Sophie

Sophie

distrib > Mageia > 7 > i586 > by-pkgid > 6b013b0b104b2168eab70e8601f81231 > files > 49

kernel-5.2.16-2.mga7.src.rpm

 fs/aufs/Kconfig          |    2 +-
 fs/dcache.c              |    2 ++
 fs/exec.c                |    1 +
 fs/fcntl.c               |    1 +
 fs/file_table.c          |    3 +++
 fs/inode.c               |    1 +
 fs/namespace.c           |    2 ++
 fs/notify/group.c        |    4 ++++
 fs/notify/mark.c         |    3 +++
 fs/open.c                |    1 +
 fs/read_write.c          |    4 ++++
 fs/splice.c              |    2 ++
 fs/sync.c                |    1 +
 fs/xattr.c               |    1 +
 kernel/task_work.c       |    1 +
 security/commoncap.c     |    2 ++
 security/device_cgroup.c |    2 ++
 security/security.c      |   10 ++++++++++
 18 files changed, 42 insertions(+), 1 deletion(-)

diff -Nurp linux-5.2.5-aufs/fs/aufs/Kconfig linux-5.2.5-aufs-mod/fs/aufs/Kconfig
--- linux-5.2.5-aufs/fs/aufs/Kconfig	2019-08-01 13:49:33.931536014 +0300
+++ linux-5.2.5-aufs-mod/fs/aufs/Kconfig	2019-08-01 13:56:24.223519655 +0300
@@ -1,6 +1,6 @@
 # SPDX-License-Identifier: GPL-2.0
 config AUFS_FS
-	bool "Aufs (Advanced multi layered unification filesystem) support"
+	tristate "Aufs (Advanced multi layered unification filesystem) support"
 	help
 	Aufs is a stackable unification filesystem such as Unionfs,
 	which unifies several directories and provides a merged single
diff -Nurp linux-5.2.5-aufs/fs/dcache.c linux-5.2.5-aufs-mod/fs/dcache.c
--- linux-5.2.5-aufs/fs/dcache.c	2019-08-01 13:49:33.938536014 +0300
+++ linux-5.2.5-aufs-mod/fs/dcache.c	2019-08-01 13:56:24.249519654 +0300
@@ -1352,6 +1352,7 @@ rename_retry:
 	seq = 1;
 	goto again;
 }
+EXPORT_SYMBOL_GPL(d_walk);
 
 struct check_mount {
 	struct vfsmount *mnt;
@@ -2850,6 +2851,7 @@ void d_exchange(struct dentry *dentry1,
 
 	write_sequnlock(&rename_lock);
 }
+EXPORT_SYMBOL_GPL(d_exchange);
 
 /**
  * d_ancestor - search for an ancestor
diff -Nurp linux-5.2.5-aufs/fs/exec.c linux-5.2.5-aufs-mod/fs/exec.c
--- linux-5.2.5-aufs/fs/exec.c	2019-07-08 01:41:56.000000000 +0300
+++ linux-5.2.5-aufs-mod/fs/exec.c	2019-08-01 13:56:24.249519654 +0300
@@ -110,6 +110,7 @@ bool path_noexec(const struct path *path
 	return (path->mnt->mnt_flags & MNT_NOEXEC) ||
 	       (path->mnt->mnt_sb->s_iflags & SB_I_NOEXEC);
 }
+EXPORT_SYMBOL_GPL(path_noexec);
 
 #ifdef CONFIG_USELIB
 /*
diff -Nurp linux-5.2.5-aufs/fs/fcntl.c linux-5.2.5-aufs-mod/fs/fcntl.c
--- linux-5.2.5-aufs/fs/fcntl.c	2019-08-01 13:49:33.939536014 +0300
+++ linux-5.2.5-aufs-mod/fs/fcntl.c	2019-08-01 13:56:24.249519654 +0300
@@ -85,6 +85,7 @@ int setfl(int fd, struct file * filp, un
  out:
 	return error;
 }
+EXPORT_SYMBOL_GPL(setfl);
 
 static void f_modown(struct file *filp, struct pid *pid, enum pid_type type,
                      int force)
diff -Nurp linux-5.2.5-aufs/fs/file_table.c linux-5.2.5-aufs-mod/fs/file_table.c
--- linux-5.2.5-aufs/fs/file_table.c	2019-07-08 01:41:56.000000000 +0300
+++ linux-5.2.5-aufs-mod/fs/file_table.c	2019-08-01 13:56:24.254519654 +0300
@@ -162,6 +162,7 @@ over:
 	}
 	return ERR_PTR(-ENFILE);
 }
+EXPORT_SYMBOL_GPL(alloc_empty_file);
 
 /*
  * Variant of alloc_empty_file() that doesn't check and modify nr_files.
@@ -327,6 +328,7 @@ void flush_delayed_fput(void)
 {
 	delayed_fput(NULL);
 }
+EXPORT_SYMBOL_GPL(flush_delayed_fput);
 
 static DECLARE_DELAYED_WORK(delayed_fput_work, delayed_fput);
 
@@ -374,6 +376,7 @@ void __fput_sync(struct file *file)
 }
 
 EXPORT_SYMBOL(fput);
+EXPORT_SYMBOL_GPL(__fput_sync);
 
 void __init files_init(void)
 {
diff -Nurp linux-5.2.5-aufs/fs/inode.c linux-5.2.5-aufs-mod/fs/inode.c
--- linux-5.2.5-aufs/fs/inode.c	2019-08-01 13:49:33.939536014 +0300
+++ linux-5.2.5-aufs-mod/fs/inode.c	2019-08-01 13:56:24.254519654 +0300
@@ -1679,6 +1679,7 @@ int update_time(struct inode *inode, str
 
 	return update_time(inode, time, flags);
 }
+EXPORT_SYMBOL_GPL(update_time);
 
 /**
  *	touch_atime	-	update the access time
diff -Nurp linux-5.2.5-aufs/fs/namespace.c linux-5.2.5-aufs-mod/fs/namespace.c
--- linux-5.2.5-aufs/fs/namespace.c	2019-08-01 13:49:33.939536014 +0300
+++ linux-5.2.5-aufs-mod/fs/namespace.c	2019-08-01 13:56:24.254519654 +0300
@@ -436,6 +436,7 @@ void __mnt_drop_write(struct vfsmount *m
 	mnt_dec_writers(real_mount(mnt));
 	preempt_enable();
 }
+EXPORT_SYMBOL_GPL(__mnt_drop_write);
 
 /**
  * mnt_drop_write - give up write access to a mount
@@ -1908,6 +1909,7 @@ int iterate_mounts(int (*f)(struct vfsmo
 	}
 	return 0;
 }
+EXPORT_SYMBOL_GPL(iterate_mounts);
 
 static void lock_mnt_tree(struct mount *mnt)
 {
diff -Nurp linux-5.2.5-aufs/fs/notify/group.c linux-5.2.5-aufs-mod/fs/notify/group.c
--- linux-5.2.5-aufs/fs/notify/group.c	2019-07-08 01:41:56.000000000 +0300
+++ linux-5.2.5-aufs-mod/fs/notify/group.c	2019-08-01 13:56:24.255519654 +0300
@@ -10,6 +10,7 @@
 #include <linux/rculist.h>
 #include <linux/wait.h>
 #include <linux/memcontrol.h>
+#include <linux/module.h>
 
 #include <linux/fsnotify_backend.h>
 #include "fsnotify.h"
@@ -99,6 +100,7 @@ void fsnotify_get_group(struct fsnotify_
 {
 	refcount_inc(&group->refcnt);
 }
+EXPORT_SYMBOL_GPL(fsnotify_get_group);
 
 /*
  * Drop a reference to a group.  Free it if it's through.
@@ -108,6 +110,7 @@ void fsnotify_put_group(struct fsnotify_
 	if (refcount_dec_and_test(&group->refcnt))
 		fsnotify_final_destroy_group(group);
 }
+EXPORT_SYMBOL_GPL(fsnotify_put_group);
 
 /*
  * Create a new fsnotify_group and hold a reference for the group returned.
@@ -137,6 +140,7 @@ struct fsnotify_group *fsnotify_alloc_gr
 
 	return group;
 }
+EXPORT_SYMBOL_GPL(fsnotify_alloc_group);
 
 int fsnotify_fasync(int fd, struct file *file, int on)
 {
diff -Nurp linux-5.2.5-aufs/fs/notify/mark.c linux-5.2.5-aufs-mod/fs/notify/mark.c
--- linux-5.2.5-aufs/fs/notify/mark.c	2019-07-08 01:41:56.000000000 +0300
+++ linux-5.2.5-aufs-mod/fs/notify/mark.c	2019-08-01 13:56:24.255519654 +0300
@@ -115,6 +115,7 @@ __u32 fsnotify_conn_mask(struct fsnotify
 
 	return *fsnotify_conn_mask_p(conn);
 }
+EXPORT_SYMBOL_GPL(fsnotify_put_mark);
 
 static void __fsnotify_recalc_mask(struct fsnotify_mark_connector *conn)
 {
@@ -302,6 +303,7 @@ static bool fsnotify_get_mark_safe(struc
 	}
 	return false;
 }
+EXPORT_SYMBOL_GPL(fsnotify_destroy_mark);
 
 /*
  * Puts marks and wakes up group destruction if necessary.
@@ -625,6 +627,7 @@ out_err:
 	spin_unlock(&mark->lock);
 	return err;
 }
+EXPORT_SYMBOL_GPL(fsnotify_init_mark);
 
 /*
  * Attach an initialized mark to a given group and fs object.
diff -Nurp linux-5.2.5-aufs/fs/open.c linux-5.2.5-aufs-mod/fs/open.c
--- linux-5.2.5-aufs/fs/open.c	2019-08-01 13:21:55.395602145 +0300
+++ linux-5.2.5-aufs-mod/fs/open.c	2019-08-01 13:56:24.255519654 +0300
@@ -65,6 +65,7 @@ int do_truncate(struct dentry *dentry, l
 	inode_unlock(dentry->d_inode);
 	return ret;
 }
+EXPORT_SYMBOL_GPL(do_truncate);
 
 long vfs_truncate(const struct path *path, loff_t length)
 {
diff -Nurp linux-5.2.5-aufs/fs/read_write.c linux-5.2.5-aufs-mod/fs/read_write.c
--- linux-5.2.5-aufs/fs/read_write.c	2019-08-01 13:49:33.940536014 +0300
+++ linux-5.2.5-aufs-mod/fs/read_write.c	2019-08-01 13:56:24.255519654 +0300
@@ -468,6 +468,7 @@ ssize_t vfs_read(struct file *file, char
 
 	return ret;
 }
+EXPORT_SYMBOL_GPL(vfs_read);
 
 static ssize_t new_sync_write(struct file *filp, const char __user *buf, size_t len, loff_t *ppos)
 {
@@ -508,6 +509,7 @@ vfs_readf_t vfs_readf(struct file *file)
 		return new_sync_read;
 	return ERR_PTR(-ENOSYS);
 }
+EXPORT_SYMBOL_GPL(vfs_readf);
 
 vfs_writef_t vfs_writef(struct file *file)
 {
@@ -519,6 +521,7 @@ vfs_writef_t vfs_writef(struct file *fil
 		return new_sync_write;
 	return ERR_PTR(-ENOSYS);
 }
+EXPORT_SYMBOL_GPL(vfs_writef);
 
 ssize_t __kernel_write(struct file *file, const void *buf, size_t count, loff_t *pos)
 {
@@ -588,6 +591,7 @@ ssize_t vfs_write(struct file *file, con
 
 	return ret;
 }
+EXPORT_SYMBOL_GPL(vfs_write);
 
 /* file_ppos returns &file->f_pos or NULL if file is stream */
 static inline loff_t *file_ppos(struct file *file)
diff -Nurp linux-5.2.5-aufs/fs/splice.c linux-5.2.5-aufs-mod/fs/splice.c
--- linux-5.2.5-aufs/fs/splice.c	2019-08-01 13:49:33.940536014 +0300
+++ linux-5.2.5-aufs-mod/fs/splice.c	2019-08-01 13:56:24.255519654 +0300
@@ -847,6 +847,7 @@ long do_splice_from(struct pipe_inode_in
 
 	return splice_write(pipe, out, ppos, len, flags);
 }
+EXPORT_SYMBOL_GPL(do_splice_from);
 
 /*
  * Attempt to initiate a splice from a file to a pipe.
@@ -876,6 +877,7 @@ long do_splice_to(struct file *in, loff_
 
 	return splice_read(in, ppos, pipe, len, flags);
 }
+EXPORT_SYMBOL_GPL(do_splice_to);
 
 /**
  * splice_direct_to_actor - splices data directly between two non-pipes
diff -Nurp linux-5.2.5-aufs/fs/sync.c linux-5.2.5-aufs-mod/fs/sync.c
--- linux-5.2.5-aufs/fs/sync.c	2019-08-01 13:49:33.940536014 +0300
+++ linux-5.2.5-aufs-mod/fs/sync.c	2019-08-01 13:56:24.256519654 +0300
@@ -39,6 +39,7 @@ int __sync_filesystem(struct super_block
 		sb->s_op->sync_fs(sb, wait);
 	return __sync_blockdev(sb->s_bdev, wait);
 }
+EXPORT_SYMBOL_GPL(__sync_filesystem);
 
 /*
  * Write out and wait upon all dirty data associated with this
diff -Nurp linux-5.2.5-aufs/fs/xattr.c linux-5.2.5-aufs-mod/fs/xattr.c
--- linux-5.2.5-aufs/fs/xattr.c	2019-07-08 01:41:56.000000000 +0300
+++ linux-5.2.5-aufs-mod/fs/xattr.c	2019-08-01 13:56:24.256519654 +0300
@@ -296,6 +296,7 @@ vfs_getxattr_alloc(struct dentry *dentry
 	*xattr_value = value;
 	return error;
 }
+EXPORT_SYMBOL_GPL(vfs_getxattr_alloc);
 
 ssize_t
 __vfs_getxattr(struct dentry *dentry, struct inode *inode, const char *name,
diff -Nurp linux-5.2.5-aufs/kernel/task_work.c linux-5.2.5-aufs-mod/kernel/task_work.c
--- linux-5.2.5-aufs/kernel/task_work.c	2019-07-08 01:41:56.000000000 +0300
+++ linux-5.2.5-aufs-mod/kernel/task_work.c	2019-08-01 13:56:24.256519654 +0300
@@ -116,3 +116,4 @@ void task_work_run(void)
 		} while (work);
 	}
 }
+EXPORT_SYMBOL_GPL(task_work_run);
diff -Nurp linux-5.2.5-aufs/security/commoncap.c linux-5.2.5-aufs-mod/security/commoncap.c
--- linux-5.2.5-aufs/security/commoncap.c	2019-07-08 01:41:56.000000000 +0300
+++ linux-5.2.5-aufs-mod/security/commoncap.c	2019-08-01 13:56:24.260519653 +0300
@@ -1330,12 +1330,14 @@ int cap_mmap_addr(unsigned long addr)
 	}
 	return ret;
 }
+EXPORT_SYMBOL_GPL(cap_mmap_addr);
 
 int cap_mmap_file(struct file *file, unsigned long reqprot,
 		  unsigned long prot, unsigned long flags)
 {
 	return 0;
 }
+EXPORT_SYMBOL_GPL(cap_mmap_file);
 
 #ifdef CONFIG_SECURITY
 
diff -Nurp linux-5.2.5-aufs/security/device_cgroup.c linux-5.2.5-aufs-mod/security/device_cgroup.c
--- linux-5.2.5-aufs/security/device_cgroup.c	2019-07-08 01:41:56.000000000 +0300
+++ linux-5.2.5-aufs-mod/security/device_cgroup.c	2019-08-01 13:56:24.261519653 +0300
@@ -8,6 +8,7 @@
 #include <linux/device_cgroup.h>
 #include <linux/cgroup.h>
 #include <linux/ctype.h>
+#include <linux/export.h>
 #include <linux/list.h>
 #include <linux/uaccess.h>
 #include <linux/seq_file.h>
@@ -824,3 +825,4 @@ int __devcgroup_check_permission(short t
 
 	return 0;
 }
+EXPORT_SYMBOL_GPL(__devcgroup_check_permission);
diff -Nurp linux-5.2.5-aufs/security/security.c linux-5.2.5-aufs-mod/security/security.c
--- linux-5.2.5-aufs/security/security.c	2019-07-08 01:41:56.000000000 +0300
+++ linux-5.2.5-aufs-mod/security/security.c	2019-08-01 13:56:24.266519653 +0300
@@ -993,6 +993,7 @@ int security_path_rmdir(const struct pat
 		return 0;
 	return call_int_hook(path_rmdir, 0, dir, dentry);
 }
+EXPORT_SYMBOL_GPL(security_path_rmdir);
 
 int security_path_unlink(const struct path *dir, struct dentry *dentry)
 {
@@ -1009,6 +1010,7 @@ int security_path_symlink(const struct p
 		return 0;
 	return call_int_hook(path_symlink, 0, dir, dentry, old_name);
 }
+EXPORT_SYMBOL_GPL(security_path_symlink);
 
 int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
 		       struct dentry *new_dentry)
@@ -1017,6 +1019,7 @@ int security_path_link(struct dentry *ol
 		return 0;
 	return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry);
 }
+EXPORT_SYMBOL_GPL(security_path_link);
 
 int security_path_rename(const struct path *old_dir, struct dentry *old_dentry,
 			 const struct path *new_dir, struct dentry *new_dentry,
@@ -1044,6 +1047,7 @@ int security_path_truncate(const struct
 		return 0;
 	return call_int_hook(path_truncate, 0, path);
 }
+EXPORT_SYMBOL_GPL(security_path_truncate);
 
 int security_path_chmod(const struct path *path, umode_t mode)
 {
@@ -1051,6 +1055,7 @@ int security_path_chmod(const struct pat
 		return 0;
 	return call_int_hook(path_chmod, 0, path, mode);
 }
+EXPORT_SYMBOL_GPL(security_path_chmod);
 
 int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
 {
@@ -1058,6 +1063,7 @@ int security_path_chown(const struct pat
 		return 0;
 	return call_int_hook(path_chown, 0, path, uid, gid);
 }
+EXPORT_SYMBOL_GPL(security_path_chown);
 
 int security_path_chroot(const struct path *path)
 {
@@ -1143,6 +1149,7 @@ int security_inode_readlink(struct dentr
 		return 0;
 	return call_int_hook(inode_readlink, 0, dentry);
 }
+EXPORT_SYMBOL_GPL(security_inode_readlink);
 
 int security_inode_follow_link(struct dentry *dentry, struct inode *inode,
 			       bool rcu)
@@ -1158,6 +1165,7 @@ int security_inode_permission(struct ino
 		return 0;
 	return call_int_hook(inode_permission, 0, inode, mask);
 }
+EXPORT_SYMBOL_GPL(security_inode_permission);
 
 int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
 {
@@ -1335,6 +1343,7 @@ int security_file_permission(struct file
 
 	return fsnotify_perm(file, mask);
 }
+EXPORT_SYMBOL_GPL(security_file_permission);
 
 int security_file_alloc(struct file *file)
 {
@@ -1409,6 +1418,7 @@ int security_mmap_file(struct file *file
 		return ret;
 	return ima_file_mmap(file, prot);
 }
+EXPORT_SYMBOL_GPL(security_mmap_file);
 
 int security_mmap_addr(unsigned long addr)
 {