diff --git a/policy/modules/services/aisexec.if b/policy/modules/services/aisexec.if
index 7fb41c2..4827f39 100644
--- a/policy/modules/services/aisexec.if
+++ b/policy/modules/services/aisexec.if
@@ -60,7 +60,7 @@ interface(`aisexec_read_log',`
 
 ######################################
 ## <summary>
-##	All of the rules required to administrate 
+##	All of the rules required to administrate
 ##	an aisexec environment
 ## </summary>
 ## <param name="domain">
diff --git a/policy/modules/services/aisexec.te b/policy/modules/services/aisexec.te
index 22f2004..c9cbdcf 100644
--- a/policy/modules/services/aisexec.te
+++ b/policy/modules/services/aisexec.te
@@ -56,7 +56,7 @@ files_var_lib_filetrans(aisexec_t, aisexec_var_lib_t, { file dir sock_file })
 
 manage_files_pattern(aisexec_t, aisexec_var_log_t, aisexec_var_log_t)
 manage_sock_files_pattern(aisexec_t, aisexec_var_log_t, aisexec_var_log_t)
-logging_log_filetrans(aisexec_t,aisexec_var_log_t,{ sock_file file })
+logging_log_filetrans(aisexec_t, aisexec_var_log_t, { sock_file file })
 
 manage_files_pattern(aisexec_t, aisexec_var_run_t, aisexec_var_run_t)
 manage_sock_files_pattern(aisexec_t, aisexec_var_run_t, aisexec_var_run_t)
diff --git a/policy/modules/services/corosync.if b/policy/modules/services/corosync.if
index 3626db1..5318dce 100644
--- a/policy/modules/services/corosync.if
+++ b/policy/modules/services/corosync.if
@@ -60,7 +60,7 @@ interface(`corosync_stream_connect',`
 
 ######################################
 ## <summary>
-##	All of the rules required to administrate 
+##	All of the rules required to administrate
 ##	an corosync environment
 ## </summary>
 ## <param name="domain">
diff --git a/policy/modules/services/corosync.te b/policy/modules/services/corosync.te
index ad8d017..726e98b 100644
--- a/policy/modules/services/corosync.te
+++ b/policy/modules/services/corosync.te
@@ -48,7 +48,7 @@ files_tmp_filetrans(corosync_t, corosync_tmp_t, { file dir })
 
 manage_dirs_pattern(corosync_t, corosync_tmpfs_t, corosync_tmpfs_t)
 manage_files_pattern(corosync_t, corosync_tmpfs_t, corosync_tmpfs_t)
-fs_tmpfs_filetrans(corosync_t, corosync_tmpfs_t,{ dir file })
+fs_tmpfs_filetrans(corosync_t, corosync_tmpfs_t, { dir file })
 
 manage_files_pattern(corosync_t, corosync_var_lib_t, corosync_var_lib_t)
 manage_dirs_pattern(corosync_t, corosync_var_lib_t, corosync_var_lib_t)
diff --git a/policy/modules/services/rgmanager.te b/policy/modules/services/rgmanager.te
index 4bba0fb..00b4caf 100644
--- a/policy/modules/services/rgmanager.te
+++ b/policy/modules/services/rgmanager.te
@@ -51,7 +51,7 @@ files_tmp_filetrans(rgmanager_t, rgmanager_tmp_t, { file dir })
 
 manage_dirs_pattern(rgmanager_t, rgmanager_tmpfs_t, rgmanager_tmpfs_t)
 manage_files_pattern(rgmanager_t, rgmanager_tmpfs_t, rgmanager_tmpfs_t)
-fs_tmpfs_filetrans(rgmanager_t, rgmanager_tmpfs_t,{ dir file })
+fs_tmpfs_filetrans(rgmanager_t, rgmanager_tmpfs_t, { dir file })
 
 manage_files_pattern(rgmanager_t, rgmanager_var_log_t, rgmanager_var_log_t)
 logging_log_filetrans(rgmanager_t, rgmanager_var_log_t, { file })
diff --git a/policy/modules/services/rhcs.if b/policy/modules/services/rhcs.if
index c9ce9ab..6b7eb35 100644
--- a/policy/modules/services/rhcs.if
+++ b/policy/modules/services/rhcs.if
@@ -51,7 +51,7 @@ template(`rhcs_domain_template',`
 	manage_fifo_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
 	manage_sock_files_pattern($1_t, $1_var_run_t, $1_var_run_t)
 	files_pid_filetrans($1_t, $1_var_run_t, { file fifo_file })
-	
+
 ')
 
 ######################################
@@ -226,7 +226,7 @@ interface(`rhcs_rw_gfs_controld_semaphores',`
 #
 interface(`rhcs_rw_gfs_controld_shm',`
 	gen_require(`
-		type gfs_controld_t,  gfs_controld_tmpfs_t;
+		type gfs_controld_t, gfs_controld_tmpfs_t;
 	')
 
 	allow $1 gfs_controld_t:shm { rw_shm_perms destroy };