--- /dev/null
+From d401b23149a89fc14806dc8c347f2a85205a95cd Mon Sep 17 00:00:00 2001
+From: Philip Prindeville <philipp@redfish-solutions.com>
+Date: Mon, 26 Jun 2017 18:34:04 -0600
+Subject: [PATCH v1 1/1] Cleanup calls to message() containing newlines
+To: Philipp Rumpf <prumpf@mandrakesoft.com>, Jeff Garzik <jgarzik@pobox.com>, Henrique de Moraes Holschuh <hmh@debian.org>, Andrew Morton <akpm@linux-foundation.org>
+Cc: Philip Prindeville <philipp@redfish-solutions.com>
+
+Newlines are added automatically by logging daemons, and having
+embedded newlines can cause extra blank lines in syslog-ng,
+busybox, etc.
+
+Signed-off-by: Philip Prindeville <philipp@redfish-solutions.com>
+---
+ rngd.c | 8 ++++----
+ rngd_entsource.c | 6 +++---
+ rngd_linux.c | 2 +-
+ rngd_rdrand.c | 6 +++---
+ 4 files changed, 11 insertions(+), 11 deletions(-)
+
+diff --git a/rngd.c b/rngd.c
+index 0205d40e0abb970fb126460306398388bd7462a0..f10198682a14f2f1460100a1d274ad0d724cb326 100644
+--- a/rngd.c
++++ b/rngd.c
+@@ -271,7 +271,7 @@ static void do_loop(int random_step)
+ } else if (iter->failures >= MAX_RNG_FAILURES) {
+ if (!arguments->quiet)
+ message(LOG_DAEMON|LOG_ERR,
+- "too many FIPS failures, disabling entropy source\n");
++ "too many FIPS failures, disabling entropy source");
+ iter->disabled = true;
+ }
+ }
+@@ -282,7 +282,7 @@ static void do_loop(int random_step)
+
+ if (!arguments->quiet)
+ message(LOG_DAEMON|LOG_ERR,
+- "No entropy sources working, exiting rngd\n");
++ "No entropy sources working, exiting rngd");
+ }
+
+ static void term_signal(int signo)
+@@ -317,7 +317,7 @@ int main(int argc, char **argv)
+ message(LOG_DAEMON|LOG_ERR,
+ "can't open any entropy source");
+ message(LOG_DAEMON|LOG_ERR,
+- "Maybe RNG device modules are not loaded\n");
++ "Maybe RNG device modules are not loaded");
+ }
+ return 1;
+ }
+@@ -337,7 +337,7 @@ int main(int argc, char **argv)
+ && (rc_tpm || !arguments->enable_tpm)) {
+ if (!arguments->quiet)
+ message(LOG_DAEMON|LOG_ERR,
+- "No entropy source available, shutting down\n");
++ "No entropy source available, shutting down");
+ return 1;
+ }
+
+diff --git a/rngd_entsource.c b/rngd_entsource.c
+index f0e219d7af674204e5bdcf96e9045c40717872c3..8c1d7cb33159c9a0e03a4ea83f3a3358c706e2e3 100644
+--- a/rngd_entsource.c
++++ b/rngd_entsource.c
+@@ -64,7 +64,7 @@ int xread(void *buf, size_t size, struct rng *ent_src)
+ }
+
+ if (size) {
+- message(LOG_DAEMON|LOG_ERR, "read error\n");
++ message(LOG_DAEMON|LOG_ERR, "read error");
+ return -1;
+ }
+ return 0;
+@@ -114,7 +114,7 @@ int xread_tpm(void *buf, size_t size, struct rng *ent_src)
+ sizeof(rng_cmd) - r);
+ if (retval < 0) {
+ message(LOG_ERR|LOG_INFO,
+- "Error writing %s\n",
++ "Error writing %s",
+ ent_src->rng_name);
+ retval = -1;
+ goto error_out;
+@@ -123,7 +123,7 @@ int xread_tpm(void *buf, size_t size, struct rng *ent_src)
+ }
+ if (r < sizeof(rng_cmd)) {
+ message(LOG_ERR|LOG_INFO,
+- "Error writing %s\n", ent_src->rng_name);
++ "Error writing %s", ent_src->rng_name);
+ retval = -1;
+ goto error_out;
+ }
+diff --git a/rngd_linux.c b/rngd_linux.c
+index c4f45dedecad0fd3bf80a35d7c240b917bf5ffdd..481c6bb15def3f06989766988b61f35d91207b58 100644
+--- a/rngd_linux.c
++++ b/rngd_linux.c
+@@ -131,7 +131,7 @@ void random_add_entropy(void *buf, size_t size)
+ memcpy(entropy.data, buf, size);
+
+ if (ioctl(random_fd, RNDADDENTROPY, &entropy) != 0) {
+- message(LOG_DAEMON|LOG_ERR, "RNDADDENTROPY failed: %s\n",
++ message(LOG_DAEMON|LOG_ERR, "RNDADDENTROPY failed: %s",
+ strerror(errno));
+ exit(1);
+ }
+diff --git a/rngd_rdrand.c b/rngd_rdrand.c
+index 4d7a5a7b3f52c3af8e677d3c4d758d4d235f1dd6..c1919d538428a8647dbce88d7d76384761e5b6cc 100644
+--- a/rngd_rdrand.c
++++ b/rngd_rdrand.c
+@@ -162,7 +162,7 @@ static inline int gcrypt_mangle(unsigned char *tmp)
+
+ if (gcry_error) {
+ message(LOG_DAEMON|LOG_ERR,
+- "gcry_cipher_encrypt error: %s\n",
++ "gcry_cipher_encrypt error: %s",
+ gcry_strerror(gcry_error));
+ return -1;
+ }
+@@ -257,7 +257,7 @@ static int init_gcrypt(const void *key)
+
+ if (!gcry_check_version(MIN_GCRYPT_VERSION)) {
+ message(LOG_DAEMON|LOG_ERR,
+- "libgcrypt version mismatch: have %s, require >= %s\n",
++ "libgcrypt version mismatch: have %s, require >= %s",
+ gcry_check_version(NULL), MIN_GCRYPT_VERSION);
+ return 1;
+ }
+@@ -278,7 +278,7 @@ static int init_gcrypt(const void *key)
+
+ if (gcry_error) {
+ message(LOG_DAEMON|LOG_ERR,
+- "could not set key or IV: %s\n",
++ "could not set key or IV: %s",
+ gcry_strerror(gcry_error));
+ gcry_cipher_close(gcry_cipher_hd);
+ return 1;
+--
+2.7.4
+