wok view linux/stuff/aufs3-standalone.patch @ rev 25000

updated nms (0.3.3 -> 1.0.1)
author Hans-G?nter Theisgen
date Mon May 16 13:53:18 2022 +0100 (2022-05-16)
parents
children
line source
1 aufs3.16 standalone patch
3 diff --git a/fs/dcache.c b/fs/dcache.c
4 index 0ea8c4a..2c22125 100644
5 --- a/fs/dcache.c
6 +++ b/fs/dcache.c
7 @@ -1161,6 +1161,7 @@ rename_retry:
8 seq = 1;
9 goto again;
10 }
11 +EXPORT_SYMBOL(d_walk);
13 /*
14 * Search for at least 1 mount point in the dentry's subdirs.
15 diff --git a/fs/file_table.c b/fs/file_table.c
16 index 385bfd3..7d4ee57 100644
17 --- a/fs/file_table.c
18 +++ b/fs/file_table.c
19 @@ -147,6 +147,7 @@ over:
20 }
21 return ERR_PTR(-ENFILE);
22 }
23 +EXPORT_SYMBOL(get_empty_filp);
25 /**
26 * alloc_file - allocate and initialize a 'struct file'
27 @@ -316,6 +317,7 @@ void put_filp(struct file *file)
28 file_free(file);
29 }
30 }
31 +EXPORT_SYMBOL(put_filp);
33 void __init files_init(unsigned long mempages)
34 {
35 diff --git a/fs/inode.c b/fs/inode.c
36 index b225c0f..73259c8 100644
37 --- a/fs/inode.c
38 +++ b/fs/inode.c
39 @@ -57,6 +57,7 @@ static struct hlist_head *inode_hashtable __read_mostly;
40 static __cacheline_aligned_in_smp DEFINE_SPINLOCK(inode_hash_lock);
42 __cacheline_aligned_in_smp DEFINE_SPINLOCK(inode_sb_list_lock);
43 +EXPORT_SYMBOL(inode_sb_list_lock);
45 /*
46 * Empty aops. Can be used for the cases where the user does not
47 @@ -1512,6 +1513,7 @@ int update_time(struct inode *inode, struct timespec *time, int flags)
48 mark_inode_dirty_sync(inode);
49 return 0;
50 }
51 +EXPORT_SYMBOL(update_time);
53 /**
54 * touch_atime - update the access time
55 diff --git a/fs/namespace.c b/fs/namespace.c
56 index 182bc41..c88e101 100644
57 --- a/fs/namespace.c
58 +++ b/fs/namespace.c
59 @@ -453,6 +453,7 @@ void __mnt_drop_write(struct vfsmount *mnt)
60 mnt_dec_writers(real_mount(mnt));
61 preempt_enable();
62 }
63 +EXPORT_SYMBOL_GPL(__mnt_drop_write);
65 /**
66 * mnt_drop_write - give up write access to a mount
67 @@ -1564,6 +1565,7 @@ int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg,
68 }
69 return 0;
70 }
71 +EXPORT_SYMBOL(iterate_mounts);
73 static void cleanup_group_ids(struct mount *mnt, struct mount *end)
74 {
75 diff --git a/fs/notify/group.c b/fs/notify/group.c
76 index ad19959..adf290d 100644
77 --- a/fs/notify/group.c
78 +++ b/fs/notify/group.c
79 @@ -22,6 +22,7 @@
80 #include <linux/srcu.h>
81 #include <linux/rculist.h>
82 #include <linux/wait.h>
83 +#include <linux/module.h>
85 #include <linux/fsnotify_backend.h>
86 #include "fsnotify.h"
87 @@ -72,6 +73,7 @@ void fsnotify_get_group(struct fsnotify_group *group)
88 {
89 atomic_inc(&group->refcnt);
90 }
91 +EXPORT_SYMBOL(fsnotify_get_group);
93 /*
94 * Drop a reference to a group. Free it if it's through.
95 @@ -81,6 +83,7 @@ void fsnotify_put_group(struct fsnotify_group *group)
96 if (atomic_dec_and_test(&group->refcnt))
97 fsnotify_final_destroy_group(group);
98 }
99 +EXPORT_SYMBOL(fsnotify_put_group);
101 /*
102 * Create a new fsnotify_group and hold a reference for the group returned.
103 @@ -109,6 +112,7 @@ struct fsnotify_group *fsnotify_alloc_group(const struct fsnotify_ops *ops)
105 return group;
106 }
107 +EXPORT_SYMBOL(fsnotify_alloc_group);
109 int fsnotify_fasync(int fd, struct file *file, int on)
110 {
111 diff --git a/fs/notify/mark.c b/fs/notify/mark.c
112 index d90deaa..60b4239 100644
113 --- a/fs/notify/mark.c
114 +++ b/fs/notify/mark.c
115 @@ -109,6 +109,7 @@ void fsnotify_put_mark(struct fsnotify_mark *mark)
116 mark->free_mark(mark);
117 }
118 }
119 +EXPORT_SYMBOL(fsnotify_put_mark);
121 /*
122 * Any time a mark is getting freed we end up here.
123 @@ -191,6 +192,7 @@ void fsnotify_destroy_mark(struct fsnotify_mark *mark,
124 fsnotify_destroy_mark_locked(mark, group);
125 mutex_unlock(&group->mark_mutex);
126 }
127 +EXPORT_SYMBOL(fsnotify_destroy_mark);
129 void fsnotify_set_mark_mask_locked(struct fsnotify_mark *mark, __u32 mask)
130 {
131 @@ -275,6 +277,7 @@ err:
133 return ret;
134 }
135 +EXPORT_SYMBOL(fsnotify_add_mark);
137 int fsnotify_add_mark(struct fsnotify_mark *mark, struct fsnotify_group *group,
138 struct inode *inode, struct vfsmount *mnt, int allow_dups)
139 @@ -336,6 +339,7 @@ void fsnotify_init_mark(struct fsnotify_mark *mark,
140 atomic_set(&mark->refcnt, 1);
141 mark->free_mark = free_mark;
142 }
143 +EXPORT_SYMBOL(fsnotify_init_mark);
145 static int fsnotify_mark_destroy(void *ignored)
146 {
147 diff --git a/fs/open.c b/fs/open.c
148 index d6fd3ac..5224633c 100644
149 --- a/fs/open.c
150 +++ b/fs/open.c
151 @@ -62,6 +62,7 @@ int do_truncate(struct dentry *dentry, loff_t length, unsigned int time_attrs,
152 mutex_unlock(&dentry->d_inode->i_mutex);
153 return ret;
154 }
155 +EXPORT_SYMBOL(do_truncate);
157 long vfs_truncate(struct path *path, loff_t length)
158 {
159 @@ -298,6 +299,7 @@ int do_fallocate(struct file *file, int mode, loff_t offset, loff_t len)
160 sb_end_write(inode->i_sb);
161 return ret;
162 }
163 +EXPORT_SYMBOL(do_fallocate);
165 SYSCALL_DEFINE4(fallocate, int, fd, int, mode, loff_t, offset, loff_t, len)
166 {
167 @@ -663,6 +665,7 @@ int open_check_o_direct(struct file *f)
168 }
169 return 0;
170 }
171 +EXPORT_SYMBOL(open_check_o_direct);
173 static int do_dentry_open(struct file *f,
174 int (*open)(struct inode *, struct file *),
175 diff --git a/fs/splice.c b/fs/splice.c
176 index 9ba380c..3419932 100644
177 --- a/fs/splice.c
178 +++ b/fs/splice.c
179 @@ -1127,6 +1127,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
181 return splice_write(pipe, out, ppos, len, flags);
182 }
183 +EXPORT_SYMBOL(do_splice_from);
185 /*
186 * Attempt to initiate a splice from a file to a pipe.
187 @@ -1153,6 +1154,7 @@ long do_splice_to(struct file *in, loff_t *ppos,
189 return splice_read(in, ppos, pipe, len, flags);
190 }
191 +EXPORT_SYMBOL(do_splice_to);
193 /**
194 * splice_direct_to_actor - splices data directly between two non-pipes
195 diff --git a/fs/xattr.c b/fs/xattr.c
196 index c69e6d4..3a7a8eb 100644
197 --- a/fs/xattr.c
198 +++ b/fs/xattr.c
199 @@ -207,6 +207,7 @@ vfs_getxattr_alloc(struct dentry *dentry, const char *name, char **xattr_value,
200 *xattr_value = value;
201 return error;
202 }
203 +EXPORT_SYMBOL(vfs_getxattr_alloc);
205 /* Compare an extended attribute value with the given value */
206 int vfs_xattr_cmp(struct dentry *dentry, const char *xattr_name,
207 diff --git a/security/commoncap.c b/security/commoncap.c
208 index b9d613e..ba3b618 100644
209 --- a/security/commoncap.c
210 +++ b/security/commoncap.c
211 @@ -988,9 +988,11 @@ int cap_mmap_addr(unsigned long addr)
212 }
213 return ret;
214 }
215 +EXPORT_SYMBOL(cap_mmap_addr);
217 int cap_mmap_file(struct file *file, unsigned long reqprot,
218 unsigned long prot, unsigned long flags)
219 {
220 return 0;
221 }
222 +EXPORT_SYMBOL(cap_mmap_file);
223 diff --git a/security/device_cgroup.c b/security/device_cgroup.c
224 index d9d69e6..3f6f471 100644
225 --- a/security/device_cgroup.c
226 +++ b/security/device_cgroup.c
227 @@ -7,6 +7,7 @@
228 #include <linux/device_cgroup.h>
229 #include <linux/cgroup.h>
230 #include <linux/ctype.h>
231 +#include <linux/export.h>
232 #include <linux/list.h>
233 #include <linux/uaccess.h>
234 #include <linux/seq_file.h>
235 @@ -849,6 +850,7 @@ int __devcgroup_inode_permission(struct inode *inode, int mask)
236 return __devcgroup_check_permission(type, imajor(inode), iminor(inode),
237 access);
238 }
239 +EXPORT_SYMBOL(__devcgroup_inode_permission);
241 int devcgroup_inode_mknod(int mode, dev_t dev)
242 {
243 diff --git a/security/security.c b/security/security.c
244 index 31614e9..b223a66 100644
245 --- a/security/security.c
246 +++ b/security/security.c
247 @@ -407,6 +407,7 @@ int security_path_rmdir(struct path *dir, struct dentry *dentry)
248 return 0;
249 return security_ops->path_rmdir(dir, dentry);
250 }
251 +EXPORT_SYMBOL(security_path_rmdir);
253 int security_path_unlink(struct path *dir, struct dentry *dentry)
254 {
255 @@ -423,6 +424,7 @@ int security_path_symlink(struct path *dir, struct dentry *dentry,
256 return 0;
257 return security_ops->path_symlink(dir, dentry, old_name);
258 }
259 +EXPORT_SYMBOL(security_path_symlink);
261 int security_path_link(struct dentry *old_dentry, struct path *new_dir,
262 struct dentry *new_dentry)
263 @@ -431,6 +433,7 @@ int security_path_link(struct dentry *old_dentry, struct path *new_dir,
264 return 0;
265 return security_ops->path_link(old_dentry, new_dir, new_dentry);
266 }
267 +EXPORT_SYMBOL(security_path_link);
269 int security_path_rename(struct path *old_dir, struct dentry *old_dentry,
270 struct path *new_dir, struct dentry *new_dentry,
271 @@ -458,6 +461,7 @@ int security_path_truncate(struct path *path)
272 return 0;
273 return security_ops->path_truncate(path);
274 }
275 +EXPORT_SYMBOL(security_path_truncate);
277 int security_path_chmod(struct path *path, umode_t mode)
278 {
279 @@ -465,6 +469,7 @@ int security_path_chmod(struct path *path, umode_t mode)
280 return 0;
281 return security_ops->path_chmod(path, mode);
282 }
283 +EXPORT_SYMBOL(security_path_chmod);
285 int security_path_chown(struct path *path, kuid_t uid, kgid_t gid)
286 {
287 @@ -472,6 +477,7 @@ int security_path_chown(struct path *path, kuid_t uid, kgid_t gid)
288 return 0;
289 return security_ops->path_chown(path, uid, gid);
290 }
291 +EXPORT_SYMBOL(security_path_chown);
293 int security_path_chroot(struct path *path)
294 {
295 @@ -557,6 +563,7 @@ int security_inode_readlink(struct dentry *dentry)
296 return 0;
297 return security_ops->inode_readlink(dentry);
298 }
299 +EXPORT_SYMBOL(security_inode_readlink);
301 int security_inode_follow_link(struct dentry *dentry, struct nameidata *nd)
302 {
303 @@ -571,6 +578,7 @@ int security_inode_permission(struct inode *inode, int mask)
304 return 0;
305 return security_ops->inode_permission(inode, mask);
306 }
307 +EXPORT_SYMBOL(security_inode_permission);
309 int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
310 {
311 @@ -693,6 +701,7 @@ int security_file_permission(struct file *file, int mask)
313 return fsnotify_perm(file, mask);
314 }
315 +EXPORT_SYMBOL(security_file_permission);
317 int security_file_alloc(struct file *file)
318 {
319 @@ -753,6 +762,7 @@ int security_mmap_file(struct file *file, unsigned long prot,
320 return ret;
321 return ima_file_mmap(file, prot);
322 }
323 +EXPORT_SYMBOL(security_mmap_file);
325 int security_mmap_addr(unsigned long addr)
326 {