Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2923530imu; Sun, 9 Dec 2018 12:40:59 -0800 (PST) X-Google-Smtp-Source: AFSGD/XVMkZ0H5DWJ9tXZfextriAKzOPwcCZgOuEEcuocK0D3jkgLYfX9OB2fEeY3Z4QYjZDSd0J X-Received: by 2002:a63:151f:: with SMTP id v31mr8514809pgl.34.1544388059587; Sun, 09 Dec 2018 12:40:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544388059; cv=none; d=google.com; s=arc-20160816; b=AfxkzD9RLJ5GbkjFSFIFA9KxZphTGgR5isCR3p2iq4lzRkB8hu7rxQfEsS1q2eOtsd jqae9DR51fOzjYq3wFbtMZyk1VBisWzF/yAVqev8NF507Oe6sJvmUcfwfFXkDYpZHxu2 0uQGqFyM3PJmkT7wnOwiyMhxRLRR/UtIzV8xSYHua/QdCzlhiChnnOaYC3+wiITcksa3 3LK/YM0Ju79aImfjO1nAUAQlq2DVJSvQFQt75ndsFcrg8qfekNwxVWUv5RPVAi32BBnr iISRcRudazoZ0oR3mK52CCrxAF+OzfrrHyJsI8oaSxGlw3FTNNMb+c91J9f3kpd+g2iR SDDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=9NrHoKHjWH+iSsXMXmJYSjVKQWunwd4jssSLlQQBAoY=; b=dLJ1GuBem+TM1kq/rxj8hGm5ABeVYWTzjUW2oxrWgV66T+fVvQjae0vXac0jno1New zJTO9fSUms6B0p391AiE4G7oZuUc7Zvs9htAexQZc7478xEqT/4nIr42URn5giVge7Al LIzekKfnuQCu/vgtFqDrIdEuzCEPPkSewLiGugdTPf1H9fxqbRofcGbj8gDSA0q4wU9F H153GzQ71cgfNpc4k0lPe3Wp39ogD4Me+l2Ehzd0w6zop0UXLHwr8XHV7eEb12fus63T FY7yfto9q8FEU/jtPncKtG/eTpVATCGEtbRcowvJJLBGIR+Qm6a3KxMrwqqbGO48Y4K4 pM1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a11si8554482pln.78.2018.12.09.12.40.44; Sun, 09 Dec 2018 12:40:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726361AbeLIUiU (ORCPT + 99 others); Sun, 9 Dec 2018 15:38:20 -0500 Received: from mail5.windriver.com ([192.103.53.11]:52302 "EHLO mail5.wrs.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726219AbeLIUiT (ORCPT ); Sun, 9 Dec 2018 15:38:19 -0500 Received: from ALA-HCA.corp.ad.wrs.com (ala-hca.corp.ad.wrs.com [147.11.189.40]) by mail5.wrs.com (8.15.2/8.15.2) with ESMTPS id wB9Kb4nf004222 (version=TLSv1 cipher=AES128-SHA bits=128 verify=FAIL); Sun, 9 Dec 2018 12:37:39 -0800 Received: from yow-cube1.wrs.com (128.224.56.98) by ALA-HCA.corp.ad.wrs.com (147.11.189.40) with Microsoft SMTP Server id 14.3.408.0; Sun, 9 Dec 2018 12:37:27 -0800 From: Paul Gortmaker To: CC: , Paul Gortmaker , James Morris , "Serge E. Hallyn" Subject: [PATCH 3/5] security: fs: make inode explicitly non-modular Date: Sun, 9 Dec 2018 15:36:31 -0500 Message-ID: <1544387793-32309-4-git-send-email-paul.gortmaker@windriver.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1544387793-32309-1-git-send-email-paul.gortmaker@windriver.com> References: <1544387793-32309-1-git-send-email-paul.gortmaker@windriver.com> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The Makefile/Kconfig entry controlling compilation of this code is: security/Makefile:obj-$(CONFIG_SECURITYFS) += inode.o security/Kconfig:config SECURITYFS security/Kconfig: bool "Enable the securityfs filesystem" ...meaning that it currently is not being built as a module by anyone. Lets remove the couple traces of modular infrastructure use, so that when reading the driver there is no doubt it is builtin-only. We also delete the MODULE_LICENSE tag etc. since all that information is already contained at the top of the file in the comments. The removal of module.h uncovered a couple previously hidden implicit header requirements which are now included explicitly. Cc: James Morris Cc: "Serge E. Hallyn" Cc: linux-security-module@vger.kernel.org Signed-off-by: Paul Gortmaker --- security/inode.c | 6 ++---- 1 file changed, 2 insertions(+), 4 deletions(-) diff --git a/security/inode.c b/security/inode.c index 8dd9ca8848e4..b7772a9b315e 100644 --- a/security/inode.c +++ b/security/inode.c @@ -13,7 +13,8 @@ */ /* #define DEBUG */ -#include +#include +#include #include #include #include @@ -341,7 +342,4 @@ static int __init securityfs_init(void) #endif return 0; } - core_initcall(securityfs_init); -MODULE_LICENSE("GPL"); - -- 2.7.4