Fix the checkpatch.pl issues:
CHECK: spaces preferred around that '&' (ctx:VxV)
CHECK: spaces preferred around that '<<' (ctx:VxV)
CHECK: spaces preferred around that '-' (ctx:VxV)
CHECK: spaces preferred around that '+' (ctx:VxV)

Signed-off-by: Lucas Tanure <tan...@linux.com>
---
 net/ipv4/netfilter/ip_tables.c | 26 +++++++++++++-------------
 1 file changed, 13 insertions(+), 13 deletions(-)

diff --git a/net/ipv4/netfilter/ip_tables.c b/net/ipv4/netfilter/ip_tables.c
index dcc61c0..6f29382 100644
--- a/net/ipv4/netfilter/ip_tables.c
+++ b/net/ipv4/netfilter/ip_tables.c
@@ -82,9 +82,9 @@ ip_packet_match(const struct iphdr *ip,
 
 #define FWINV(bool, invflg) ((bool) ^ !!(ipinfo->invflags & (invflg)))
 
-       if (FWINV((ip->saddr&ipinfo->smsk.s_addr) != ipinfo->src.s_addr,
+       if (FWINV((ip->saddr & ipinfo->smsk.s_addr) != ipinfo->src.s_addr,
                  IPT_INV_SRCIP) ||
-           FWINV((ip->daddr&ipinfo->dmsk.s_addr) != ipinfo->dst.s_addr,
+           FWINV((ip->daddr & ipinfo->dmsk.s_addr) != ipinfo->dst.s_addr,
                  IPT_INV_DSTIP)) {
                dprintf("Source or dest mismatch.\n");
 
@@ -126,7 +126,7 @@ ip_packet_match(const struct iphdr *ip,
 
        /* If we have a fragment rule but the packet is not a fragment
         * then we return zero */
-       if (FWINV((ipinfo->flags&IPT_F_FRAG) && !isfrag, IPT_INV_FRAG)) {
+       if (FWINV((ipinfo->flags & IPT_F_FRAG) && !isfrag, IPT_INV_FRAG)) {
                dprintf("Fragment rule but not fragment.%s\n",
                        ipinfo->invflags & IPT_INV_FRAG ? " (INV)" : "");
                return false;
@@ -496,7 +496,7 @@ mark_source_chains(const struct xt_table_info *newinfo,
                                /* Return: backtrack through the last
                                   big jump. */
                                do {
-                                       e->comefrom ^= (1<<NF_INET_NUMHOOKS);
+                                       e->comefrom ^= (1 << NF_INET_NUMHOOKS);
 #ifdef DEBUG_IP_FIREWALL_USER
                                        if (e->comefrom
                                            & (1 << NF_INET_NUMHOOKS)) {
@@ -981,7 +981,7 @@ copy_entries_to_user(unsigned int total_size,
                                         + offsetof(struct xt_entry_match,
                                                    u.user.name),
                                         m->u.kernel.match->name,
-                                        strlen(m->u.kernel.match->name)+1)
+                                        strlen(m->u.kernel.match->name) + 1)
                            != 0) {
                                ret = -EFAULT;
                                goto free_counters;
@@ -993,7 +993,7 @@ copy_entries_to_user(unsigned int total_size,
                                 + offsetof(struct xt_entry_target,
                                            u.user.name),
                                 t->u.kernel.target->name,
-                                strlen(t->u.kernel.target->name)+1) != 0) {
+                                strlen(t->u.kernel.target->name) + 1) != 0) {
                        ret = -EFAULT;
                        goto free_counters;
                }
@@ -1094,7 +1094,7 @@ static int get_info(struct net *net, void __user *user,
        if (copy_from_user(name, user, sizeof(name)) != 0)
                return -EFAULT;
 
-       name[XT_TABLE_MAXNAMELEN-1] = '\0';
+       name[XT_TABLE_MAXNAMELEN - 1] = '\0';
 #ifdef CONFIG_COMPAT
        if (compat)
                xt_compat_lock(AF_INET);
@@ -1270,7 +1270,7 @@ do_replace(struct net *net, const void __user *user, 
unsigned int len)
        if (tmp.num_counters == 0)
                return -EINVAL;
 
-       tmp.name[sizeof(tmp.name)-1] = 0;
+       tmp.name[sizeof(tmp.name) - 1] = 0;
 
        newinfo = xt_alloc_table_info(tmp.size);
        if (!newinfo)
@@ -1818,7 +1818,7 @@ compat_do_replace(struct net *net, void __user *user, 
unsigned int len)
        if (tmp.num_counters == 0)
                return -EINVAL;
 
-       tmp.name[sizeof(tmp.name)-1] = 0;
+       tmp.name[sizeof(tmp.name) - 1] = 0;
 
        newinfo = xt_alloc_table_info(tmp.size);
        if (!newinfo)
@@ -2041,7 +2041,7 @@ do_ipt_get_ctl(struct sock *sk, int cmd, void __user 
*user, int *len)
                        ret = -EFAULT;
                        break;
                }
-               rev.name[sizeof(rev.name)-1] = 0;
+               rev.name[sizeof(rev.name) - 1] = 0;
 
                if (cmd == IPT_SO_GET_REVISION_TARGET)
                        target = 1;
@@ -2155,7 +2155,7 @@ icmp_match(const struct sk_buff *skb, struct 
xt_action_param *par)
                                    icmpinfo->code[0],
                                    icmpinfo->code[1],
                                    ic->type, ic->code,
-                                   !!(icmpinfo->invflags&IPT_ICMP_INV));
+                                   !!(icmpinfo->invflags & IPT_ICMP_INV));
 }
 
 static int icmp_checkentry(const struct xt_mtchk_param *par)
@@ -2188,13 +2188,13 @@ static struct xt_target ipt_builtin_tg[] __read_mostly 
= {
 static struct nf_sockopt_ops ipt_sockopts = {
        .pf             = PF_INET,
        .set_optmin     = IPT_BASE_CTL,
-       .set_optmax     = IPT_SO_SET_MAX+1,
+       .set_optmax     = IPT_SO_SET_MAX + 1,
        .set            = do_ipt_set_ctl,
 #ifdef CONFIG_COMPAT
        .compat_set     = compat_do_ipt_set_ctl,
 #endif
        .get_optmin     = IPT_BASE_CTL,
-       .get_optmax     = IPT_SO_GET_MAX+1,
+       .get_optmax     = IPT_SO_GET_MAX + 1,
        .get            = do_ipt_get_ctl,
 #ifdef CONFIG_COMPAT
        .compat_get     = compat_do_ipt_get_ctl,
-- 
2.7.0

Reply via email to