Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp624056ybg; Tue, 28 Jul 2020 14:37:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxU0RdpuQoNox++IxSZv/VKa/KXixnexnZmujG87g1+w9BsYpnfdAqYpgiiKC9ASAXJBxYu X-Received: by 2002:a17:907:11dd:: with SMTP id va29mr26505219ejb.470.1595972266184; Tue, 28 Jul 2020 14:37:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595972266; cv=none; d=google.com; s=arc-20160816; b=g6Y9eZEndsx2OQpxYPd0u8kliIZ+GHFTPqUzmG9faTMYLWr7ITxqHI7HQOFequCsGn HLF9P625cSkCKjVBYjgiS7fHAiE2yE8BGiOqhzeeOz1v46z+5iH6/70xYCZoCvyYz7/p OqsmjkFANkI75rrZvroHQh8q/AGO1YX9dVEtzzXeb1g6hrlpR2xicRgtj16Z6Y7zv9nJ weB7lAog7pqenhNAQ6lKT1L3r1YdiDShvWfs/6OGzfvsHaOQYBZ9O/TLSKFCuXvjAD8U G1O9UUMMu294X0KtLRJ1plYtFOVdnxA/9x2vPO/JhC8gWsb+Jw7RCUsiYIjuvGKJ8h2s iX0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=BO1cenWUnGNayuyBmKqbXIIbsqyXRIWwZdTmlpXz42M=; b=BDCZ+pfeYslsgvqcTsbtCuWeFeWoHZMPWG6jeGIIlsNWQpUGYoYpWTIJC1+tOa3YmL MUQeNadf/19rGhoqKkRoAHtypip5FosiBwGr3lnMLHuXpg8EFyqRu7MuAcRGeRyZIOV4 LRCaf3XVlEZX9TYkNcuNWCaiF7jJnc2/3ddAM0Dl7e1MfHD+hwBm5//pwDuDfgrhJY07 ZMVXyxBFRUwiNADO69PY7vh0A+rCIKbKmEDzy2G19igQdLEeNnSLjXznnEcCv+ngbADp J3IclS58JiElkcnqzKtGBFuMkQvs23jXtn0ELfGB6wBNSWjApBVl4ZqDfOg7JTP6BF2T +T4Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=RaHVbLaW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o21si7859376ejb.37.2020.07.28.14.37.23; Tue, 28 Jul 2020 14:37:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=RaHVbLaW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729787AbgG1Vgz (ORCPT + 99 others); Tue, 28 Jul 2020 17:36:55 -0400 Received: from linux.microsoft.com ([13.77.154.182]:47292 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729505AbgG1Vgd (ORCPT ); Tue, 28 Jul 2020 17:36:33 -0400 Received: from dede-linux-virt.corp.microsoft.com (unknown [131.107.160.54]) by linux.microsoft.com (Postfix) with ESMTPSA id 3F25C20B4923; Tue, 28 Jul 2020 14:36:30 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 3F25C20B4923 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1595972190; bh=BO1cenWUnGNayuyBmKqbXIIbsqyXRIWwZdTmlpXz42M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RaHVbLaWB+l5MyXu+WEVHQdhh8velqRtK0KcQtcOuUu7+CqBtj7tVSvKs8A361m5f 3UsFkckhYrWNNYhWYOH1Zj9h8jFwOfeLA6mjsHpruXQwIMicbgCwHXS3dGP6CdOaCv onZUWPXWfnxjjocj/n0TSoX/fyeNPC6PT4YV9QgE= From: Deven Bowers To: agk@redhat.com, axboe@kernel.dk, snitzer@redhat.com, jmorris@namei.org, serge@hallyn.com, zohar@linux.ibm.com, viro@zeniv.linux.org.uk, paul@paul-moore.com, eparis@redhat.com, jannh@google.com, dm-devel@redhat.com, linux-integrity@vger.kernel.org, linux-security-module@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-block@vger.kernel.org, linux-audit@redhat.com Cc: tyhicks@linux.microsoft.com, linux-kernel@vger.kernel.org, corbet@lwn.net, sashal@kernel.org, jaskarankhurana@linux.microsoft.com, mdsakib@microsoft.com, nramas@linux.microsoft.com, pasha.tatashin@soleen.com Subject: [RFC PATCH v5 12/12] cleanup: uapi/linux/audit.h Date: Tue, 28 Jul 2020 14:36:14 -0700 Message-Id: <20200728213614.586312-15-deven.desai@linux.microsoft.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200728213614.586312-1-deven.desai@linux.microsoft.com> References: <20200728213614.586312-1-deven.desai@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Remove trailing whitespaces and align the integrity #defines in linux/uapi/audit.h Signed-off-by: Deven Bowers --- include/uapi/linux/audit.h | 32 ++++++++++++++++---------------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h index 5a634cca1d42..609b4a5e8a80 100644 --- a/include/uapi/linux/audit.h +++ b/include/uapi/linux/audit.h @@ -48,7 +48,7 @@ * 2500 - 2999 future user space (maybe integrity labels and related events) * * Messages from 1000-1199 are bi-directional. 1200-1299 & 2100 - 2999 are - * exclusively user space. 1300-2099 is kernel --> user space + * exclusively user space. 1300-2099 is kernel --> user space * communication. */ #define AUDIT_GET 1000 /* Get status */ @@ -78,7 +78,7 @@ #define AUDIT_LAST_USER_MSG 1199 #define AUDIT_FIRST_USER_MSG2 2100 /* More user space messages */ #define AUDIT_LAST_USER_MSG2 2999 - + #define AUDIT_DAEMON_START 1200 /* Daemon startup record */ #define AUDIT_DAEMON_END 1201 /* Daemon normal stop record */ #define AUDIT_DAEMON_ABORT 1202 /* Daemon error stop record */ @@ -140,20 +140,20 @@ #define AUDIT_MAC_CALIPSO_ADD 1418 /* NetLabel: add CALIPSO DOI entry */ #define AUDIT_MAC_CALIPSO_DEL 1419 /* NetLabel: del CALIPSO DOI entry */ -#define AUDIT_FIRST_KERN_ANOM_MSG 1700 -#define AUDIT_LAST_KERN_ANOM_MSG 1799 -#define AUDIT_ANOM_PROMISCUOUS 1700 /* Device changed promiscuous mode */ -#define AUDIT_ANOM_ABEND 1701 /* Process ended abnormally */ -#define AUDIT_ANOM_LINK 1702 /* Suspicious use of file links */ -#define AUDIT_ANOM_CREAT 1703 /* Suspicious file creation */ -#define AUDIT_INTEGRITY_DATA 1800 /* Data integrity verification */ -#define AUDIT_INTEGRITY_METADATA 1801 /* Metadata integrity verification */ -#define AUDIT_INTEGRITY_STATUS 1802 /* Integrity enable status */ -#define AUDIT_INTEGRITY_HASH 1803 /* Integrity HASH type */ -#define AUDIT_INTEGRITY_PCR 1804 /* PCR invalidation msgs */ -#define AUDIT_INTEGRITY_RULE 1805 /* policy rule */ -#define AUDIT_INTEGRITY_EVM_XATTR 1806 /* New EVM-covered xattr */ -#define AUDIT_INTEGRITY_POLICY_RULE 1807 /* IMA policy rules */ +#define AUDIT_FIRST_KERN_ANOM_MSG 1700 +#define AUDIT_LAST_KERN_ANOM_MSG 1799 +#define AUDIT_ANOM_PROMISCUOUS 1700 /* Device changed promiscuous mode */ +#define AUDIT_ANOM_ABEND 1701 /* Process ended abnormally */ +#define AUDIT_ANOM_LINK 1702 /* Suspicious use of file links */ +#define AUDIT_ANOM_CREAT 1703 /* Suspicious file creation */ +#define AUDIT_INTEGRITY_DATA 1800 /* Data integrity verification */ +#define AUDIT_INTEGRITY_METADATA 1801 /* Metadata integrity verification */ +#define AUDIT_INTEGRITY_STATUS 1802 /* Integrity enable status */ +#define AUDIT_INTEGRITY_HASH 1803 /* Integrity HASH type */ +#define AUDIT_INTEGRITY_PCR 1804 /* PCR invalidation msgs */ +#define AUDIT_INTEGRITY_RULE 1805 /* policy rule */ +#define AUDIT_INTEGRITY_EVM_XATTR 1806 /* New EVM-covered xattr */ +#define AUDIT_INTEGRITY_POLICY_RULE 1807 /* IMA policy rules */ #define AUDIT_INTEGRITY_POLICY_LOAD 1808 /* IPE Policy Load */ #define AUDIT_INTEGRITY_POLICY_ACTIVATE 1809 /* IPE Policy Activation */ #define AUDIT_INTEGRITY_EVENT 1810 /* IPE Evaluation Event */ -- 2.27.0