ip link: add VLAN support
[oweals/busybox.git] / selinux / setfiles.c
index ca3fd93618b8e6e92f80f6927be4ae504e38edc3..0173db99e91d2b211ceffcdd7e0c22b32bd7cf8a 100644 (file)
@@ -498,10 +498,11 @@ static int process_one(char *name)
 
        if (S_ISDIR(sb.st_mode) && recurse) {
                if (recursive_action(name,
-                                    ACTION_RECURSE,
-                                    apply_spec,
-                                    apply_spec,
-                                    NULL, 0) != TRUE) {
+                               ACTION_RECURSE,
+                               apply_spec,
+                               apply_spec,
+                               NULL, 0) != TRUE
+               ) {
                        bb_error_msg("error while labeling %s", name);
                        goto err;
                }
@@ -584,7 +585,7 @@ int setfiles_main(int argc UNUSED_PARAM, char **argv)
                flags = getopt32(argv, "de:f:ilnpqr:svo:FW"
                                IF_FEATURE_SETFILES_CHECK_OPTION("c:"),
                        &exclude_dir, &input_filename, &rootpath, &out_filename,
-                                IF_FEATURE_SETFILES_CHECK_OPTION(&policyfile,)
+                               IF_FEATURE_SETFILES_CHECK_OPTION(&policyfile,)
                        &verbose);
        }
        argv += optind;
@@ -600,8 +601,8 @@ int setfiles_main(int argc UNUSED_PARAM, char **argv)
                fclose(policystream);
 
                /* Only process the specified file_contexts file, not
-                  any .homedirs or .local files, and do not perform
-                  context translations. */
+                * any .homedirs or .local files, and do not perform
+                * context translations. */
                set_matchpathcon_flags(MATCHPATHCON_BASEONLY |
                                       MATCHPATHCON_NOTRANS |
                                       MATCHPATHCON_VALIDATE);
@@ -631,8 +632,8 @@ int setfiles_main(int argc UNUSED_PARAM, char **argv)
 
        if (applet_name[0] == 's') { /* setfiles */
                /* Use our own invalid context checking function so that
-                  we can support either checking against the active policy or
-                  checking against a binary policy file. */
+                * we can support either checking against the active policy or
+                * checking against a binary policy file. */
                set_matchpathcon_canoncon(&canoncon);
                if (!argv[0])
                        bb_show_usage();