---
 src/journal/journal-file.c    | 3 ++-
 src/journal/journal-verify.c  | 3 ++-
 src/journal/journald-server.c | 6 +++---
 3 files changed, 7 insertions(+), 5 deletions(-)

diff --git a/src/journal/journal-file.c b/src/journal/journal-file.c
index c5d2d19433..ca28bd53ef 100644
--- a/src/journal/journal-file.c
+++ b/src/journal/journal-file.c
@@ -2527,7 +2527,8 @@ int journal_file_open(
                  * currently no usable API to query this, hence let's
                  * emulate this via extended attributes. If extended
                  * attributes are not supported we'll just skip this,
-                 * and rely solely on mtime/atime/ctime of the file.*/
+                 * and rely solely on mtime/atime/ctime of the file.
+                 */
 
                 crtime = htole64((uint64_t) now(CLOCK_REALTIME));
                 fsetxattr(f->fd, "user.crtime_usec", &crtime, sizeof(crtime), 
XATTR_CREATE);
diff --git a/src/journal/journal-verify.c b/src/journal/journal-verify.c
index 7e3c974b33..f20798cfad 100644
--- a/src/journal/journal-verify.c
+++ b/src/journal/journal-verify.c
@@ -427,7 +427,8 @@ static int entry_points_to_data(
 
         /* Check if this entry is also in main entry array. Since the
          * main entry array has already been verified we can rely on
-         * its consistency.*/
+         * its consistency.
+         */
 
         i = 0;
         n = le64toh(f->header->n_entries);
diff --git a/src/journal/journald-server.c b/src/journal/journald-server.c
index 80c9736420..a2a2e197c0 100644
--- a/src/journal/journald-server.c
+++ b/src/journal/journald-server.c
@@ -811,7 +811,7 @@ static void dispatch_message_real(
                  * realuid is not root, in order not to accidentally
                  * leak privileged information to the user that is
                  * logged by a privileged process that is part of an
-                 * unprivileged session.*/
+                 * unprivileged session. */
                 journal_uid = owner;
         else
                 journal_uid = 0;
@@ -1131,7 +1131,7 @@ int process_datagram(sd_event_source *es, int fd, 
uint32_t revents, void *userda
                          * the SELinux people this will change and it
                          * will probably be identical to NAME_MAX. For
                          * now we use that, but this should be updated
-                         * one day when the final limit is known.*/
+                         * one day when the final limit is known. */
                         uint8_t buf[CMSG_SPACE(sizeof(struct ucred)) +
                                     CMSG_SPACE(sizeof(struct timeval)) +
                                     CMSG_SPACE(sizeof(int)) + /* fd */
@@ -1158,7 +1158,7 @@ int process_datagram(sd_event_source *es, int fd, 
uint32_t revents, void *userda
                  * don't rely on it. */
                 (void) ioctl(fd, SIOCINQ, &v);
 
-                /* Fix it up, if it is too small. We use the same fixed value 
as auditd here. Awful!*/
+                /* Fix it up, if it is too small. We use the same fixed value 
as auditd here. Awful! */
                 m = PAGE_ALIGN(MAX3((size_t) v + 1,
                                     (size_t) LINE_MAX,
                                     ALIGN(sizeof(struct nlmsghdr)) + 
ALIGN((size_t) MAX_AUDIT_MESSAGE_LENGTH)) + 1);
-- 
2.2.0

_______________________________________________
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to