |
774 | 774 | kfree(sig_data); |
775 | 775 | break; |
... | ... | @@ -1005,7 +1005,7 @@ |
1005 | 1005 | return ret; |
1006 | 1006 | } |
1007 | 1007 | |
1008 | -static inline void audit_get_stamp(struct audit_context *ctx, | |
1008 | +static inline void audit_get_stamp(struct audit_context *ctx, | |
1009 | 1009 | struct timespec *t, unsigned int *serial) |
1010 | 1010 | { |
1011 | 1011 | if (ctx) |
... | ... | @@ -1056,7 +1056,7 @@ |
1056 | 1056 | if (gfp_mask & __GFP_WAIT) |
1057 | 1057 | reserve = 0; |
1058 | 1058 | else |
1059 | - reserve = 5; /* Allow atomic callers to go up to five | |
1059 | + reserve = 5; /* Allow atomic callers to go up to five | |
1060 | 1060 | entries over the normal backlog limit */ |
1061 | 1061 | |
1062 | 1062 | while (audit_backlog_limit |
... | ... | @@ -1319,7 +1319,7 @@ |
1319 | 1319 | if (IS_ERR(p)) { /* Should never happen since we send PATH_MAX */ |
1320 | 1320 | /* FIXME: can we save some information here? */ |
1321 | 1321 | audit_log_format(ab, "<too long>"); |
1322 | - } else | |
1322 | + } else | |
1323 | 1323 | audit_log_untrustedstring(ab, p); |
1324 | 1324 | kfree(path); |
1325 | 1325 | } |
... | ... | @@ -1365,7 +1365,7 @@ |
1365 | 1365 | * audit_log_vformat, and audit_log_end. It may be called |
1366 | 1366 | * in any context. |
1367 | 1367 | */ |
1368 | -void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, | |
1368 | +void audit_log(struct audit_context *ctx, gfp_t gfp_mask, int type, | |
1369 | 1369 | const char *fmt, ...) |
1370 | 1370 | { |
1371 | 1371 | struct audit_buffer *ab; |