summaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorDavid S. Miller <davem@davemloft.net>2019-06-22 08:59:24 -0400
committerDavid S. Miller <davem@davemloft.net>2019-06-22 08:59:24 -0400
commit92ad6325cb891bb455487bfe90cc47d18aa6ec37 (patch)
tree433a7ef938fae69789216043f67eff9f9c6b0c68 /security
parente0effb5fbd56a8b2b8917611cbf4fcd9aba92b8f (diff)
parentc356dc4b540edd6c02b409dd8cf3208ba2804c38 (diff)
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
Minor SPDX change conflict. Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'security')
-rw-r--r--security/apparmor/include/policy.h11
-rw-r--r--security/apparmor/policy_unpack.c49
-rw-r--r--security/inode.c5
-rw-r--r--security/lsm_audit.c5
-rw-r--r--security/selinux/avc.c5
-rw-r--r--security/selinux/hooks.c5
-rw-r--r--security/selinux/include/audit.h5
-rw-r--r--security/selinux/include/netif.h5
-rw-r--r--security/selinux/include/objsec.h5
-rw-r--r--security/selinux/netif.c5
-rw-r--r--security/selinux/netlink.c5
-rw-r--r--security/selinux/nlmsgtab.c5
-rw-r--r--security/selinux/ss/status.c5
-rw-r--r--security/selinux/xfrm.c5
-rw-r--r--security/smack/smack_lsm.c5
-rw-r--r--security/smack/smack_netfilter.c5
-rw-r--r--security/yama/yama_lsm.c6
17 files changed, 65 insertions, 71 deletions
diff --git a/security/apparmor/include/policy.h b/security/apparmor/include/policy.h
index 1ce4e9bdac48..b5b4b8190e65 100644
--- a/security/apparmor/include/policy.h
+++ b/security/apparmor/include/policy.h
@@ -213,7 +213,16 @@ static inline struct aa_profile *aa_get_newest_profile(struct aa_profile *p)
213 return labels_profile(aa_get_newest_label(&p->label)); 213 return labels_profile(aa_get_newest_label(&p->label));
214} 214}
215 215
216#define PROFILE_MEDIATES(P, T) ((P)->policy.start[(unsigned char) (T)]) 216static inline unsigned int PROFILE_MEDIATES(struct aa_profile *profile,
217 unsigned char class)
218{
219 if (class <= AA_CLASS_LAST)
220 return profile->policy.start[class];
221 else
222 return aa_dfa_match_len(profile->policy.dfa,
223 profile->policy.start[0], &class, 1);
224}
225
217static inline unsigned int PROFILE_MEDIATES_AF(struct aa_profile *profile, 226static inline unsigned int PROFILE_MEDIATES_AF(struct aa_profile *profile,
218 u16 AF) { 227 u16 AF) {
219 unsigned int state = PROFILE_MEDIATES(profile, AA_CLASS_NET); 228 unsigned int state = PROFILE_MEDIATES(profile, AA_CLASS_NET);
diff --git a/security/apparmor/policy_unpack.c b/security/apparmor/policy_unpack.c
index 01957ce9252b..8cfc9493eefc 100644
--- a/security/apparmor/policy_unpack.c
+++ b/security/apparmor/policy_unpack.c
@@ -219,16 +219,21 @@ static void *kvmemdup(const void *src, size_t len)
219static size_t unpack_u16_chunk(struct aa_ext *e, char **chunk) 219static size_t unpack_u16_chunk(struct aa_ext *e, char **chunk)
220{ 220{
221 size_t size = 0; 221 size_t size = 0;
222 void *pos = e->pos;
222 223
223 if (!inbounds(e, sizeof(u16))) 224 if (!inbounds(e, sizeof(u16)))
224 return 0; 225 goto fail;
225 size = le16_to_cpu(get_unaligned((__le16 *) e->pos)); 226 size = le16_to_cpu(get_unaligned((__le16 *) e->pos));
226 e->pos += sizeof(__le16); 227 e->pos += sizeof(__le16);
227 if (!inbounds(e, size)) 228 if (!inbounds(e, size))
228 return 0; 229 goto fail;
229 *chunk = e->pos; 230 *chunk = e->pos;
230 e->pos += size; 231 e->pos += size;
231 return size; 232 return size;
233
234fail:
235 e->pos = pos;
236 return 0;
232} 237}
233 238
234/* unpack control byte */ 239/* unpack control byte */
@@ -272,7 +277,7 @@ static bool unpack_nameX(struct aa_ext *e, enum aa_code code, const char *name)
272 char *tag = NULL; 277 char *tag = NULL;
273 size_t size = unpack_u16_chunk(e, &tag); 278 size_t size = unpack_u16_chunk(e, &tag);
274 /* if a name is specified it must match. otherwise skip tag */ 279 /* if a name is specified it must match. otherwise skip tag */
275 if (name && (!size || strcmp(name, tag))) 280 if (name && (!size || tag[size-1] != '\0' || strcmp(name, tag)))
276 goto fail; 281 goto fail;
277 } else if (name) { 282 } else if (name) {
278 /* if a name is specified and there is no name tag fail */ 283 /* if a name is specified and there is no name tag fail */
@@ -290,62 +295,84 @@ fail:
290 295
291static bool unpack_u8(struct aa_ext *e, u8 *data, const char *name) 296static bool unpack_u8(struct aa_ext *e, u8 *data, const char *name)
292{ 297{
298 void *pos = e->pos;
299
293 if (unpack_nameX(e, AA_U8, name)) { 300 if (unpack_nameX(e, AA_U8, name)) {
294 if (!inbounds(e, sizeof(u8))) 301 if (!inbounds(e, sizeof(u8)))
295 return 0; 302 goto fail;
296 if (data) 303 if (data)
297 *data = get_unaligned((u8 *)e->pos); 304 *data = get_unaligned((u8 *)e->pos);
298 e->pos += sizeof(u8); 305 e->pos += sizeof(u8);
299 return 1; 306 return 1;
300 } 307 }
308
309fail:
310 e->pos = pos;
301 return 0; 311 return 0;
302} 312}
303 313
304static bool unpack_u32(struct aa_ext *e, u32 *data, const char *name) 314static bool unpack_u32(struct aa_ext *e, u32 *data, const char *name)
305{ 315{
316 void *pos = e->pos;
317
306 if (unpack_nameX(e, AA_U32, name)) { 318 if (unpack_nameX(e, AA_U32, name)) {
307 if (!inbounds(e, sizeof(u32))) 319 if (!inbounds(e, sizeof(u32)))
308 return 0; 320 goto fail;
309 if (data) 321 if (data)
310 *data = le32_to_cpu(get_unaligned((__le32 *) e->pos)); 322 *data = le32_to_cpu(get_unaligned((__le32 *) e->pos));
311 e->pos += sizeof(u32); 323 e->pos += sizeof(u32);
312 return 1; 324 return 1;
313 } 325 }
326
327fail:
328 e->pos = pos;
314 return 0; 329 return 0;
315} 330}
316 331
317static bool unpack_u64(struct aa_ext *e, u64 *data, const char *name) 332static bool unpack_u64(struct aa_ext *e, u64 *data, const char *name)
318{ 333{
334 void *pos = e->pos;
335
319 if (unpack_nameX(e, AA_U64, name)) { 336 if (unpack_nameX(e, AA_U64, name)) {
320 if (!inbounds(e, sizeof(u64))) 337 if (!inbounds(e, sizeof(u64)))
321 return 0; 338 goto fail;
322 if (data) 339 if (data)
323 *data = le64_to_cpu(get_unaligned((__le64 *) e->pos)); 340 *data = le64_to_cpu(get_unaligned((__le64 *) e->pos));
324 e->pos += sizeof(u64); 341 e->pos += sizeof(u64);
325 return 1; 342 return 1;
326 } 343 }
344
345fail:
346 e->pos = pos;
327 return 0; 347 return 0;
328} 348}
329 349
330static size_t unpack_array(struct aa_ext *e, const char *name) 350static size_t unpack_array(struct aa_ext *e, const char *name)
331{ 351{
352 void *pos = e->pos;
353
332 if (unpack_nameX(e, AA_ARRAY, name)) { 354 if (unpack_nameX(e, AA_ARRAY, name)) {
333 int size; 355 int size;
334 if (!inbounds(e, sizeof(u16))) 356 if (!inbounds(e, sizeof(u16)))
335 return 0; 357 goto fail;
336 size = (int)le16_to_cpu(get_unaligned((__le16 *) e->pos)); 358 size = (int)le16_to_cpu(get_unaligned((__le16 *) e->pos));
337 e->pos += sizeof(u16); 359 e->pos += sizeof(u16);
338 return size; 360 return size;
339 } 361 }
362
363fail:
364 e->pos = pos;
340 return 0; 365 return 0;
341} 366}
342 367
343static size_t unpack_blob(struct aa_ext *e, char **blob, const char *name) 368static size_t unpack_blob(struct aa_ext *e, char **blob, const char *name)
344{ 369{
370 void *pos = e->pos;
371
345 if (unpack_nameX(e, AA_BLOB, name)) { 372 if (unpack_nameX(e, AA_BLOB, name)) {
346 u32 size; 373 u32 size;
347 if (!inbounds(e, sizeof(u32))) 374 if (!inbounds(e, sizeof(u32)))
348 return 0; 375 goto fail;
349 size = le32_to_cpu(get_unaligned((__le32 *) e->pos)); 376 size = le32_to_cpu(get_unaligned((__le32 *) e->pos));
350 e->pos += sizeof(u32); 377 e->pos += sizeof(u32);
351 if (inbounds(e, (size_t) size)) { 378 if (inbounds(e, (size_t) size)) {
@@ -354,6 +381,9 @@ static size_t unpack_blob(struct aa_ext *e, char **blob, const char *name)
354 return size; 381 return size;
355 } 382 }
356 } 383 }
384
385fail:
386 e->pos = pos;
357 return 0; 387 return 0;
358} 388}
359 389
@@ -370,9 +400,10 @@ static int unpack_str(struct aa_ext *e, const char **string, const char *name)
370 if (src_str[size - 1] != 0) 400 if (src_str[size - 1] != 0)
371 goto fail; 401 goto fail;
372 *string = src_str; 402 *string = src_str;
403
404 return size;
373 } 405 }
374 } 406 }
375 return size;
376 407
377fail: 408fail:
378 e->pos = pos; 409 e->pos = pos;
diff --git a/security/inode.c b/security/inode.c
index aacc4dabba7d..fcff7f08bb1c 100644
--- a/security/inode.c
+++ b/security/inode.c
@@ -1,12 +1,9 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * inode.c - securityfs 3 * inode.c - securityfs
3 * 4 *
4 * Copyright (C) 2005 Greg Kroah-Hartman <gregkh@suse.de> 5 * Copyright (C) 2005 Greg Kroah-Hartman <gregkh@suse.de>
5 * 6 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License version
8 * 2 as published by the Free Software Foundation.
9 *
10 * Based on fs/debugfs/inode.c which had the following copyright notice: 7 * Based on fs/debugfs/inode.c which had the following copyright notice:
11 * Copyright (C) 2004 Greg Kroah-Hartman <greg@kroah.com> 8 * Copyright (C) 2004 Greg Kroah-Hartman <greg@kroah.com>
12 * Copyright (C) 2004 IBM Inc. 9 * Copyright (C) 2004 IBM Inc.
diff --git a/security/lsm_audit.c b/security/lsm_audit.c
index 33028c098ef3..e40874373f2b 100644
--- a/security/lsm_audit.c
+++ b/security/lsm_audit.c
@@ -1,3 +1,4 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * common LSM auditing functions 3 * common LSM auditing functions
3 * 4 *
@@ -5,10 +6,6 @@
5 * Stephen Smalley, <sds@tycho.nsa.gov> 6 * Stephen Smalley, <sds@tycho.nsa.gov>
6 * James Morris <jmorris@redhat.com> 7 * James Morris <jmorris@redhat.com>
7 * Author : Etienne Basset, <etienne.basset@ensta.org> 8 * Author : Etienne Basset, <etienne.basset@ensta.org>
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License version 2,
11 * as published by the Free Software Foundation.
12 */ 9 */
13 10
14#include <linux/types.h> 11#include <linux/types.h>
diff --git a/security/selinux/avc.c b/security/selinux/avc.c
index a99be508f93d..ecd3829996aa 100644
--- a/security/selinux/avc.c
+++ b/security/selinux/avc.c
@@ -1,3 +1,4 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * Implementation of the kernel access vector cache (AVC). 3 * Implementation of the kernel access vector cache (AVC).
3 * 4 *
@@ -8,10 +9,6 @@
8 * Replaced the avc_lock spinlock by RCU. 9 * Replaced the avc_lock spinlock by RCU.
9 * 10 *
10 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> 11 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License version 2,
14 * as published by the Free Software Foundation.
15 */ 12 */
16#include <linux/types.h> 13#include <linux/types.h>
17#include <linux/stddef.h> 14#include <linux/stddef.h>
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c
index fea66f6b31bf..94de51628fdc 100644
--- a/security/selinux/hooks.c
+++ b/security/selinux/hooks.c
@@ -1,3 +1,4 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * NSA Security-Enhanced Linux (SELinux) security module 3 * NSA Security-Enhanced Linux (SELinux) security module
3 * 4 *
@@ -18,10 +19,6 @@
18 * Copyright (C) 2007 Hitachi Software Engineering Co., Ltd. 19 * Copyright (C) 2007 Hitachi Software Engineering Co., Ltd.
19 * Yuichi Nakamura <ynakam@hitachisoft.jp> 20 * Yuichi Nakamura <ynakam@hitachisoft.jp>
20 * Copyright (C) 2016 Mellanox Technologies 21 * Copyright (C) 2016 Mellanox Technologies
21 *
22 * This program is free software; you can redistribute it and/or modify
23 * it under the terms of the GNU General Public License version 2,
24 * as published by the Free Software Foundation.
25 */ 22 */
26 23
27#include <linux/init.h> 24#include <linux/init.h>
diff --git a/security/selinux/include/audit.h b/security/selinux/include/audit.h
index 682e2b5de2a4..073a3d34a0d2 100644
--- a/security/selinux/include/audit.h
+++ b/security/selinux/include/audit.h
@@ -1,3 +1,4 @@
1/* SPDX-License-Identifier: GPL-2.0-only */
1/* 2/*
2 * SELinux support for the Audit LSM hooks 3 * SELinux support for the Audit LSM hooks
3 * 4 *
@@ -6,10 +7,6 @@
6 * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> 7 * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com>
7 * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> 8 * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com>
8 * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> 9 * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com>
9 *
10 * This program is free software; you can redistribute it and/or modify
11 * it under the terms of the GNU General Public License version 2,
12 * as published by the Free Software Foundation.
13 */ 10 */
14 11
15#ifndef _SELINUX_AUDIT_H 12#ifndef _SELINUX_AUDIT_H
diff --git a/security/selinux/include/netif.h b/security/selinux/include/netif.h
index c72145444090..85ec30d11144 100644
--- a/security/selinux/include/netif.h
+++ b/security/selinux/include/netif.h
@@ -1,3 +1,4 @@
1/* SPDX-License-Identifier: GPL-2.0-only */
1/* 2/*
2 * Network interface table. 3 * Network interface table.
3 * 4 *
@@ -9,10 +10,6 @@
9 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> 10 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
10 * Copyright (C) 2007 Hewlett-Packard Development Company, L.P. 11 * Copyright (C) 2007 Hewlett-Packard Development Company, L.P.
11 * Paul Moore <paul@paul-moore.com> 12 * Paul Moore <paul@paul-moore.com>
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2,
15 * as published by the Free Software Foundation.
16 */ 13 */
17#ifndef _SELINUX_NETIF_H_ 14#ifndef _SELINUX_NETIF_H_
18#define _SELINUX_NETIF_H_ 15#define _SELINUX_NETIF_H_
diff --git a/security/selinux/include/objsec.h b/security/selinux/include/objsec.h
index 231262d8eac9..91c5395dd20c 100644
--- a/security/selinux/include/objsec.h
+++ b/security/selinux/include/objsec.h
@@ -1,3 +1,4 @@
1/* SPDX-License-Identifier: GPL-2.0-only */
1/* 2/*
2 * NSA Security-Enhanced Linux (SELinux) security module 3 * NSA Security-Enhanced Linux (SELinux) security module
3 * 4 *
@@ -11,10 +12,6 @@
11 * Copyright (C) 2001,2002 Networks Associates Technology, Inc. 12 * Copyright (C) 2001,2002 Networks Associates Technology, Inc.
12 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> 13 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
13 * Copyright (C) 2016 Mellanox Technologies 14 * Copyright (C) 2016 Mellanox Technologies
14 *
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License version 2,
17 * as published by the Free Software Foundation.
18 */ 15 */
19#ifndef _SELINUX_OBJSEC_H_ 16#ifndef _SELINUX_OBJSEC_H_
20#define _SELINUX_OBJSEC_H_ 17#define _SELINUX_OBJSEC_H_
diff --git a/security/selinux/netif.c b/security/selinux/netif.c
index 8c738c189942..9cb83eeee1d9 100644
--- a/security/selinux/netif.c
+++ b/security/selinux/netif.c
@@ -1,3 +1,4 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * Network interface table. 3 * Network interface table.
3 * 4 *
@@ -9,10 +10,6 @@
9 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> 10 * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com>
10 * Copyright (C) 2007 Hewlett-Packard Development Company, L.P. 11 * Copyright (C) 2007 Hewlett-Packard Development Company, L.P.
11 * Paul Moore <paul@paul-moore.com> 12 * Paul Moore <paul@paul-moore.com>
12 *
13 * This program is free software; you can redistribute it and/or modify
14 * it under the terms of the GNU General Public License version 2,
15 * as published by the Free Software Foundation.
16 */ 13 */
17#include <linux/init.h> 14#include <linux/init.h>
18#include <linux/types.h> 15#include <linux/types.h>
diff --git a/security/selinux/netlink.c b/security/selinux/netlink.c
index 8a8a72507437..621e2e9cd6a1 100644
--- a/security/selinux/netlink.c
+++ b/security/selinux/netlink.c
@@ -1,13 +1,10 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * Netlink event notifications for SELinux. 3 * Netlink event notifications for SELinux.
3 * 4 *
4 * Author: James Morris <jmorris@redhat.com> 5 * Author: James Morris <jmorris@redhat.com>
5 * 6 *
6 * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com> 7 * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2,
10 * as published by the Free Software Foundation.
11 */ 8 */
12#include <linux/init.h> 9#include <linux/init.h>
13#include <linux/types.h> 10#include <linux/types.h>
diff --git a/security/selinux/nlmsgtab.c b/security/selinux/nlmsgtab.c
index 2c75d823d8e2..58345ba0528e 100644
--- a/security/selinux/nlmsgtab.c
+++ b/security/selinux/nlmsgtab.c
@@ -1,13 +1,10 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * Netlink message type permission tables, for user generated messages. 3 * Netlink message type permission tables, for user generated messages.
3 * 4 *
4 * Author: James Morris <jmorris@redhat.com> 5 * Author: James Morris <jmorris@redhat.com>
5 * 6 *
6 * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com> 7 * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2,
10 * as published by the Free Software Foundation.
11 */ 8 */
12#include <linux/types.h> 9#include <linux/types.h>
13#include <linux/kernel.h> 10#include <linux/kernel.h>
diff --git a/security/selinux/ss/status.c b/security/selinux/ss/status.c
index a121de45ac0e..3c554a442467 100644
--- a/security/selinux/ss/status.c
+++ b/security/selinux/ss/status.c
@@ -1,13 +1,10 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * mmap based event notifications for SELinux 3 * mmap based event notifications for SELinux
3 * 4 *
4 * Author: KaiGai Kohei <kaigai@ak.jp.nec.com> 5 * Author: KaiGai Kohei <kaigai@ak.jp.nec.com>
5 * 6 *
6 * Copyright (C) 2010 NEC corporation 7 * Copyright (C) 2010 NEC corporation
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2,
10 * as published by the Free Software Foundation.
11 */ 8 */
12#include <linux/kernel.h> 9#include <linux/kernel.h>
13#include <linux/gfp.h> 10#include <linux/gfp.h>
diff --git a/security/selinux/xfrm.c b/security/selinux/xfrm.c
index 7c57cb7e4146..7314196185d1 100644
--- a/security/selinux/xfrm.c
+++ b/security/selinux/xfrm.c
@@ -1,3 +1,4 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * NSA Security-Enhanced Linux (SELinux) security module 3 * NSA Security-Enhanced Linux (SELinux) security module
3 * 4 *
@@ -12,10 +13,6 @@
12 * 13 *
13 * Copyright (C) 2005 International Business Machines Corporation 14 * Copyright (C) 2005 International Business Machines Corporation
14 * Copyright (C) 2006 Trusted Computer Solutions, Inc. 15 * Copyright (C) 2006 Trusted Computer Solutions, Inc.
15 *
16 * This program is free software; you can redistribute it and/or modify
17 * it under the terms of the GNU General Public License version 2,
18 * as published by the Free Software Foundation.
19 */ 16 */
20 17
21/* 18/*
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c
index d99450b4f511..4c5e5a438f8b 100644
--- a/security/smack/smack_lsm.c
+++ b/security/smack/smack_lsm.c
@@ -1,3 +1,4 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * Simplified MAC Kernel (smack) security module 3 * Simplified MAC Kernel (smack) security module
3 * 4 *
@@ -12,10 +13,6 @@
12 * Paul Moore <paul@paul-moore.com> 13 * Paul Moore <paul@paul-moore.com>
13 * Copyright (C) 2010 Nokia Corporation 14 * Copyright (C) 2010 Nokia Corporation
14 * Copyright (C) 2011 Intel Corporation. 15 * Copyright (C) 2011 Intel Corporation.
15 *
16 * This program is free software; you can redistribute it and/or modify
17 * it under the terms of the GNU General Public License version 2,
18 * as published by the Free Software Foundation.
19 */ 16 */
20 17
21#include <linux/xattr.h> 18#include <linux/xattr.h>
diff --git a/security/smack/smack_netfilter.c b/security/smack/smack_netfilter.c
index e36d17835d4f..fc7399b45373 100644
--- a/security/smack/smack_netfilter.c
+++ b/security/smack/smack_netfilter.c
@@ -1,3 +1,4 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * Simplified MAC Kernel (smack) security module 3 * Simplified MAC Kernel (smack) security module
3 * 4 *
@@ -8,10 +9,6 @@
8 * 9 *
9 * Copyright (C) 2014 Casey Schaufler <casey@schaufler-ca.com> 10 * Copyright (C) 2014 Casey Schaufler <casey@schaufler-ca.com>
10 * Copyright (C) 2014 Intel Corporation. 11 * Copyright (C) 2014 Intel Corporation.
11 *
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License version 2,
14 * as published by the Free Software Foundation.
15 */ 12 */
16 13
17#include <linux/netfilter_ipv4.h> 14#include <linux/netfilter_ipv4.h>
diff --git a/security/yama/yama_lsm.c b/security/yama/yama_lsm.c
index efac68556b45..01c6239c4493 100644
--- a/security/yama/yama_lsm.c
+++ b/security/yama/yama_lsm.c
@@ -1,3 +1,4 @@
1// SPDX-License-Identifier: GPL-2.0-only
1/* 2/*
2 * Yama Linux Security Module 3 * Yama Linux Security Module
3 * 4 *
@@ -5,11 +6,6 @@
5 * 6 *
6 * Copyright (C) 2010 Canonical, Ltd. 7 * Copyright (C) 2010 Canonical, Ltd.
7 * Copyright (C) 2011 The Chromium OS Authors. 8 * Copyright (C) 2011 The Chromium OS Authors.
8 *
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License version 2, as
11 * published by the Free Software Foundation.
12 *
13 */ 9 */
14 10
15#include <linux/lsm_hooks.h> 11#include <linux/lsm_hooks.h>