Index: uspace/lib/c/arch/ia32/src/entry.S
===================================================================
--- uspace/lib/c/arch/ia32/src/entry.S	(revision 1d6dd2a62370f8442aef510558ad86b6439e6653)
+++ uspace/lib/c/arch/ia32/src/entry.S	(revision fd57cf17d12bbe3b41626a0b8708f075134a073e)
@@ -46,5 +46,5 @@
 	mov %ax, %fs
 	# Do not set %gs, it contains descriptor that can see TLS
-	
+
 #ifndef PROCESSOR_i486
 	# Detect the mechanism used for making syscalls
@@ -57,5 +57,5 @@
 	0:
 #endif
-	
+
 	#
 	# Create the first stack frame.
@@ -64,5 +64,5 @@
 	pushl $0
 	movl %esp, %ebp
-	
+
 	# Pass the PCB pointer to __main as the first argument
 	pushl %edi
Index: uspace/lib/c/arch/ia32/src/entryjmp.S
===================================================================
--- uspace/lib/c/arch/ia32/src/entryjmp.S	(revision 1d6dd2a62370f8442aef510558ad86b6439e6653)
+++ uspace/lib/c/arch/ia32/src/entryjmp.S	(revision fd57cf17d12bbe3b41626a0b8708f075134a073e)
@@ -36,14 +36,14 @@
 	push %ebp
 	movl %esp, %ebp
-	
+
 	# %eax := entry_point
 	movl 0x8(%ebp), %eax
-	
+
 	# %edi := pcb
 	# pcb is passed to the entry point in %edi
 	mov 0xc(%ebp), %edi
-	
+
 	# Save a tiny bit of stack space
 	pop %ebp
-	
+
 	jmp *%eax
Index: uspace/lib/c/arch/ia32/src/fibril.S
===================================================================
--- uspace/lib/c/arch/ia32/src/fibril.S	(revision 1d6dd2a62370f8442aef510558ad86b6439e6653)
+++ uspace/lib/c/arch/ia32/src/fibril.S	(revision fd57cf17d12bbe3b41626a0b8708f075134a073e)
@@ -40,5 +40,5 @@
 	movl 0(%esp), %eax  # the caller's return %eip
 	movl 4(%esp), %edx  # address of the context variable to save context to
-	
+
 	# save registers to the context structure
 	movl %esp, CONTEXT_OFFSET_SP(%edx)	# %esp -> ctx->sp
@@ -48,9 +48,9 @@
 	movl %edi, CONTEXT_OFFSET_EDI(%edx)	# %edi -> ctx->edi
 	movl %ebp, CONTEXT_OFFSET_EBP(%edx)	# %ebp -> ctx->ebp
-	
+
 	# save TLS
 	movl %gs:0, %eax
 	movl %eax, CONTEXT_OFFSET_TLS(%edx)	# tls -> ctx->tls
-	
+
 	xorl %eax, %eax		# context_save returns 1
 	incl %eax
@@ -65,5 +65,5 @@
 FUNCTION_BEGIN(context_restore)
 	movl 4(%esp), %eax  # address of the context variable to restore context from
-	
+
 	# restore registers from the context structure
 	movl CONTEXT_OFFSET_SP(%eax),%esp	# ctx->sp -> %esp
@@ -73,11 +73,11 @@
 	movl CONTEXT_OFFSET_EDI(%eax),%edi	# ctx->edi -> %edi
 	movl CONTEXT_OFFSET_EBP(%eax),%ebp	# ctx->ebp -> %ebp
-	
+
 	movl %edx, 0(%esp)  # ctx->pc -> saver's return %eip
-	
+
 	# set thread local storage
 	movl CONTEXT_OFFSET_TLS(%eax), %edx	# Set arg1 to TLS addr
 	movl %edx, %gs:0
-	
+
 	xorl %eax, %eax		# context_restore returns 0
 	ret
Index: uspace/lib/c/arch/ia32/src/rtld/reloc.c
===================================================================
--- uspace/lib/c/arch/ia32/src/rtld/reloc.c	(revision 1d6dd2a62370f8442aef510558ad86b6439e6653)
+++ uspace/lib/c/arch/ia32/src/rtld/reloc.c	(revision fd57cf17d12bbe3b41626a0b8708f075134a073e)
@@ -65,5 +65,5 @@
 	elf_word sym_idx;
 	uint32_t sym_addr;
-	
+
 	elf_symbol_t *sym_table;
 	elf_symbol_t *sym;
@@ -71,5 +71,5 @@
 	uint32_t sym_size;
 	char *str_tab;
-	
+
 	elf_symbol_t *sym_def;
 	module_t *dest;
@@ -82,5 +82,5 @@
 
 	DPRINTF("address: 0x%" PRIxPTR ", entries: %zd\n", (uintptr_t)rt, rt_entries);
-	
+
 	for (i = 0; i < rt_entries; ++i) {
 //		DPRINTF("symbol %d: ", i);
@@ -173,5 +173,5 @@
 			memcpy(r_ptr, (const void *)sym_addr, sym_size);
 			break;
-			
+
 		case R_386_RELATIVE:
 			DPRINTF("fixup R_386_RELATIVE (b+a)\n");
Index: uspace/lib/c/arch/ia32/src/thread_entry.S
===================================================================
--- uspace/lib/c/arch/ia32/src/thread_entry.S	(revision 1d6dd2a62370f8442aef510558ad86b6439e6653)
+++ uspace/lib/c/arch/ia32/src/thread_entry.S	(revision fd57cf17d12bbe3b41626a0b8708f075134a073e)
@@ -40,5 +40,5 @@
 	mov %dx, %fs
 	# Do not set %gs, it contains descriptor that can see TLS
-	
+
 	#
 	# Create the first stack frame.
@@ -47,5 +47,5 @@
 	pushl $0
 	mov %esp, %ebp
-	
+
 	#
 	# EAX contains address of uarg.
@@ -53,5 +53,5 @@
 	pushl %eax
 	call __thread_main
-	
+
 	#
 	# Not reached.
