@@ -221,7 +221,7 @@ static int audit_match_signal(struct audit_entry *entry)
221221 entry -> rule .mask ));
222222 }
223223
224- switch (audit_classify_arch (arch -> val )) {
224+ switch (audit_classify_arch (arch -> val )) {
225225 case 0 : /* native */
226226 return (audit_match_class_bits (AUDIT_CLASS_SIGNAL ,
227227 entry -> rule .mask ));
@@ -243,7 +243,7 @@ static inline struct audit_entry *audit_to_entry_common(struct audit_rule_data *
243243
244244 err = - EINVAL ;
245245 listnr = rule -> flags & ~AUDIT_FILTER_PREPEND ;
246- switch (listnr ) {
246+ switch (listnr ) {
247247 default :
248248 goto exit_err ;
249249#ifdef CONFIG_AUDITSYSCALL
@@ -344,7 +344,7 @@ static int audit_field_valid(struct audit_entry *entry, struct audit_field *f)
344344
345345 switch (entry -> rule .listnr ) {
346346 case AUDIT_FILTER_FS :
347- switch (f -> type ) {
347+ switch (f -> type ) {
348348 case AUDIT_FSTYPE :
349349 case AUDIT_FILTERKEY :
350350 break ;
@@ -651,7 +651,7 @@ static struct audit_rule_data *audit_krule_to_data(struct audit_krule *krule)
651651
652652 data -> fields [i ] = f -> type ;
653653 data -> fieldflags [i ] = audit_ops [f -> op ];
654- switch (f -> type ) {
654+ switch (f -> type ) {
655655 case AUDIT_SUBJ_USER :
656656 case AUDIT_SUBJ_ROLE :
657657 case AUDIT_SUBJ_TYPE :
@@ -694,7 +694,8 @@ static struct audit_rule_data *audit_krule_to_data(struct audit_krule *krule)
694694 data -> values [i ] = f -> val ;
695695 }
696696 }
697- for (i = 0 ; i < AUDIT_BITMASK_SIZE ; i ++ ) data -> mask [i ] = krule -> mask [i ];
697+ for (i = 0 ; i < AUDIT_BITMASK_SIZE ; i ++ )
698+ data -> mask [i ] = krule -> mask [i ];
698699
699700 return data ;
700701}
@@ -717,7 +718,7 @@ static int audit_compare_rule(struct audit_krule *a, struct audit_krule *b)
717718 a -> fields [i ].op != b -> fields [i ].op )
718719 return 1 ;
719720
720- switch (a -> fields [i ].type ) {
721+ switch (a -> fields [i ].type ) {
721722 case AUDIT_SUBJ_USER :
722723 case AUDIT_SUBJ_ROLE :
723724 case AUDIT_SUBJ_TYPE :
@@ -946,7 +947,7 @@ static inline int audit_add_rule(struct audit_entry *entry)
946947 int dont_count = 0 ;
947948
948949 /* If any of these, don't count towards total */
949- switch (entry -> rule .listnr ) {
950+ switch (entry -> rule .listnr ) {
950951 case AUDIT_FILTER_USER :
951952 case AUDIT_FILTER_EXCLUDE :
952953 case AUDIT_FILTER_FS :
@@ -1029,7 +1030,7 @@ int audit_del_rule(struct audit_entry *entry)
10291030 int dont_count = 0 ;
10301031
10311032 /* If any of these, don't count towards total */
1032- switch (entry -> rule .listnr ) {
1033+ switch (entry -> rule .listnr ) {
10331034 case AUDIT_FILTER_USER :
10341035 case AUDIT_FILTER_EXCLUDE :
10351036 case AUDIT_FILTER_FS :
@@ -1083,7 +1084,7 @@ static void audit_list_rules(int seq, struct sk_buff_head *q)
10831084
10841085 /* This is a blocking read, so use audit_filter_mutex instead of rcu
10851086 * iterator to sync with list writers. */
1086- for (i = 0 ; i < AUDIT_NR_FILTERS ; i ++ ) {
1087+ for (i = 0 ; i < AUDIT_NR_FILTERS ; i ++ ) {
10871088 list_for_each_entry (r , & audit_rules_list [i ], list ) {
10881089 struct audit_rule_data * data ;
10891090
0 commit comments