wok-current view linux/stuff/aufs4-standalone.patch @ rev 25701

Fix dep for libglamoregl.so (libepoxy), and miss file for amdgpu (thanks alanyih)
author Stanislas Leduc <shann@slitaz.org>
date Fri Apr 19 12:48:51 2024 +0000 (2 months ago)
parents
children
line source
1 SPDX-License-Identifier: GPL-2.0
2 aufs4.19 standalone patch
4 diff --git a/fs/dcache.c b/fs/dcache.c
5 index 9f57bd87bce5a..328a13662ca2e 100644
6 --- a/fs/dcache.c
7 +++ b/fs/dcache.c
8 @@ -1343,6 +1343,7 @@ void d_walk(struct dentry *parent, void *data,
9 seq = 1;
10 goto again;
11 }
12 +EXPORT_SYMBOL_GPL(d_walk);
14 struct check_mount {
15 struct vfsmount *mnt;
16 @@ -2837,6 +2838,7 @@ void d_exchange(struct dentry *dentry1, struct dentry *dentry2)
18 write_sequnlock(&rename_lock);
19 }
20 +EXPORT_SYMBOL_GPL(d_exchange);
22 /**
23 * d_ancestor - search for an ancestor
24 diff --git a/fs/exec.c b/fs/exec.c
25 index 1ebf6e5a521d9..a72c294657eae 100644
26 --- a/fs/exec.c
27 +++ b/fs/exec.c
28 @@ -109,6 +109,7 @@ bool path_noexec(const struct path *path)
29 return (path->mnt->mnt_flags & MNT_NOEXEC) ||
30 (path->mnt->mnt_sb->s_iflags & SB_I_NOEXEC);
31 }
32 +EXPORT_SYMBOL_GPL(path_noexec);
34 #ifdef CONFIG_USELIB
35 /*
36 diff --git a/fs/fcntl.c b/fs/fcntl.c
37 index d4da10be555c9..fbc70ac63462f 100644
38 --- a/fs/fcntl.c
39 +++ b/fs/fcntl.c
40 @@ -85,6 +85,7 @@ int setfl(int fd, struct file *filp, unsigned long arg)
41 out:
42 return error;
43 }
44 +EXPORT_SYMBOL_GPL(setfl);
46 static void f_modown(struct file *filp, struct pid *pid, enum pid_type type,
47 int force)
48 diff --git a/fs/file_table.c b/fs/file_table.c
49 index e49af4caf15d9..569020fd1fb38 100644
50 --- a/fs/file_table.c
51 +++ b/fs/file_table.c
52 @@ -161,6 +161,7 @@ struct file *alloc_empty_file(int flags, const struct cred *cred)
53 }
54 return ERR_PTR(-ENFILE);
55 }
56 +EXPORT_SYMBOL_GPL(alloc_empty_file);
58 /*
59 * Variant of alloc_empty_file() that doesn't check and modify nr_files.
60 @@ -323,6 +324,7 @@ void flush_delayed_fput(void)
61 {
62 delayed_fput(NULL);
63 }
64 +EXPORT_SYMBOL_GPL(flush_delayed_fput);
66 static DECLARE_DELAYED_WORK(delayed_fput_work, delayed_fput);
68 @@ -365,6 +367,7 @@ void __fput_sync(struct file *file)
69 }
71 EXPORT_SYMBOL(fput);
72 +EXPORT_SYMBOL_GPL(__fput_sync);
74 void __init files_init(void)
75 {
76 diff --git a/fs/inode.c b/fs/inode.c
77 index fa6ae6a217fbd..69d4a6cded14b 100644
78 --- a/fs/inode.c
79 +++ b/fs/inode.c
80 @@ -1666,6 +1666,7 @@ int update_time(struct inode *inode, struct timespec64 *time, int flags)
82 return update_time(inode, time, flags);
83 }
84 +EXPORT_SYMBOL_GPL(update_time);
86 /**
87 * touch_atime - update the access time
88 diff --git a/fs/namespace.c b/fs/namespace.c
89 index 72c93f3e86478..c49803ce04b8b 100644
90 --- a/fs/namespace.c
91 +++ b/fs/namespace.c
92 @@ -437,6 +437,7 @@ void __mnt_drop_write(struct vfsmount *mnt)
93 mnt_dec_writers(real_mount(mnt));
94 preempt_enable();
95 }
96 +EXPORT_SYMBOL_GPL(__mnt_drop_write);
98 /**
99 * mnt_drop_write - give up write access to a mount
100 @@ -775,6 +776,7 @@ int is_current_mnt_ns(struct vfsmount *mnt)
101 {
102 return check_mnt(real_mount(mnt));
103 }
104 +EXPORT_SYMBOL_GPL(is_current_mnt_ns);
106 /*
107 * vfsmount lock must be held for write
108 @@ -1832,6 +1834,7 @@ int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg,
109 }
110 return 0;
111 }
112 +EXPORT_SYMBOL_GPL(iterate_mounts);
114 static void cleanup_group_ids(struct mount *mnt, struct mount *end)
115 {
116 diff --git a/fs/notify/group.c b/fs/notify/group.c
117 index c03b836628769..94d210ca384a6 100644
118 --- a/fs/notify/group.c
119 +++ b/fs/notify/group.c
120 @@ -112,6 +112,7 @@ void fsnotify_get_group(struct fsnotify_group *group)
121 {
122 refcount_inc(&group->refcnt);
123 }
124 +EXPORT_SYMBOL_GPL(fsnotify_get_group);
126 /*
127 * Drop a reference to a group. Free it if it's through.
128 @@ -121,6 +122,7 @@ void fsnotify_put_group(struct fsnotify_group *group)
129 if (refcount_dec_and_test(&group->refcnt))
130 fsnotify_final_destroy_group(group);
131 }
132 +EXPORT_SYMBOL_GPL(fsnotify_put_group);
134 /*
135 * Create a new fsnotify_group and hold a reference for the group returned.
136 @@ -150,6 +152,7 @@ struct fsnotify_group *fsnotify_alloc_group(const struct fsnotify_ops *ops)
138 return group;
139 }
140 +EXPORT_SYMBOL_GPL(fsnotify_alloc_group);
142 int fsnotify_fasync(int fd, struct file *file, int on)
143 {
144 diff --git a/fs/notify/mark.c b/fs/notify/mark.c
145 index 59cdb27826def..ce365c73f4fea 100644
146 --- a/fs/notify/mark.c
147 +++ b/fs/notify/mark.c
148 @@ -263,6 +263,7 @@ void fsnotify_put_mark(struct fsnotify_mark *mark)
149 queue_delayed_work(system_unbound_wq, &reaper_work,
150 FSNOTIFY_REAPER_DELAY);
151 }
152 +EXPORT_SYMBOL_GPL(fsnotify_put_mark);
154 /*
155 * Get mark reference when we found the mark via lockless traversal of object
156 @@ -417,6 +418,7 @@ void fsnotify_destroy_mark(struct fsnotify_mark *mark,
157 mutex_unlock(&group->mark_mutex);
158 fsnotify_free_mark(mark);
159 }
160 +EXPORT_SYMBOL_GPL(fsnotify_destroy_mark);
162 /*
163 * Sorting function for lists of fsnotify marks.
164 @@ -632,6 +634,7 @@ int fsnotify_add_mark(struct fsnotify_mark *mark, fsnotify_connp_t *connp,
165 mutex_unlock(&group->mark_mutex);
166 return ret;
167 }
168 +EXPORT_SYMBOL_GPL(fsnotify_add_mark);
170 /*
171 * Given a list of marks, find the mark associated with given group. If found
172 @@ -754,6 +757,7 @@ void fsnotify_init_mark(struct fsnotify_mark *mark,
173 fsnotify_get_group(group);
174 mark->group = group;
175 }
176 +EXPORT_SYMBOL_GPL(fsnotify_init_mark);
178 /*
179 * Destroy all marks in destroy_list, waits for SRCU period to finish before
180 diff --git a/fs/open.c b/fs/open.c
181 index 0285ce7dbd515..cb81623a8b09e 100644
182 --- a/fs/open.c
183 +++ b/fs/open.c
184 @@ -64,6 +64,7 @@ int do_truncate(struct dentry *dentry, loff_t length, unsigned int time_attrs,
185 inode_unlock(dentry->d_inode);
186 return ret;
187 }
188 +EXPORT_SYMBOL_GPL(do_truncate);
190 long vfs_truncate(const struct path *path, loff_t length)
191 {
192 diff --git a/fs/read_write.c b/fs/read_write.c
193 index 45e3e7a0d4e64..f802a3865acf4 100644
194 --- a/fs/read_write.c
195 +++ b/fs/read_write.c
196 @@ -459,6 +459,7 @@ ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos)
198 return ret;
199 }
200 +EXPORT_SYMBOL_GPL(vfs_read);
202 static ssize_t new_sync_write(struct file *filp, const char __user *buf, size_t len, loff_t *ppos)
203 {
204 @@ -499,6 +500,7 @@ vfs_readf_t vfs_readf(struct file *file)
205 return new_sync_read;
206 return ERR_PTR(-ENOSYS); /* doesn't have ->read(|_iter)() op */
207 }
208 +EXPORT_SYMBOL_GPL(vfs_readf);
210 vfs_writef_t vfs_writef(struct file *file)
211 {
212 @@ -510,6 +512,7 @@ vfs_writef_t vfs_writef(struct file *file)
213 return new_sync_write;
214 return ERR_PTR(-ENOSYS); /* doesn't have ->write(|_iter)() op */
215 }
216 +EXPORT_SYMBOL_GPL(vfs_writef);
218 ssize_t __kernel_write(struct file *file, const void *buf, size_t count, loff_t *pos)
219 {
220 @@ -579,6 +582,7 @@ ssize_t vfs_write(struct file *file, const char __user *buf, size_t count, loff_
222 return ret;
223 }
224 +EXPORT_SYMBOL_GPL(vfs_write);
226 static inline loff_t file_pos_read(struct file *file)
227 {
228 diff --git a/fs/splice.c b/fs/splice.c
229 index 1dd7f96b22dc4..a5e3bcba0ea26 100644
230 --- a/fs/splice.c
231 +++ b/fs/splice.c
232 @@ -851,6 +851,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
234 return splice_write(pipe, out, ppos, len, flags);
235 }
236 +EXPORT_SYMBOL_GPL(do_splice_from);
238 /*
239 * Attempt to initiate a splice from a file to a pipe.
240 @@ -880,6 +881,7 @@ long do_splice_to(struct file *in, loff_t *ppos,
242 return splice_read(in, ppos, pipe, len, flags);
243 }
244 +EXPORT_SYMBOL_GPL(do_splice_to);
246 /**
247 * splice_direct_to_actor - splices data directly between two non-pipes
248 diff --git a/fs/sync.c b/fs/sync.c
249 index 28607828e96f2..ffd7ea43831ea 100644
250 --- a/fs/sync.c
251 +++ b/fs/sync.c
252 @@ -39,6 +39,7 @@ int __sync_filesystem(struct super_block *sb, int wait)
253 sb->s_op->sync_fs(sb, wait);
254 return __sync_blockdev(sb->s_bdev, wait);
255 }
256 +EXPORT_SYMBOL_GPL(__sync_filesystem);
258 /*
259 * Write out and wait upon all dirty data associated with this
260 diff --git a/fs/xattr.c b/fs/xattr.c
261 index 0d6a6a4af8616..7ce4701b7289d 100644
262 --- a/fs/xattr.c
263 +++ b/fs/xattr.c
264 @@ -295,6 +295,7 @@ vfs_getxattr_alloc(struct dentry *dentry, const char *name, char **xattr_value,
265 *xattr_value = value;
266 return error;
267 }
268 +EXPORT_SYMBOL_GPL(vfs_getxattr_alloc);
270 ssize_t
271 __vfs_getxattr(struct dentry *dentry, struct inode *inode, const char *name,
272 diff --git a/kernel/locking/lockdep.c b/kernel/locking/lockdep.c
273 index fa6f5599a2a5e..7ac19efdac047 100644
274 --- a/kernel/locking/lockdep.c
275 +++ b/kernel/locking/lockdep.c
276 @@ -151,6 +151,7 @@ inline struct lock_class *lockdep_hlock_class(struct held_lock *hlock)
277 }
278 return lock_classes + hlock->class_idx - 1;
279 }
280 +EXPORT_SYMBOL_GPL(lockdep_hlock_class);
281 #define hlock_class(hlock) lockdep_hlock_class(hlock)
283 #ifdef CONFIG_LOCK_STAT
284 diff --git a/kernel/task_work.c b/kernel/task_work.c
285 index 0fef395662a6e..83fb1ecfc33de 100644
286 --- a/kernel/task_work.c
287 +++ b/kernel/task_work.c
288 @@ -116,3 +116,4 @@ void task_work_run(void)
289 } while (work);
290 }
291 }
292 +EXPORT_SYMBOL_GPL(task_work_run);
293 diff --git a/security/device_cgroup.c b/security/device_cgroup.c
294 index cd97929fac663..20c59b2e3b261 100644
295 --- a/security/device_cgroup.c
296 +++ b/security/device_cgroup.c
297 @@ -824,3 +824,4 @@ int __devcgroup_check_permission(short type, u32 major, u32 minor,
299 return 0;
300 }
301 +EXPORT_SYMBOL_GPL(__devcgroup_check_permission);
302 diff --git a/security/security.c b/security/security.c
303 index 736e78da1ab9d..c67016362c13e 100644
304 --- a/security/security.c
305 +++ b/security/security.c
306 @@ -542,6 +542,7 @@ int security_path_rmdir(const struct path *dir, struct dentry *dentry)
307 return 0;
308 return call_int_hook(path_rmdir, 0, dir, dentry);
309 }
310 +EXPORT_SYMBOL_GPL(security_path_rmdir);
312 int security_path_unlink(const struct path *dir, struct dentry *dentry)
313 {
314 @@ -558,6 +559,7 @@ int security_path_symlink(const struct path *dir, struct dentry *dentry,
315 return 0;
316 return call_int_hook(path_symlink, 0, dir, dentry, old_name);
317 }
318 +EXPORT_SYMBOL_GPL(security_path_symlink);
320 int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
321 struct dentry *new_dentry)
322 @@ -566,6 +568,7 @@ int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
323 return 0;
324 return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry);
325 }
326 +EXPORT_SYMBOL_GPL(security_path_link);
328 int security_path_rename(const struct path *old_dir, struct dentry *old_dentry,
329 const struct path *new_dir, struct dentry *new_dentry,
330 @@ -593,6 +596,7 @@ int security_path_truncate(const struct path *path)
331 return 0;
332 return call_int_hook(path_truncate, 0, path);
333 }
334 +EXPORT_SYMBOL_GPL(security_path_truncate);
336 int security_path_chmod(const struct path *path, umode_t mode)
337 {
338 @@ -600,6 +604,7 @@ int security_path_chmod(const struct path *path, umode_t mode)
339 return 0;
340 return call_int_hook(path_chmod, 0, path, mode);
341 }
342 +EXPORT_SYMBOL_GPL(security_path_chmod);
344 int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
345 {
346 @@ -607,6 +612,7 @@ int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
347 return 0;
348 return call_int_hook(path_chown, 0, path, uid, gid);
349 }
350 +EXPORT_SYMBOL_GPL(security_path_chown);
352 int security_path_chroot(const struct path *path)
353 {
354 @@ -707,6 +713,7 @@ int security_inode_permission(struct inode *inode, int mask)
355 return 0;
356 return call_int_hook(inode_permission, 0, inode, mask);
357 }
358 +EXPORT_SYMBOL_GPL(security_inode_permission);
360 int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
361 {
362 @@ -878,6 +885,7 @@ int security_file_permission(struct file *file, int mask)
364 return fsnotify_perm(file, mask);
365 }
366 +EXPORT_SYMBOL_GPL(security_file_permission);
368 int security_file_alloc(struct file *file)
369 {
370 @@ -937,6 +945,7 @@ int security_mmap_file(struct file *file, unsigned long prot,
371 return ret;
372 return ima_file_mmap(file, prot);
373 }
374 +EXPORT_SYMBOL_GPL(security_mmap_file);
376 int security_mmap_addr(unsigned long addr)
377 {