Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S964898AbbGHKZj (ORCPT ); Wed, 8 Jul 2015 06:25:39 -0400 Received: from mailout1.w1.samsung.com ([210.118.77.11]:43757 "EHLO mailout1.w1.samsung.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933891AbbGHKZ0 (ORCPT ); Wed, 8 Jul 2015 06:25:26 -0400 X-AuditID: cbfec7f4-f79c56d0000012ee-b3-559cfa938d93 From: Paul Osmialowski To: Paul Moore , James Morris , Casey Schaufler , "Serge E. Hallyn" , Kees Cook , Tetsuo Handa , Stephen Smalley , Neil Brown , Mark Rustad , Greg Kroah-Hartman , Daniel Mack , David Herrmann , Djalal Harouni , Shuah Khan , Al Viro , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, linux-api@vger.kernel.org Cc: Karol Lewandowski , Paul Osmialowski , Lukasz Skalski Subject: [RFC 1/8] lsm: make security_file_receive available for external modules Date: Wed, 08 Jul 2015 12:25:03 +0200 Message-id: <1436351110-5902-2-git-send-email-p.osmialowsk@samsung.com> X-Mailer: git-send-email 1.9.1 In-reply-to: <1436351110-5902-1-git-send-email-p.osmialowsk@samsung.com> References: <1436351110-5902-1-git-send-email-p.osmialowsk@samsung.com> X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFuphkeLIzCtJLcpLzFFi42I5/e/4Vd3Jv+aEGlzr5LW4t+0Xm0XT31cs Fosvi1k0L17PZtH3OMii8dNcZosz3bkWc841Mlls/t7BZnF51xw2iw89j9gs5rx9y2axd34D i8WENweYLWa3vGO1+HztF7vF4d2LmS3OXzjHbjH1ywcWi5W/t7NZnP97nNVB1GN2w0UWj6cT JrN7XNsd6bFz7Somj8V7XjJ57J+7ht1jxa8j7B4fn95i8djSf5fd4/2+q2wefVtWMXoc3b+I zWPz6WqPrdP/s3p83iTnsenJW6YAwSgum5TUnMyy1CJ9uwSujL725YwFS1gr/r+4ztjAuIml i5GTQ0LARKLh6QRmCFtM4sK99WxdjFwcQgJLGSVWNh5jAkkICTQySUy8rg5iswkYStz8f5gR xBYR2MUq8WZHHEgDs0Ano8ScrnNgDcICwRI3d+4BK2IRUJWYu3oz2DZeAXeJ5p8L2SC2yUmc PDaZFcTmFPCQWPjyKzPEMneJjav/sU1g5F3AyLCKUTS1NLmgOCk911CvODG3uDQvXS85P3cT IySOvuxgXHzM6hCjAAejEg+vR8ycUCHWxLLiytxDjBIczEoivLsuAIV4UxIrq1KL8uOLSnNS iw8xSnOwKInzzt31PkRIID2xJDU7NbUgtQgmy8TBKdXA6GgTs2zyyntXbBr13xUwHLxr8sDy 28opF/S2xZdPsfZRaLkanTBZQszIa1/TuXrzX7H7g+tbJKwmMPN6vX7vHSH3ch2LDVP4zKDO ib6VolcNj+y7seLLkY2Gj9W3856+8HLRb8VGvZfdd4yf28XM/vjg5IS8h3W2xxcZZH79K6hp 6NH+8VtovxJLcUaioRZzUXEiAPXmK5mfAgAA Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 896 Lines: 30 From: Karol Lewandowski This is required for using filedesc related LSM hooks in kdbus code if it is built as a module. Signed-off-by: Karol Lewandowski --- security/security.c | 1 + 1 file changed, 1 insertion(+) diff --git a/security/security.c b/security/security.c index 595fffa..b1e935b 100644 --- a/security/security.c +++ b/security/security.c @@ -837,6 +837,7 @@ int security_file_receive(struct file *file) { return call_int_hook(file_receive, 0, file); } +EXPORT_SYMBOL(security_file_receive); int security_file_open(struct file *file, const struct cred *cred) { -- 1.9.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/