123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245 |
- SPDX-License-Identifier: GPL-2.0
- aufs6.6.63 standalone patch
- diff --git a/fs/dcache.c b/fs/dcache.c
- index e2877ac9a1e6..f20b4ac29a1d 100644
- --- a/fs/dcache.c
- +++ b/fs/dcache.c
- @@ -1455,6 +1455,7 @@ void d_walk(struct dentry *parent, void *data,
- seq = 1;
- goto again;
- }
- +EXPORT_SYMBOL_GPL(d_walk);
-
- struct check_mount {
- struct vfsmount *mnt;
- @@ -3058,6 +3059,7 @@ void d_exchange(struct dentry *dentry1, struct dentry *dentry2)
-
- write_sequnlock(&rename_lock);
- }
- +EXPORT_SYMBOL_GPL(d_exchange);
-
- /**
- * d_ancestor - search for an ancestor
- diff --git a/fs/exec.c b/fs/exec.c
- index 7776209d98c1..372bbb606c38 100644
- --- a/fs/exec.c
- +++ b/fs/exec.c
- @@ -112,6 +112,7 @@ bool path_noexec(const struct path *path)
- return (path->mnt->mnt_flags & MNT_NOEXEC) ||
- (path->mnt->mnt_sb->s_iflags & SB_I_NOEXEC);
- }
- +EXPORT_SYMBOL_GPL(path_noexec);
-
- #ifdef CONFIG_USELIB
- /*
- diff --git a/fs/fcntl.c b/fs/fcntl.c
- index 1e44fc9b0f70..f5dd3c8b414e 100644
- --- a/fs/fcntl.c
- +++ b/fs/fcntl.c
- @@ -87,6 +87,7 @@ int setfl(int fd, struct file * filp, unsigned int arg)
- out:
- return error;
- }
- +EXPORT_SYMBOL_GPL(setfl);
-
- void __f_setown(struct file *filp, struct pid *pid, enum pid_type type,
- int force)
- diff --git a/fs/file_table.c b/fs/file_table.c
- index ee21b3da9d08..c45ac36795dd 100644
- --- a/fs/file_table.c
- +++ b/fs/file_table.c
- @@ -225,6 +225,7 @@ struct file *alloc_empty_file(int flags, const struct cred *cred)
- }
- return ERR_PTR(-ENFILE);
- }
- +EXPORT_SYMBOL_GPL(alloc_empty_file);
-
- /*
- * Variant of alloc_empty_file() that doesn't check and modify nr_files.
- diff --git a/fs/namespace.c b/fs/namespace.c
- index c9347fc5e14a..d47e357d65de 100644
- --- a/fs/namespace.c
- +++ b/fs/namespace.c
- @@ -466,6 +466,7 @@ void __mnt_drop_write(struct vfsmount *mnt)
- mnt_dec_writers(real_mount(mnt));
- preempt_enable();
- }
- +EXPORT_SYMBOL_GPL(__mnt_drop_write);
-
- /**
- * mnt_drop_write - give up write access to a mount
- @@ -877,6 +878,7 @@ int is_current_mnt_ns(struct vfsmount *mnt)
- {
- return check_mnt(real_mount(mnt));
- }
- +EXPORT_SYMBOL_GPL(is_current_mnt_ns);
-
- /*
- * vfsmount lock must be held for write
- @@ -2152,6 +2154,7 @@ int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg,
- }
- return 0;
- }
- +EXPORT_SYMBOL_GPL(iterate_mounts);
-
- static void lock_mnt_tree(struct mount *mnt)
- {
- diff --git a/fs/notify/group.c b/fs/notify/group.c
- index 1de6631a3925..3008eb37a18d 100644
- --- a/fs/notify/group.c
- +++ b/fs/notify/group.c
- @@ -100,6 +100,7 @@ void fsnotify_get_group(struct fsnotify_group *group)
- {
- refcount_inc(&group->refcnt);
- }
- +EXPORT_SYMBOL_GPL(fsnotify_get_group);
-
- /*
- * Drop a reference to a group. Free it if it's through.
- diff --git a/fs/open.c b/fs/open.c
- index f9ac703ec1b2..d5c83814332e 100644
- --- a/fs/open.c
- +++ b/fs/open.c
- @@ -67,6 +67,7 @@ int do_truncate(struct mnt_idmap *idmap, struct dentry *dentry,
- inode_unlock(dentry->d_inode);
- return ret;
- }
- +EXPORT_SYMBOL_GPL(do_truncate);
-
- long vfs_truncate(const struct path *path, loff_t length)
- {
- diff --git a/fs/read_write.c b/fs/read_write.c
- index 4771701c896b..c79270aba792 100644
- --- a/fs/read_write.c
- +++ b/fs/read_write.c
- @@ -477,6 +477,7 @@ ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos)
- inc_syscr(current);
- return ret;
- }
- +EXPORT_SYMBOL_GPL(vfs_read);
-
- static ssize_t new_sync_write(struct file *filp, const char __user *buf, size_t len, loff_t *ppos)
- {
- @@ -592,6 +593,7 @@ ssize_t vfs_write(struct file *file, const char __user *buf, size_t count, loff_
- file_end_write(file);
- return ret;
- }
- +EXPORT_SYMBOL_GPL(vfs_write);
-
- /* file_ppos returns &file->f_pos or NULL if file is stream */
- static inline loff_t *file_ppos(struct file *file)
- diff --git a/fs/splice.c b/fs/splice.c
- index 7216ef993b5f..7ce1f1bc4268 100644
- --- a/fs/splice.c
- +++ b/fs/splice.c
- @@ -932,6 +932,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
- return warn_unsupported(out, "write");
- return out->f_op->splice_write(pipe, out, ppos, len, flags);
- }
- +EXPORT_SYMBOL_GPL(do_splice_from);
-
- /*
- * Indicate to the caller that there was a premature EOF when reading from the
- diff --git a/fs/xattr.c b/fs/xattr.c
- index c20046548f21..1d66796705fb 100644
- --- a/fs/xattr.c
- +++ b/fs/xattr.c
- @@ -406,6 +406,7 @@ vfs_getxattr_alloc(struct mnt_idmap *idmap, struct dentry *dentry,
- *xattr_value = value;
- return error;
- }
- +EXPORT_SYMBOL_GPL(vfs_getxattr_alloc);
-
- ssize_t
- __vfs_getxattr(struct dentry *dentry, struct inode *inode, const char *name,
- diff --git a/kernel/locking/lockdep.c b/kernel/locking/lockdep.c
- index 64b9aedbe941..903a23230775 100644
- --- a/kernel/locking/lockdep.c
- +++ b/kernel/locking/lockdep.c
- @@ -239,6 +239,7 @@ inline struct lock_class *lockdep_hlock_class(struct held_lock *hlock)
- */
- return lock_classes + class_idx;
- }
- +EXPORT_SYMBOL_GPL(lockdep_hlock_class);
- #define hlock_class(hlock) lockdep_hlock_class(hlock)
-
- #ifdef CONFIG_LOCK_STAT
- diff --git a/kernel/task_work.c b/kernel/task_work.c
- index c969f1f26be5..68eb672f425d 100644
- --- a/kernel/task_work.c
- +++ b/kernel/task_work.c
- @@ -242,3 +242,4 @@ void task_work_run(void)
- } while (work);
- }
- }
- +EXPORT_SYMBOL_GPL(task_work_run);
- diff --git a/security/security.c b/security/security.c
- index b6144833c7a8..3b15e084ecc3 100644
- --- a/security/security.c
- +++ b/security/security.c
- @@ -1750,6 +1750,7 @@ int security_path_rmdir(const struct path *dir, struct dentry *dentry)
- return 0;
- return call_int_hook(path_rmdir, 0, dir, dentry);
- }
- +EXPORT_SYMBOL_GPL(security_path_rmdir);
-
- /**
- * security_path_unlink() - Check if removing a hard link is allowed
- @@ -1785,6 +1786,7 @@ int security_path_symlink(const struct path *dir, struct dentry *dentry,
- return 0;
- return call_int_hook(path_symlink, 0, dir, dentry, old_name);
- }
- +EXPORT_SYMBOL_GPL(security_path_symlink);
-
- /**
- * security_path_link - Check if creating a hard link is allowed
- @@ -1803,6 +1805,7 @@ int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
- return 0;
- return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry);
- }
- +EXPORT_SYMBOL_GPL(security_path_link);
-
- /**
- * security_path_rename() - Check if renaming a file is allowed
- @@ -1864,6 +1867,7 @@ int security_path_chmod(const struct path *path, umode_t mode)
- return 0;
- return call_int_hook(path_chmod, 0, path, mode);
- }
- +EXPORT_SYMBOL_GPL(security_path_chmod);
-
- /**
- * security_path_chown() - Check if changing the file's owner/group is allowed
- @@ -1881,6 +1885,7 @@ int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
- return 0;
- return call_int_hook(path_chown, 0, path, uid, gid);
- }
- +EXPORT_SYMBOL_GPL(security_path_chown);
-
- /**
- * security_path_chroot() - Check if changing the root directory is allowed
- @@ -2110,6 +2115,7 @@ int security_inode_permission(struct inode *inode, int mask)
- return 0;
- return call_int_hook(inode_permission, 0, inode, mask);
- }
- +EXPORT_SYMBOL_GPL(security_inode_permission);
-
- /**
- * security_inode_setattr() - Check if setting file attributes is allowed
- @@ -2588,6 +2594,7 @@ int security_file_permission(struct file *file, int mask)
-
- return fsnotify_perm(file, mask);
- }
- +EXPORT_SYMBOL_GPL(security_file_permission);
-
- /**
- * security_file_alloc() - Allocate and init a file's LSM blob
- @@ -2872,6 +2879,7 @@ int security_file_truncate(struct file *file)
- {
- return call_int_hook(file_truncate, 0, file);
- }
- +EXPORT_SYMBOL_GPL(security_file_truncate);
-
- /**
- * security_task_alloc() - Allocate a task's LSM blob
|