Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2926749imu; Sun, 9 Dec 2018 12:46:39 -0800 (PST) X-Google-Smtp-Source: AFSGD/VE+9IZtLwIL1rbkxh5rsE4A6I9BLPC7D/eJ2kl6nQ8hlRa/cHfQHkyfngSX5GRcsHYuGVT X-Received: by 2002:a17:902:6b09:: with SMTP id o9mr9680881plk.208.1544388399252; Sun, 09 Dec 2018 12:46:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544388399; cv=none; d=google.com; s=arc-20160816; b=KmLbj6GxrOsQ0t4kUoaS9tnKaOtT1BfUpf5T7MYRLNVy/TQkq1SfqsXTiWv5hcMflZ YZwPTAASUSXKiiuB6reDtV78ERryFP2DJUSNuIgc/Q4k1OeTuQGGV5GDCsTM5Gcn1Baj 2WxdKfxCFHhJGd5/70M5H1MGV7Kqt3JbxVkV8hQlT+d0EndJ7UJRwJtdaow3c0C5YX0K X+z22PNOzgfolRb6G0Fsqp3njrcMXGk7msuDkrt51unglfy8EL6/vV3t5rEBJlBEvbmU vOpasNCN8B+6wkNfOZhJ7Aba5MFBrbyTcvLPxbayrH6Pnl8WkKocW7+k+MK+nHS1v4jD U0pA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=63Pfe60NFbMK0/6Ii1xkNE4kTSEQC6dNPlnGVc89QgA=; b=ChLB9FyqwdzYJrSiwOoZ74GsflYDXXgStuTigDCvLf9+0q7tRuNK6HfUBA3HxOa5sq JTCsfS9XF72Zs8731mCcjM3+/tBrB5LADhVfGlkkHiukDQFqrWKyE9SpS2EkJFlxAoOZ mKrCZBm5uEwPPzoM/mlWpCs0Vtw7dZV5T4UQpMC6rD60nItpiBrbNT3zUL61aYi69ylE RqeVcKIhPbYHM8BwJHZl2lBRIwF7CFl+bCE1xJ8folk4HX5DCgxy5Ffbqi6WcjyJxyDh e0QbV4oEcPgLKsHrtZymsvNKJhbZCpjBKGopdvxkpYl1PbHfxGU5c6teiGG9EAGnEO8c 524A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m64si9252012pfb.224.2018.12.09.12.46.23; Sun, 09 Dec 2018 12:46:39 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726387AbeLIUin (ORCPT + 99 others); Sun, 9 Dec 2018 15:38:43 -0500 Received: from mail5.windriver.com ([192.103.53.11]:52320 "EHLO mail5.wrs.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726225AbeLIUin (ORCPT ); Sun, 9 Dec 2018 15:38:43 -0500 Received: from ALA-HCA.corp.ad.wrs.com (ala-hca.corp.ad.wrs.com [147.11.189.40]) by mail5.wrs.com (8.15.2/8.15.2) with ESMTPS id wB9Kb4ne004222 (version=TLSv1 cipher=AES128-SHA bits=128 verify=FAIL); Sun, 9 Dec 2018 12:37:14 -0800 Received: from yow-cube1.wrs.com (128.224.56.98) by ALA-HCA.corp.ad.wrs.com (147.11.189.40) with Microsoft SMTP Server id 14.3.408.0; Sun, 9 Dec 2018 12:36:53 -0800 From: Paul Gortmaker To: CC: , Paul Gortmaker , Mimi Zohar , David Howells , James Morris , "Serge E. Hallyn" , , Subject: [PATCH 2/5] keys: remove needless modular infrastructure from ecryptfs_format Date: Sun, 9 Dec 2018 15:36:30 -0500 Message-ID: <1544387793-32309-3-git-send-email-paul.gortmaker@windriver.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1544387793-32309-1-git-send-email-paul.gortmaker@windriver.com> References: <1544387793-32309-1-git-send-email-paul.gortmaker@windriver.com> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Even though the support can be modular, only one file needs to use all the macros like MODULE_AUTHOR, MODULE_LICENSE etc. Only the one responsible for registering/removal with module_init/module_exit needs to declare these. In this case, that file is "encrypted.c" and it already has the MODULE_LICENSE that we are removing here. Since the file does EXPORT_SYMBOL, we add export.h - and build tests show that module.h (which includes everything) was hiding an implicit use of string.h - so that is added as well. Cc: Mimi Zohar Cc: David Howells Cc: James Morris Cc: "Serge E. Hallyn" Cc: linux-integrity@vger.kernel.org Cc: keyrings@vger.kernel.org Cc: linux-security-module@vger.kernel.org Signed-off-by: Paul Gortmaker --- security/keys/encrypted-keys/ecryptfs_format.c | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/security/keys/encrypted-keys/ecryptfs_format.c b/security/keys/encrypted-keys/ecryptfs_format.c index 6daa3b6ff9ed..efac03047919 100644 --- a/security/keys/encrypted-keys/ecryptfs_format.c +++ b/security/keys/encrypted-keys/ecryptfs_format.c @@ -15,7 +15,8 @@ * the Free Software Foundation, version 2 of the License. */ -#include +#include +#include #include "ecryptfs_format.h" u8 *ecryptfs_get_auth_tok_key(struct ecryptfs_auth_tok *auth_tok) @@ -77,5 +78,3 @@ int ecryptfs_fill_auth_tok(struct ecryptfs_auth_tok *auth_tok, return 0; } EXPORT_SYMBOL(ecryptfs_fill_auth_tok); - -MODULE_LICENSE("GPL"); -- 2.7.4