wok-current diff linux/stuff/aufs4-standalone.patch @ rev 25701

Fix dep for libglamoregl.so (libepoxy), and miss file for amdgpu (thanks alanyih)
author Stanislas Leduc <shann@slitaz.org>
date Fri Apr 19 12:48:51 2024 +0000 (5 months ago)
parents
children
line diff
     1.1 --- /dev/null	Thu Jan 01 00:00:00 1970 +0000
     1.2 +++ b/linux/stuff/aufs4-standalone.patch	Fri Apr 19 12:48:51 2024 +0000
     1.3 @@ -0,0 +1,377 @@
     1.4 +SPDX-License-Identifier: GPL-2.0
     1.5 +aufs4.19 standalone patch
     1.6 +
     1.7 +diff --git a/fs/dcache.c b/fs/dcache.c
     1.8 +index 9f57bd87bce5a..328a13662ca2e 100644
     1.9 +--- a/fs/dcache.c
    1.10 ++++ b/fs/dcache.c
    1.11 +@@ -1343,6 +1343,7 @@ void d_walk(struct dentry *parent, void *data,
    1.12 + 	seq = 1;
    1.13 + 	goto again;
    1.14 + }
    1.15 ++EXPORT_SYMBOL_GPL(d_walk);
    1.16 + 
    1.17 + struct check_mount {
    1.18 + 	struct vfsmount *mnt;
    1.19 +@@ -2837,6 +2838,7 @@ void d_exchange(struct dentry *dentry1, struct dentry *dentry2)
    1.20 + 
    1.21 + 	write_sequnlock(&rename_lock);
    1.22 + }
    1.23 ++EXPORT_SYMBOL_GPL(d_exchange);
    1.24 + 
    1.25 + /**
    1.26 +  * d_ancestor - search for an ancestor
    1.27 +diff --git a/fs/exec.c b/fs/exec.c
    1.28 +index 1ebf6e5a521d9..a72c294657eae 100644
    1.29 +--- a/fs/exec.c
    1.30 ++++ b/fs/exec.c
    1.31 +@@ -109,6 +109,7 @@ bool path_noexec(const struct path *path)
    1.32 + 	return (path->mnt->mnt_flags & MNT_NOEXEC) ||
    1.33 + 	       (path->mnt->mnt_sb->s_iflags & SB_I_NOEXEC);
    1.34 + }
    1.35 ++EXPORT_SYMBOL_GPL(path_noexec);
    1.36 + 
    1.37 + #ifdef CONFIG_USELIB
    1.38 + /*
    1.39 +diff --git a/fs/fcntl.c b/fs/fcntl.c
    1.40 +index d4da10be555c9..fbc70ac63462f 100644
    1.41 +--- a/fs/fcntl.c
    1.42 ++++ b/fs/fcntl.c
    1.43 +@@ -85,6 +85,7 @@ int setfl(int fd, struct file *filp, unsigned long arg)
    1.44 +  out:
    1.45 + 	return error;
    1.46 + }
    1.47 ++EXPORT_SYMBOL_GPL(setfl);
    1.48 + 
    1.49 + static void f_modown(struct file *filp, struct pid *pid, enum pid_type type,
    1.50 +                      int force)
    1.51 +diff --git a/fs/file_table.c b/fs/file_table.c
    1.52 +index e49af4caf15d9..569020fd1fb38 100644
    1.53 +--- a/fs/file_table.c
    1.54 ++++ b/fs/file_table.c
    1.55 +@@ -161,6 +161,7 @@ struct file *alloc_empty_file(int flags, const struct cred *cred)
    1.56 + 	}
    1.57 + 	return ERR_PTR(-ENFILE);
    1.58 + }
    1.59 ++EXPORT_SYMBOL_GPL(alloc_empty_file);
    1.60 + 
    1.61 + /*
    1.62 +  * Variant of alloc_empty_file() that doesn't check and modify nr_files.
    1.63 +@@ -323,6 +324,7 @@ void flush_delayed_fput(void)
    1.64 + {
    1.65 + 	delayed_fput(NULL);
    1.66 + }
    1.67 ++EXPORT_SYMBOL_GPL(flush_delayed_fput);
    1.68 + 
    1.69 + static DECLARE_DELAYED_WORK(delayed_fput_work, delayed_fput);
    1.70 + 
    1.71 +@@ -365,6 +367,7 @@ void __fput_sync(struct file *file)
    1.72 + }
    1.73 + 
    1.74 + EXPORT_SYMBOL(fput);
    1.75 ++EXPORT_SYMBOL_GPL(__fput_sync);
    1.76 + 
    1.77 + void __init files_init(void)
    1.78 + {
    1.79 +diff --git a/fs/inode.c b/fs/inode.c
    1.80 +index fa6ae6a217fbd..69d4a6cded14b 100644
    1.81 +--- a/fs/inode.c
    1.82 ++++ b/fs/inode.c
    1.83 +@@ -1666,6 +1666,7 @@ int update_time(struct inode *inode, struct timespec64 *time, int flags)
    1.84 + 
    1.85 + 	return update_time(inode, time, flags);
    1.86 + }
    1.87 ++EXPORT_SYMBOL_GPL(update_time);
    1.88 + 
    1.89 + /**
    1.90 +  *	touch_atime	-	update the access time
    1.91 +diff --git a/fs/namespace.c b/fs/namespace.c
    1.92 +index 72c93f3e86478..c49803ce04b8b 100644
    1.93 +--- a/fs/namespace.c
    1.94 ++++ b/fs/namespace.c
    1.95 +@@ -437,6 +437,7 @@ void __mnt_drop_write(struct vfsmount *mnt)
    1.96 + 	mnt_dec_writers(real_mount(mnt));
    1.97 + 	preempt_enable();
    1.98 + }
    1.99 ++EXPORT_SYMBOL_GPL(__mnt_drop_write);
   1.100 + 
   1.101 + /**
   1.102 +  * mnt_drop_write - give up write access to a mount
   1.103 +@@ -775,6 +776,7 @@ int is_current_mnt_ns(struct vfsmount *mnt)
   1.104 + {
   1.105 + 	return check_mnt(real_mount(mnt));
   1.106 + }
   1.107 ++EXPORT_SYMBOL_GPL(is_current_mnt_ns);
   1.108 + 
   1.109 + /*
   1.110 +  * vfsmount lock must be held for write
   1.111 +@@ -1832,6 +1834,7 @@ int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg,
   1.112 + 	}
   1.113 + 	return 0;
   1.114 + }
   1.115 ++EXPORT_SYMBOL_GPL(iterate_mounts);
   1.116 + 
   1.117 + static void cleanup_group_ids(struct mount *mnt, struct mount *end)
   1.118 + {
   1.119 +diff --git a/fs/notify/group.c b/fs/notify/group.c
   1.120 +index c03b836628769..94d210ca384a6 100644
   1.121 +--- a/fs/notify/group.c
   1.122 ++++ b/fs/notify/group.c
   1.123 +@@ -112,6 +112,7 @@ void fsnotify_get_group(struct fsnotify_group *group)
   1.124 + {
   1.125 + 	refcount_inc(&group->refcnt);
   1.126 + }
   1.127 ++EXPORT_SYMBOL_GPL(fsnotify_get_group);
   1.128 + 
   1.129 + /*
   1.130 +  * Drop a reference to a group.  Free it if it's through.
   1.131 +@@ -121,6 +122,7 @@ void fsnotify_put_group(struct fsnotify_group *group)
   1.132 + 	if (refcount_dec_and_test(&group->refcnt))
   1.133 + 		fsnotify_final_destroy_group(group);
   1.134 + }
   1.135 ++EXPORT_SYMBOL_GPL(fsnotify_put_group);
   1.136 + 
   1.137 + /*
   1.138 +  * Create a new fsnotify_group and hold a reference for the group returned.
   1.139 +@@ -150,6 +152,7 @@ struct fsnotify_group *fsnotify_alloc_group(const struct fsnotify_ops *ops)
   1.140 + 
   1.141 + 	return group;
   1.142 + }
   1.143 ++EXPORT_SYMBOL_GPL(fsnotify_alloc_group);
   1.144 + 
   1.145 + int fsnotify_fasync(int fd, struct file *file, int on)
   1.146 + {
   1.147 +diff --git a/fs/notify/mark.c b/fs/notify/mark.c
   1.148 +index 59cdb27826def..ce365c73f4fea 100644
   1.149 +--- a/fs/notify/mark.c
   1.150 ++++ b/fs/notify/mark.c
   1.151 +@@ -263,6 +263,7 @@ void fsnotify_put_mark(struct fsnotify_mark *mark)
   1.152 + 	queue_delayed_work(system_unbound_wq, &reaper_work,
   1.153 + 			   FSNOTIFY_REAPER_DELAY);
   1.154 + }
   1.155 ++EXPORT_SYMBOL_GPL(fsnotify_put_mark);
   1.156 + 
   1.157 + /*
   1.158 +  * Get mark reference when we found the mark via lockless traversal of object
   1.159 +@@ -417,6 +418,7 @@ void fsnotify_destroy_mark(struct fsnotify_mark *mark,
   1.160 + 	mutex_unlock(&group->mark_mutex);
   1.161 + 	fsnotify_free_mark(mark);
   1.162 + }
   1.163 ++EXPORT_SYMBOL_GPL(fsnotify_destroy_mark);
   1.164 + 
   1.165 + /*
   1.166 +  * Sorting function for lists of fsnotify marks.
   1.167 +@@ -632,6 +634,7 @@ int fsnotify_add_mark(struct fsnotify_mark *mark, fsnotify_connp_t *connp,
   1.168 + 	mutex_unlock(&group->mark_mutex);
   1.169 + 	return ret;
   1.170 + }
   1.171 ++EXPORT_SYMBOL_GPL(fsnotify_add_mark);
   1.172 + 
   1.173 + /*
   1.174 +  * Given a list of marks, find the mark associated with given group. If found
   1.175 +@@ -754,6 +757,7 @@ void fsnotify_init_mark(struct fsnotify_mark *mark,
   1.176 + 	fsnotify_get_group(group);
   1.177 + 	mark->group = group;
   1.178 + }
   1.179 ++EXPORT_SYMBOL_GPL(fsnotify_init_mark);
   1.180 + 
   1.181 + /*
   1.182 +  * Destroy all marks in destroy_list, waits for SRCU period to finish before
   1.183 +diff --git a/fs/open.c b/fs/open.c
   1.184 +index 0285ce7dbd515..cb81623a8b09e 100644
   1.185 +--- a/fs/open.c
   1.186 ++++ b/fs/open.c
   1.187 +@@ -64,6 +64,7 @@ int do_truncate(struct dentry *dentry, loff_t length, unsigned int time_attrs,
   1.188 + 	inode_unlock(dentry->d_inode);
   1.189 + 	return ret;
   1.190 + }
   1.191 ++EXPORT_SYMBOL_GPL(do_truncate);
   1.192 + 
   1.193 + long vfs_truncate(const struct path *path, loff_t length)
   1.194 + {
   1.195 +diff --git a/fs/read_write.c b/fs/read_write.c
   1.196 +index 45e3e7a0d4e64..f802a3865acf4 100644
   1.197 +--- a/fs/read_write.c
   1.198 ++++ b/fs/read_write.c
   1.199 +@@ -459,6 +459,7 @@ ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos)
   1.200 + 
   1.201 + 	return ret;
   1.202 + }
   1.203 ++EXPORT_SYMBOL_GPL(vfs_read);
   1.204 + 
   1.205 + static ssize_t new_sync_write(struct file *filp, const char __user *buf, size_t len, loff_t *ppos)
   1.206 + {
   1.207 +@@ -499,6 +500,7 @@ vfs_readf_t vfs_readf(struct file *file)
   1.208 + 		return new_sync_read;
   1.209 + 	return ERR_PTR(-ENOSYS); /* doesn't have ->read(|_iter)() op */
   1.210 + }
   1.211 ++EXPORT_SYMBOL_GPL(vfs_readf);
   1.212 + 
   1.213 + vfs_writef_t vfs_writef(struct file *file)
   1.214 + {
   1.215 +@@ -510,6 +512,7 @@ vfs_writef_t vfs_writef(struct file *file)
   1.216 + 		return new_sync_write;
   1.217 + 	return ERR_PTR(-ENOSYS); /* doesn't have ->write(|_iter)() op */
   1.218 + }
   1.219 ++EXPORT_SYMBOL_GPL(vfs_writef);
   1.220 + 
   1.221 + ssize_t __kernel_write(struct file *file, const void *buf, size_t count, loff_t *pos)
   1.222 + {
   1.223 +@@ -579,6 +582,7 @@ ssize_t vfs_write(struct file *file, const char __user *buf, size_t count, loff_
   1.224 + 
   1.225 + 	return ret;
   1.226 + }
   1.227 ++EXPORT_SYMBOL_GPL(vfs_write);
   1.228 + 
   1.229 + static inline loff_t file_pos_read(struct file *file)
   1.230 + {
   1.231 +diff --git a/fs/splice.c b/fs/splice.c
   1.232 +index 1dd7f96b22dc4..a5e3bcba0ea26 100644
   1.233 +--- a/fs/splice.c
   1.234 ++++ b/fs/splice.c
   1.235 +@@ -851,6 +851,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
   1.236 + 
   1.237 + 	return splice_write(pipe, out, ppos, len, flags);
   1.238 + }
   1.239 ++EXPORT_SYMBOL_GPL(do_splice_from);
   1.240 + 
   1.241 + /*
   1.242 +  * Attempt to initiate a splice from a file to a pipe.
   1.243 +@@ -880,6 +881,7 @@ long do_splice_to(struct file *in, loff_t *ppos,
   1.244 + 
   1.245 + 	return splice_read(in, ppos, pipe, len, flags);
   1.246 + }
   1.247 ++EXPORT_SYMBOL_GPL(do_splice_to);
   1.248 + 
   1.249 + /**
   1.250 +  * splice_direct_to_actor - splices data directly between two non-pipes
   1.251 +diff --git a/fs/sync.c b/fs/sync.c
   1.252 +index 28607828e96f2..ffd7ea43831ea 100644
   1.253 +--- a/fs/sync.c
   1.254 ++++ b/fs/sync.c
   1.255 +@@ -39,6 +39,7 @@ int __sync_filesystem(struct super_block *sb, int wait)
   1.256 + 		sb->s_op->sync_fs(sb, wait);
   1.257 + 	return __sync_blockdev(sb->s_bdev, wait);
   1.258 + }
   1.259 ++EXPORT_SYMBOL_GPL(__sync_filesystem);
   1.260 + 
   1.261 + /*
   1.262 +  * Write out and wait upon all dirty data associated with this
   1.263 +diff --git a/fs/xattr.c b/fs/xattr.c
   1.264 +index 0d6a6a4af8616..7ce4701b7289d 100644
   1.265 +--- a/fs/xattr.c
   1.266 ++++ b/fs/xattr.c
   1.267 +@@ -295,6 +295,7 @@ vfs_getxattr_alloc(struct dentry *dentry, const char *name, char **xattr_value,
   1.268 + 	*xattr_value = value;
   1.269 + 	return error;
   1.270 + }
   1.271 ++EXPORT_SYMBOL_GPL(vfs_getxattr_alloc);
   1.272 + 
   1.273 + ssize_t
   1.274 + __vfs_getxattr(struct dentry *dentry, struct inode *inode, const char *name,
   1.275 +diff --git a/kernel/locking/lockdep.c b/kernel/locking/lockdep.c
   1.276 +index fa6f5599a2a5e..7ac19efdac047 100644
   1.277 +--- a/kernel/locking/lockdep.c
   1.278 ++++ b/kernel/locking/lockdep.c
   1.279 +@@ -151,6 +151,7 @@ inline struct lock_class *lockdep_hlock_class(struct held_lock *hlock)
   1.280 + 	}
   1.281 + 	return lock_classes + hlock->class_idx - 1;
   1.282 + }
   1.283 ++EXPORT_SYMBOL_GPL(lockdep_hlock_class);
   1.284 + #define hlock_class(hlock) lockdep_hlock_class(hlock)
   1.285 + 
   1.286 + #ifdef CONFIG_LOCK_STAT
   1.287 +diff --git a/kernel/task_work.c b/kernel/task_work.c
   1.288 +index 0fef395662a6e..83fb1ecfc33de 100644
   1.289 +--- a/kernel/task_work.c
   1.290 ++++ b/kernel/task_work.c
   1.291 +@@ -116,3 +116,4 @@ void task_work_run(void)
   1.292 + 		} while (work);
   1.293 + 	}
   1.294 + }
   1.295 ++EXPORT_SYMBOL_GPL(task_work_run);
   1.296 +diff --git a/security/device_cgroup.c b/security/device_cgroup.c
   1.297 +index cd97929fac663..20c59b2e3b261 100644
   1.298 +--- a/security/device_cgroup.c
   1.299 ++++ b/security/device_cgroup.c
   1.300 +@@ -824,3 +824,4 @@ int __devcgroup_check_permission(short type, u32 major, u32 minor,
   1.301 + 
   1.302 + 	return 0;
   1.303 + }
   1.304 ++EXPORT_SYMBOL_GPL(__devcgroup_check_permission);
   1.305 +diff --git a/security/security.c b/security/security.c
   1.306 +index 736e78da1ab9d..c67016362c13e 100644
   1.307 +--- a/security/security.c
   1.308 ++++ b/security/security.c
   1.309 +@@ -542,6 +542,7 @@ int security_path_rmdir(const struct path *dir, struct dentry *dentry)
   1.310 + 		return 0;
   1.311 + 	return call_int_hook(path_rmdir, 0, dir, dentry);
   1.312 + }
   1.313 ++EXPORT_SYMBOL_GPL(security_path_rmdir);
   1.314 + 
   1.315 + int security_path_unlink(const struct path *dir, struct dentry *dentry)
   1.316 + {
   1.317 +@@ -558,6 +559,7 @@ int security_path_symlink(const struct path *dir, struct dentry *dentry,
   1.318 + 		return 0;
   1.319 + 	return call_int_hook(path_symlink, 0, dir, dentry, old_name);
   1.320 + }
   1.321 ++EXPORT_SYMBOL_GPL(security_path_symlink);
   1.322 + 
   1.323 + int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
   1.324 + 		       struct dentry *new_dentry)
   1.325 +@@ -566,6 +568,7 @@ int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
   1.326 + 		return 0;
   1.327 + 	return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry);
   1.328 + }
   1.329 ++EXPORT_SYMBOL_GPL(security_path_link);
   1.330 + 
   1.331 + int security_path_rename(const struct path *old_dir, struct dentry *old_dentry,
   1.332 + 			 const struct path *new_dir, struct dentry *new_dentry,
   1.333 +@@ -593,6 +596,7 @@ int security_path_truncate(const struct path *path)
   1.334 + 		return 0;
   1.335 + 	return call_int_hook(path_truncate, 0, path);
   1.336 + }
   1.337 ++EXPORT_SYMBOL_GPL(security_path_truncate);
   1.338 + 
   1.339 + int security_path_chmod(const struct path *path, umode_t mode)
   1.340 + {
   1.341 +@@ -600,6 +604,7 @@ int security_path_chmod(const struct path *path, umode_t mode)
   1.342 + 		return 0;
   1.343 + 	return call_int_hook(path_chmod, 0, path, mode);
   1.344 + }
   1.345 ++EXPORT_SYMBOL_GPL(security_path_chmod);
   1.346 + 
   1.347 + int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
   1.348 + {
   1.349 +@@ -607,6 +612,7 @@ int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
   1.350 + 		return 0;
   1.351 + 	return call_int_hook(path_chown, 0, path, uid, gid);
   1.352 + }
   1.353 ++EXPORT_SYMBOL_GPL(security_path_chown);
   1.354 + 
   1.355 + int security_path_chroot(const struct path *path)
   1.356 + {
   1.357 +@@ -707,6 +713,7 @@ int security_inode_permission(struct inode *inode, int mask)
   1.358 + 		return 0;
   1.359 + 	return call_int_hook(inode_permission, 0, inode, mask);
   1.360 + }
   1.361 ++EXPORT_SYMBOL_GPL(security_inode_permission);
   1.362 + 
   1.363 + int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
   1.364 + {
   1.365 +@@ -878,6 +885,7 @@ int security_file_permission(struct file *file, int mask)
   1.366 + 
   1.367 + 	return fsnotify_perm(file, mask);
   1.368 + }
   1.369 ++EXPORT_SYMBOL_GPL(security_file_permission);
   1.370 + 
   1.371 + int security_file_alloc(struct file *file)
   1.372 + {
   1.373 +@@ -937,6 +945,7 @@ int security_mmap_file(struct file *file, unsigned long prot,
   1.374 + 		return ret;
   1.375 + 	return ima_file_mmap(file, prot);
   1.376 + }
   1.377 ++EXPORT_SYMBOL_GPL(security_mmap_file);
   1.378 + 
   1.379 + int security_mmap_addr(unsigned long addr)
   1.380 + {