wok view linux/stuff/aufs2-standalone.patch @ rev 12887
Up: libsoup-dev (2.38.1)
author | Dominique Corbex <domcox@slitaz.org> |
---|---|
date | Sun May 27 21:52:01 2012 +0200 (2012-05-27) |
parents | 34e3298168a8 |
children |
line source
1 aufs2.1 standalone patch for linux-2.6.
3 diff --git a/fs/file_table.c b/fs/file_table.c
4 index 01e4c1e..0e800e2 100644
5 --- a/fs/file_table.c
6 +++ b/fs/file_table.c
7 @@ -443,6 +443,8 @@ void file_sb_list_del(struct file *file)
8 }
9 }
11 +EXPORT_SYMBOL(file_sb_list_del);
12 +
13 #ifdef CONFIG_SMP
15 /*
16 diff --git a/fs/inode.c b/fs/inode.c
17 index 43566d1..4291eae 100644
18 --- a/fs/inode.c
19 +++ b/fs/inode.c
20 @@ -69,6 +69,7 @@ static DEFINE_SPINLOCK(inode_lru_lock);
22 __cacheline_aligned_in_smp DEFINE_SPINLOCK(inode_sb_list_lock);
23 __cacheline_aligned_in_smp DEFINE_SPINLOCK(inode_wb_list_lock);
24 +EXPORT_SYMBOL(inode_sb_list_lock);
26 /*
27 * iprune_sem provides exclusion between the icache shrinking and the
28 diff --git a/fs/namei.c b/fs/namei.c
29 index 95978ec..f86d670 100644
30 --- a/fs/namei.c
31 +++ b/fs/namei.c
32 @@ -365,6 +365,7 @@ int deny_write_access(struct file * file)
34 return 0;
35 }
36 +EXPORT_SYMBOL(deny_write_access);
38 /**
39 * path_get - get a reference to a path
40 @@ -1696,6 +1697,7 @@ struct dentry *lookup_hash(struct nameidata *nd)
41 {
42 return __lookup_hash(&nd->last, nd->path.dentry, nd);
43 }
44 +EXPORT_SYMBOL(lookup_hash);
46 /**
47 * lookup_one_len - filesystem helper to lookup single pathname component
48 diff --git a/fs/namespace.c b/fs/namespace.c
49 index fe59bd1..7d3843f 100644
50 --- a/fs/namespace.c
51 +++ b/fs/namespace.c
52 @@ -1508,6 +1508,7 @@ int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg,
53 }
54 return 0;
55 }
56 +EXPORT_SYMBOL(iterate_mounts);
58 static void cleanup_group_ids(struct vfsmount *mnt, struct vfsmount *end)
59 {
60 diff --git a/fs/notify/group.c b/fs/notify/group.c
61 index d309f38..f0e9568 100644
62 --- a/fs/notify/group.c
63 +++ b/fs/notify/group.c
64 @@ -22,6 +22,7 @@
65 #include <linux/srcu.h>
66 #include <linux/rculist.h>
67 #include <linux/wait.h>
68 +#include <linux/module.h>
70 #include <linux/fsnotify_backend.h>
71 #include "fsnotify.h"
72 @@ -70,6 +71,7 @@ void fsnotify_put_group(struct fsnotify_group *group)
73 if (atomic_dec_and_test(&group->refcnt))
74 fsnotify_destroy_group(group);
75 }
76 +EXPORT_SYMBOL(fsnotify_put_group);
78 /*
79 * Create a new fsnotify_group and hold a reference for the group returned.
80 @@ -102,3 +104,4 @@ struct fsnotify_group *fsnotify_alloc_group(const struct fsnotify_ops *ops)
82 return group;
83 }
84 +EXPORT_SYMBOL(fsnotify_alloc_group);
85 diff --git a/fs/notify/mark.c b/fs/notify/mark.c
86 index 252ab1f..2199b9b 100644
87 --- a/fs/notify/mark.c
88 +++ b/fs/notify/mark.c
89 @@ -112,6 +112,7 @@ void fsnotify_put_mark(struct fsnotify_mark *mark)
90 if (atomic_dec_and_test(&mark->refcnt))
91 mark->free_mark(mark);
92 }
93 +EXPORT_SYMBOL(fsnotify_put_mark);
95 /*
96 * Any time a mark is getting freed we end up here.
97 @@ -189,6 +190,7 @@ void fsnotify_destroy_mark(struct fsnotify_mark *mark)
98 if (unlikely(atomic_dec_and_test(&group->num_marks)))
99 fsnotify_final_destroy_group(group);
100 }
101 +EXPORT_SYMBOL(fsnotify_destroy_mark);
103 void fsnotify_set_mark_mask_locked(struct fsnotify_mark *mark, __u32 mask)
104 {
105 @@ -276,6 +278,7 @@ err:
107 return ret;
108 }
109 +EXPORT_SYMBOL(fsnotify_add_mark);
111 /*
112 * clear any marks in a group in which mark->flags & flags is true
113 @@ -331,6 +334,7 @@ void fsnotify_init_mark(struct fsnotify_mark *mark,
114 atomic_set(&mark->refcnt, 1);
115 mark->free_mark = free_mark;
116 }
117 +EXPORT_SYMBOL(fsnotify_init_mark);
119 static int fsnotify_mark_destroy(void *ignored)
120 {
121 diff --git a/fs/open.c b/fs/open.c
122 index b52cf01..c1b341c 100644
123 --- a/fs/open.c
124 +++ b/fs/open.c
125 @@ -60,6 +60,7 @@ int do_truncate(struct dentry *dentry, loff_t length, unsigned int time_attrs,
126 mutex_unlock(&dentry->d_inode->i_mutex);
127 return ret;
128 }
129 +EXPORT_SYMBOL(do_truncate);
131 static long do_sys_truncate(const char __user *pathname, loff_t length)
132 {
133 diff --git a/fs/splice.c b/fs/splice.c
134 index 19afec6..11f07f8 100644
135 --- a/fs/splice.c
136 +++ b/fs/splice.c
137 @@ -1109,6 +1109,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
139 return splice_write(pipe, out, ppos, len, flags);
140 }
141 +EXPORT_SYMBOL(do_splice_from);
143 /*
144 * Attempt to initiate a splice from a file to a pipe.
145 @@ -1135,6 +1136,7 @@ long do_splice_to(struct file *in, loff_t *ppos,
147 return splice_read(in, ppos, pipe, len, flags);
148 }
149 +EXPORT_SYMBOL(do_splice_to);
151 /**
152 * splice_direct_to_actor - splices data directly between two non-pipes
153 diff --git a/security/commoncap.c b/security/commoncap.c
154 index a93b3b7..024282c 100644
155 --- a/security/commoncap.c
156 +++ b/security/commoncap.c
157 @@ -971,3 +971,4 @@ int cap_file_mmap(struct file *file, unsigned long reqprot,
158 }
159 return ret;
160 }
161 +EXPORT_SYMBOL(cap_file_mmap);
162 diff --git a/security/device_cgroup.c b/security/device_cgroup.c
163 index 1be6826..215278c 100644
164 --- a/security/device_cgroup.c
165 +++ b/security/device_cgroup.c
166 @@ -508,6 +508,7 @@ found:
168 return -EPERM;
169 }
170 +EXPORT_SYMBOL(__devcgroup_inode_permission);
172 int devcgroup_inode_mknod(int mode, dev_t dev)
173 {
174 diff --git a/security/security.c b/security/security.c
175 index 4ba6d4c..9f64bb8 100644
176 --- a/security/security.c
177 +++ b/security/security.c
178 @@ -373,6 +373,7 @@ int security_path_rmdir(struct path *dir, struct dentry *dentry)
179 return 0;
180 return security_ops->path_rmdir(dir, dentry);
181 }
182 +EXPORT_SYMBOL(security_path_rmdir);
184 int security_path_unlink(struct path *dir, struct dentry *dentry)
185 {
186 @@ -389,6 +390,7 @@ int security_path_symlink(struct path *dir, struct dentry *dentry,
187 return 0;
188 return security_ops->path_symlink(dir, dentry, old_name);
189 }
190 +EXPORT_SYMBOL(security_path_symlink);
192 int security_path_link(struct dentry *old_dentry, struct path *new_dir,
193 struct dentry *new_dentry)
194 @@ -397,6 +399,7 @@ int security_path_link(struct dentry *old_dentry, struct path *new_dir,
195 return 0;
196 return security_ops->path_link(old_dentry, new_dir, new_dentry);
197 }
198 +EXPORT_SYMBOL(security_path_link);
200 int security_path_rename(struct path *old_dir, struct dentry *old_dentry,
201 struct path *new_dir, struct dentry *new_dentry)
202 @@ -415,6 +418,7 @@ int security_path_truncate(struct path *path)
203 return 0;
204 return security_ops->path_truncate(path);
205 }
206 +EXPORT_SYMBOL(security_path_truncate);
208 int security_path_chmod(struct dentry *dentry, struct vfsmount *mnt,
209 mode_t mode)
210 @@ -423,6 +427,7 @@ int security_path_chmod(struct dentry *dentry, struct vfsmount *mnt,
211 return 0;
212 return security_ops->path_chmod(dentry, mnt, mode);
213 }
214 +EXPORT_SYMBOL(security_path_chmod);
216 int security_path_chown(struct path *path, uid_t uid, gid_t gid)
217 {
218 @@ -430,6 +435,7 @@ int security_path_chown(struct path *path, uid_t uid, gid_t gid)
219 return 0;
220 return security_ops->path_chown(path, uid, gid);
221 }
222 +EXPORT_SYMBOL(security_path_chown);
224 int security_path_chroot(struct path *path)
225 {
226 @@ -506,6 +512,7 @@ int security_inode_readlink(struct dentry *dentry)
227 return 0;
228 return security_ops->inode_readlink(dentry);
229 }
230 +EXPORT_SYMBOL(security_inode_readlink);
232 int security_inode_follow_link(struct dentry *dentry, struct nameidata *nd)
233 {
234 @@ -520,6 +527,7 @@ int security_inode_permission(struct inode *inode, int mask)
235 return 0;
236 return security_ops->inode_permission(inode, mask, 0);
237 }
238 +EXPORT_SYMBOL(security_inode_permission);
240 int security_inode_exec_permission(struct inode *inode, unsigned int flags)
241 {
242 @@ -626,6 +634,7 @@ int security_file_permission(struct file *file, int mask)
244 return fsnotify_perm(file, mask);
245 }
246 +EXPORT_SYMBOL(security_file_permission);
248 int security_file_alloc(struct file *file)
249 {
250 @@ -653,6 +662,7 @@ int security_file_mmap(struct file *file, unsigned long reqprot,
251 return ret;
252 return ima_file_mmap(file, prot);
253 }
254 +EXPORT_SYMBOL(security_file_mmap);
256 int security_file_mprotect(struct vm_area_struct *vma, unsigned long reqprot,
257 unsigned long prot)