omap3-pandora-kernel: Add AUFS2 shim and keypad 'WIP' code.
[openpandora.oe.git] / recipes / linux / omap3-pandora-kernel / aufs2 / aufs2-standalone.patch
diff --git a/recipes/linux/omap3-pandora-kernel/aufs2/aufs2-standalone.patch b/recipes/linux/omap3-pandora-kernel/aufs2/aufs2-standalone.patch
new file mode 100644 (file)
index 0000000..c40db9e
--- /dev/null
@@ -0,0 +1,138 @@
+aufs2 standalone patch for linux-2.6.27
+
+diff --git a/fs/namei.c b/fs/namei.c
+index 2759ad4..b207821 100644
+--- a/fs/namei.c
++++ b/fs/namei.c
+@@ -354,6 +354,7 @@ int deny_write_access(struct file * file)
+       return 0;
+ }
++EXPORT_SYMBOL(deny_write_access);
+ /**
+  * path_get - get a reference to a path
+@@ -1250,6 +1251,7 @@ struct dentry *lookup_hash(struct nameidata *nd)
+               return ERR_PTR(err);
+       return __lookup_hash(&nd->last, nd->path.dentry, nd);
+ }
++EXPORT_SYMBOL(lookup_hash);
+ int __lookup_one_len(const char *name, struct qstr *this,
+               struct dentry *base, int len)
+@@ -1272,6 +1274,7 @@ int __lookup_one_len(const char *name, struct qstr *this,
+       this->hash = end_name_hash(hash);
+       return 0;
+ }
++EXPORT_SYMBOL(__lookup_one_len);
+ /**
+  * lookup_one_len - filesystem helper to lookup single pathname component
+diff --git a/fs/namespace.c b/fs/namespace.c
+index 6e283c9..36030e8 100644
+--- a/fs/namespace.c
++++ b/fs/namespace.c
+@@ -37,6 +37,7 @@
+ /* spinlock for vfsmount related operations, inplace of dcache_lock */
+ __cacheline_aligned_in_smp DEFINE_SPINLOCK(vfsmount_lock);
++EXPORT_SYMBOL(vfsmount_lock);
+ static int event;
+ static DEFINE_IDA(mnt_id_ida);
+diff --git a/fs/open.c b/fs/open.c
+index 07da935..b8e9726 100644
+--- a/fs/open.c
++++ b/fs/open.c
+@@ -222,6 +222,7 @@ int do_truncate(struct dentry *dentry, loff_t length, unsigned int time_attrs,
+       mutex_unlock(&dentry->d_inode->i_mutex);
+       return err;
+ }
++EXPORT_SYMBOL(do_truncate);
+ static long do_sys_truncate(const char __user *pathname, loff_t length)
+ {
+diff --git a/fs/splice.c b/fs/splice.c
+index 409245a..48d7e72 100644
+--- a/fs/splice.c
++++ b/fs/splice.c
+@@ -907,6 +907,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
+       return out->f_op->splice_write(pipe, out, ppos, len, flags);
+ }
++EXPORT_SYMBOL(do_splice_from);
+ /*
+  * Attempt to initiate a splice from a file to a pipe.
+@@ -929,6 +930,7 @@ long do_splice_to(struct file *in, loff_t *ppos,
+       return in->f_op->splice_read(in, ppos, pipe, len, flags);
+ }
++EXPORT_SYMBOL(do_splice_to);
+ /**
+  * splice_direct_to_actor - splices data directly between two non-pipes
+diff --git a/fs/super.c b/fs/super.c
+index e931ae9..141853c 100644
+--- a/fs/super.c
++++ b/fs/super.c
+@@ -270,6 +270,7 @@ int fsync_super(struct super_block *sb)
+       __fsync_super(sb);
+       return sync_blockdev(sb->s_bdev);
+ }
++EXPORT_SYMBOL(fsync_super);
+ /**
+  *    generic_shutdown_super  -       common helper for ->kill_sb()
+diff --git a/fs/sync.c b/fs/sync.c
+index 2967562..34040d6 100644
+--- a/fs/sync.c
++++ b/fs/sync.c
+@@ -104,6 +104,7 @@ long do_fsync(struct file *file, int datasync)
+ out:
+       return ret;
+ }
++EXPORT_SYMBOL(do_fsync);
+ static long __do_fsync(unsigned int fd, int datasync)
+ {
+diff --git a/security/device_cgroup.c b/security/device_cgroup.c
+index 46f2397..00ec611 100644
+--- a/security/device_cgroup.c
++++ b/security/device_cgroup.c
+@@ -537,6 +537,7 @@ acc_check:
+       return -EPERM;
+ }
++EXPORT_SYMBOL(devcgroup_inode_permission);
+ int devcgroup_inode_mknod(int mode, dev_t dev)
+ {
+diff --git a/security/security.c b/security/security.c
+index 3a4b4f5..79be80b 100644
+--- a/security/security.c
++++ b/security/security.c
+@@ -425,6 +425,7 @@ int security_inode_readlink(struct dentry *dentry)
+               return 0;
+       return security_ops->inode_readlink(dentry);
+ }
++EXPORT_SYMBOL(security_inode_readlink);
+ int security_inode_follow_link(struct dentry *dentry, struct nameidata *nd)
+ {
+@@ -439,6 +440,7 @@ int security_inode_permission(struct inode *inode, int mask)
+               return 0;
+       return security_ops->inode_permission(inode, mask);
+ }
++EXPORT_SYMBOL(security_inode_permission);
+ int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
+ {
+@@ -539,6 +541,7 @@ int security_file_permission(struct file *file, int mask)
+ {
+       return security_ops->file_permission(file, mask);
+ }
++EXPORT_SYMBOL(security_file_permission);
+ int security_file_alloc(struct file *file)
+ {