selinux: fix style issues with security/selinux/include/policycap_names.h
As part of on ongoing effort to perform more automated testing and provide more tools for individual developers to validate their patches before submitting, we are trying to make our code "clang-format clean". My hope is that once we have fixed all of our style "quirks", developers will be able to run clang-format on their patches to help avoid silly formatting problems and ensure their changes fit in well with the rest of the SELinux kernel code. Signed-off-by: Paul Moore <paul@paul-moore.com>
This commit is contained in:
parent
db896a0061
commit
376ef14d62
|
@ -1,9 +1,11 @@
|
||||||
/* SPDX-License-Identifier: GPL-2.0 */
|
/* SPDX-License-Identifier: GPL-2.0 */
|
||||||
|
|
||||||
#ifndef _SELINUX_POLICYCAP_NAMES_H_
|
#ifndef _SELINUX_POLICYCAP_NAMES_H_
|
||||||
#define _SELINUX_POLICYCAP_NAMES_H_
|
#define _SELINUX_POLICYCAP_NAMES_H_
|
||||||
|
|
||||||
#include "policycap.h"
|
#include "policycap.h"
|
||||||
|
|
||||||
|
/* clang-format off */
|
||||||
/* Policy capability names */
|
/* Policy capability names */
|
||||||
const char *const selinux_policycap_names[__POLICYDB_CAP_MAX] = {
|
const char *const selinux_policycap_names[__POLICYDB_CAP_MAX] = {
|
||||||
"network_peer_controls",
|
"network_peer_controls",
|
||||||
|
@ -16,5 +18,6 @@ const char *const selinux_policycap_names[__POLICYDB_CAP_MAX] = {
|
||||||
"ioctl_skip_cloexec",
|
"ioctl_skip_cloexec",
|
||||||
"userspace_initial_context",
|
"userspace_initial_context",
|
||||||
};
|
};
|
||||||
|
/* clang-format on */
|
||||||
|
|
||||||
#endif /* _SELINUX_POLICYCAP_NAMES_H_ */
|
#endif /* _SELINUX_POLICYCAP_NAMES_H_ */
|
||||||
|
|
Loading…
Reference in New Issue