fs/aufs/Kconfig | 2 +- fs/dcache.c | 2 ++ fs/exec.c | 1 + fs/fcntl.c | 1 + fs/file_table.c | 3 +++ fs/inode.c | 1 + fs/namespace.c | 2 ++ fs/notify/group.c | 4 ++++ fs/notify/mark.c | 3 +++ fs/open.c | 1 + fs/read_write.c | 4 ++++ fs/splice.c | 2 ++ fs/sync.c | 1 + fs/xattr.c | 1 + kernel/task_work.c | 1 + security/commoncap.c | 2 ++ security/device_cgroup.c | 2 ++ security/security.c | 10 ++++++++++ 18 files changed, 42 insertions(+), 1 deletion(-) diff -Nurp linux-5.2.5-aufs/fs/aufs/Kconfig linux-5.2.5-aufs-mod/fs/aufs/Kconfig --- linux-5.2.5-aufs/fs/aufs/Kconfig 2019-08-01 13:49:33.931536014 +0300 +++ linux-5.2.5-aufs-mod/fs/aufs/Kconfig 2019-08-01 13:56:24.223519655 +0300 @@ -1,6 +1,6 @@ # SPDX-License-Identifier: GPL-2.0 config AUFS_FS - bool "Aufs (Advanced multi layered unification filesystem) support" + tristate "Aufs (Advanced multi layered unification filesystem) support" help Aufs is a stackable unification filesystem such as Unionfs, which unifies several directories and provides a merged single diff -Nurp linux-5.2.5-aufs/fs/dcache.c linux-5.2.5-aufs-mod/fs/dcache.c --- linux-5.2.5-aufs/fs/dcache.c 2019-08-01 13:49:33.938536014 +0300 +++ linux-5.2.5-aufs-mod/fs/dcache.c 2019-08-01 13:56:24.249519654 +0300 @@ -1352,6 +1352,7 @@ rename_retry: seq = 1; goto again; } +EXPORT_SYMBOL_GPL(d_walk); struct check_mount { struct vfsmount *mnt; @@ -2850,6 +2851,7 @@ void d_exchange(struct dentry *dentry1, write_sequnlock(&rename_lock); } +EXPORT_SYMBOL_GPL(d_exchange); /** * d_ancestor - search for an ancestor diff -Nurp linux-5.2.5-aufs/fs/exec.c linux-5.2.5-aufs-mod/fs/exec.c --- linux-5.2.5-aufs/fs/exec.c 2019-07-08 01:41:56.000000000 +0300 +++ linux-5.2.5-aufs-mod/fs/exec.c 2019-08-01 13:56:24.249519654 +0300 @@ -110,6 +110,7 @@ bool path_noexec(const struct path *path return (path->mnt->mnt_flags & MNT_NOEXEC) || (path->mnt->mnt_sb->s_iflags & SB_I_NOEXEC); } +EXPORT_SYMBOL_GPL(path_noexec); #ifdef CONFIG_USELIB /* diff -Nurp linux-5.2.5-aufs/fs/fcntl.c linux-5.2.5-aufs-mod/fs/fcntl.c --- linux-5.2.5-aufs/fs/fcntl.c 2019-08-01 13:49:33.939536014 +0300 +++ linux-5.2.5-aufs-mod/fs/fcntl.c 2019-08-01 13:56:24.249519654 +0300 @@ -85,6 +85,7 @@ int setfl(int fd, struct file * filp, un out: return error; } +EXPORT_SYMBOL_GPL(setfl); static void f_modown(struct file *filp, struct pid *pid, enum pid_type type, int force) diff -Nurp linux-5.2.5-aufs/fs/file_table.c linux-5.2.5-aufs-mod/fs/file_table.c --- linux-5.2.5-aufs/fs/file_table.c 2019-07-08 01:41:56.000000000 +0300 +++ linux-5.2.5-aufs-mod/fs/file_table.c 2019-08-01 13:56:24.254519654 +0300 @@ -162,6 +162,7 @@ over: } return ERR_PTR(-ENFILE); } +EXPORT_SYMBOL_GPL(alloc_empty_file); /* * Variant of alloc_empty_file() that doesn't check and modify nr_files. @@ -327,6 +328,7 @@ void flush_delayed_fput(void) { delayed_fput(NULL); } +EXPORT_SYMBOL_GPL(flush_delayed_fput); static DECLARE_DELAYED_WORK(delayed_fput_work, delayed_fput); @@ -374,6 +376,7 @@ void __fput_sync(struct file *file) } EXPORT_SYMBOL(fput); +EXPORT_SYMBOL_GPL(__fput_sync); void __init files_init(void) { diff -Nurp linux-5.2.5-aufs/fs/inode.c linux-5.2.5-aufs-mod/fs/inode.c --- linux-5.2.5-aufs/fs/inode.c 2019-08-01 13:49:33.939536014 +0300 +++ linux-5.2.5-aufs-mod/fs/inode.c 2019-08-01 13:56:24.254519654 +0300 @@ -1679,6 +1679,7 @@ int update_time(struct inode *inode, str return update_time(inode, time, flags); } +EXPORT_SYMBOL_GPL(update_time); /** * touch_atime - update the access time diff -Nurp linux-5.2.5-aufs/fs/namespace.c linux-5.2.5-aufs-mod/fs/namespace.c --- linux-5.2.5-aufs/fs/namespace.c 2019-08-01 13:49:33.939536014 +0300 +++ linux-5.2.5-aufs-mod/fs/namespace.c 2019-08-01 13:56:24.254519654 +0300 @@ -436,6 +436,7 @@ void __mnt_drop_write(struct vfsmount *m mnt_dec_writers(real_mount(mnt)); preempt_enable(); } +EXPORT_SYMBOL_GPL(__mnt_drop_write); /** * mnt_drop_write - give up write access to a mount @@ -1908,6 +1909,7 @@ int iterate_mounts(int (*f)(struct vfsmo } return 0; } +EXPORT_SYMBOL_GPL(iterate_mounts); static void lock_mnt_tree(struct mount *mnt) { diff -Nurp linux-5.2.5-aufs/fs/notify/group.c linux-5.2.5-aufs-mod/fs/notify/group.c --- linux-5.2.5-aufs/fs/notify/group.c 2019-07-08 01:41:56.000000000 +0300 +++ linux-5.2.5-aufs-mod/fs/notify/group.c 2019-08-01 13:56:24.255519654 +0300 @@ -10,6 +10,7 @@ #include <linux/rculist.h> #include <linux/wait.h> #include <linux/memcontrol.h> +#include <linux/module.h> #include <linux/fsnotify_backend.h> #include "fsnotify.h" @@ -99,6 +100,7 @@ void fsnotify_get_group(struct fsnotify_ { refcount_inc(&group->refcnt); } +EXPORT_SYMBOL_GPL(fsnotify_get_group); /* * Drop a reference to a group. Free it if it's through. @@ -108,6 +110,7 @@ void fsnotify_put_group(struct fsnotify_ if (refcount_dec_and_test(&group->refcnt)) fsnotify_final_destroy_group(group); } +EXPORT_SYMBOL_GPL(fsnotify_put_group); /* * Create a new fsnotify_group and hold a reference for the group returned. @@ -137,6 +140,7 @@ struct fsnotify_group *fsnotify_alloc_gr return group; } +EXPORT_SYMBOL_GPL(fsnotify_alloc_group); int fsnotify_fasync(int fd, struct file *file, int on) { diff -Nurp linux-5.2.5-aufs/fs/notify/mark.c linux-5.2.5-aufs-mod/fs/notify/mark.c --- linux-5.2.5-aufs/fs/notify/mark.c 2019-07-08 01:41:56.000000000 +0300 +++ linux-5.2.5-aufs-mod/fs/notify/mark.c 2019-08-01 13:56:24.255519654 +0300 @@ -115,6 +115,7 @@ __u32 fsnotify_conn_mask(struct fsnotify return *fsnotify_conn_mask_p(conn); } +EXPORT_SYMBOL_GPL(fsnotify_put_mark); static void __fsnotify_recalc_mask(struct fsnotify_mark_connector *conn) { @@ -302,6 +303,7 @@ static bool fsnotify_get_mark_safe(struc } return false; } +EXPORT_SYMBOL_GPL(fsnotify_destroy_mark); /* * Puts marks and wakes up group destruction if necessary. @@ -625,6 +627,7 @@ out_err: spin_unlock(&mark->lock); return err; } +EXPORT_SYMBOL_GPL(fsnotify_init_mark); /* * Attach an initialized mark to a given group and fs object. diff -Nurp linux-5.2.5-aufs/fs/open.c linux-5.2.5-aufs-mod/fs/open.c --- linux-5.2.5-aufs/fs/open.c 2019-08-01 13:21:55.395602145 +0300 +++ linux-5.2.5-aufs-mod/fs/open.c 2019-08-01 13:56:24.255519654 +0300 @@ -65,6 +65,7 @@ int do_truncate(struct dentry *dentry, l inode_unlock(dentry->d_inode); return ret; } +EXPORT_SYMBOL_GPL(do_truncate); long vfs_truncate(const struct path *path, loff_t length) { diff -Nurp linux-5.2.5-aufs/fs/read_write.c linux-5.2.5-aufs-mod/fs/read_write.c --- linux-5.2.5-aufs/fs/read_write.c 2019-08-01 13:49:33.940536014 +0300 +++ linux-5.2.5-aufs-mod/fs/read_write.c 2019-08-01 13:56:24.255519654 +0300 @@ -468,6 +468,7 @@ ssize_t vfs_read(struct file *file, char return ret; } +EXPORT_SYMBOL_GPL(vfs_read); static ssize_t new_sync_write(struct file *filp, const char __user *buf, size_t len, loff_t *ppos) { @@ -508,6 +509,7 @@ vfs_readf_t vfs_readf(struct file *file) return new_sync_read; return ERR_PTR(-ENOSYS); } +EXPORT_SYMBOL_GPL(vfs_readf); vfs_writef_t vfs_writef(struct file *file) { @@ -519,6 +521,7 @@ vfs_writef_t vfs_writef(struct file *fil return new_sync_write; return ERR_PTR(-ENOSYS); } +EXPORT_SYMBOL_GPL(vfs_writef); ssize_t __kernel_write(struct file *file, const void *buf, size_t count, loff_t *pos) { @@ -588,6 +591,7 @@ ssize_t vfs_write(struct file *file, con return ret; } +EXPORT_SYMBOL_GPL(vfs_write); /* file_ppos returns &file->f_pos or NULL if file is stream */ static inline loff_t *file_ppos(struct file *file) diff -Nurp linux-5.2.5-aufs/fs/splice.c linux-5.2.5-aufs-mod/fs/splice.c --- linux-5.2.5-aufs/fs/splice.c 2019-08-01 13:49:33.940536014 +0300 +++ linux-5.2.5-aufs-mod/fs/splice.c 2019-08-01 13:56:24.255519654 +0300 @@ -847,6 +847,7 @@ long do_splice_from(struct pipe_inode_in return splice_write(pipe, out, ppos, len, flags); } +EXPORT_SYMBOL_GPL(do_splice_from); /* * Attempt to initiate a splice from a file to a pipe. @@ -876,6 +877,7 @@ long do_splice_to(struct file *in, loff_ return splice_read(in, ppos, pipe, len, flags); } +EXPORT_SYMBOL_GPL(do_splice_to); /** * splice_direct_to_actor - splices data directly between two non-pipes diff -Nurp linux-5.2.5-aufs/fs/sync.c linux-5.2.5-aufs-mod/fs/sync.c --- linux-5.2.5-aufs/fs/sync.c 2019-08-01 13:49:33.940536014 +0300 +++ linux-5.2.5-aufs-mod/fs/sync.c 2019-08-01 13:56:24.256519654 +0300 @@ -39,6 +39,7 @@ int __sync_filesystem(struct super_block sb->s_op->sync_fs(sb, wait); return __sync_blockdev(sb->s_bdev, wait); } +EXPORT_SYMBOL_GPL(__sync_filesystem); /* * Write out and wait upon all dirty data associated with this diff -Nurp linux-5.2.5-aufs/fs/xattr.c linux-5.2.5-aufs-mod/fs/xattr.c --- linux-5.2.5-aufs/fs/xattr.c 2019-07-08 01:41:56.000000000 +0300 +++ linux-5.2.5-aufs-mod/fs/xattr.c 2019-08-01 13:56:24.256519654 +0300 @@ -296,6 +296,7 @@ vfs_getxattr_alloc(struct dentry *dentry *xattr_value = value; return error; } +EXPORT_SYMBOL_GPL(vfs_getxattr_alloc); ssize_t __vfs_getxattr(struct dentry *dentry, struct inode *inode, const char *name, diff -Nurp linux-5.2.5-aufs/kernel/task_work.c linux-5.2.5-aufs-mod/kernel/task_work.c --- linux-5.2.5-aufs/kernel/task_work.c 2019-07-08 01:41:56.000000000 +0300 +++ linux-5.2.5-aufs-mod/kernel/task_work.c 2019-08-01 13:56:24.256519654 +0300 @@ -116,3 +116,4 @@ void task_work_run(void) } while (work); } } +EXPORT_SYMBOL_GPL(task_work_run); diff -Nurp linux-5.2.5-aufs/security/commoncap.c linux-5.2.5-aufs-mod/security/commoncap.c --- linux-5.2.5-aufs/security/commoncap.c 2019-07-08 01:41:56.000000000 +0300 +++ linux-5.2.5-aufs-mod/security/commoncap.c 2019-08-01 13:56:24.260519653 +0300 @@ -1330,12 +1330,14 @@ int cap_mmap_addr(unsigned long addr) } return ret; } +EXPORT_SYMBOL_GPL(cap_mmap_addr); int cap_mmap_file(struct file *file, unsigned long reqprot, unsigned long prot, unsigned long flags) { return 0; } +EXPORT_SYMBOL_GPL(cap_mmap_file); #ifdef CONFIG_SECURITY diff -Nurp linux-5.2.5-aufs/security/device_cgroup.c linux-5.2.5-aufs-mod/security/device_cgroup.c --- linux-5.2.5-aufs/security/device_cgroup.c 2019-07-08 01:41:56.000000000 +0300 +++ linux-5.2.5-aufs-mod/security/device_cgroup.c 2019-08-01 13:56:24.261519653 +0300 @@ -8,6 +8,7 @@ #include <linux/device_cgroup.h> #include <linux/cgroup.h> #include <linux/ctype.h> +#include <linux/export.h> #include <linux/list.h> #include <linux/uaccess.h> #include <linux/seq_file.h> @@ -824,3 +825,4 @@ int __devcgroup_check_permission(short t return 0; } +EXPORT_SYMBOL_GPL(__devcgroup_check_permission); diff -Nurp linux-5.2.5-aufs/security/security.c linux-5.2.5-aufs-mod/security/security.c --- linux-5.2.5-aufs/security/security.c 2019-07-08 01:41:56.000000000 +0300 +++ linux-5.2.5-aufs-mod/security/security.c 2019-08-01 13:56:24.266519653 +0300 @@ -993,6 +993,7 @@ int security_path_rmdir(const struct pat return 0; return call_int_hook(path_rmdir, 0, dir, dentry); } +EXPORT_SYMBOL_GPL(security_path_rmdir); int security_path_unlink(const struct path *dir, struct dentry *dentry) { @@ -1009,6 +1010,7 @@ int security_path_symlink(const struct p return 0; return call_int_hook(path_symlink, 0, dir, dentry, old_name); } +EXPORT_SYMBOL_GPL(security_path_symlink); int security_path_link(struct dentry *old_dentry, const struct path *new_dir, struct dentry *new_dentry) @@ -1017,6 +1019,7 @@ int security_path_link(struct dentry *ol return 0; return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry); } +EXPORT_SYMBOL_GPL(security_path_link); int security_path_rename(const struct path *old_dir, struct dentry *old_dentry, const struct path *new_dir, struct dentry *new_dentry, @@ -1044,6 +1047,7 @@ int security_path_truncate(const struct return 0; return call_int_hook(path_truncate, 0, path); } +EXPORT_SYMBOL_GPL(security_path_truncate); int security_path_chmod(const struct path *path, umode_t mode) { @@ -1051,6 +1055,7 @@ int security_path_chmod(const struct pat return 0; return call_int_hook(path_chmod, 0, path, mode); } +EXPORT_SYMBOL_GPL(security_path_chmod); int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid) { @@ -1058,6 +1063,7 @@ int security_path_chown(const struct pat return 0; return call_int_hook(path_chown, 0, path, uid, gid); } +EXPORT_SYMBOL_GPL(security_path_chown); int security_path_chroot(const struct path *path) { @@ -1143,6 +1149,7 @@ int security_inode_readlink(struct dentr return 0; return call_int_hook(inode_readlink, 0, dentry); } +EXPORT_SYMBOL_GPL(security_inode_readlink); int security_inode_follow_link(struct dentry *dentry, struct inode *inode, bool rcu) @@ -1158,6 +1165,7 @@ int security_inode_permission(struct ino return 0; return call_int_hook(inode_permission, 0, inode, mask); } +EXPORT_SYMBOL_GPL(security_inode_permission); int security_inode_setattr(struct dentry *dentry, struct iattr *attr) { @@ -1335,6 +1343,7 @@ int security_file_permission(struct file return fsnotify_perm(file, mask); } +EXPORT_SYMBOL_GPL(security_file_permission); int security_file_alloc(struct file *file) { @@ -1409,6 +1418,7 @@ int security_mmap_file(struct file *file return ret; return ima_file_mmap(file, prot); } +EXPORT_SYMBOL_GPL(security_mmap_file); int security_mmap_addr(unsigned long addr) {