The patch titled
capabilities: export __cap_ symbols
has been removed from the -mm tree. Its filename was
add-64-bit-capability-support-to-the-kernel-capabilities-export-__cap_-symbols.patch
This patch was dropped because it was folded into
add-64-bit-capability-support-to-the-kernel.patch
The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/
------------------------------------------------------
Subject: capabilities: export __cap_ symbols
From: "Serge E. Hallyn" <[EMAIL PROTECTED]>
Export __cap_empty_set and friends so that the cap_clear(), cap_set_full()
and cap_set_init_eff() defines can be used by modules.
Signed-off-by: Serge E. Hallyn <[EMAIL PROTECTED]>
Signed-off-by: Andrew Morton <[EMAIL PROTECTED]>
---
kernel/capability.c | 4 ++++
1 file changed, 4 insertions(+)
diff -puN
kernel/capability.c~add-64-bit-capability-support-to-the-kernel-capabilities-export-__cap_-symbols
kernel/capability.c
---
a/kernel/capability.c~add-64-bit-capability-support-to-the-kernel-capabilities-export-__cap_-symbols
+++ a/kernel/capability.c
@@ -29,6 +29,10 @@ const kernel_cap_t __cap_empty_set = CAP
const kernel_cap_t __cap_full_set = CAP_FULL_SET;
const kernel_cap_t __cap_init_eff_set = CAP_INIT_EFF_SET;
+EXPORT_SYMBOL(__cap_empty_set);
+EXPORT_SYMBOL(__cap_full_set);
+EXPORT_SYMBOL(__cap_init_eff_set);
+
/*
* More recent versions of libcap are available from:
*
_
Patches currently in -mm which might be from [EMAIL PROTECTED] are
origin.patch
vfs-security-rework-inode_getsecurity-and-callers-to.patch
vfs-reorder-vfs_getxattr-to-avoid-unnecessary-calls-to-the-lsm.patch
revert-capabilities-clean-up-file-capability-reading.patch
add-64-bit-capability-support-to-the-kernel.patch
add-64-bit-capability-support-to-the-kernel-capabilities-export-__cap_-symbols.patch
capabilities-introduce-per-process-capability-bounding-set.patch
capabilities-introduce-per-process-capability-bounding-set-capabilities-correct-logic-at-capset_check.patch
oom_kill-remove-uid==0-checks.patch
smack-using-capabilities-32-and-33.patch
smack-using-capabilities-32-and-33-update-cap_last_cap-to-reflect-cap_mac_admin.patch
r-o-bind-mounts-stub-functions.patch
r-o-bind-mounts-do_rmdir-elevate-write-count.patch
add-the-namespaces-config-option.patch
move-the-uts-namespace-under-uts_ns-option.patch
move-the-ipc-namespace-under-ipc_ns-option.patch
cleanup-the-code-managed-with-the-user_ns-option.patch
cleanup-the-code-managed-with-pid_ns-option.patch
mark-net_ns-with-depends-on-namespaces.patch
proc-seqfile-convert-proc_pid_status-to-properly-handle-pid-namespaces.patch
proc-seqfile-convert-proc_pid_status-to-properly-handle-pid-namespaces-checkpatch-fixes.patch
proc-seqfile-convert-proc_pid_status-to-properly-handle-pid-namespaces-nommu-fix.patch
pid-namespaces-vs-locks-interaction.patch
reiser4-replace-uid==0-check-with-capability.patch
-
To unsubscribe from this list: send the line "unsubscribe mm-commits" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html