From: Ben Hutchings Date: Tue, 26 Jun 2018 15:59:01 +0000 (+0100) Subject: Export symbols needed by Android drivers X-Git-Tag: archive/raspbian/5.9.6-1+rpi1^2^2^2~79 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=edd31924802895d7ddd09363f6c04e720b9fa71d;p=linux.git Export symbols needed by Android drivers Bug-Debian: https://bugs.debian.org/901492 We want to enable use of the Android ashmem and binder drivers to support Anbox, but they should not be built-in as that would waste resources and increase security attack surface on systems that don't need them. Export the currently un-exported symbols they depend on. Gbp-Pq: Topic debian Gbp-Pq: Name export-symbols-needed-by-android-drivers.patch --- diff --git a/fs/file.c b/fs/file.c index abb8b7081d7..2f664a17537 100644 --- a/fs/file.c +++ b/fs/file.c @@ -409,6 +409,7 @@ struct files_struct *get_files_struct(struct task_struct *task) return files; } +EXPORT_SYMBOL_GPL(get_files_struct); void put_files_struct(struct files_struct *files) { @@ -421,6 +422,7 @@ void put_files_struct(struct files_struct *files) kmem_cache_free(files_cachep, files); } } +EXPORT_SYMBOL_GPL(put_files_struct); void reset_files_struct(struct files_struct *files) { @@ -534,6 +536,7 @@ out: spin_unlock(&files->file_lock); return error; } +EXPORT_SYMBOL_GPL(__alloc_fd); static int alloc_fd(unsigned start, unsigned flags) { @@ -612,6 +615,7 @@ void __fd_install(struct files_struct *files, unsigned int fd, rcu_assign_pointer(fdt->fd[fd], file); rcu_read_unlock_sched(); } +EXPORT_SYMBOL_GPL(__fd_install); void fd_install(unsigned int fd, struct file *file) { @@ -676,6 +680,7 @@ out_unlock: *res = NULL; return -ENOENT; } +EXPORT_SYMBOL(__close_fd_get_file); void do_close_on_exec(struct files_struct *files) { diff --git a/kernel/fork.c b/kernel/fork.c index efc5493203a..7d5e390b4be 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -1131,6 +1131,7 @@ void mmput_async(struct mm_struct *mm) schedule_work(&mm->async_put_work); } } +EXPORT_SYMBOL_GPL(mmput_async); #endif /** diff --git a/kernel/sched/core.c b/kernel/sched/core.c index f788cd61df2..ede9475ba29 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -4797,6 +4797,7 @@ int can_nice(const struct task_struct *p, const int nice) return (nice_rlim <= task_rlimit(p, RLIMIT_NICE) || capable(CAP_SYS_NICE)); } +EXPORT_SYMBOL_GPL(can_nice); #ifdef __ARCH_WANT_SYS_NICE diff --git a/kernel/signal.c b/kernel/signal.c index 42b67d2cea3..842a0303aa4 100644 --- a/kernel/signal.c +++ b/kernel/signal.c @@ -1396,6 +1396,7 @@ struct sighand_struct *__lock_task_sighand(struct task_struct *tsk, return sighand; } +EXPORT_SYMBOL_GPL(__lock_task_sighand); /* * send signal info to all the members of a group diff --git a/kernel/task_work.c b/kernel/task_work.c index 613b2d634af..d621006f007 100644 --- a/kernel/task_work.c +++ b/kernel/task_work.c @@ -58,6 +58,7 @@ task_work_add(struct task_struct *task, struct callback_head *work, int notify) return 0; } +EXPORT_SYMBOL(task_work_add); /** * task_work_cancel - cancel a pending work added by task_work_add() diff --git a/mm/memory.c b/mm/memory.c index 03c693ea59b..24ea01169ab 100644 --- a/mm/memory.c +++ b/mm/memory.c @@ -1368,6 +1368,7 @@ void zap_page_range(struct vm_area_struct *vma, unsigned long start, mmu_notifier_invalidate_range_end(&range); tlb_finish_mmu(&tlb, start, range.end); } +EXPORT_SYMBOL_GPL(zap_page_range); /** * zap_page_range_single - remove user pages in a given range diff --git a/mm/shmem.c b/mm/shmem.c index b2abca3f7f3..cc9a66808b2 100644 --- a/mm/shmem.c +++ b/mm/shmem.c @@ -4158,6 +4158,7 @@ int shmem_zero_setup(struct vm_area_struct *vma) return 0; } +EXPORT_SYMBOL_GPL(shmem_zero_setup); /** * shmem_read_mapping_page_gfp - read into page cache, using specified page allocation flags. diff --git a/mm/vmalloc.c b/mm/vmalloc.c index 128d20d2d6c..a3e656894d3 100644 --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -1280,6 +1280,7 @@ overflow: kmem_cache_free(vmap_area_cachep, va); return ERR_PTR(-EBUSY); } +EXPORT_SYMBOL_GPL(map_kernel_range_noflush); int register_vmap_purge_notifier(struct notifier_block *nb) { @@ -2149,6 +2150,7 @@ struct vm_struct *get_vm_area(unsigned long size, unsigned long flags) NUMA_NO_NODE, GFP_KERNEL, __builtin_return_address(0)); } +EXPORT_SYMBOL_GPL(get_vm_area); struct vm_struct *get_vm_area_caller(unsigned long size, unsigned long flags, const void *caller) diff --git a/security/security.c b/security/security.c index 70a7ad357bc..6e2ad1fa598 100644 --- a/security/security.c +++ b/security/security.c @@ -725,24 +725,28 @@ int security_binder_set_context_mgr(struct task_struct *mgr) { return call_int_hook(binder_set_context_mgr, 0, mgr); } +EXPORT_SYMBOL_GPL(security_binder_set_context_mgr); int security_binder_transaction(struct task_struct *from, struct task_struct *to) { return call_int_hook(binder_transaction, 0, from, to); } +EXPORT_SYMBOL_GPL(security_binder_transaction); int security_binder_transfer_binder(struct task_struct *from, struct task_struct *to) { return call_int_hook(binder_transfer_binder, 0, from, to); } +EXPORT_SYMBOL_GPL(security_binder_transfer_binder); int security_binder_transfer_file(struct task_struct *from, struct task_struct *to, struct file *file) { return call_int_hook(binder_transfer_file, 0, from, to, file); } +EXPORT_SYMBOL_GPL(security_binder_transfer_file); int security_ptrace_access_check(struct task_struct *child, unsigned int mode) {