From 07e8c3055d1a25ef340185603dc79476288b1085 Mon Sep 17 00:00:00 2001 From: Yu Watanabe Date: Mon, 25 Dec 2023 02:13:49 +0900 Subject: [PATCH] tree-wide: drop several doubled space --- src/analyze/analyze-security.c | 10 +++++----- src/basic/alloc-util.h | 2 +- src/basic/cgroup-util.h | 2 +- src/basic/env-file.c | 2 +- src/shared/firewall-util.h | 2 +- 5 files changed, 9 insertions(+), 9 deletions(-) diff --git a/src/analyze/analyze-security.c b/src/analyze/analyze-security.c index 5f1b5e69705..030b206f1e0 100644 --- a/src/analyze/analyze-security.c +++ b/src/analyze/analyze-security.c @@ -1651,7 +1651,7 @@ static uint64_t access_weight(const struct security_assessor *a, JsonVariant *po assert(a); val = security_assessor_find_in_policy(a, policy, "weight"); - if (val) { + if (val) { if (json_variant_is_unsigned(val)) return json_variant_unsigned(val); log_debug("JSON field 'weight' of policy for %s is not an unsigned integer, ignoring.", a->id); @@ -1666,7 +1666,7 @@ static uint64_t access_range(const struct security_assessor *a, JsonVariant *pol assert(a); val = security_assessor_find_in_policy(a, policy, "range"); - if (val) { + if (val) { if (json_variant_is_unsigned(val)) return json_variant_unsigned(val); log_debug("JSON field 'range' of policy for %s is not an unsigned integer, ignoring.", a->id); @@ -1681,7 +1681,7 @@ static const char *access_description_na(const struct security_assessor *a, Json assert(a); val = security_assessor_find_in_policy(a, policy, "description_na"); - if (val) { + if (val) { if (json_variant_is_string(val)) return json_variant_string(val); log_debug("JSON field 'description_na' of policy for %s is not a string, ignoring.", a->id); @@ -1696,7 +1696,7 @@ static const char *access_description_good(const struct security_assessor *a, Js assert(a); val = security_assessor_find_in_policy(a, policy, "description_good"); - if (val) { + if (val) { if (json_variant_is_string(val)) return json_variant_string(val); log_debug("JSON field 'description_good' of policy for %s is not a string, ignoring.", a->id); @@ -1711,7 +1711,7 @@ static const char *access_description_bad(const struct security_assessor *a, Jso assert(a); val = security_assessor_find_in_policy(a, policy, "description_bad"); - if (val) { + if (val) { if (json_variant_is_string(val)) return json_variant_string(val); log_debug("JSON field 'description_bad' of policy for %s is not a string, ignoring.", a->id); diff --git a/src/basic/alloc-util.h b/src/basic/alloc-util.h index 4f86334d7d4..5fbfff0af41 100644 --- a/src/basic/alloc-util.h +++ b/src/basic/alloc-util.h @@ -112,7 +112,7 @@ static inline bool size_multiply_overflow(size_t size, size_t need) { return _unlikely_(need != 0 && size > (SIZE_MAX / need)); } -_malloc_ _alloc_(1, 2) static inline void *malloc_multiply(size_t size, size_t need) { +_malloc_ _alloc_(1, 2) static inline void *malloc_multiply(size_t size, size_t need) { if (size_multiply_overflow(size, need)) return NULL; diff --git a/src/basic/cgroup-util.h b/src/basic/cgroup-util.h index 6ab14c753d5..be97258d168 100644 --- a/src/basic/cgroup-util.h +++ b/src/basic/cgroup-util.h @@ -215,7 +215,7 @@ int cg_is_delegated_fd(int fd); int cg_has_coredump_receive(const char *path); -typedef enum { +typedef enum { CG_KEY_MODE_GRACEFUL = 1 << 0, } CGroupKeyMode; diff --git a/src/basic/env-file.c b/src/basic/env-file.c index c2cbff4d843..2fff98f8fb4 100644 --- a/src/basic/env-file.c +++ b/src/basic/env-file.c @@ -125,7 +125,7 @@ static int parse_env_file_internal( state = VALUE; if (!GREEDY_REALLOC(value, n_value+2)) - return -ENOMEM; + return -ENOMEM; value[n_value++] = c; } diff --git a/src/shared/firewall-util.h b/src/shared/firewall-util.h index 14e35bec8d6..25ba0d4b3b4 100644 --- a/src/shared/firewall-util.h +++ b/src/shared/firewall-util.h @@ -43,7 +43,7 @@ typedef enum NFTSetSource { NFT_SET_SOURCE_GROUP, _NFT_SET_SOURCE_MAX, _NFT_SET_SOURCE_INVALID = -EINVAL, -} NFTSetSource; +} NFTSetSource; typedef struct NFTSet { NFTSetSource source;