|
@@ -0,0 +1,193 @@
|
|
|
+From: Ben Hutchings <ben@decadent.org.uk>
|
|
|
+Date: Tue, 26 Jun 2018 16:59:01 +0100
|
|
|
+Subject: Export symbols needed by Android drivers
|
|
|
+Bug-Debian: https://bugs.debian.org/901492
|
|
|
+
|
|
|
+We want to enable use of the Android ashmem and binder drivers to
|
|
|
+support Anbox, but they should not be built-in as that would waste
|
|
|
+resources and increase security attack surface on systems that don't
|
|
|
+need them.
|
|
|
+
|
|
|
+Export the currently un-exported symbols they depend on.
|
|
|
+
|
|
|
+---
|
|
|
+ fs/file.c | 5 +++++
|
|
|
+ kernel/fork.c | 1 +
|
|
|
+ kernel/sched/core.c | 1 +
|
|
|
+ kernel/signal.c | 1 +
|
|
|
+ kernel/task_work.c | 1 +
|
|
|
+ mm/memory.c | 1 +
|
|
|
+ mm/shmem.c | 1 +
|
|
|
+ mm/vmalloc.c | 2 ++
|
|
|
+ security/security.c | 4 ++++
|
|
|
+ 9 files changed, 17 insertions(+)
|
|
|
+
|
|
|
+Index: debian-kernel/fs/file.c
|
|
|
+===================================================================
|
|
|
+--- debian-kernel.orig/fs/file.c
|
|
|
++++ debian-kernel/fs/file.c
|
|
|
+@@ -409,6 +409,7 @@ struct files_struct *get_files_struct(st
|
|
|
+
|
|
|
+ return files;
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(get_files_struct);
|
|
|
+
|
|
|
+ void put_files_struct(struct files_struct *files)
|
|
|
+ {
|
|
|
+@@ -421,6 +422,7 @@ void put_files_struct(struct files_struc
|
|
|
+ kmem_cache_free(files_cachep, files);
|
|
|
+ }
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(put_files_struct);
|
|
|
+
|
|
|
+ void reset_files_struct(struct files_struct *files)
|
|
|
+ {
|
|
|
+@@ -534,6 +536,7 @@ out:
|
|
|
+ spin_unlock(&files->file_lock);
|
|
|
+ return error;
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(__alloc_fd);
|
|
|
+
|
|
|
+ static int alloc_fd(unsigned start, unsigned flags)
|
|
|
+ {
|
|
|
+@@ -612,6 +615,7 @@ void __fd_install(struct files_struct *f
|
|
|
+ rcu_assign_pointer(fdt->fd[fd], file);
|
|
|
+ rcu_read_unlock_sched();
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(__fd_install);
|
|
|
+
|
|
|
+ void fd_install(unsigned int fd, struct file *file)
|
|
|
+ {
|
|
|
+@@ -676,6 +680,7 @@ out_unlock:
|
|
|
+ *res = NULL;
|
|
|
+ return -ENOENT;
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL(__close_fd_get_file);
|
|
|
+
|
|
|
+ void do_close_on_exec(struct files_struct *files)
|
|
|
+ {
|
|
|
+Index: debian-kernel/kernel/fork.c
|
|
|
+===================================================================
|
|
|
+--- debian-kernel.orig/kernel/fork.c
|
|
|
++++ debian-kernel/kernel/fork.c
|
|
|
+@@ -1131,6 +1131,7 @@ void mmput_async(struct mm_struct *mm)
|
|
|
+ schedule_work(&mm->async_put_work);
|
|
|
+ }
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(mmput_async);
|
|
|
+ #endif
|
|
|
+
|
|
|
+ /**
|
|
|
+Index: debian-kernel/kernel/sched/core.c
|
|
|
+===================================================================
|
|
|
+--- debian-kernel.orig/kernel/sched/core.c
|
|
|
++++ debian-kernel/kernel/sched/core.c
|
|
|
+@@ -4667,6 +4667,7 @@ int can_nice(const struct task_struct *p
|
|
|
+ return (nice_rlim <= task_rlimit(p, RLIMIT_NICE) ||
|
|
|
+ capable(CAP_SYS_NICE));
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(can_nice);
|
|
|
+
|
|
|
+ #ifdef __ARCH_WANT_SYS_NICE
|
|
|
+
|
|
|
+Index: debian-kernel/kernel/signal.c
|
|
|
+===================================================================
|
|
|
+--- debian-kernel.orig/kernel/signal.c
|
|
|
++++ debian-kernel/kernel/signal.c
|
|
|
+@@ -1396,6 +1396,7 @@ struct sighand_struct *__lock_task_sigha
|
|
|
+
|
|
|
+ return sighand;
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(__lock_task_sighand);
|
|
|
+
|
|
|
+ /*
|
|
|
+ * send signal info to all the members of a group
|
|
|
+Index: debian-kernel/kernel/task_work.c
|
|
|
+===================================================================
|
|
|
+--- debian-kernel.orig/kernel/task_work.c
|
|
|
++++ debian-kernel/kernel/task_work.c
|
|
|
+@@ -52,6 +52,7 @@ task_work_add(struct task_struct *task,
|
|
|
+
|
|
|
+ return 0;
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL(task_work_add);
|
|
|
+
|
|
|
+ /**
|
|
|
+ * task_work_cancel - cancel a pending work added by task_work_add()
|
|
|
+Index: debian-kernel/mm/memory.c
|
|
|
+===================================================================
|
|
|
+--- debian-kernel.orig/mm/memory.c
|
|
|
++++ debian-kernel/mm/memory.c
|
|
|
+@@ -1367,6 +1367,7 @@ void zap_page_range(struct vm_area_struc
|
|
|
+ mmu_notifier_invalidate_range_end(&range);
|
|
|
+ tlb_finish_mmu(&tlb, start, range.end);
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(zap_page_range);
|
|
|
+
|
|
|
+ /**
|
|
|
+ * zap_page_range_single - remove user pages in a given range
|
|
|
+Index: debian-kernel/mm/shmem.c
|
|
|
+===================================================================
|
|
|
+--- debian-kernel.orig/mm/shmem.c
|
|
|
++++ debian-kernel/mm/shmem.c
|
|
|
+@@ -4158,6 +4158,7 @@ int shmem_zero_setup(struct vm_area_stru
|
|
|
+
|
|
|
+ return 0;
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(shmem_zero_setup);
|
|
|
+
|
|
|
+ /**
|
|
|
+ * shmem_read_mapping_page_gfp - read into page cache, using specified page allocation flags.
|
|
|
+Index: debian-kernel/mm/vmalloc.c
|
|
|
+===================================================================
|
|
|
+--- debian-kernel.orig/mm/vmalloc.c
|
|
|
++++ debian-kernel/mm/vmalloc.c
|
|
|
+@@ -1278,6 +1278,7 @@ overflow:
|
|
|
+ kmem_cache_free(vmap_area_cachep, va);
|
|
|
+ return ERR_PTR(-EBUSY);
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(map_kernel_range_noflush);
|
|
|
+
|
|
|
+ int register_vmap_purge_notifier(struct notifier_block *nb)
|
|
|
+ {
|
|
|
+@@ -2147,6 +2148,7 @@ struct vm_struct *get_vm_area(unsigned l
|
|
|
+ NUMA_NO_NODE, GFP_KERNEL,
|
|
|
+ __builtin_return_address(0));
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(get_vm_area);
|
|
|
+
|
|
|
+ struct vm_struct *get_vm_area_caller(unsigned long size, unsigned long flags,
|
|
|
+ const void *caller)
|
|
|
+Index: debian-kernel/security/security.c
|
|
|
+===================================================================
|
|
|
+--- debian-kernel.orig/security/security.c
|
|
|
++++ debian-kernel/security/security.c
|
|
|
+@@ -725,24 +725,28 @@ int security_binder_set_context_mgr(stru
|
|
|
+ {
|
|
|
+ return call_int_hook(binder_set_context_mgr, 0, mgr);
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(security_binder_set_context_mgr);
|
|
|
+
|
|
|
+ int security_binder_transaction(struct task_struct *from,
|
|
|
+ struct task_struct *to)
|
|
|
+ {
|
|
|
+ return call_int_hook(binder_transaction, 0, from, to);
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(security_binder_transaction);
|
|
|
+
|
|
|
+ int security_binder_transfer_binder(struct task_struct *from,
|
|
|
+ struct task_struct *to)
|
|
|
+ {
|
|
|
+ return call_int_hook(binder_transfer_binder, 0, from, to);
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(security_binder_transfer_binder);
|
|
|
+
|
|
|
+ int security_binder_transfer_file(struct task_struct *from,
|
|
|
+ struct task_struct *to, struct file *file)
|
|
|
+ {
|
|
|
+ return call_int_hook(binder_transfer_file, 0, from, to, file);
|
|
|
+ }
|
|
|
++EXPORT_SYMBOL_GPL(security_binder_transfer_file);
|
|
|
+
|
|
|
+ int security_ptrace_access_check(struct task_struct *child, unsigned int mode)
|
|
|
+ {
|