Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp35173imm; Tue, 17 Jul 2018 13:25:50 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdOgkzJO4/mTEIVIbI/QHZwLS09RRt9R/ycsT8I8M4QK2s+SOlc9jgYHuCc4WVQ5NXNqop1 X-Received: by 2002:a17:902:e201:: with SMTP id ce1-v6mr2967008plb.136.1531859150467; Tue, 17 Jul 2018 13:25:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531859150; cv=none; d=google.com; s=arc-20160816; b=Sfg27gTBlTr3b8MnyIJ2nBYXS1LO2T3+TGqGQur186qPEHplkA8Q0NSgSZ7/YsoYDr 1L7dUgMtDayoJGdNLSlmCj0tX3EIgoxLVU7R32+Wst+AKkjXRedFSmpl328rFTTIYFFX 3islIuZWEMdKRS0AyTMxqCM0vOa1icknHZKMpifm90vRz77YgBtdCrCJZePEbRkf4pnD vnVxzGHYc/IBK1/DZn7pcBog4aW+gz+UOWXzpntSLhtpjIKAdQjoO9cT+3ZEHyo690Hq orjmJ0dTzDhD5V6zEVkrAnsPR84dbBLdwMJQEUJ+R3NUq101+m/hwz9Bvb6ar2FOyAbd 4moA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Wy+4aNuNp57ZZ9JJNYFcvGOH4CQGp6at2Am85N7esnM=; b=ULb+2+xoL1gFTwGSfuj79qFIb2tAXT4aZMFTo48qxwt1GmcJUz46J3a6Cuq+iap3Jx F5uWfeZG0HMk8vH1tPj+dkT/W72SmtV9+aGiQDjPNKtArRMrPvuIf9/Rjc5uNOt6WQKT uANf0pqURxNMYURrpJah5lCdQ+oYmBc/MDHJMH1cOuW/6kmFpMGG5st9sK+yCNKkoajX XhS5VlDuoS8AoukUw4c/1CfLKap7NoTTPsHwszZojcPTTj32vc26rF0rOcaZBM4j9iVm aBn62evaV7vTZ31gQCK1cGnSyb8BV0BcP3SIaLI3lK1EDaapAs2je+mFe47GYBLzz/fr HtnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x3-v6si1678653pfj.289.2018.07.17.13.25.35; Tue, 17 Jul 2018 13:25:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730614AbeGQU6r (ORCPT + 99 others); Tue, 17 Jul 2018 16:58:47 -0400 Received: from mout.kundenserver.de ([212.227.126.135]:47841 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729741AbeGQU6q (ORCPT ); Tue, 17 Jul 2018 16:58:46 -0400 Received: from wuerfel.lan ([46.223.138.35]) by mrelayeu.kundenserver.de (mreue007 [212.227.15.129]) with ESMTPA (Nemesis) id 0LkEpj-1gCOcX0BxL-00cNsc; Tue, 17 Jul 2018 22:23:58 +0200 From: Arnd Bergmann To: James Morris , "Serge E. Hallyn" Cc: Arnd Bergmann , Mimi Zohar , Kees Cook , David Howells , "Eric W. Biederman" , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] security: export security_kernel_load_data function Date: Tue, 17 Jul 2018 22:23:37 +0200 Message-Id: <20180717202355.2119407-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K1:kiy1i74IFDaVb4GxjRdW0LvWuai9XJxE6mUN0j2vHAFufVUsRwg aXPMy+eUHPPlrmY0+hbFdPKNofz53Ev/yCNIjp9+JccJrUU2EMY6UpX7p2Zh5EBz9LAupCp J13uv1dt2/bbYDY+p6j72JCzgyk+x00/bgisaCFdq037+D/9r2DWkQHZ6bu3mQVPSUD3vba Mcv9kXI+LNkOAs/70fJFQ== X-UI-Out-Filterresults: notjunk:1;V01:K0:ITWu7OOS1Ts=:UfLAHqMlmrX1x/gF+z50VZ dYE5pRYZPXJxtag9J0YKDXrvwv/bQKcKuOhiHHSDbVct0ZZuMEIlqP/PvJ9iLHdtH2PJijH8b C3fX1XVdYBxdxA05VVkqUkbzBctmQ3IvNsRJm7EbqWKK3XcqbIoS7Ko8ey/R/EAzLKJEQqBJZ IGE8LJg1RA3wPh8spF6dZVBKbhLWXQeoNBmiII2NhDqkcHG2D/EHsT6C1rP59216bEQOomCRJ F/K/qXSe4uHfCo4WDc9s3WRnA5weqcpPk7fL1DAQy3sIZSopAua4xfFeFEYmrPkuVj6r2++pp f6rKwAN9Xr3rT91oni+dP7kxbi31ZUSUTHLZRB05DLj0DGIwTLyQPBMbaetKCS7b3tRw+Rv3u KyUAyTbiEdgn7zuBMusftcrx3zeKUQ4s3ThNIbudqg3z5yuJSsRQ0ERhK2LvLqZxPNaxL13z+ lnrs4jXgQ4tN4mr6daioCUcFpovnx+2XY/TTYXz8QKwKYuFljuG8KC1UqzuB01eMCeaKWVRU3 bdVoWN6QybSG5xe6r7fvOSu9CexfmQQ+YsOmsEqc8aa6bx/+edDmRe84MkbrgPq5GHShcZ4Fr w/DwmKsV2nQUlhRJ7HplyVsGYkNbPV9ctwh6uKls3jlcpBSf1cVoOpNjrfz5WCczfM/RFpHAL RTnKCsaiwt2Eomx+praL/6RWcI3tfbzVdRpZhdrEKX4sqca2VQws/F0fbBEvFHh+JT+g= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The firmware_loader can be built as a loadable module, which now fails when CONFIG_SECURITY is enabled, because a call to the security_kernel_load_data() function got added, and this is not exported to modules: ERROR: "security_kernel_load_data" [drivers/base/firmware_loader/firmware_class.ko] undefined! Add an EXPORT_SYMBOL_GPL() to make it available here. Fixes: 6e852651f28e ("firmware: add call to LSM hook before firmware sysfs fallback") Signed-off-by: Arnd Bergmann --- security/security.c | 1 + 1 file changed, 1 insertion(+) diff --git a/security/security.c b/security/security.c index 03e98be76d58..7f9618eaba10 100644 --- a/security/security.c +++ b/security/security.c @@ -1121,6 +1121,7 @@ int security_kernel_load_data(enum kernel_load_data_id id) return ret; return ima_load_data(id); } +EXPORT_SYMBOL_GPL(security_kernel_load_data); int security_task_fix_setuid(struct cred *new, const struct cred *old, int flags) -- 2.9.0