diff --git a/acl/acl-update.c b/acl/acl-update.c index c3e9e83..c6816f6 100644 --- a/acl/acl-update.c +++ b/acl/acl-update.c @@ -4,8 +4,8 @@ #include #include -int hakurei_acl_update_file_by_uid(const char *path_p, uid_t uid, acl_perm_t *perms, - size_t plen) { +int hakurei_acl_update_file_by_uid(const char *path_p, uid_t uid, + acl_perm_t *perms, size_t plen) { int ret = -1; bool v; int i; diff --git a/acl/acl-update.h b/acl/acl-update.h index 6ad1a87..b86eb17 100644 --- a/acl/acl-update.h +++ b/acl/acl-update.h @@ -1,4 +1,4 @@ #include -int hakurei_acl_update_file_by_uid(const char *path_p, uid_t uid, acl_perm_t *perms, - size_t plen); +int hakurei_acl_update_file_by_uid(const char *path_p, uid_t uid, + acl_perm_t *perms, size_t plen); diff --git a/sandbox/seccomp/seccomp-build.c b/sandbox/seccomp/seccomp-build.c index 6eb3c53..3fe47df 100644 --- a/sandbox/seccomp/seccomp-build.c +++ b/sandbox/seccomp/seccomp-build.c @@ -28,8 +28,8 @@ struct hakurei_syscall_act { #define SECCOMP_RULESET_ADD(ruleset) \ do { \ - if (opts & HAKUREI_VERBOSE) \ - hakurei_println("adding seccomp ruleset \"" #ruleset "\""); \ + if (opts & HAKUREI_VERBOSE) \ + hakurei_println("adding seccomp ruleset \"" #ruleset "\""); \ for (int i = 0; i < LEN(ruleset); i++) { \ assert(ruleset[i].m_errno == EPERM || ruleset[i].m_errno == ENOSYS); \ \ @@ -50,8 +50,8 @@ struct hakurei_syscall_act { } \ } while (0) -int32_t hakurei_build_filter(int *ret_p, int fd, uint32_t arch, uint32_t multiarch, - hakurei_filter_opts opts) { +int32_t hakurei_build_filter(int *ret_p, int fd, uint32_t arch, + uint32_t multiarch, hakurei_filter_opts opts) { int32_t res = 0; /* refer to resPrefix for message */ int allow_multiarch = opts & HAKUREI_MULTIARCH; int allowed_personality = PER_LINUX; diff --git a/sandbox/seccomp/seccomp-build.h b/sandbox/seccomp/seccomp-build.h index 10f6eac..324e6d2 100644 --- a/sandbox/seccomp/seccomp-build.h +++ b/sandbox/seccomp/seccomp-build.h @@ -19,5 +19,5 @@ typedef enum { } hakurei_filter_opts; extern void hakurei_println(char *v); -int32_t hakurei_build_filter(int *ret_p, int fd, uint32_t arch, uint32_t multiarch, - hakurei_filter_opts opts); \ No newline at end of file +int32_t hakurei_build_filter(int *ret_p, int fd, uint32_t arch, + uint32_t multiarch, hakurei_filter_opts opts); \ No newline at end of file diff --git a/sandbox/wl/wayland-bind.c b/sandbox/wl/wayland-bind.c index 432527f..bf76653 100644 --- a/sandbox/wl/wayland-bind.c +++ b/sandbox/wl/wayland-bind.c @@ -29,7 +29,7 @@ static const struct wl_registry_listener registry_listener = { }; int32_t hakurei_bind_wayland_fd(char *socket_path, int fd, const char *app_id, - const char *instance_id, int sync_fd) { + const char *instance_id, int sync_fd) { int32_t res = 0; /* refer to resErr for corresponding Go error */ struct wl_display *display; diff --git a/sandbox/wl/wayland-bind.h b/sandbox/wl/wayland-bind.h index 2113697..eae8936 100644 --- a/sandbox/wl/wayland-bind.h +++ b/sandbox/wl/wayland-bind.h @@ -1,4 +1,4 @@ #include int32_t hakurei_bind_wayland_fd(char *socket_path, int fd, const char *app_id, - const char *instance_id, int sync_fd); \ No newline at end of file + const char *instance_id, int sync_fd); \ No newline at end of file