aufs6-standalone.patch 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245
  1. SPDX-License-Identifier: GPL-2.0
  2. aufs6.6.63 standalone patch
  3. diff --git a/fs/dcache.c b/fs/dcache.c
  4. index e2877ac9a1e6..f20b4ac29a1d 100644
  5. --- a/fs/dcache.c
  6. +++ b/fs/dcache.c
  7. @@ -1455,6 +1455,7 @@ void d_walk(struct dentry *parent, void *data,
  8. seq = 1;
  9. goto again;
  10. }
  11. +EXPORT_SYMBOL_GPL(d_walk);
  12. struct check_mount {
  13. struct vfsmount *mnt;
  14. @@ -3058,6 +3059,7 @@ void d_exchange(struct dentry *dentry1, struct dentry *dentry2)
  15. write_sequnlock(&rename_lock);
  16. }
  17. +EXPORT_SYMBOL_GPL(d_exchange);
  18. /**
  19. * d_ancestor - search for an ancestor
  20. diff --git a/fs/exec.c b/fs/exec.c
  21. index 7776209d98c1..372bbb606c38 100644
  22. --- a/fs/exec.c
  23. +++ b/fs/exec.c
  24. @@ -112,6 +112,7 @@ bool path_noexec(const struct path *path)
  25. return (path->mnt->mnt_flags & MNT_NOEXEC) ||
  26. (path->mnt->mnt_sb->s_iflags & SB_I_NOEXEC);
  27. }
  28. +EXPORT_SYMBOL_GPL(path_noexec);
  29. #ifdef CONFIG_USELIB
  30. /*
  31. diff --git a/fs/fcntl.c b/fs/fcntl.c
  32. index 1e44fc9b0f70..f5dd3c8b414e 100644
  33. --- a/fs/fcntl.c
  34. +++ b/fs/fcntl.c
  35. @@ -87,6 +87,7 @@ int setfl(int fd, struct file * filp, unsigned int arg)
  36. out:
  37. return error;
  38. }
  39. +EXPORT_SYMBOL_GPL(setfl);
  40. void __f_setown(struct file *filp, struct pid *pid, enum pid_type type,
  41. int force)
  42. diff --git a/fs/file_table.c b/fs/file_table.c
  43. index ee21b3da9d08..c45ac36795dd 100644
  44. --- a/fs/file_table.c
  45. +++ b/fs/file_table.c
  46. @@ -225,6 +225,7 @@ struct file *alloc_empty_file(int flags, const struct cred *cred)
  47. }
  48. return ERR_PTR(-ENFILE);
  49. }
  50. +EXPORT_SYMBOL_GPL(alloc_empty_file);
  51. /*
  52. * Variant of alloc_empty_file() that doesn't check and modify nr_files.
  53. diff --git a/fs/namespace.c b/fs/namespace.c
  54. index c9347fc5e14a..d47e357d65de 100644
  55. --- a/fs/namespace.c
  56. +++ b/fs/namespace.c
  57. @@ -466,6 +466,7 @@ void __mnt_drop_write(struct vfsmount *mnt)
  58. mnt_dec_writers(real_mount(mnt));
  59. preempt_enable();
  60. }
  61. +EXPORT_SYMBOL_GPL(__mnt_drop_write);
  62. /**
  63. * mnt_drop_write - give up write access to a mount
  64. @@ -877,6 +878,7 @@ int is_current_mnt_ns(struct vfsmount *mnt)
  65. {
  66. return check_mnt(real_mount(mnt));
  67. }
  68. +EXPORT_SYMBOL_GPL(is_current_mnt_ns);
  69. /*
  70. * vfsmount lock must be held for write
  71. @@ -2152,6 +2154,7 @@ int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg,
  72. }
  73. return 0;
  74. }
  75. +EXPORT_SYMBOL_GPL(iterate_mounts);
  76. static void lock_mnt_tree(struct mount *mnt)
  77. {
  78. diff --git a/fs/notify/group.c b/fs/notify/group.c
  79. index 1de6631a3925..3008eb37a18d 100644
  80. --- a/fs/notify/group.c
  81. +++ b/fs/notify/group.c
  82. @@ -100,6 +100,7 @@ void fsnotify_get_group(struct fsnotify_group *group)
  83. {
  84. refcount_inc(&group->refcnt);
  85. }
  86. +EXPORT_SYMBOL_GPL(fsnotify_get_group);
  87. /*
  88. * Drop a reference to a group. Free it if it's through.
  89. diff --git a/fs/open.c b/fs/open.c
  90. index f9ac703ec1b2..d5c83814332e 100644
  91. --- a/fs/open.c
  92. +++ b/fs/open.c
  93. @@ -67,6 +67,7 @@ int do_truncate(struct mnt_idmap *idmap, struct dentry *dentry,
  94. inode_unlock(dentry->d_inode);
  95. return ret;
  96. }
  97. +EXPORT_SYMBOL_GPL(do_truncate);
  98. long vfs_truncate(const struct path *path, loff_t length)
  99. {
  100. diff --git a/fs/read_write.c b/fs/read_write.c
  101. index 4771701c896b..c79270aba792 100644
  102. --- a/fs/read_write.c
  103. +++ b/fs/read_write.c
  104. @@ -477,6 +477,7 @@ ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos)
  105. inc_syscr(current);
  106. return ret;
  107. }
  108. +EXPORT_SYMBOL_GPL(vfs_read);
  109. static ssize_t new_sync_write(struct file *filp, const char __user *buf, size_t len, loff_t *ppos)
  110. {
  111. @@ -592,6 +593,7 @@ ssize_t vfs_write(struct file *file, const char __user *buf, size_t count, loff_
  112. file_end_write(file);
  113. return ret;
  114. }
  115. +EXPORT_SYMBOL_GPL(vfs_write);
  116. /* file_ppos returns &file->f_pos or NULL if file is stream */
  117. static inline loff_t *file_ppos(struct file *file)
  118. diff --git a/fs/splice.c b/fs/splice.c
  119. index 7216ef993b5f..7ce1f1bc4268 100644
  120. --- a/fs/splice.c
  121. +++ b/fs/splice.c
  122. @@ -932,6 +932,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
  123. return warn_unsupported(out, "write");
  124. return out->f_op->splice_write(pipe, out, ppos, len, flags);
  125. }
  126. +EXPORT_SYMBOL_GPL(do_splice_from);
  127. /*
  128. * Indicate to the caller that there was a premature EOF when reading from the
  129. diff --git a/fs/xattr.c b/fs/xattr.c
  130. index c20046548f21..1d66796705fb 100644
  131. --- a/fs/xattr.c
  132. +++ b/fs/xattr.c
  133. @@ -406,6 +406,7 @@ vfs_getxattr_alloc(struct mnt_idmap *idmap, struct dentry *dentry,
  134. *xattr_value = value;
  135. return error;
  136. }
  137. +EXPORT_SYMBOL_GPL(vfs_getxattr_alloc);
  138. ssize_t
  139. __vfs_getxattr(struct dentry *dentry, struct inode *inode, const char *name,
  140. diff --git a/kernel/locking/lockdep.c b/kernel/locking/lockdep.c
  141. index 64b9aedbe941..903a23230775 100644
  142. --- a/kernel/locking/lockdep.c
  143. +++ b/kernel/locking/lockdep.c
  144. @@ -239,6 +239,7 @@ inline struct lock_class *lockdep_hlock_class(struct held_lock *hlock)
  145. */
  146. return lock_classes + class_idx;
  147. }
  148. +EXPORT_SYMBOL_GPL(lockdep_hlock_class);
  149. #define hlock_class(hlock) lockdep_hlock_class(hlock)
  150. #ifdef CONFIG_LOCK_STAT
  151. diff --git a/kernel/task_work.c b/kernel/task_work.c
  152. index c969f1f26be5..68eb672f425d 100644
  153. --- a/kernel/task_work.c
  154. +++ b/kernel/task_work.c
  155. @@ -242,3 +242,4 @@ void task_work_run(void)
  156. } while (work);
  157. }
  158. }
  159. +EXPORT_SYMBOL_GPL(task_work_run);
  160. diff --git a/security/security.c b/security/security.c
  161. index b6144833c7a8..3b15e084ecc3 100644
  162. --- a/security/security.c
  163. +++ b/security/security.c
  164. @@ -1750,6 +1750,7 @@ int security_path_rmdir(const struct path *dir, struct dentry *dentry)
  165. return 0;
  166. return call_int_hook(path_rmdir, 0, dir, dentry);
  167. }
  168. +EXPORT_SYMBOL_GPL(security_path_rmdir);
  169. /**
  170. * security_path_unlink() - Check if removing a hard link is allowed
  171. @@ -1785,6 +1786,7 @@ int security_path_symlink(const struct path *dir, struct dentry *dentry,
  172. return 0;
  173. return call_int_hook(path_symlink, 0, dir, dentry, old_name);
  174. }
  175. +EXPORT_SYMBOL_GPL(security_path_symlink);
  176. /**
  177. * security_path_link - Check if creating a hard link is allowed
  178. @@ -1803,6 +1805,7 @@ int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
  179. return 0;
  180. return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry);
  181. }
  182. +EXPORT_SYMBOL_GPL(security_path_link);
  183. /**
  184. * security_path_rename() - Check if renaming a file is allowed
  185. @@ -1864,6 +1867,7 @@ int security_path_chmod(const struct path *path, umode_t mode)
  186. return 0;
  187. return call_int_hook(path_chmod, 0, path, mode);
  188. }
  189. +EXPORT_SYMBOL_GPL(security_path_chmod);
  190. /**
  191. * security_path_chown() - Check if changing the file's owner/group is allowed
  192. @@ -1881,6 +1885,7 @@ int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
  193. return 0;
  194. return call_int_hook(path_chown, 0, path, uid, gid);
  195. }
  196. +EXPORT_SYMBOL_GPL(security_path_chown);
  197. /**
  198. * security_path_chroot() - Check if changing the root directory is allowed
  199. @@ -2110,6 +2115,7 @@ int security_inode_permission(struct inode *inode, int mask)
  200. return 0;
  201. return call_int_hook(inode_permission, 0, inode, mask);
  202. }
  203. +EXPORT_SYMBOL_GPL(security_inode_permission);
  204. /**
  205. * security_inode_setattr() - Check if setting file attributes is allowed
  206. @@ -2588,6 +2594,7 @@ int security_file_permission(struct file *file, int mask)
  207. return fsnotify_perm(file, mask);
  208. }
  209. +EXPORT_SYMBOL_GPL(security_file_permission);
  210. /**
  211. * security_file_alloc() - Allocate and init a file's LSM blob
  212. @@ -2872,6 +2879,7 @@ int security_file_truncate(struct file *file)
  213. {
  214. return call_int_hook(file_truncate, 0, file);
  215. }
  216. +EXPORT_SYMBOL_GPL(security_file_truncate);
  217. /**
  218. * security_task_alloc() - Allocate a task's LSM blob