Updated to version 5.3.1

This commit is contained in:
Evgenii Shatokhin 2019-09-24 11:56:44 +03:00
parent 17e88f1815
commit 4ca3b2aeb5
6 changed files with 1762 additions and 1129 deletions

View file

@ -1,3 +1,3 @@
sources:
linux-5.2.tar.xz: 872edeb5080f3f6a8154fa54a79fe868ed19f6dd
patch-5.2.14.xz: 08b39baaa2d8368b2b4cbb392458d166f1ce9ea3
linux-5.3.tar.xz: 988855d1fee4eb12495a5b3602e2f3471623ec3e
patch-5.3.1.xz: bd8e57aee3e886edb8bc892956d6d55842451a97

View file

@ -1,8 +1,8 @@
diff --git a/Makefile b/Makefile
index b1152cd20359..0beac65f7adf 100644
index 2b600604e4b7..c8ac7b9cf35b 100644
--- a/Makefile
+++ b/Makefile
@@ -1108,8 +1108,7 @@ include/config/kernel.release: FORCE
@@ -1120,8 +1120,7 @@ include/config/kernel.release: FORCE
# Carefully list dependencies so we do not try to build scripts twice
# in parallel
PHONY += scripts
@ -12,7 +12,7 @@ index b1152cd20359..0beac65f7adf 100644
# Things we need to do before we recursively start building the kernel
# or the modules are listed in "prepare".
@@ -1145,7 +1144,7 @@ prepare0: archprepare
@@ -1154,7 +1153,7 @@ prepare0: archprepare
$(Q)$(MAKE) $(build)=.
# All the preparing..
@ -21,23 +21,23 @@ index b1152cd20359..0beac65f7adf 100644
# Support for using generic headers in asm-generic
asm-generic := -f $(srctree)/scripts/Makefile.asm-generic obj
@@ -1389,13 +1388,8 @@ CLEAN_DIRS += $(MODVERDIR) include/ksym
@@ -1409,13 +1408,8 @@ CLEAN_DIRS += include/ksym
CLEAN_FILES += modules.builtin.modinfo
# Directories & files removed with 'make mrproper'
-MRPROPER_DIRS += include/config usr/include include/generated \
-MRPROPER_DIRS += include/config include/generated \
- arch/$(SRCARCH)/include/generated .tmp_objdiff
-MRPROPER_FILES += .config .config.old .version \
- Module.symvers tags TAGS cscope* GPATH GTAGS GRTAGS GSYMS \
- Module.symvers \
- signing_key.pem signing_key.priv signing_key.x509 \
- x509.genkey extra_certificates signing_key.x509.keyid \
- signing_key.x509.signer vmlinux-gdb.py
+MRPROPER_DIRS += ""
+MRPROPER_FILES += ""
# clean - Delete most, but leave enough to build external modules
#
@@ -1417,13 +1411,10 @@ clean: archclean vmlinuxclean
# Directories & files removed with 'make distclean'
DISTCLEAN_DIRS +=
@@ -1441,13 +1435,10 @@ clean: archclean vmlinuxclean
#
mrproper: rm-dirs := $(wildcard $(MRPROPER_DIRS))
mrproper: rm-files := $(wildcard $(MRPROPER_FILES))
@ -54,10 +54,10 @@ index b1152cd20359..0beac65f7adf 100644
$(call cmd,rmfiles)
diff --git a/scripts/kconfig/Makefile b/scripts/kconfig/Makefile
index 3f327e21f60e..b849a171efbb 100644
index 7656e1137b6b..ebb4d0caacab 100644
--- a/scripts/kconfig/Makefile
+++ b/scripts/kconfig/Makefile
@@ -20,19 +20,14 @@ endif
@@ -24,19 +24,14 @@ endif
unexport CONFIG_
xconfig: $(obj)/qconf
@ -77,7 +77,7 @@ index 3f327e21f60e..b849a171efbb 100644
build_menuconfig: $(obj)/mconf
@@ -48,11 +43,9 @@ localyesconfig localmodconfig: $(obj)/conf
@@ -52,11 +47,9 @@ localyesconfig localmodconfig: $(obj)/conf
cmp -s .tmp.config .config || \
(mv -f .config .config.old.1; \
mv -f .tmp.config .config; \
@ -89,7 +89,7 @@ index 3f327e21f60e..b849a171efbb 100644
fi
$(Q)rm -f .tmp.config
@@ -66,26 +59,14 @@ simple-targets := oldconfig allnoconfig allyesconfig allmodconfig \
@@ -70,24 +63,14 @@ simple-targets := oldconfig allnoconfig allyesconfig allmodconfig \
PHONY += $(simple-targets)
$(simple-targets): $(obj)/conf
@ -101,9 +101,7 @@ index 3f327e21f60e..b849a171efbb 100644
- $< $(silent) --$@=defconfig $(Kconfig)
defconfig: $(obj)/conf
-ifeq ($(KBUILD_DEFCONFIG),)
- $< $(silent) --defconfig $(Kconfig)
-else ifneq ($(wildcard $(srctree)/arch/$(SRCARCH)/configs/$(KBUILD_DEFCONFIG)),)
-ifneq ($(wildcard $(srctree)/arch/$(SRCARCH)/configs/$(KBUILD_DEFCONFIG)),)
- @$(kecho) "*** Default configuration is based on '$(KBUILD_DEFCONFIG)'"
- $(Q)$< $(silent) --defconfig=arch/$(SRCARCH)/configs/$(KBUILD_DEFCONFIG) $(Kconfig)
-else

View file

@ -1929,10 +1929,10 @@ index 000000000000..13e8583f2b91
+Currently this approach is applied to address_space_operations for
+regular files only.
diff --git a/MAINTAINERS b/MAINTAINERS
index 677ef41cb012..c2a7491ddc68 100644
index a50e97a63bc8..bd7c76319a85 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -2769,6 +2769,19 @@ F: include/linux/audit.h
@@ -2822,6 +2822,19 @@ F: include/linux/audit.h
F: include/uapi/linux/audit.h
F: kernel/audit*
@ -1953,10 +1953,10 @@ index 677ef41cb012..c2a7491ddc68 100644
M: Miguel Ojeda Sandonis <miguel.ojeda.sandonis@gmail.com>
S: Maintained
diff --git a/drivers/block/loop.c b/drivers/block/loop.c
index f11b7dc16e9d..1b723737592b 100644
index ab7ca5989097..80d06084b043 100644
--- a/drivers/block/loop.c
+++ b/drivers/block/loop.c
@@ -746,6 +746,24 @@ static int loop_change_fd(struct loop_device *lo, struct block_device *bdev,
@@ -738,6 +738,24 @@ static int loop_change_fd(struct loop_device *lo, struct block_device *bdev,
return error;
}
@ -1994,7 +1994,7 @@ index bfb1c6095c7a..bddba5bb307e 100644
endif # MISC_FILESYSTEMS
diff --git a/fs/Makefile b/fs/Makefile
index c9aea23aba56..57c6f47b0185 100644
index d60089fd689b..924c16a40b00 100644
--- a/fs/Makefile
+++ b/fs/Makefile
@@ -130,3 +130,4 @@ obj-$(CONFIG_F2FS_FS) += f2fs/
@ -2329,10 +2329,10 @@ index 000000000000..a62a85211b88
+#endif /* __AUFS_H__ */
diff --git a/fs/aufs/branch.c b/fs/aufs/branch.c
new file mode 100644
index 000000000000..fb388a049940
index 000000000000..608bf76f8f21
--- /dev/null
+++ b/fs/aufs/branch.c
@@ -0,0 +1,1423 @@
@@ -0,0 +1,1428 @@
+// SPDX-License-Identifier: GPL-2.0
+/*
+ * Copyright (C) 2005-2019 Junjiro R. Okajima
@ -3553,6 +3553,7 @@ index 000000000000..fb388a049940
+ unsigned char verbose, writer;
+ struct file *file, *hf, **array;
+ struct au_hfile *hfile;
+ struct inode *h_inode;
+
+ mnt_flags = au_mntflags(sb);
+ verbose = !!au_opt_test(mnt_flags, VERBOSE);
@ -3623,8 +3624,12 @@ index 000000000000..fb388a049940
+ hf->f_mode &= ~(FMODE_WRITE | FMODE_WRITER);
+ spin_unlock(&hf->f_lock);
+ if (writer) {
+ put_write_access(file_inode(hf));
+ h_inode = file_inode(hf);
+ put_write_access(h_inode);
+ __mnt_drop_write(hf->f_path.mnt);
+ if ((hf->f_mode & (FMODE_READ | FMODE_WRITE))
+ == FMODE_READ)
+ i_readcount_inc(h_inode);
+ }
+ }
+
@ -17256,10 +17261,10 @@ index 000000000000..2e7c2cdb8202
+}
diff --git a/fs/aufs/i_op.c b/fs/aufs/i_op.c
new file mode 100644
index 000000000000..4f5001ebd0f4
index 000000000000..ef1e08c7ca10
--- /dev/null
+++ b/fs/aufs/i_op.c
@@ -0,0 +1,1507 @@
@@ -0,0 +1,1505 @@
+// SPDX-License-Identifier: GPL-2.0
+/*
+ * Copyright (C) 2005-2019 Junjiro R. Okajima
@ -17902,9 +17907,7 @@ index 000000000000..4f5001ebd0f4
+
+static void au_pin_hdir_set_owner(struct au_pin *p, struct task_struct *task)
+{
+#if !defined(CONFIG_RWSEM_GENERIC_SPINLOCK) && defined(CONFIG_RWSEM_SPIN_ON_OWNER)
+ p->hdir->hi_inode->i_rwsem.owner = task;
+#endif
+ atomic_long_set(&p->hdir->hi_inode->i_rwsem.owner, (long)task);
+}
+
+void au_pin_hdir_acquire_nest(struct au_pin *p)
@ -24850,10 +24853,10 @@ index 000000000000..cbac849ead31
+}
diff --git a/fs/aufs/opts.c b/fs/aufs/opts.c
new file mode 100644
index 000000000000..c92ca14574ff
index 000000000000..77e17d7b3bdf
--- /dev/null
+++ b/fs/aufs/opts.c
@@ -0,0 +1,1877 @@
@@ -0,0 +1,1880 @@
+// SPDX-License-Identifier: GPL-2.0
+/*
+ * Copyright (C) 2005-2019 Junjiro R. Okajima
@ -26242,6 +26245,7 @@ index 000000000000..c92ca14574ff
+ case Opt_wsum:
+ au_opt_clr(sbinfo->si_mntflags, SUM);
+ au_opt_set(sbinfo->si_mntflags, SUM_W);
+ break;
+ case Opt_nosum:
+ au_opt_clr(sbinfo->si_mntflags, SUM);
+ au_opt_clr(sbinfo->si_mntflags, SUM_W);
@ -26367,8 +26371,10 @@ index 000000000000..c92ca14574ff
+ if (opt->add.bindex < 0)
+ opt->add.bindex = 0;
+ goto add;
+ /* Always goto add, not fallthrough */
+ case Opt_prepend:
+ opt->add.bindex = 0;
+ /* fallthrough */
+ add: /* indented label */
+ case Opt_add:
+ err = au_br_add(sb, &opt->add,
@ -38010,10 +38016,10 @@ index 000000000000..35ea33469d36
+ return err;
+}
diff --git a/fs/dcache.c b/fs/dcache.c
index c435398f2c81..3fc74e471924 100644
index e88cf0554e65..00d7e6a08026 100644
--- a/fs/dcache.c
+++ b/fs/dcache.c
@@ -1247,7 +1247,7 @@ enum d_walk_ret {
@@ -1264,7 +1264,7 @@ enum d_walk_ret {
*
* The @enter() callbacks are called with d_lock held.
*/
@ -38022,7 +38028,7 @@ index c435398f2c81..3fc74e471924 100644
enum d_walk_ret (*enter)(void *, struct dentry *))
{
struct dentry *this_parent;
@@ -1352,6 +1352,7 @@ static void d_walk(struct dentry *parent, void *data,
@@ -1369,6 +1369,7 @@ static void d_walk(struct dentry *parent, void *data,
seq = 1;
goto again;
}
@ -38030,7 +38036,7 @@ index c435398f2c81..3fc74e471924 100644
struct check_mount {
struct vfsmount *mnt;
@@ -2850,6 +2851,7 @@ void d_exchange(struct dentry *dentry1, struct dentry *dentry2)
@@ -2914,6 +2915,7 @@ void d_exchange(struct dentry *dentry1, struct dentry *dentry2)
write_sequnlock(&rename_lock);
}
@ -38039,7 +38045,7 @@ index c435398f2c81..3fc74e471924 100644
/**
* d_ancestor - search for an ancestor
diff --git a/fs/exec.c b/fs/exec.c
index 39902cc9eb6f..ed8f4957a4a6 100644
index f7f6a140856a..1a740f3c42ba 100644
--- a/fs/exec.c
+++ b/fs/exec.c
@@ -110,6 +110,7 @@ bool path_noexec(const struct path *path)
@ -38109,7 +38115,7 @@ index b07b53f24ff5..34b9bbf4c556 100644
void __init files_init(void)
{
diff --git a/fs/inode.c b/fs/inode.c
index 2bf21e2c90fc..c8f1c0d3c34d 100644
index 0f1e3b563c47..7432b8a81c53 100644
--- a/fs/inode.c
+++ b/fs/inode.c
@@ -882,6 +882,8 @@ unsigned int get_next_ino(void)
@ -38148,10 +38154,10 @@ index 2bf21e2c90fc..c8f1c0d3c34d 100644
/**
* touch_atime - update the access time
diff --git a/fs/namespace.c b/fs/namespace.c
index 6fbc9126367a..6cb11bd6ff9a 100644
index d28d30b13043..2b64af58b643 100644
--- a/fs/namespace.c
+++ b/fs/namespace.c
@@ -436,6 +436,7 @@ void __mnt_drop_write(struct vfsmount *mnt)
@@ -431,6 +431,7 @@ void __mnt_drop_write(struct vfsmount *mnt)
mnt_dec_writers(real_mount(mnt));
preempt_enable();
}
@ -38159,7 +38165,7 @@ index 6fbc9126367a..6cb11bd6ff9a 100644
/**
* mnt_drop_write - give up write access to a mount
@@ -770,6 +771,13 @@ static inline int check_mnt(struct mount *mnt)
@@ -776,6 +777,13 @@ static inline int check_mnt(struct mount *mnt)
return mnt->mnt_ns == current->nsproxy->mnt_ns;
}
@ -38173,7 +38179,7 @@ index 6fbc9126367a..6cb11bd6ff9a 100644
/*
* vfsmount lock must be held for write
*/
@@ -1902,6 +1910,7 @@ int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg,
@@ -1894,6 +1902,7 @@ int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg,
}
return 0;
}
@ -38258,10 +38264,10 @@ index a59abe3c669a..78809163ba03 100644
long vfs_truncate(const struct path *path, loff_t length)
{
diff --git a/fs/proc/base.c b/fs/proc/base.c
index e781af70d10d..97aee11aee79 100644
index ebea9501afb8..dc7edc5f7267 100644
--- a/fs/proc/base.c
+++ b/fs/proc/base.c
@@ -2038,7 +2038,7 @@ static int map_files_get_link(struct dentry *dentry, struct path *path)
@@ -2037,7 +2037,7 @@ static int map_files_get_link(struct dentry *dentry, struct path *path)
rc = -ENOENT;
vma = find_exact_vma(mm, vm_start, vm_end);
if (vma && vma->vm_file) {
@ -38287,7 +38293,7 @@ index 14c2badb8fd9..65afe5287e43 100644
ino = inode->i_ino;
}
diff --git a/fs/proc/task_mmu.c b/fs/proc/task_mmu.c
index 7f84d1477b5b..3d9ee997b3d0 100644
index 731642e0f5a0..e8d6259de65b 100644
--- a/fs/proc/task_mmu.c
+++ b/fs/proc/task_mmu.c
@@ -309,7 +309,10 @@ show_map_vma(struct seq_file *m, struct vm_area_struct *vma)
@ -38302,7 +38308,7 @@ index 7f84d1477b5b..3d9ee997b3d0 100644
dev = inode->i_sb->s_dev;
ino = inode->i_ino;
pgoff = ((loff_t)vma->vm_pgoff) << PAGE_SHIFT;
@@ -1774,7 +1777,7 @@ static int show_numa_map(struct seq_file *m, void *v)
@@ -1807,7 +1810,7 @@ static int show_numa_map(struct seq_file *m, void *v)
struct proc_maps_private *proc_priv = &numa_priv->proc_maps;
struct vm_area_struct *vma = v;
struct numa_maps *md = &numa_priv->md;
@ -38328,7 +38334,7 @@ index 7907e6419e57..d17209cf52bc 100644
ino = inode->i_ino;
pgoff = (loff_t)vma->vm_pgoff << PAGE_SHIFT;
diff --git a/fs/read_write.c b/fs/read_write.c
index c543d965e288..9da238d64ea4 100644
index 5bbf587f5bc1..5b2dbddb0efe 100644
--- a/fs/read_write.c
+++ b/fs/read_write.c
@@ -468,6 +468,7 @@ ssize_t vfs_read(struct file *file, char __user *buf, size_t count, loff_t *pos)
@ -38379,7 +38385,7 @@ index c543d965e288..9da238d64ea4 100644
/* file_ppos returns &file->f_pos or NULL if file is stream */
static inline loff_t *file_ppos(struct file *file)
diff --git a/fs/splice.c b/fs/splice.c
index 14cb602d9a2f..4fe4afa7f6b1 100644
index 98412721f056..0a1f7498c22b 100644
--- a/fs/splice.c
+++ b/fs/splice.c
@@ -834,8 +834,8 @@ EXPORT_SYMBOL(generic_splice_sendpage);
@ -38453,10 +38459,10 @@ index 90dd78f0eb27..40b01dd1b14a 100644
ssize_t
__vfs_getxattr(struct dentry *dentry, struct inode *inode, const char *name,
diff --git a/include/linux/fs.h b/include/linux/fs.h
index 79fec8a8413f..363bd32c0466 100644
index 997a530ff4e9..3dbec51c2037 100644
--- a/include/linux/fs.h
+++ b/include/linux/fs.h
@@ -1333,6 +1333,7 @@ extern void fasync_free(struct fasync_struct *);
@@ -1331,6 +1331,7 @@ extern void fasync_free(struct fasync_struct *);
/* can be called from interrupts */
extern void kill_fasync(struct fasync_struct **, int, int);
@ -38464,7 +38470,7 @@ index 79fec8a8413f..363bd32c0466 100644
extern void __f_setown(struct file *filp, struct pid *, enum pid_type, int force);
extern int f_setown(struct file *filp, unsigned long arg, int force);
extern void f_delown(struct file *filp);
@@ -1812,6 +1813,7 @@ struct file_operations {
@@ -1810,6 +1811,7 @@ struct file_operations {
ssize_t (*sendpage) (struct file *, struct page *, int, size_t, loff_t *, int);
unsigned long (*get_unmapped_area)(struct file *, unsigned long, unsigned long, unsigned long, unsigned long);
int (*check_flags)(int);
@ -38472,7 +38478,7 @@ index 79fec8a8413f..363bd32c0466 100644
int (*flock) (struct file *, int, struct file_lock *);
ssize_t (*splice_write)(struct pipe_inode_info *, struct file *, loff_t *, size_t, unsigned int);
ssize_t (*splice_read)(struct file *, loff_t *, struct pipe_inode_info *, size_t, unsigned int);
@@ -1882,6 +1884,12 @@ ssize_t rw_copy_check_uvector(int type, const struct iovec __user * uvector,
@@ -1880,6 +1882,12 @@ ssize_t rw_copy_check_uvector(int type, const struct iovec __user * uvector,
struct iovec *fast_pointer,
struct iovec **ret_pointer);
@ -38485,7 +38491,7 @@ index 79fec8a8413f..363bd32c0466 100644
extern ssize_t __vfs_read(struct file *, char __user *, size_t, loff_t *);
extern ssize_t vfs_read(struct file *, char __user *, size_t, loff_t *);
extern ssize_t vfs_write(struct file *, const char __user *, size_t, loff_t *);
@@ -2315,6 +2323,7 @@ extern int current_umask(void);
@@ -2298,6 +2306,7 @@ extern int current_umask(void);
extern void ihold(struct inode * inode);
extern void iput(struct inode *);
extern int generic_update_time(struct inode *, struct timespec64 *, int);
@ -38493,7 +38499,7 @@ index 79fec8a8413f..363bd32c0466 100644
/* /sys/fs */
extern struct kobject *fs_kobj;
@@ -2603,6 +2612,7 @@ static inline bool sb_is_blkdev_sb(struct super_block *sb)
@@ -2586,6 +2595,7 @@ static inline bool sb_is_blkdev_sb(struct super_block *sb)
return false;
}
#endif
@ -38502,10 +38508,10 @@ index 79fec8a8413f..363bd32c0466 100644
extern const struct file_operations def_blk_fops;
extern const struct file_operations def_chr_fops;
diff --git a/include/linux/lockdep.h b/include/linux/lockdep.h
index 6e2377e6c1d6..5a945d18a72a 100644
index 0b0d7259276d..12d18e180348 100644
--- a/include/linux/lockdep.h
+++ b/include/linux/lockdep.h
@@ -325,6 +325,8 @@ static inline int lockdep_match_key(struct lockdep_map *lock,
@@ -334,6 +334,8 @@ static inline int lockdep_match_key(struct lockdep_map *lock,
return lock->key == key;
}
@ -38514,7 +38520,7 @@ index 6e2377e6c1d6..5a945d18a72a 100644
/*
* Acquire a lock.
*
@@ -463,6 +465,7 @@ struct lockdep_map { };
@@ -476,6 +478,7 @@ struct lockdep_map { };
#define lockdep_depth(tsk) (0)
@ -38523,10 +38529,10 @@ index 6e2377e6c1d6..5a945d18a72a 100644
#define lockdep_assert_held(l) do { (void)(l); } while (0)
diff --git a/include/linux/mm.h b/include/linux/mm.h
index 0a6dae2f2b84..dd74bb1d1f51 100644
index 0334ca97c584..3bdae823daee 100644
--- a/include/linux/mm.h
+++ b/include/linux/mm.h
@@ -1558,6 +1558,28 @@ static inline void unmap_shared_mapping_range(struct address_space *mapping,
@@ -1538,6 +1538,28 @@ static inline void unmap_shared_mapping_range(struct address_space *mapping,
unmap_mapping_range(mapping, holebegin, holelen, 0);
}
@ -38556,10 +38562,10 @@ index 0a6dae2f2b84..dd74bb1d1f51 100644
void *buf, int len, unsigned int gup_flags);
extern int access_remote_vm(struct mm_struct *mm, unsigned long addr,
diff --git a/include/linux/mm_types.h b/include/linux/mm_types.h
index 8ec38b11b361..d3f5492a2611 100644
index 6a7a1083b6fb..461db8843e32 100644
--- a/include/linux/mm_types.h
+++ b/include/linux/mm_types.h
@@ -253,6 +253,7 @@ struct vm_region {
@@ -262,6 +262,7 @@ struct vm_region {
unsigned long vm_top; /* region allocated to here */
unsigned long vm_pgoff; /* the offset in vm_file corresponding to vm_start */
struct file *vm_file; /* the backing file or NULL */
@ -38567,14 +38573,14 @@ index 8ec38b11b361..d3f5492a2611 100644
int vm_usage; /* region usage count (access under nommu_region_sem) */
bool vm_icache_flushed : 1; /* true if the icache has been flushed for
@@ -327,6 +328,7 @@ struct vm_area_struct {
@@ -336,6 +337,7 @@ struct vm_area_struct {
unsigned long vm_pgoff; /* Offset (within vm_file) in PAGE_SIZE
units */
struct file * vm_file; /* File we map to (can be NULL). */
+ struct file *vm_prfile; /* shadow of vm_file */
void * vm_private_data; /* was vm_pte (shared mem) */
atomic_long_t swap_readahead_info;
#ifdef CONFIG_SWAP
diff --git a/include/linux/mnt_namespace.h b/include/linux/mnt_namespace.h
index 35942084cd40..24f5fd1a789d 100644
--- a/include/linux/mnt_namespace.h
@ -38611,11 +38617,11 @@ index 74b4911ac16d..19789fbea567 100644
#endif
diff --git a/include/uapi/linux/aufs_type.h b/include/uapi/linux/aufs_type.h
new file mode 100644
index 000000000000..4e16fdc205d6
index 000000000000..f5c1150463a1
--- /dev/null
+++ b/include/uapi/linux/aufs_type.h
@@ -0,0 +1,448 @@
+/* SPDX-License-Identifier: GPL-2.0 */
@@ -0,0 +1,452 @@
+/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
+/*
+ * Copyright (C) 2005-2019 Junjiro R. Okajima
+ *
@ -38657,7 +38663,7 @@ index 000000000000..4e16fdc205d6
+
+#include <linux/limits.h>
+
+#define AUFS_VERSION "5.2-20190715"
+#define AUFS_VERSION "5.3-20190923"
+
+/* todo? move this to linux-2.6.19/include/magic.h */
+#define AUFS_SUPER_MAGIC ('a' << 24 | 'u' << 16 | 'f' << 8 | 's')
@ -38871,7 +38877,11 @@ index 000000000000..4e16fdc205d6
+
+/* borrowed from linux/include/linux/kernel.h */
+#ifndef ALIGN
+#ifdef _GNU_SOURCE
+#define ALIGN(x, a) __ALIGN_MASK(x, (typeof(x))(a)-1)
+#else
+#define ALIGN(x, a) (((x) + (a) - 1) & ~((a) - 1))
+#endif
+#define __ALIGN_MASK(x, mask) (((x)+(mask))&~(mask))
+#endif
+
@ -39064,7 +39074,7 @@ index 000000000000..4e16fdc205d6
+
+#endif /* __AUFS_TYPE_H__ */
diff --git a/kernel/fork.c b/kernel/fork.c
index d3f006ed2f9d..e4478e2f1c08 100644
index 541fd805fb88..3208fcf3b3c9 100644
--- a/kernel/fork.c
+++ b/kernel/fork.c
@@ -553,7 +553,7 @@ static __latent_entropy int dup_mmap(struct mm_struct *mm,
@ -39077,21 +39087,21 @@ index d3f006ed2f9d..e4478e2f1c08 100644
atomic_dec(&inode->i_writecount);
i_mmap_lock_write(mapping);
diff --git a/kernel/locking/lockdep.c b/kernel/locking/lockdep.c
index dbc936ccf149..4fc8dc30cec0 100644
index 4861cf8e274b..739d1c8a81f5 100644
--- a/kernel/locking/lockdep.c
+++ b/kernel/locking/lockdep.c
@@ -152,7 +152,7 @@ static
#endif
@@ -153,7 +153,7 @@ static
struct lock_class lock_classes[MAX_LOCKDEP_KEYS];
static DECLARE_BITMAP(lock_classes_in_use, MAX_LOCKDEP_KEYS);
-static inline struct lock_class *hlock_class(struct held_lock *hlock)
+inline struct lock_class *lockdep_hlock_class(struct held_lock *hlock)
{
if (!hlock->class_idx) {
/*
@@ -163,6 +163,8 @@ static inline struct lock_class *hlock_class(struct held_lock *hlock)
}
return lock_classes + hlock->class_idx - 1;
unsigned int class_idx = hlock->class_idx;
@@ -174,6 +174,8 @@ static inline struct lock_class *hlock_class(struct held_lock *hlock)
*/
return lock_classes + class_idx;
}
+EXPORT_SYMBOL_GPL(lockdep_hlock_class);
+#define hlock_class(hlock) lockdep_hlock_class(hlock)
@ -39108,23 +39118,23 @@ index 0fef395662a6..83fb1ecfc33d 100644
}
+EXPORT_SYMBOL_GPL(task_work_run);
diff --git a/mm/Makefile b/mm/Makefile
index ac5e5ba78874..5decb22d13a0 100644
index d0b295c3b764..6156cd3d1ab0 100644
--- a/mm/Makefile
+++ b/mm/Makefile
@@ -39,7 +39,7 @@ obj-y := filemap.o mempool.o oom_kill.o fadvise.o \
mm_init.o mmu_context.o percpu.o slab_common.o \
compaction.o vmacache.o \
interval_tree.o list_lru.o workingset.o \
- debug.o $(mmu-y)
+ prfile.o debug.o $(mmu-y)
- debug.o gup.o $(mmu-y)
+ prfile.o debug.o gup.o $(mmu-y)
# Give 'page_alloc' its own module-parameter namespace
page-alloc-y := page_alloc.o
diff --git a/mm/filemap.c b/mm/filemap.c
index 861e26ee4c72..7ac5b439794c 100644
index d0cf700bf201..5cac93e7bf67 100644
--- a/mm/filemap.c
+++ b/mm/filemap.c
@@ -2723,7 +2723,7 @@ vm_fault_t filemap_page_mkwrite(struct vm_fault *vmf)
@@ -2721,7 +2721,7 @@ vm_fault_t filemap_page_mkwrite(struct vm_fault *vmf)
vm_fault_t ret = VM_FAULT_LOCKED;
sb_start_pagefault(inode->i_sb);
@ -39231,10 +39241,10 @@ index 7e8c3e8ae75f..d8a903f61262 100644
new_vma->vm_ops->open(new_vma);
vma_link(mm, new_vma, prev, rb_link, rb_parent);
diff --git a/mm/nommu.c b/mm/nommu.c
index b2823519f8cd..d7e4abcaca3e 100644
index fed1b6e9c89b..0d43b248ed54 100644
--- a/mm/nommu.c
+++ b/mm/nommu.c
@@ -640,7 +640,7 @@ static void __put_nommu_region(struct vm_region *region)
@@ -552,7 +552,7 @@ static void __put_nommu_region(struct vm_region *region)
up_write(&nommu_region_sem);
if (region->vm_file)
@ -39243,7 +39253,7 @@ index b2823519f8cd..d7e4abcaca3e 100644
/* IO memory and memory shared directly out of the pagecache
* from ramfs/tmpfs mustn't be released here */
@@ -778,7 +778,7 @@ static void delete_vma(struct mm_struct *mm, struct vm_area_struct *vma)
@@ -690,7 +690,7 @@ static void delete_vma(struct mm_struct *mm, struct vm_area_struct *vma)
if (vma->vm_ops && vma->vm_ops->close)
vma->vm_ops->close(vma);
if (vma->vm_file)
@ -39252,7 +39262,7 @@ index b2823519f8cd..d7e4abcaca3e 100644
put_nommu_region(vma->vm_region);
vm_area_free(vma);
}
@@ -1301,7 +1301,7 @@ unsigned long do_mmap(struct file *file,
@@ -1213,7 +1213,7 @@ unsigned long do_mmap(struct file *file,
goto error_just_free;
}
}
@ -39261,7 +39271,7 @@ index b2823519f8cd..d7e4abcaca3e 100644
kmem_cache_free(vm_region_jar, region);
region = pregion;
result = start;
@@ -1376,10 +1376,10 @@ unsigned long do_mmap(struct file *file,
@@ -1290,10 +1290,10 @@ unsigned long do_mmap(struct file *file,
up_write(&nommu_region_sem);
error:
if (region->vm_file)
@ -39367,7 +39377,7 @@ index 000000000000..024cdcfae1b1
+}
+#endif /* !CONFIG_MMU */
diff --git a/security/device_cgroup.c b/security/device_cgroup.c
index dc28914fa72e..c2ddfea2b280 100644
index 725674f3276d..83f6494c52a2 100644
--- a/security/device_cgroup.c
+++ b/security/device_cgroup.c
@@ -824,3 +824,4 @@ int __devcgroup_check_permission(short type, u32 major, u32 minor,
@ -39376,10 +39386,10 @@ index dc28914fa72e..c2ddfea2b280 100644
}
+EXPORT_SYMBOL_GPL(__devcgroup_check_permission);
diff --git a/security/security.c b/security/security.c
index f493db0bf62a..96f118be469f 100644
index 250ee2d76406..2765042d4846 100644
--- a/security/security.c
+++ b/security/security.c
@@ -993,6 +993,7 @@ int security_path_rmdir(const struct path *dir, struct dentry *dentry)
@@ -996,6 +996,7 @@ int security_path_rmdir(const struct path *dir, struct dentry *dentry)
return 0;
return call_int_hook(path_rmdir, 0, dir, dentry);
}
@ -39387,7 +39397,7 @@ index f493db0bf62a..96f118be469f 100644
int security_path_unlink(const struct path *dir, struct dentry *dentry)
{
@@ -1009,6 +1010,7 @@ int security_path_symlink(const struct path *dir, struct dentry *dentry,
@@ -1012,6 +1013,7 @@ int security_path_symlink(const struct path *dir, struct dentry *dentry,
return 0;
return call_int_hook(path_symlink, 0, dir, dentry, old_name);
}
@ -39395,7 +39405,7 @@ index f493db0bf62a..96f118be469f 100644
int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
struct dentry *new_dentry)
@@ -1017,6 +1019,7 @@ int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
@@ -1020,6 +1022,7 @@ int security_path_link(struct dentry *old_dentry, const struct path *new_dir,
return 0;
return call_int_hook(path_link, 0, old_dentry, new_dir, new_dentry);
}
@ -39403,7 +39413,7 @@ index f493db0bf62a..96f118be469f 100644
int security_path_rename(const struct path *old_dir, struct dentry *old_dentry,
const struct path *new_dir, struct dentry *new_dentry,
@@ -1044,6 +1047,7 @@ int security_path_truncate(const struct path *path)
@@ -1047,6 +1050,7 @@ int security_path_truncate(const struct path *path)
return 0;
return call_int_hook(path_truncate, 0, path);
}
@ -39411,7 +39421,7 @@ index f493db0bf62a..96f118be469f 100644
int security_path_chmod(const struct path *path, umode_t mode)
{
@@ -1051,6 +1055,7 @@ int security_path_chmod(const struct path *path, umode_t mode)
@@ -1054,6 +1058,7 @@ int security_path_chmod(const struct path *path, umode_t mode)
return 0;
return call_int_hook(path_chmod, 0, path, mode);
}
@ -39419,7 +39429,7 @@ index f493db0bf62a..96f118be469f 100644
int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
{
@@ -1058,6 +1063,7 @@ int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
@@ -1061,6 +1066,7 @@ int security_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
return 0;
return call_int_hook(path_chown, 0, path, uid, gid);
}
@ -39427,7 +39437,7 @@ index f493db0bf62a..96f118be469f 100644
int security_path_chroot(const struct path *path)
{
@@ -1158,6 +1164,7 @@ int security_inode_permission(struct inode *inode, int mask)
@@ -1161,6 +1167,7 @@ int security_inode_permission(struct inode *inode, int mask)
return 0;
return call_int_hook(inode_permission, 0, inode, mask);
}
@ -39435,7 +39445,7 @@ index f493db0bf62a..96f118be469f 100644
int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
{
@@ -1335,6 +1342,7 @@ int security_file_permission(struct file *file, int mask)
@@ -1338,6 +1345,7 @@ int security_file_permission(struct file *file, int mask)
return fsnotify_perm(file, mask);
}

File diff suppressed because it is too large Load diff

File diff suppressed because it is too large Load diff

View file

@ -1,7 +1,7 @@
%define kernelversion 5
%define patchlevel 2
%define patchlevel 3
# sublevel is used for stable-based kernels
%define sublevel 14
%define sublevel 1
# Release number. Increase this before a rebuild.
%define rpmrel 1
@ -201,6 +201,8 @@ BuildRequires: flex
BuildRequires: bzip2
BuildRequires: rsync
%ifarch x86_64
BuildRequires: numa-devel
%endif