diff options
author | Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> | 2011-01-21 11:39:56 +0100 |
---|---|---|
committer | Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> | 2011-01-21 11:39:56 +0100 |
commit | 133dacf17131daa138f22b7ac38f3b94de203681 (patch) | |
tree | 903032266b8555c25058c9c223e870a87480740f /kernel/xt_set.c | |
parent | ed3c453a0787ddc10c5ce6010bd6ac663c740b68 (diff) |
Fix trailing whitespaces and pr_* messages
Some trailing whitespace slipped in, those are removed. With the deleted
ip_set_kernel.h, the pr_* messages lost the trailing "\n" character.
The messages were completed with it.
Diffstat (limited to 'kernel/xt_set.c')
-rw-r--r-- | kernel/xt_set.c | 20 |
1 files changed, 10 insertions, 10 deletions
diff --git a/kernel/xt_set.c b/kernel/xt_set.c index d580c6c..cc132f7 100644 --- a/kernel/xt_set.c +++ b/kernel/xt_set.c @@ -108,12 +108,12 @@ set_match_v0_checkentry(const struct xt_mtchk_param *par) index = ip_set_nfnl_get_byindex(info->match_set.index); if (index == IPSET_INVALID_ID) { - pr_warning("Cannot find set indentified by id %u to match", + pr_warning("Cannot find set indentified by id %u to match\n", info->match_set.index); return CHECK_FAIL; /* error */ } if (info->match_set.u.flags[IPSET_DIM_MAX-1] != 0) { - pr_warning("That's nasty!"); + pr_warning("That's nasty!\n"); return CHECK_FAIL; /* error */ } @@ -167,7 +167,7 @@ set_target_v0_checkentry(const struct xt_tgchk_param *par) if (info->add_set.index != IPSET_INVALID_ID) { index = ip_set_nfnl_get_byindex(info->add_set.index); if (index == IPSET_INVALID_ID) { - pr_warning("cannot find add_set index %u as target", + pr_warning("cannot find add_set index %u as target\n", info->add_set.index); return CHECK_FAIL; /* error */ } @@ -176,14 +176,14 @@ set_target_v0_checkentry(const struct xt_tgchk_param *par) if (info->del_set.index != IPSET_INVALID_ID) { index = ip_set_nfnl_get_byindex(info->del_set.index); if (index == IPSET_INVALID_ID) { - pr_warning("cannot find del_set index %u as target", + pr_warning("cannot find del_set index %u as target\n", info->del_set.index); return CHECK_FAIL; /* error */ } } if (info->add_set.u.flags[IPSET_DIM_MAX-1] != 0 || info->del_set.u.flags[IPSET_DIM_MAX-1] != 0) { - pr_warning("That's nasty!"); + pr_warning("That's nasty!\n"); return CHECK_FAIL; /* error */ } @@ -237,12 +237,12 @@ set_match_checkentry(const struct xt_mtchk_param *par) index = ip_set_nfnl_get_byindex(info->match_set.index); if (index == IPSET_INVALID_ID) { - pr_warning("Cannot find set indentified by id %u to match", + pr_warning("Cannot find set indentified by id %u to match\n", info->match_set.index); return CHECK_FAIL; /* error */ } if (info->match_set.dim > IPSET_DIM_MAX) { - pr_warning("That's nasty!"); + pr_warning("That's nasty!\n"); return CHECK_FAIL; /* error */ } @@ -295,7 +295,7 @@ set_target_checkentry(const struct xt_tgchk_param *par) if (info->add_set.index != IPSET_INVALID_ID) { index = ip_set_nfnl_get_byindex(info->add_set.index); if (index == IPSET_INVALID_ID) { - pr_warning("cannot find add_set index %u as target", + pr_warning("cannot find add_set index %u as target\n", info->add_set.index); return CHECK_FAIL; /* error */ } @@ -304,14 +304,14 @@ set_target_checkentry(const struct xt_tgchk_param *par) if (info->del_set.index != IPSET_INVALID_ID) { index = ip_set_nfnl_get_byindex(info->del_set.index); if (index == IPSET_INVALID_ID) { - pr_warning("cannot find del_set index %u as target", + pr_warning("cannot find del_set index %u as target\n", info->del_set.index); return CHECK_FAIL; /* error */ } } if (info->add_set.dim > IPSET_DIM_MAX || info->del_set.flags > IPSET_DIM_MAX) { - pr_warning("That's nasty!"); + pr_warning("That's nasty!\n"); return CHECK_FAIL; /* error */ } |