From patchwork Tue Jul 17 20:23:37 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 142221 Delivered-To: patch@linaro.org Received: by 2002:a2e:9754:0:0:0:0:0 with SMTP id f20-v6csp10186ljj; Tue, 17 Jul 2018 13:24:32 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcfDHVLHWbRwWaRMTbHK4sw28OAr5SqKmW5e7ED20SIF3KtOCHtJvMPIVQa5gW0n5CPtzWO X-Received: by 2002:a17:902:22:: with SMTP id 31-v6mr3039191pla.332.1531859071911; Tue, 17 Jul 2018 13:24:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531859071; cv=none; d=google.com; s=arc-20160816; b=VDc12cOQa7vt7w0JeHUgZKlenT4vK5b6XuMQ8ZLB4n4MwNfS+0L3oLWAWciDmyIKDK 6mUnDKoesGnplwI05PSBqIrxSPsezyW9CkN1otsh9L3U49s0+bKhky1QvOcBz5fi5wnl H3AXqDFxiYuedKi++XfU2MmznI6PkHqT7ltpgFDmEZiezMmqPwGxDaJsbh9KZ4fR8+K4 93G8jRBFZVkQYyKj0eS+gj322qZyDkzJlJ2N/uEI8wh93oJodsey25ONULd23VJ+bImo tvneDRzDpCHgO15Tt9E77mCIZ8xtwokC+2CJLpvmFTqFVcSWlgcLsY22PXsYuznJO0Tc Brrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=Wy+4aNuNp57ZZ9JJNYFcvGOH4CQGp6at2Am85N7esnM=; b=ULb+2+xoL1gFTwGSfuj79qFIb2tAXT4aZMFTo48qxwt1GmcJUz46J3a6Cuq+iap3Jx F5uWfeZG0HMk8vH1tPj+dkT/W72SmtV9+aGiQDjPNKtArRMrPvuIf9/Rjc5uNOt6WQKT uANf0pqURxNMYURrpJah5lCdQ+oYmBc/MDHJMH1cOuW/6kmFpMGG5st9sK+yCNKkoajX XhS5VlDuoS8AoukUw4c/1CfLKap7NoTTPsHwszZojcPTTj32vc26rF0rOcaZBM4j9iVm aBn62evaV7vTZ31gQCK1cGnSyb8BV0BcP3SIaLI3lK1EDaapAs2je+mFe47GYBLzz/fr HtnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t19-v6si1416071plo.350.2018.07.17.13.24.31; Tue, 17 Jul 2018 13:24:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730638AbeGQU6r (ORCPT + 30 others); Tue, 17 Jul 2018 16:58:47 -0400 Received: from mout.kundenserver.de ([212.227.126.135]:47841 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729741AbeGQU6q (ORCPT ); Tue, 17 Jul 2018 16:58:46 -0400 Received: from wuerfel.lan ([46.223.138.35]) by mrelayeu.kundenserver.de (mreue007 [212.227.15.129]) with ESMTPA (Nemesis) id 0LkEpj-1gCOcX0BxL-00cNsc; Tue, 17 Jul 2018 22:23:58 +0200 From: Arnd Bergmann To: James Morris , "Serge E. Hallyn" Cc: Arnd Bergmann , Mimi Zohar , Kees Cook , David Howells , "Eric W. Biederman" , linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] security: export security_kernel_load_data function Date: Tue, 17 Jul 2018 22:23:37 +0200 Message-Id: <20180717202355.2119407-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K1:kiy1i74IFDaVb4GxjRdW0LvWuai9XJxE6mUN0j2vHAFufVUsRwg aXPMy+eUHPPlrmY0+hbFdPKNofz53Ev/yCNIjp9+JccJrUU2EMY6UpX7p2Zh5EBz9LAupCp J13uv1dt2/bbYDY+p6j72JCzgyk+x00/bgisaCFdq037+D/9r2DWkQHZ6bu3mQVPSUD3vba Mcv9kXI+LNkOAs/70fJFQ== X-UI-Out-Filterresults: notjunk:1; V01:K0:ITWu7OOS1Ts=:UfLAHqMlmrX1x/gF+z50VZ dYE5pRYZPXJxtag9J0YKDXrvwv/bQKcKuOhiHHSDbVct0ZZuMEIlqP/PvJ9iLHdtH2PJijH8b C3fX1XVdYBxdxA05VVkqUkbzBctmQ3IvNsRJm7EbqWKK3XcqbIoS7Ko8ey/R/EAzLKJEQqBJZ IGE8LJg1RA3wPh8spF6dZVBKbhLWXQeoNBmiII2NhDqkcHG2D/EHsT6C1rP59216bEQOomCRJ F/K/qXSe4uHfCo4WDc9s3WRnA5weqcpPk7fL1DAQy3sIZSopAua4xfFeFEYmrPkuVj6r2++pp f6rKwAN9Xr3rT91oni+dP7kxbi31ZUSUTHLZRB05DLj0DGIwTLyQPBMbaetKCS7b3tRw+Rv3u KyUAyTbiEdgn7zuBMusftcrx3zeKUQ4s3ThNIbudqg3z5yuJSsRQ0ERhK2LvLqZxPNaxL13z+ lnrs4jXgQ4tN4mr6daioCUcFpovnx+2XY/TTYXz8QKwKYuFljuG8KC1UqzuB01eMCeaKWVRU3 bdVoWN6QybSG5xe6r7fvOSu9CexfmQQ+YsOmsEqc8aa6bx/+edDmRe84MkbrgPq5GHShcZ4Fr w/DwmKsV2nQUlhRJ7HplyVsGYkNbPV9ctwh6uKls3jlcpBSf1cVoOpNjrfz5WCczfM/RFpHAL RTnKCsaiwt2Eomx+praL/6RWcI3tfbzVdRpZhdrEKX4sqca2VQws/F0fbBEvFHh+JT+g= Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The firmware_loader can be built as a loadable module, which now fails when CONFIG_SECURITY is enabled, because a call to the security_kernel_load_data() function got added, and this is not exported to modules: ERROR: "security_kernel_load_data" [drivers/base/firmware_loader/firmware_class.ko] undefined! Add an EXPORT_SYMBOL_GPL() to make it available here. Fixes: 6e852651f28e ("firmware: add call to LSM hook before firmware sysfs fallback") Signed-off-by: Arnd Bergmann --- security/security.c | 1 + 1 file changed, 1 insertion(+) -- 2.9.0 diff --git a/security/security.c b/security/security.c index 03e98be76d58..7f9618eaba10 100644 --- a/security/security.c +++ b/security/security.c @@ -1121,6 +1121,7 @@ int security_kernel_load_data(enum kernel_load_data_id id) return ret; return ima_load_data(id); } +EXPORT_SYMBOL_GPL(security_kernel_load_data); int security_task_fix_setuid(struct cred *new, const struct cred *old, int flags)