diff options
author | Arnd Bergmann <arnd@arndb.de> | 2018-07-17 22:23:37 +0200 |
---|---|---|
committer | James Morris <james.morris@microsoft.com> | 2018-07-17 21:26:51 -0700 |
commit | 83a68a06795fa47e77ea758f293a5946e9e02e84 (patch) | |
tree | 1ec49b4c0bc1b7476ca1cc71061a4f5ca2cb152d /security/security.c | |
parent | 4f0496d8ffa3ed5956a2ddee5d84f0246977799d (diff) | |
download | lwn-83a68a06795fa47e77ea758f293a5946e9e02e84.tar.gz lwn-83a68a06795fa47e77ea758f293a5946e9e02e84.zip |
security: export security_kernel_load_data function
The firmware_loader can be built as a loadable module, which now
fails when CONFIG_SECURITY is enabled, because a call to the
security_kernel_load_data() function got added, and this is
not exported to modules:
ERROR: "security_kernel_load_data" [drivers/base/firmware_loader/firmware_class.ko] undefined!
Add an EXPORT_SYMBOL_GPL() to make it available here.
Fixes: 6e852651f28e ("firmware: add call to LSM hook before firmware sysfs fallback")
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Signed-off-by: James Morris <james.morris@microsoft.com>
Diffstat (limited to 'security/security.c')
-rw-r--r-- | security/security.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/security/security.c b/security/security.c index 4927e7cc7d96..6e149d0ffe33 100644 --- a/security/security.c +++ b/security/security.c @@ -1065,6 +1065,7 @@ int security_kernel_load_data(enum kernel_load_data_id id) return ret; return ima_load_data(id); } +EXPORT_SYMBOL_GPL(security_kernel_load_data); int security_task_fix_setuid(struct cred *new, const struct cred *old, int flags) |