Browse Source

netfilter: ipv4: code indentation

Use tabs instead of spaces to indent code.

No changes detected by objdiff.

Signed-off-by: Ian Morris <ipm@chirality.org.uk>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Ian Morris 9 years ago
parent
commit
24cebe3f29

+ 3 - 3
net/ipv4/netfilter/ip_tables.c

@@ -431,8 +431,8 @@ ipt_do_table(struct sk_buff *skb,
 	} while (!acpar.hotdrop);
 	} while (!acpar.hotdrop);
 	pr_debug("Exiting %s; sp at %u\n", __func__, stackidx);
 	pr_debug("Exiting %s; sp at %u\n", __func__, stackidx);
 
 
- 	xt_write_recseq_end(addend);
- 	local_bh_enable();
+	xt_write_recseq_end(addend);
+	local_bh_enable();
 
 
 #ifdef DEBUG_ALLOW_ALL
 #ifdef DEBUG_ALLOW_ALL
 	return NF_ACCEPT;
 	return NF_ACCEPT;
@@ -484,7 +484,7 @@ mark_source_chains(const struct xt_table_info *newinfo,
 				unsigned int oldpos, size;
 				unsigned int oldpos, size;
 
 
 				if ((strcmp(t->target.u.user.name,
 				if ((strcmp(t->target.u.user.name,
-			    		    XT_STANDARD_TARGET) == 0) &&
+					    XT_STANDARD_TARGET) == 0) &&
 				    t->verdict < -NF_MAX_VERDICT - 1) {
 				    t->verdict < -NF_MAX_VERDICT - 1) {
 					duprintf("mark_source_chains: bad "
 					duprintf("mark_source_chains: bad "
 						"negative verdict (%i)\n",
 						"negative verdict (%i)\n",

+ 1 - 1
net/ipv4/netfilter/ipt_SYNPROXY.c

@@ -231,7 +231,7 @@ synproxy_send_client_ack(const struct synproxy_net *snet,
 	synproxy_build_options(nth, opts);
 	synproxy_build_options(nth, opts);
 
 
 	synproxy_send_tcp(snet, skb, nskb, skb->nfct, IP_CT_ESTABLISHED_REPLY,
 	synproxy_send_tcp(snet, skb, nskb, skb->nfct, IP_CT_ESTABLISHED_REPLY,
-	                  niph, nth, tcp_hdr_size);
+			  niph, nth, tcp_hdr_size);
 }
 }
 
 
 static bool
 static bool

+ 1 - 1
net/ipv4/netfilter/iptable_security.c

@@ -79,7 +79,7 @@ static int __init iptable_security_init(void)
 	int ret;
 	int ret;
 
 
 	ret = register_pernet_subsys(&iptable_security_net_ops);
 	ret = register_pernet_subsys(&iptable_security_net_ops);
-        if (ret < 0)
+	if (ret < 0)
 		return ret;
 		return ret;
 
 
 	sectbl_ops = xt_hook_link(&security_table, iptable_security_hook);
 	sectbl_ops = xt_hook_link(&security_table, iptable_security_hook);