Skip to content

format: clean up errant spaces.#1593

Open
jcpunk wants to merge 1 commit intoshadow-maint:masterfrom
jcpunk:space-fix
Open

format: clean up errant spaces.#1593
jcpunk wants to merge 1 commit intoshadow-maint:masterfrom
jcpunk:space-fix

Conversation

@jcpunk
Copy link
Contributor

@jcpunk jcpunk commented Mar 18, 2026

This commit should have zero functional changes, but remove the no longer expected space between a function and its arguments.

This commit should have zero functional changes, but remove the
no longer expected space between a function and its arguments.

Signed-off-by: Pat Riehecky <riehecky@fnal.gov>
@alejandro-colomar
Copy link
Collaborator

The problem with such a huge patch would be that downstream is going to have problems rebasing patches. But I'm fine with this, FWIW. (I haven't reviewed yet, but the idea seems reasonable.)

@alejandro-colomar
Copy link
Collaborator

BTW, if this has been scripted, please paste the scripts in the commit message, so that it can be fully reproduced and investigated.

printf (MSG_WARN_EDIT_OTHER_FILE,
pw_dbname (),
spw_dbname (),
vipwedit(pw_dbname(), pw_lock, pw_unlock);

Check failure

Code scanning / CodeQL

Uncontrolled data used in path expression High

This argument to a file access function is derived from
user input (a command-line argument)
and then passed to vipwedit(file), which calls fopen(__filename).
db->changed = false;

fd = open (db->filename,
fd = open(db->filename,

Check failure

Code scanning / CodeQL

Uncontrolled data used in path expression High

This argument to a file access function is derived from
user input (a command-line argument)
and then passed to open(__path).
This argument to a file access function is derived from
user input (a command-line argument)
and then passed to open(__path).
}

tp = localtime (&(fail->fail_time));
tp = localtime(&(fail->fail_time));

Check failure

Code scanning / CodeQL

Use of potentially dangerous function Critical

Call to 'localtime' is potentially dangerous.
* grief.
*/
(void) execle (file, arg, (char *) NULL, envp);
(void) execle(file, arg, (char *) NULL, envp);

Check failure

Code scanning / CodeQL

Uncontrolled process operation High

The value of this argument may come from
an environment variable
and is being passed to execle.
The value of this argument may come from
an environment variable
and is being passed to execle.
printf (MSG_WARN_EDIT_OTHER_FILE,
spw_dbname (),
pw_dbname (),
vipwedit(spw_dbname(), spw_lock, spw_unlock);

Check failure

Code scanning / CodeQL

Uncontrolled data used in path expression High

This argument to a file access function is derived from
user input (a command-line argument)
and then passed to vipwedit(file), which calls fopen(__filename).
continue;
}
if (set_locktime_one (pwent->pw_uid, locktime)) {
if (set_locktime_one(pwent->pw_uid, locktime)) {

Check warning

Code scanning / CodeQL

Potential exposure of sensitive system data to an unauthorized control sphere Medium

This operation potentially exposes sensitive system data from
*call to getpwent
.
continue;
}
if (setmax_one (pwent->pw_uid, max)) {
if (setmax_one(pwent->pw_uid, max)) {

Check warning

Code scanning / CodeQL

Potential exposure of sensitive system data to an unauthorized control sphere Medium

This operation potentially exposes sensitive system data from
*call to getpwent
.
continue;
}
if (reset_one (pwent->pw_uid)) {
if (reset_one(pwent->pw_uid)) {

Check warning

Code scanning / CodeQL

Potential exposure of sensitive system data to an unauthorized control sphere Medium

This operation potentially exposes sensitive system data from
*call to getpwent
.
@@ -2056,7 +2056,7 @@
}
#endif /* ENABLE_LASTLOG */

static void tallylog_reset (const char *user_name)
static void tallylog_reset(const char *user_name)

Check notice

Code scanning / CodeQL

Local variable hides global variable Note

Parameter user_name hides a
global variable
with the same name.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants