diff options
author | David S. Miller <davem@davemloft.net> | 2019-06-22 08:59:24 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2019-06-22 08:59:24 -0400 |
commit | 92ad6325cb891bb455487bfe90cc47d18aa6ec37 (patch) | |
tree | 433a7ef938fae69789216043f67eff9f9c6b0c68 /security | |
parent | e0effb5fbd56a8b2b8917611cbf4fcd9aba92b8f (diff) | |
parent | c356dc4b540edd6c02b409dd8cf3208ba2804c38 (diff) |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
Minor SPDX change conflict.
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'security')
-rw-r--r-- | security/apparmor/include/policy.h | 11 | ||||
-rw-r--r-- | security/apparmor/policy_unpack.c | 49 | ||||
-rw-r--r-- | security/inode.c | 5 | ||||
-rw-r--r-- | security/lsm_audit.c | 5 | ||||
-rw-r--r-- | security/selinux/avc.c | 5 | ||||
-rw-r--r-- | security/selinux/hooks.c | 5 | ||||
-rw-r--r-- | security/selinux/include/audit.h | 5 | ||||
-rw-r--r-- | security/selinux/include/netif.h | 5 | ||||
-rw-r--r-- | security/selinux/include/objsec.h | 5 | ||||
-rw-r--r-- | security/selinux/netif.c | 5 | ||||
-rw-r--r-- | security/selinux/netlink.c | 5 | ||||
-rw-r--r-- | security/selinux/nlmsgtab.c | 5 | ||||
-rw-r--r-- | security/selinux/ss/status.c | 5 | ||||
-rw-r--r-- | security/selinux/xfrm.c | 5 | ||||
-rw-r--r-- | security/smack/smack_lsm.c | 5 | ||||
-rw-r--r-- | security/smack/smack_netfilter.c | 5 | ||||
-rw-r--r-- | security/yama/yama_lsm.c | 6 |
17 files changed, 65 insertions, 71 deletions
diff --git a/security/apparmor/include/policy.h b/security/apparmor/include/policy.h index 1ce4e9bdac48..b5b4b8190e65 100644 --- a/security/apparmor/include/policy.h +++ b/security/apparmor/include/policy.h | |||
@@ -213,7 +213,16 @@ static inline struct aa_profile *aa_get_newest_profile(struct aa_profile *p) | |||
213 | return labels_profile(aa_get_newest_label(&p->label)); | 213 | return labels_profile(aa_get_newest_label(&p->label)); |
214 | } | 214 | } |
215 | 215 | ||
216 | #define PROFILE_MEDIATES(P, T) ((P)->policy.start[(unsigned char) (T)]) | 216 | static inline unsigned int PROFILE_MEDIATES(struct aa_profile *profile, |
217 | unsigned char class) | ||
218 | { | ||
219 | if (class <= AA_CLASS_LAST) | ||
220 | return profile->policy.start[class]; | ||
221 | else | ||
222 | return aa_dfa_match_len(profile->policy.dfa, | ||
223 | profile->policy.start[0], &class, 1); | ||
224 | } | ||
225 | |||
217 | static inline unsigned int PROFILE_MEDIATES_AF(struct aa_profile *profile, | 226 | static inline unsigned int PROFILE_MEDIATES_AF(struct aa_profile *profile, |
218 | u16 AF) { | 227 | u16 AF) { |
219 | unsigned int state = PROFILE_MEDIATES(profile, AA_CLASS_NET); | 228 | unsigned int state = PROFILE_MEDIATES(profile, AA_CLASS_NET); |
diff --git a/security/apparmor/policy_unpack.c b/security/apparmor/policy_unpack.c index 01957ce9252b..8cfc9493eefc 100644 --- a/security/apparmor/policy_unpack.c +++ b/security/apparmor/policy_unpack.c | |||
@@ -219,16 +219,21 @@ static void *kvmemdup(const void *src, size_t len) | |||
219 | static size_t unpack_u16_chunk(struct aa_ext *e, char **chunk) | 219 | static size_t unpack_u16_chunk(struct aa_ext *e, char **chunk) |
220 | { | 220 | { |
221 | size_t size = 0; | 221 | size_t size = 0; |
222 | void *pos = e->pos; | ||
222 | 223 | ||
223 | if (!inbounds(e, sizeof(u16))) | 224 | if (!inbounds(e, sizeof(u16))) |
224 | return 0; | 225 | goto fail; |
225 | size = le16_to_cpu(get_unaligned((__le16 *) e->pos)); | 226 | size = le16_to_cpu(get_unaligned((__le16 *) e->pos)); |
226 | e->pos += sizeof(__le16); | 227 | e->pos += sizeof(__le16); |
227 | if (!inbounds(e, size)) | 228 | if (!inbounds(e, size)) |
228 | return 0; | 229 | goto fail; |
229 | *chunk = e->pos; | 230 | *chunk = e->pos; |
230 | e->pos += size; | 231 | e->pos += size; |
231 | return size; | 232 | return size; |
233 | |||
234 | fail: | ||
235 | e->pos = pos; | ||
236 | return 0; | ||
232 | } | 237 | } |
233 | 238 | ||
234 | /* unpack control byte */ | 239 | /* unpack control byte */ |
@@ -272,7 +277,7 @@ static bool unpack_nameX(struct aa_ext *e, enum aa_code code, const char *name) | |||
272 | char *tag = NULL; | 277 | char *tag = NULL; |
273 | size_t size = unpack_u16_chunk(e, &tag); | 278 | size_t size = unpack_u16_chunk(e, &tag); |
274 | /* if a name is specified it must match. otherwise skip tag */ | 279 | /* if a name is specified it must match. otherwise skip tag */ |
275 | if (name && (!size || strcmp(name, tag))) | 280 | if (name && (!size || tag[size-1] != '\0' || strcmp(name, tag))) |
276 | goto fail; | 281 | goto fail; |
277 | } else if (name) { | 282 | } else if (name) { |
278 | /* if a name is specified and there is no name tag fail */ | 283 | /* if a name is specified and there is no name tag fail */ |
@@ -290,62 +295,84 @@ fail: | |||
290 | 295 | ||
291 | static bool unpack_u8(struct aa_ext *e, u8 *data, const char *name) | 296 | static bool unpack_u8(struct aa_ext *e, u8 *data, const char *name) |
292 | { | 297 | { |
298 | void *pos = e->pos; | ||
299 | |||
293 | if (unpack_nameX(e, AA_U8, name)) { | 300 | if (unpack_nameX(e, AA_U8, name)) { |
294 | if (!inbounds(e, sizeof(u8))) | 301 | if (!inbounds(e, sizeof(u8))) |
295 | return 0; | 302 | goto fail; |
296 | if (data) | 303 | if (data) |
297 | *data = get_unaligned((u8 *)e->pos); | 304 | *data = get_unaligned((u8 *)e->pos); |
298 | e->pos += sizeof(u8); | 305 | e->pos += sizeof(u8); |
299 | return 1; | 306 | return 1; |
300 | } | 307 | } |
308 | |||
309 | fail: | ||
310 | e->pos = pos; | ||
301 | return 0; | 311 | return 0; |
302 | } | 312 | } |
303 | 313 | ||
304 | static bool unpack_u32(struct aa_ext *e, u32 *data, const char *name) | 314 | static bool unpack_u32(struct aa_ext *e, u32 *data, const char *name) |
305 | { | 315 | { |
316 | void *pos = e->pos; | ||
317 | |||
306 | if (unpack_nameX(e, AA_U32, name)) { | 318 | if (unpack_nameX(e, AA_U32, name)) { |
307 | if (!inbounds(e, sizeof(u32))) | 319 | if (!inbounds(e, sizeof(u32))) |
308 | return 0; | 320 | goto fail; |
309 | if (data) | 321 | if (data) |
310 | *data = le32_to_cpu(get_unaligned((__le32 *) e->pos)); | 322 | *data = le32_to_cpu(get_unaligned((__le32 *) e->pos)); |
311 | e->pos += sizeof(u32); | 323 | e->pos += sizeof(u32); |
312 | return 1; | 324 | return 1; |
313 | } | 325 | } |
326 | |||
327 | fail: | ||
328 | e->pos = pos; | ||
314 | return 0; | 329 | return 0; |
315 | } | 330 | } |
316 | 331 | ||
317 | static bool unpack_u64(struct aa_ext *e, u64 *data, const char *name) | 332 | static bool unpack_u64(struct aa_ext *e, u64 *data, const char *name) |
318 | { | 333 | { |
334 | void *pos = e->pos; | ||
335 | |||
319 | if (unpack_nameX(e, AA_U64, name)) { | 336 | if (unpack_nameX(e, AA_U64, name)) { |
320 | if (!inbounds(e, sizeof(u64))) | 337 | if (!inbounds(e, sizeof(u64))) |
321 | return 0; | 338 | goto fail; |
322 | if (data) | 339 | if (data) |
323 | *data = le64_to_cpu(get_unaligned((__le64 *) e->pos)); | 340 | *data = le64_to_cpu(get_unaligned((__le64 *) e->pos)); |
324 | e->pos += sizeof(u64); | 341 | e->pos += sizeof(u64); |
325 | return 1; | 342 | return 1; |
326 | } | 343 | } |
344 | |||
345 | fail: | ||
346 | e->pos = pos; | ||
327 | return 0; | 347 | return 0; |
328 | } | 348 | } |
329 | 349 | ||
330 | static size_t unpack_array(struct aa_ext *e, const char *name) | 350 | static size_t unpack_array(struct aa_ext *e, const char *name) |
331 | { | 351 | { |
352 | void *pos = e->pos; | ||
353 | |||
332 | if (unpack_nameX(e, AA_ARRAY, name)) { | 354 | if (unpack_nameX(e, AA_ARRAY, name)) { |
333 | int size; | 355 | int size; |
334 | if (!inbounds(e, sizeof(u16))) | 356 | if (!inbounds(e, sizeof(u16))) |
335 | return 0; | 357 | goto fail; |
336 | size = (int)le16_to_cpu(get_unaligned((__le16 *) e->pos)); | 358 | size = (int)le16_to_cpu(get_unaligned((__le16 *) e->pos)); |
337 | e->pos += sizeof(u16); | 359 | e->pos += sizeof(u16); |
338 | return size; | 360 | return size; |
339 | } | 361 | } |
362 | |||
363 | fail: | ||
364 | e->pos = pos; | ||
340 | return 0; | 365 | return 0; |
341 | } | 366 | } |
342 | 367 | ||
343 | static size_t unpack_blob(struct aa_ext *e, char **blob, const char *name) | 368 | static size_t unpack_blob(struct aa_ext *e, char **blob, const char *name) |
344 | { | 369 | { |
370 | void *pos = e->pos; | ||
371 | |||
345 | if (unpack_nameX(e, AA_BLOB, name)) { | 372 | if (unpack_nameX(e, AA_BLOB, name)) { |
346 | u32 size; | 373 | u32 size; |
347 | if (!inbounds(e, sizeof(u32))) | 374 | if (!inbounds(e, sizeof(u32))) |
348 | return 0; | 375 | goto fail; |
349 | size = le32_to_cpu(get_unaligned((__le32 *) e->pos)); | 376 | size = le32_to_cpu(get_unaligned((__le32 *) e->pos)); |
350 | e->pos += sizeof(u32); | 377 | e->pos += sizeof(u32); |
351 | if (inbounds(e, (size_t) size)) { | 378 | if (inbounds(e, (size_t) size)) { |
@@ -354,6 +381,9 @@ static size_t unpack_blob(struct aa_ext *e, char **blob, const char *name) | |||
354 | return size; | 381 | return size; |
355 | } | 382 | } |
356 | } | 383 | } |
384 | |||
385 | fail: | ||
386 | e->pos = pos; | ||
357 | return 0; | 387 | return 0; |
358 | } | 388 | } |
359 | 389 | ||
@@ -370,9 +400,10 @@ static int unpack_str(struct aa_ext *e, const char **string, const char *name) | |||
370 | if (src_str[size - 1] != 0) | 400 | if (src_str[size - 1] != 0) |
371 | goto fail; | 401 | goto fail; |
372 | *string = src_str; | 402 | *string = src_str; |
403 | |||
404 | return size; | ||
373 | } | 405 | } |
374 | } | 406 | } |
375 | return size; | ||
376 | 407 | ||
377 | fail: | 408 | fail: |
378 | e->pos = pos; | 409 | e->pos = pos; |
diff --git a/security/inode.c b/security/inode.c index aacc4dabba7d..fcff7f08bb1c 100644 --- a/security/inode.c +++ b/security/inode.c | |||
@@ -1,12 +1,9 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * inode.c - securityfs | 3 | * inode.c - securityfs |
3 | * | 4 | * |
4 | * Copyright (C) 2005 Greg Kroah-Hartman <gregkh@suse.de> | 5 | * Copyright (C) 2005 Greg Kroah-Hartman <gregkh@suse.de> |
5 | * | 6 | * |
6 | * This program is free software; you can redistribute it and/or | ||
7 | * modify it under the terms of the GNU General Public License version | ||
8 | * 2 as published by the Free Software Foundation. | ||
9 | * | ||
10 | * Based on fs/debugfs/inode.c which had the following copyright notice: | 7 | * Based on fs/debugfs/inode.c which had the following copyright notice: |
11 | * Copyright (C) 2004 Greg Kroah-Hartman <greg@kroah.com> | 8 | * Copyright (C) 2004 Greg Kroah-Hartman <greg@kroah.com> |
12 | * Copyright (C) 2004 IBM Inc. | 9 | * Copyright (C) 2004 IBM Inc. |
diff --git a/security/lsm_audit.c b/security/lsm_audit.c index 33028c098ef3..e40874373f2b 100644 --- a/security/lsm_audit.c +++ b/security/lsm_audit.c | |||
@@ -1,3 +1,4 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * common LSM auditing functions | 3 | * common LSM auditing functions |
3 | * | 4 | * |
@@ -5,10 +6,6 @@ | |||
5 | * Stephen Smalley, <sds@tycho.nsa.gov> | 6 | * Stephen Smalley, <sds@tycho.nsa.gov> |
6 | * James Morris <jmorris@redhat.com> | 7 | * James Morris <jmorris@redhat.com> |
7 | * Author : Etienne Basset, <etienne.basset@ensta.org> | 8 | * Author : Etienne Basset, <etienne.basset@ensta.org> |
8 | * | ||
9 | * This program is free software; you can redistribute it and/or modify | ||
10 | * it under the terms of the GNU General Public License version 2, | ||
11 | * as published by the Free Software Foundation. | ||
12 | */ | 9 | */ |
13 | 10 | ||
14 | #include <linux/types.h> | 11 | #include <linux/types.h> |
diff --git a/security/selinux/avc.c b/security/selinux/avc.c index a99be508f93d..ecd3829996aa 100644 --- a/security/selinux/avc.c +++ b/security/selinux/avc.c | |||
@@ -1,3 +1,4 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * Implementation of the kernel access vector cache (AVC). | 3 | * Implementation of the kernel access vector cache (AVC). |
3 | * | 4 | * |
@@ -8,10 +9,6 @@ | |||
8 | * Replaced the avc_lock spinlock by RCU. | 9 | * Replaced the avc_lock spinlock by RCU. |
9 | * | 10 | * |
10 | * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> | 11 | * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> |
11 | * | ||
12 | * This program is free software; you can redistribute it and/or modify | ||
13 | * it under the terms of the GNU General Public License version 2, | ||
14 | * as published by the Free Software Foundation. | ||
15 | */ | 12 | */ |
16 | #include <linux/types.h> | 13 | #include <linux/types.h> |
17 | #include <linux/stddef.h> | 14 | #include <linux/stddef.h> |
diff --git a/security/selinux/hooks.c b/security/selinux/hooks.c index fea66f6b31bf..94de51628fdc 100644 --- a/security/selinux/hooks.c +++ b/security/selinux/hooks.c | |||
@@ -1,3 +1,4 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * NSA Security-Enhanced Linux (SELinux) security module | 3 | * NSA Security-Enhanced Linux (SELinux) security module |
3 | * | 4 | * |
@@ -18,10 +19,6 @@ | |||
18 | * Copyright (C) 2007 Hitachi Software Engineering Co., Ltd. | 19 | * Copyright (C) 2007 Hitachi Software Engineering Co., Ltd. |
19 | * Yuichi Nakamura <ynakam@hitachisoft.jp> | 20 | * Yuichi Nakamura <ynakam@hitachisoft.jp> |
20 | * Copyright (C) 2016 Mellanox Technologies | 21 | * Copyright (C) 2016 Mellanox Technologies |
21 | * | ||
22 | * This program is free software; you can redistribute it and/or modify | ||
23 | * it under the terms of the GNU General Public License version 2, | ||
24 | * as published by the Free Software Foundation. | ||
25 | */ | 22 | */ |
26 | 23 | ||
27 | #include <linux/init.h> | 24 | #include <linux/init.h> |
diff --git a/security/selinux/include/audit.h b/security/selinux/include/audit.h index 682e2b5de2a4..073a3d34a0d2 100644 --- a/security/selinux/include/audit.h +++ b/security/selinux/include/audit.h | |||
@@ -1,3 +1,4 @@ | |||
1 | /* SPDX-License-Identifier: GPL-2.0-only */ | ||
1 | /* | 2 | /* |
2 | * SELinux support for the Audit LSM hooks | 3 | * SELinux support for the Audit LSM hooks |
3 | * | 4 | * |
@@ -6,10 +7,6 @@ | |||
6 | * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> | 7 | * Copyright (C) 2005 Red Hat, Inc., James Morris <jmorris@redhat.com> |
7 | * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> | 8 | * Copyright (C) 2006 Trusted Computer Solutions, Inc. <dgoeddel@trustedcs.com> |
8 | * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> | 9 | * Copyright (C) 2006 IBM Corporation, Timothy R. Chavez <tinytim@us.ibm.com> |
9 | * | ||
10 | * This program is free software; you can redistribute it and/or modify | ||
11 | * it under the terms of the GNU General Public License version 2, | ||
12 | * as published by the Free Software Foundation. | ||
13 | */ | 10 | */ |
14 | 11 | ||
15 | #ifndef _SELINUX_AUDIT_H | 12 | #ifndef _SELINUX_AUDIT_H |
diff --git a/security/selinux/include/netif.h b/security/selinux/include/netif.h index c72145444090..85ec30d11144 100644 --- a/security/selinux/include/netif.h +++ b/security/selinux/include/netif.h | |||
@@ -1,3 +1,4 @@ | |||
1 | /* SPDX-License-Identifier: GPL-2.0-only */ | ||
1 | /* | 2 | /* |
2 | * Network interface table. | 3 | * Network interface table. |
3 | * | 4 | * |
@@ -9,10 +10,6 @@ | |||
9 | * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> | 10 | * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> |
10 | * Copyright (C) 2007 Hewlett-Packard Development Company, L.P. | 11 | * Copyright (C) 2007 Hewlett-Packard Development Company, L.P. |
11 | * Paul Moore <paul@paul-moore.com> | 12 | * Paul Moore <paul@paul-moore.com> |
12 | * | ||
13 | * This program is free software; you can redistribute it and/or modify | ||
14 | * it under the terms of the GNU General Public License version 2, | ||
15 | * as published by the Free Software Foundation. | ||
16 | */ | 13 | */ |
17 | #ifndef _SELINUX_NETIF_H_ | 14 | #ifndef _SELINUX_NETIF_H_ |
18 | #define _SELINUX_NETIF_H_ | 15 | #define _SELINUX_NETIF_H_ |
diff --git a/security/selinux/include/objsec.h b/security/selinux/include/objsec.h index 231262d8eac9..91c5395dd20c 100644 --- a/security/selinux/include/objsec.h +++ b/security/selinux/include/objsec.h | |||
@@ -1,3 +1,4 @@ | |||
1 | /* SPDX-License-Identifier: GPL-2.0-only */ | ||
1 | /* | 2 | /* |
2 | * NSA Security-Enhanced Linux (SELinux) security module | 3 | * NSA Security-Enhanced Linux (SELinux) security module |
3 | * | 4 | * |
@@ -11,10 +12,6 @@ | |||
11 | * Copyright (C) 2001,2002 Networks Associates Technology, Inc. | 12 | * Copyright (C) 2001,2002 Networks Associates Technology, Inc. |
12 | * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> | 13 | * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> |
13 | * Copyright (C) 2016 Mellanox Technologies | 14 | * Copyright (C) 2016 Mellanox Technologies |
14 | * | ||
15 | * This program is free software; you can redistribute it and/or modify | ||
16 | * it under the terms of the GNU General Public License version 2, | ||
17 | * as published by the Free Software Foundation. | ||
18 | */ | 15 | */ |
19 | #ifndef _SELINUX_OBJSEC_H_ | 16 | #ifndef _SELINUX_OBJSEC_H_ |
20 | #define _SELINUX_OBJSEC_H_ | 17 | #define _SELINUX_OBJSEC_H_ |
diff --git a/security/selinux/netif.c b/security/selinux/netif.c index 8c738c189942..9cb83eeee1d9 100644 --- a/security/selinux/netif.c +++ b/security/selinux/netif.c | |||
@@ -1,3 +1,4 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * Network interface table. | 3 | * Network interface table. |
3 | * | 4 | * |
@@ -9,10 +10,6 @@ | |||
9 | * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> | 10 | * Copyright (C) 2003 Red Hat, Inc., James Morris <jmorris@redhat.com> |
10 | * Copyright (C) 2007 Hewlett-Packard Development Company, L.P. | 11 | * Copyright (C) 2007 Hewlett-Packard Development Company, L.P. |
11 | * Paul Moore <paul@paul-moore.com> | 12 | * Paul Moore <paul@paul-moore.com> |
12 | * | ||
13 | * This program is free software; you can redistribute it and/or modify | ||
14 | * it under the terms of the GNU General Public License version 2, | ||
15 | * as published by the Free Software Foundation. | ||
16 | */ | 13 | */ |
17 | #include <linux/init.h> | 14 | #include <linux/init.h> |
18 | #include <linux/types.h> | 15 | #include <linux/types.h> |
diff --git a/security/selinux/netlink.c b/security/selinux/netlink.c index 8a8a72507437..621e2e9cd6a1 100644 --- a/security/selinux/netlink.c +++ b/security/selinux/netlink.c | |||
@@ -1,13 +1,10 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * Netlink event notifications for SELinux. | 3 | * Netlink event notifications for SELinux. |
3 | * | 4 | * |
4 | * Author: James Morris <jmorris@redhat.com> | 5 | * Author: James Morris <jmorris@redhat.com> |
5 | * | 6 | * |
6 | * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com> | 7 | * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com> |
7 | * | ||
8 | * This program is free software; you can redistribute it and/or modify | ||
9 | * it under the terms of the GNU General Public License version 2, | ||
10 | * as published by the Free Software Foundation. | ||
11 | */ | 8 | */ |
12 | #include <linux/init.h> | 9 | #include <linux/init.h> |
13 | #include <linux/types.h> | 10 | #include <linux/types.h> |
diff --git a/security/selinux/nlmsgtab.c b/security/selinux/nlmsgtab.c index 2c75d823d8e2..58345ba0528e 100644 --- a/security/selinux/nlmsgtab.c +++ b/security/selinux/nlmsgtab.c | |||
@@ -1,13 +1,10 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * Netlink message type permission tables, for user generated messages. | 3 | * Netlink message type permission tables, for user generated messages. |
3 | * | 4 | * |
4 | * Author: James Morris <jmorris@redhat.com> | 5 | * Author: James Morris <jmorris@redhat.com> |
5 | * | 6 | * |
6 | * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com> | 7 | * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com> |
7 | * | ||
8 | * This program is free software; you can redistribute it and/or modify | ||
9 | * it under the terms of the GNU General Public License version 2, | ||
10 | * as published by the Free Software Foundation. | ||
11 | */ | 8 | */ |
12 | #include <linux/types.h> | 9 | #include <linux/types.h> |
13 | #include <linux/kernel.h> | 10 | #include <linux/kernel.h> |
diff --git a/security/selinux/ss/status.c b/security/selinux/ss/status.c index a121de45ac0e..3c554a442467 100644 --- a/security/selinux/ss/status.c +++ b/security/selinux/ss/status.c | |||
@@ -1,13 +1,10 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * mmap based event notifications for SELinux | 3 | * mmap based event notifications for SELinux |
3 | * | 4 | * |
4 | * Author: KaiGai Kohei <kaigai@ak.jp.nec.com> | 5 | * Author: KaiGai Kohei <kaigai@ak.jp.nec.com> |
5 | * | 6 | * |
6 | * Copyright (C) 2010 NEC corporation | 7 | * Copyright (C) 2010 NEC corporation |
7 | * | ||
8 | * This program is free software; you can redistribute it and/or modify | ||
9 | * it under the terms of the GNU General Public License version 2, | ||
10 | * as published by the Free Software Foundation. | ||
11 | */ | 8 | */ |
12 | #include <linux/kernel.h> | 9 | #include <linux/kernel.h> |
13 | #include <linux/gfp.h> | 10 | #include <linux/gfp.h> |
diff --git a/security/selinux/xfrm.c b/security/selinux/xfrm.c index 7c57cb7e4146..7314196185d1 100644 --- a/security/selinux/xfrm.c +++ b/security/selinux/xfrm.c | |||
@@ -1,3 +1,4 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * NSA Security-Enhanced Linux (SELinux) security module | 3 | * NSA Security-Enhanced Linux (SELinux) security module |
3 | * | 4 | * |
@@ -12,10 +13,6 @@ | |||
12 | * | 13 | * |
13 | * Copyright (C) 2005 International Business Machines Corporation | 14 | * Copyright (C) 2005 International Business Machines Corporation |
14 | * Copyright (C) 2006 Trusted Computer Solutions, Inc. | 15 | * Copyright (C) 2006 Trusted Computer Solutions, Inc. |
15 | * | ||
16 | * This program is free software; you can redistribute it and/or modify | ||
17 | * it under the terms of the GNU General Public License version 2, | ||
18 | * as published by the Free Software Foundation. | ||
19 | */ | 16 | */ |
20 | 17 | ||
21 | /* | 18 | /* |
diff --git a/security/smack/smack_lsm.c b/security/smack/smack_lsm.c index d99450b4f511..4c5e5a438f8b 100644 --- a/security/smack/smack_lsm.c +++ b/security/smack/smack_lsm.c | |||
@@ -1,3 +1,4 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * Simplified MAC Kernel (smack) security module | 3 | * Simplified MAC Kernel (smack) security module |
3 | * | 4 | * |
@@ -12,10 +13,6 @@ | |||
12 | * Paul Moore <paul@paul-moore.com> | 13 | * Paul Moore <paul@paul-moore.com> |
13 | * Copyright (C) 2010 Nokia Corporation | 14 | * Copyright (C) 2010 Nokia Corporation |
14 | * Copyright (C) 2011 Intel Corporation. | 15 | * Copyright (C) 2011 Intel Corporation. |
15 | * | ||
16 | * This program is free software; you can redistribute it and/or modify | ||
17 | * it under the terms of the GNU General Public License version 2, | ||
18 | * as published by the Free Software Foundation. | ||
19 | */ | 16 | */ |
20 | 17 | ||
21 | #include <linux/xattr.h> | 18 | #include <linux/xattr.h> |
diff --git a/security/smack/smack_netfilter.c b/security/smack/smack_netfilter.c index e36d17835d4f..fc7399b45373 100644 --- a/security/smack/smack_netfilter.c +++ b/security/smack/smack_netfilter.c | |||
@@ -1,3 +1,4 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * Simplified MAC Kernel (smack) security module | 3 | * Simplified MAC Kernel (smack) security module |
3 | * | 4 | * |
@@ -8,10 +9,6 @@ | |||
8 | * | 9 | * |
9 | * Copyright (C) 2014 Casey Schaufler <casey@schaufler-ca.com> | 10 | * Copyright (C) 2014 Casey Schaufler <casey@schaufler-ca.com> |
10 | * Copyright (C) 2014 Intel Corporation. | 11 | * Copyright (C) 2014 Intel Corporation. |
11 | * | ||
12 | * This program is free software; you can redistribute it and/or modify | ||
13 | * it under the terms of the GNU General Public License version 2, | ||
14 | * as published by the Free Software Foundation. | ||
15 | */ | 12 | */ |
16 | 13 | ||
17 | #include <linux/netfilter_ipv4.h> | 14 | #include <linux/netfilter_ipv4.h> |
diff --git a/security/yama/yama_lsm.c b/security/yama/yama_lsm.c index efac68556b45..01c6239c4493 100644 --- a/security/yama/yama_lsm.c +++ b/security/yama/yama_lsm.c | |||
@@ -1,3 +1,4 @@ | |||
1 | // SPDX-License-Identifier: GPL-2.0-only | ||
1 | /* | 2 | /* |
2 | * Yama Linux Security Module | 3 | * Yama Linux Security Module |
3 | * | 4 | * |
@@ -5,11 +6,6 @@ | |||
5 | * | 6 | * |
6 | * Copyright (C) 2010 Canonical, Ltd. | 7 | * Copyright (C) 2010 Canonical, Ltd. |
7 | * Copyright (C) 2011 The Chromium OS Authors. | 8 | * Copyright (C) 2011 The Chromium OS Authors. |
8 | * | ||
9 | * This program is free software; you can redistribute it and/or modify | ||
10 | * it under the terms of the GNU General Public License version 2, as | ||
11 | * published by the Free Software Foundation. | ||
12 | * | ||
13 | */ | 9 | */ |
14 | 10 | ||
15 | #include <linux/lsm_hooks.h> | 11 | #include <linux/lsm_hooks.h> |