From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755901AbdEETyT (ORCPT ); Fri, 5 May 2017 15:54:19 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:47304 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755645AbdEETyE (ORCPT ); Fri, 5 May 2017 15:54:04 -0400 Subject: Re: [PATCH] ima: fix up #endif comments From: Mimi Zohar To: Tycho Andersen , Dmitry Kasatkin Cc: linux-ima-devel@lists.sourceforge.net, linux-kernel@vger.kernel.org Date: Fri, 05 May 2017 15:52:58 -0400 In-Reply-To: <20170505171547.11960-1-tycho@docker.com> References: <20170505171547.11960-1-tycho@docker.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.20.5 (3.20.5-1.fc24) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-AS-MML: disable x-cbid: 17050519-0052-0000-0000-0000023A9410 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17050519-0053-0000-0000-00000815BCF4 Message-Id: <1494013978.3594.2.camel@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-05-05_16:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=3 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1703280000 definitions=main-1705050188 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2017-05-05 at 11:15 -0600, Tycho Andersen wrote: > While reading the code, I noticed that these #endif comments don't match > how they're actually nested. This patch fixes that. > > Signed-off-by: Tycho Andersen Thanks! Mimi > --- > security/integrity/ima/ima.h | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/security/integrity/ima/ima.h b/security/integrity/ima/ima.h > index b563fbd4d122..d26a30e37d13 100644 > --- a/security/integrity/ima/ima.h > +++ b/security/integrity/ima/ima.h > @@ -306,12 +306,12 @@ static inline int security_filter_rule_match(u32 secid, u32 field, u32 op, > { > return -EINVAL; > } > -#endif /* CONFIG_IMA_TRUSTED_KEYRING */ > +#endif /* CONFIG_IMA_LSM_RULES */ > > #ifdef CONFIG_IMA_READ_POLICY > #define POLICY_FILE_FLAGS (S_IWUSR | S_IRUSR) > #else > #define POLICY_FILE_FLAGS S_IWUSR > -#endif /* CONFIG_IMA_WRITE_POLICY */ > +#endif /* CONFIG_IMA_READ_POLICY */ > > #endif /* __LINUX_IMA_H */