diff options
author | 2022-09-01 14:51:26 +0800 | |
---|---|---|
committer | 2022-09-01 16:21:14 -0700 | |
commit | ef331a8d4c0061ea4d353cd0db1c9b33fd45f0f2 (patch) | |
tree | 449e2f4dceecc825621dd5cc89876fb776424f9e /include | |
parent | bpf: Remove useless else if (diff) | |
download | linux-dev-ef331a8d4c0061ea4d353cd0db1c9b33fd45f0f2.tar.xz linux-dev-ef331a8d4c0061ea4d353cd0db1c9b33fd45f0f2.zip |
bpf: Only add BTF IDs for socket security hooks when CONFIG_SECURITY_NETWORK is on
When CONFIG_SECURITY_NETWORK is disabled, there will be build warnings
from resolve_btfids:
WARN: resolve_btfids: unresolved symbol bpf_lsm_socket_socketpair
......
WARN: resolve_btfids: unresolved symbol bpf_lsm_inet_conn_established
Fixing it by wrapping these BTF ID definitions by CONFIG_SECURITY_NETWORK.
Fixes: 69fd337a975c ("bpf: per-cgroup lsm flavor")
Fixes: 9113d7e48e91 ("bpf: expose bpf_{g,s}etsockopt to lsm cgroup")
Signed-off-by: Hou Tao <houtao1@huawei.com>
Link: https://lore.kernel.org/r/20220901065126.3856297-1-houtao@huaweicloud.com
Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org>
Diffstat (limited to 'include')
0 files changed, 0 insertions, 0 deletions