Age | Commit message (Collapse) | Author |
|
Export clk_restore_context and clk_save_context so that other modules can use.
There is a qcom clock driver which uses the clock restore and save context for
the hibernation use case. The PLLs, always enabled clocks are saved and restored
during this use case.
Leaf changes summary: 2 artifact changed
Changed leaf types summary: 0 leaf type changed
Removed/Changed/Added functions summary: 0 Removed, 0 Changed, 2 Added functions
Removed/Changed/Added variables summary: 0 Removed, 0 Changed, 0 Added variable
2 Added functions:
[A] 'function void clk_restore_context()'
[A] 'function void clk_save_context()'
Bug: 246901089
Change-Id: I0f9f0853f9593239dedb7d84941002d346038843
Signed-off-by: Kalpak Kawadkar <quic_kkawadka@quicinc.com>
|
|
|
|
4 function symbol(s) added
'int __traceiter_android_vh_madvise_cold_pageout_skip(void*, struct vm_area_struct*, struct folio*, bool, bool*)'
'int __traceiter_android_vh_mmput(void*, void*)'
'int __traceiter_android_vh_psi_event(void*, struct psi_trigger*)'
'int __traceiter_android_vh_psi_group(void*, struct psi_group*)'
4 variable symbol(s) added
'struct tracepoint __tracepoint_android_vh_madvise_cold_pageout_skip'
'struct tracepoint __tracepoint_android_vh_mmput'
'struct tracepoint __tracepoint_android_vh_psi_event'
'struct tracepoint __tracepoint_android_vh_psi_group'
Bug: 343627995
Change-Id: I272839167989c827167f4c0b13247190dc90dc33
Signed-off-by: xiaofeng <xiaofeng5@xiaomi.com>
|
|
1 function symbol(s) added
'unsigned int pm_wakeup_irq()'
Bug: 343147334
Change-Id: I9ed79c6457e8e13e44144a3e46969c2720354b99
Signed-off-by: Dezhi Huang <huangdezhi@hihonor.com>
|
|
makes proc_pid_ns() safe from rcu pathwalk (put_pid_ns()
is still synchronous, but that's not a problem - it does
rcu-delay everything that needs to be)
Reviewed-by: Christian Brauner <brauner@kernel.org>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
(cherry picked from commit e31f0a57ae1ab2f6e17adb8e602bc120ad722232)
Change-Id: I7f206580dd0c26d1a60354a7797daed1026dc73c
Bug: 306055483
Signed-off-by: Todd Kjos <tkjos@google.com>
|
|
* Otherwise these are not listed as part of the bazel build.
Fixes: 48cd923c3333 ("Kleaf: copy external modules' .gcno files out of the sandbox")
Bug: 344512876
Change-Id: I9b22f041d72868f948c187b49160fe95a6e02d66
Signed-off-by: Ulises Mendez Martinez <umendez@google.com>
|
|
*build/kernel updated to 5c2c9f4639884acefd4023da709073487fcd7444
Revert "Kleaf: Hack: Match all combinations for ROOT_DIR"
This reverts commit 4ce857d0d76383bc68e00dc1d28edde80ef1dfa4.
Reason for revert: the kernel patch is reverted again because
this hack does not work in Bazel 7.2.0 rc2.
Bug: 343803993
Bug: 320449031
Change-Id: Icb20df1c90f0d4ef403954bf5bc07b0a3ea26f9e
*prebuilts/kernel-build-tools updated to 42dd6457d323f1b5db3c7d4cf8377380126fcdb8
Merge "Revert^2 "kleaf: Bazel update to 7.2.0rc2"" into main
|
|
This partially reverts commit b329d0289ff347c66ad7ec60995ef79679d0e924.
The cfs_rq->decayed addition is kept to preserve the KMI until the next
KMI update.
Reason for revert: This change causes major perf issues.
Bug: 343389622
Change-Id: I496da55f509a3c1a7ba8f869c8db43d9509fc547
Signed-off-by: William McVicker <willmcvicker@google.com>
[cmllamas: kept cfs_rq->decayed addition to preserve the KMI]
Signed-off-by: Carlos Llamas <cmllamas@google.com>
|
|
Original change: https://android-review.googlesource.com/c/platform/prebuilts/rust/+/3110619
Change-Id: I889214bbcc904ba4f23a2391bd821315cce0ab23
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
Add the following symbols required by the clk-scmi driver:
clk_hw_set_rate_range
of_clk_hw_onecell_get
Bug: 343910593
Change-Id: Ib98755436487782f875533cde69d8bd201004a1b
Signed-off-by: Mike Tipton <quic_mdtipton@quicinc.com>
|
|
23 function symbol(s) added
'void __blk_req_zone_write_lock(struct request*)'
'void __blk_req_zone_write_unlock(struct request*)'
'void blk_mq_sched_mark_restart_hctx(struct blk_mq_hw_ctx*)'
'bool blk_mq_sched_try_insert_merge(struct request_queue*, struct request*, struct list_head*)'
'bool blk_mq_sched_try_merge(struct request_queue*, struct bio*, unsigned int, struct request**)'
'bool blk_req_needs_zone_write_lock(struct request*)'
'int blkcg_activate_policy(struct gendisk*, const struct blkcg_policy*)'
'void blkcg_deactivate_policy(struct gendisk*, const struct blkcg_policy*)'
'bool elv_bio_merge_ok(struct request*, struct bio*)'
'void elv_rb_add(struct rb_root*, struct request*)'
'void elv_rb_del(struct rb_root*, struct request*)'
'struct request* elv_rb_find(struct rb_root*, sector_t)'
'struct request* elv_rb_former_request(struct request_queue*, struct request*)'
'struct request* elv_rb_latter_request(struct request_queue*, struct request*)'
'void elv_rqhash_add(struct request_queue*, struct request*)'
'void elv_rqhash_del(struct request_queue*, struct request*)'
'char* get_options(const char*, int, int*)'
'struct usb_request* gs_alloc_req(struct usb_ep*, unsigned int, gfp_t)'
'void gs_free_req(struct usb_ep*, struct usb_request*)'
'void gserial_free_line(unsigned char)'
'void gserial_resume(struct gserial*)'
'void gserial_suspend(struct gserial*)'
'void netlink_ack(struct sk_buff*, struct nlmsghdr*, int, const struct netlink_ext_ack*)'
1 variable symbol(s) added
'struct blkcg blkcg_root'
Bug: 344511666
Change-Id: Iab1c8ab59fbcb914d953c567f3bd5abe42cefbbe
Signed-off-by: YOUNGJIN JOO <youngjin79.joo@samsung.com>
|
|
In commit 92f1655aa2b2 ("net: fix __dst_negative_advice() race") the
struct dst_ops callback negative_advice is callback changes function
parameters. But as this pointer is part of a structure that is tracked
in the ABI checker, the tool triggers when this is changed.
However, the callback pointer is internal to the networking stack, so
changing the function type is safe, so needing to preserve this is not
required. To do so, switch the function pointer type back to the old
one so that the checking tools pass, AND then do a hard cast of the
function pointer to the new type when assigning and calling the
function.
[6.6.y backport note, work around --Werror=cast-function-type issue by
abusing void * for function pointer types, despite it's best effort, C
still let's us shoot our foot off if we really want to!]
Bug: 343727534
Fixes: 92f1655aa2b2 ("net: fix __dst_negative_advice() race")
Change-Id: I48d4ab4bbd29f8edc8fbd7923828b7f78a23e12e
Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
|
|
1 function symbol(s) added
'int __traceiter_android_rvh_set_balance_anon_file_reclaim(void*, bool*)'
1 variable symbol(s) added
'struct tracepoint __tracepoint_android_rvh_set_balance_anon_file_reclaim'
Bug: 342280840
Change-Id: Iee0a78f9dce636a414968fb011505e2e37f93449
Signed-off-by: huzhanyuan <huzhanyuan@oppo.com>
|
|
Original change: https://android-review.googlesource.com/c/platform/prebuilts/rust/+/3109352
Change-Id: I303298a8b4e0b740a71d6496192f947080889cf5
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
If the mmap_lock can be taken for read, we can call __anon_vma_prepare()
while holding it, saving ourselves a trip back through the fault handler.
Link: https://lkml.kernel.org/r/20240426144506.1290619-5-willy@infradead.org
Signed-off-by: Matthew Wilcox (Oracle) <willy@infradead.org>
Reviewed-by: Jann Horn <jannh@google.com>
Reviewed-by: Suren Baghdasaryan <surenb@google.com>
Reviewed-by: David Hildenbrand <david@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
(cherry picked from commit 737019cf6ac5babb75645ad324aeead7bc04749d)
Bug: 161210518
Change-Id: I593aebf5f18388e01fed376375cc053c1f104ae8
Signed-off-by: T.J. Mercier <tjmercier@google.com>
|
|
The remote_filename is determined by the
remote_filename_fmt key in the config. The
key in download_configs is the local filename.
Test: N/A
Change-Id: Id1fea8a64d951e8e548baa4ff80a47bb8b52bbcb
|
|
3 function symbol(s) added
'int __traceiter_android_vh_anon_vma_name_recog(struct mm_struct *mm,
struct anon_vma_name *anon_name)'
'int __traceiter_android_vh_restore_mm_flags(struct mm_struct *mm)'
'int __traceiter_android_vh_update_vma_flags(struct vm_area_struct *vma)'
3 variable symbol(s) added
'struct tracepoint __tracepoint_android_vh_anon_vma_name_recog'
'struct tracepoint __tracepoint_android_vh_restore_mm_flags'
'struct tracepoint __tracepoint_android_vh_update_vma_flags'
Bug: 343124472
Change-Id: If66e3e6c49aee8b8c8e737117675cb31ccde332a
Signed-off-by: yan chang <changyan1@xiaomi.com>
|
|
wdev->valid_links is not cleared when upper layer disconnect from a
wdev->AP MLD. It has been observed that this would prevent offchannel
operations like remain-on-channel which would be needed for user space
operations with Public Action frame.
Clear the wdev->valid_links when STA disconnects.
Bug: 343586793
Change-Id: I75414e1bb7d7ad943c74a02bf426455f6ba476a4
(cherry picked from commit 9f6d4b8d149af8dc3f9a1e3000168b99ca576390)
Signed-off-by: Xin Deng <quic_deng@quicinc.com>
Link: https://msgid.link/20240426092501.8592-1-quic_deng@quicinc.com
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
|
|
Export the symbols :
memcg_kmem_online_key
stack_depot_print
Bug: 184928480
Change-Id: I3c66e7dc01ae2d3de694201daac6b5f5e5c89209
Signed-off-by: huzhanyuan <huzhanyuan@oppo.com>
|
|
9 function symbol(s) added
'int __traceiter_android_vh_add_page_to_lrulist(void*, struct folio*, bool, enum lru_list)'
'int __traceiter_android_vh_del_page_from_lrulist(void*, struct folio*, bool, enum lru_list)'
'int __traceiter_android_vh_do_traversal_lruvec(void*, struct lruvec*)'
'int __traceiter_android_vh_mark_page_accessed(void*, struct folio*)'
'int __traceiter_android_vh_page_referenced_check_bypass(void*, struct folio*, unsigned long, int, bool*)'
'int __traceiter_android_vh_page_should_be_protected(void*, struct folio*, bool*)'
'int __traceiter_android_vh_show_mapcount_pages(void*, void*)'
'int __traceiter_android_vh_update_page_mapcount(void*, struct page*, bool, bool, int*, bool*)'
'void do_traversal_all_lruvec()'
8 variable symbol(s) added
'struct tracepoint __tracepoint_android_vh_add_page_to_lrulist'
'struct tracepoint __tracepoint_android_vh_del_page_from_lrulist'
'struct tracepoint __tracepoint_android_vh_do_traversal_lruvec'
'struct tracepoint __tracepoint_android_vh_mark_page_accessed'
'struct tracepoint __tracepoint_android_vh_page_referenced_check_bypass'
'struct tracepoint __tracepoint_android_vh_page_should_be_protected'
'struct tracepoint __tracepoint_android_vh_show_mapcount_pages'
'struct tracepoint __tracepoint_android_vh_update_page_mapcount'
Bug: 236578020
Change-Id: I75df81476c14a58fa32585e9bab9c7ec98eca73b
Signed-off-by: huzhanyuan <huzhanyuan@oppo.com>
Signed-off-by: Will McVicker <willmcvicker@google.com>
|
|
1 function symbol(s) added
'int blk_mq_alloc_sq_tag_set(struct blk_mq_tag_set*, const struct blk_mq_ops*, unsigned int, unsigned int)'
Bug: 343878731
Change-Id: Ic899326a18fa78f670d98d7466a610aca8f79cc0
Signed-off-by: fengqi <fengqi@xiaomi.corp-partner.google.com>
|
|
This target is used as part of separating dist build and ABI check. The
ABI is still compared inside a new target, but results are interpreted
by downstream users, like `abi_compliance.sh` script.
Bug: 341797800
Change-Id: I78386f5a178e3f1efe5789bc4e2df1597d931fc2
|
|
Add iterate_supers, drop_slab, try_to_free_pages and
try_to_compact_pages symbol which will be used by the
mini DRM module to debug_symbols driver.
Bug: 343639895
Change-Id: Icdde9e6ae1b1a3178519a5c46ff80daf45f59b4b
Signed-off-by: Guanshun Liu <liuguanshun@xiaomi.com>
|
|
This reverts commit c7cf3d5da46c2fcd75677657962cc95e3b28e7d8.
Driver using memremap() will potentially behind the hood use ioremap.
But as this is normal memory, the MMIO guard registration would fail in
the hypervisor (which is expected and normal) and by extension trigger
this warning.
This behaviour is completely normal and there is no need to alarm anyone
with a warning here. So remove it until we come with a better solution.
Bug: 278749606
Bug: 243642516
Bug: 343680567
Change-Id: I8f51f264c32ab825779413d50b644885db953282
Signed-off-by: Vincent Donnefort <vdonnefort@google.com>
|
|
If no workspace files are found, create WORKSPACE.bzlmod.
Due to https://github.com/bazelbuild/bazel/issues/22579,
if there are no WORKSPACE files, the implict one
declares a dependency to @rules_cc, which resolves
to @@rules_cc if the root module does not declare
bazel_dep(name="rules_cc"). To work around this
issue, create an empty WORKSPACE.bzlmod if not
found.
Also delete the WORKSPACE.bzlmod file in
integration_test because init_ddk already
creates it.
Bug: 338440785
Change-Id: I29ce8536f98998f4ef215b6c7658bef7873f8f9b
|
|
|
|
*prebuilts/kernel-build-tools updated to 6c2ca07d3a7e5bb407ef57d20dafcd1273c5011a
Merge "kleaf: Bazel update to 7.2.0rc2" into main
*external/bazelbuild-bazel-central-registry updated to 7018452ffac4fc070b29d5c5c872bac3c746a06a
Upgrade bazel-central-registry to 9f9108b2e8108d367ec21288ee269551ef759024
This project was upgraded with external_updater.
Usage: tools/external_updater/updater.sh update external/bazelbuild-bazel-central-registry
For more info, check https://cs.android.com/android/platform/superproject/+/main:tools/external_updater/README.md
Test: TreeHugger
Change-Id: Ibcd5a8831bb11007621bb6922ba52ce8f31861d0
|
|
Currently firmware_class.patch commandline can take a single path for
loading firmwares on custom paths. SoC vendors and oems can have
firmwares in multiple file system paths. So add support for paassing
multiple paths through command line for firmware loader.
Add a getter function to read the class path.
For example - firmware_class.path="/vendor,/vendor/firmware_mnt,
/oem/firmware". firmware_class.path can take upto 10 file system
paths with ',' separation.
Bug: 259298396
Change-Id: I31d1470d7dd0255c7aefd856f3c129bdb4b7f2e8
Signed-off-by: Prasad Sodagudi <quic_psodagud@quicinc.com>
Signed-off-by: Vamsi Krishna Lanka <quic_vamslank@quicinc.com>
(cherry picked from commit ce17e299d0f6d17350d53e2097bea45420553dca)
|
|
Remove extra space to resolve checkpatch warning.
Bug: 333350371
Change-Id: I4cca8ed58af73a3fa96d8aa8eeddfb511e022dec
Signed-off-by: Neill Kapron <nkapron@google.com>
|
|
Add 'binder_alloc_copy_from_buffer'
Bug: 343139379
Change-Id: I9f95b1bf8774eefd4970b9b3551ffcb8a3c4606d
Signed-off-by: Dezhi Huang <huangdezhi@hihonor.com>
|
|
Bug: 342330958
Change-Id: I0c5763dcf1bfec59b1fe59d003f5d95472128129
Signed-off-by: fengqi <fengqi@xiaomi.corp-partner.google.com>
|
|
Enabling configs for Tegra SoCs required this module to be included in
the rockpi4 builds. This change fixes the following build issue:
ERROR: The following kernel modules are built but not copied. Add these lines to the module_outs attribute of @@//common:rockpi4_no_kgdb:
"drivers/cpufreq/tegra20-cpufreq.ko",
Bug: 335325897
Change-Id: I898000725287f34956cb977b3b02685f189cd5a0
Signed-off-by: Carlos Llamas <cmllamas@google.com>
|
|
** For tradefed version, open version.txt (go/tf-prebuilt-version) **
Tradefed
This build IS suitable for public release.
Bug: 178523691
Test: None
Change-Id: I374cd708e8ecf4cd3da34a44ca1bfbd8ad6f3de7
|
|
1 function symbol(s) added
'int folio_total_mapcount(struct folio*)'
Bug: 236578020
Change-Id: I8884496065b7d2d7a382d6f94883fe32b93b9adb
Signed-off-by: huzhanyuan <huzhanyuan@oppo.com>
|
|
hermetic_tools.extra_args
kerne_images.vendor_ramdisk_dev_nodes
Change-Id: I74db32ecc7caf7611e5041bf42f398157597a996
|
|
2 function symbol(s) added
'int cleancache_register_ops(const struct cleancache_ops*)'
'copy_page'
Bug: 294177078
Bug: 342706486
Change-Id: I423027d966db17cb09911b07071da39af724a7f0
Signed-off-by: Jaewon Kim <jaewon31.kim@samsung.com>
|
|
1 function symbol(s) added
'int __traceiter_android_vh_configfs_uevent_work(bool, bool, bool,
bool)'
1 variable symbol(s) added
'struct tracepoint __tracepoint_android_vh_configfs_uevent_work'
Bug: 333350371
Change-Id: Ia021dad190dc7b639b20d9f6671b74bbfc283c59
Signed-off-by: hulianqin <hulianqin@vivo.corp-partner.google.com>
Signed-off-by: Lianqin Hu <hulianqin@vivo.com>
|
|
In the setup below, a target depends on two
copies of hermetic tools:
parent -> A (exec) -> hermetic_tools (exec)
-> B (target) -> hermetic_tools (target)
This wasn't an issue before --gzip_is_pigz and
--toolchain_from_sources, because the hermetic
toolchain just created symlinks to prebuilts,
which were relatively fast. However, with these
flags, hermetic tools are compiled from sources,
causing two compilation of the same tool.
Fix this by wrapping hermetic tools in an internal
rule that always applies the exec transition.
Bug: 340357397
Test: the new integration test fails before the change
and passes after the change
Change-Id: I7cabfca37630c4bc0359fcb02f7770b7c8d6e658
|
|
The new --repo_manifest=<REPO_ROOT>:<REPO_MANIFEST>
and --extra_git_project needs documentation on
its usage.
Bug: 341223559
Change-Id: I5a496423ed8d5072d0e57b28e00756b7a0a2f760
|
|
|
|
Add the blk_crypto_reprogram_all_keys.
1 function symbol(s) added
'void blk_crypto_reprogram_all_keys(struct blk_crypto_profile*)'
Bug: 343342126
Change-Id: I9e4bdb028f200b6eb7486d443e1000141cae5b25
Signed-off-by: Zhe Wang <zhe.wang1@unisoc.com>
|
|
This project was upgraded with external_updater.
Usage: tools/external_updater/updater.sh update external/toybox
For more info, check https://cs.android.com/android/platform/superproject/+/main:tools/external_updater/README.md
Test: TreeHugger
Change-Id: I52b360058a98db01541bdc3d92009b7b2f0af454
|
|
The API allowing modules to manipulate the host stage-2 page-table
can end up walking the memblock list and hyp_vmemmap multiple times.
Micro-optimise this path to limit duplicate work.
Bug: 278749606
Bug: 322736772
Change-Id: Ia1c57e84ad979dc72ef93b2b5ed921f94a219448
Signed-off-by: Quentin Perret <qperret@google.com>
|
|
This adds extra projects on top of --repo_manifest
or `repo manifest` so that users can specify ones
not under `repo` control. In particular, if the
user is building a kernel from a KERNEL_DIR that
is a symlink, the stable-status.txt won't contain
a key with KERNEL_DIR. --extra_git_projects
allows users to inject custom keys.
Bug: 341223559
Test: integration_test
Change-Id: I5423608349faacfdadb4486110b0bb3c72ace736
|
|
Original change: https://android-review.googlesource.com/c/platform/prebuilts/rust/+/3107312
Change-Id: Ia24750ac5a382ea98a31bacef0b8e6a48504df91
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
2 function symbol(s) added
'int __traceiter_android_vh_alloc_pages_adjust_wmark(void*, gfp_t, int, int*)'
'int __traceiter_android_vh_alloc_pages_reset_wmark(void*, gfp_t, int, int*, unsigned long*, int*, unsigned long)'
2 variable symbol(s) added
'struct tracepoint __tracepoint_android_vh_alloc_pages_adjust_wmark'
'struct tracepoint __tracepoint_android_vh_alloc_pages_reset_wmark'
Bug: 342313291
Change-Id: I5921c2640b0687b05c60f8e881ad0c6596a4bb11
Signed-off-by: Lei Liu <liulei.rjpt@vivo.corp-partner.google.com>
|
|
7 function symbol(s) added
'spinlock_t* __pmd_trans_huge_lock(pmd_t*, struct vm_area_struct*)'
'pte_t* __pte_offset_map_lock(struct mm_struct*, pmd_t*, unsigned long,
spinlock_t**)'
'struct anon_vma_name* anon_vma_name(struct vm_area_struct*)'
'const char* arch_vma_name(struct vm_area_struct*)'
'void pmd_clear_bad(pmd_t*)'
'struct page* vm_normal_page(struct vm_area_struct*, unsigned long, pte_t)'
'int walk_page_range(struct mm_struct*, unsigned long, unsigned long, const
struct mm_walk_ops*, void*)'
Export arch_vma_name, anon_vma_name, vm_normal_page, walk_page_range, pmd_clear_bad,
__pmd_trans_huge_lock,__pte_offset_map_lock functions. Allow vendor modules perform
more operationson on memleak detect and debug.it can detect multiple types of memleak,
such as Native,ION,Slub and Vmalloc. shows detail size of memleak, and shows the stack.
Bug: 342305999
Change-Id: I22f81e8cd35ba5827057b0f5649c43c94ab4b3b0
Signed-off-by: Dezhi Huang <huangdezhi@hihonor.com>
|
|
28 function symbol(s) added
'unsigned int blk_crypto_keyslot_index(struct blk_crypto_keyslot*)'
'bool blk_crypto_register(struct blk_crypto_profile*, struct request_queue*)'
'void blk_crypto_reprogram_all_keys(struct blk_crypto_profile*)'
'void blk_mq_destroy_queue(struct request_queue*)'
'struct request_queue* blk_mq_init_queue(struct blk_mq_tag_set*)'
'void blk_mq_tagset_busy_iter(struct blk_mq_tag_set*, busy_tag_iter_fn*, void*)'
'void blk_mq_wait_quiesce_done(struct blk_mq_tag_set*)'
'void blk_pm_runtime_init(struct request_queue*, struct device*)'
'void blk_queue_update_dma_pad(struct request_queue*, unsigned int)'
'void bsg_job_done(struct bsg_job*, int, unsigned int)'
'void bsg_remove_queue(struct request_queue*)'
'struct request_queue* bsg_setup_queue(struct device*, const char*, bsg_job_fn*, bsg_timeout_fn*, int)'
'int param_set_uint_minmax(const char*, const struct kernel_param*, unsigned int, unsigned int)'
'int scsi_add_host_with_dma(struct Scsi_Host*, struct device*, struct device*)'
'int scsi_change_queue_depth(struct scsi_device*, int)'
'struct scsi_device* scsi_device_lookup(struct Scsi_Host*, uint, uint, u64)'
'int scsi_dma_map(struct scsi_cmnd*)'
'void scsi_done(struct scsi_cmnd*)'
'struct Scsi_Host* scsi_host_alloc(const struct scsi_host_template*, int)'
'struct Scsi_Host* scsi_host_lookup(unsigned int)'
'void scsi_host_put(struct Scsi_Host*)'
'int scsi_is_host_device(const struct device*)'
'void scsi_print_command(struct scsi_cmnd*)'
'int scsi_register_driver(struct device_driver*)'
'void scsi_remove_device(struct scsi_device*)'
'void scsi_remove_host(struct Scsi_Host*)'
'void scsi_report_bus_reset(struct Scsi_Host*, int)'
'void scsi_scan_host(struct Scsi_Host*)'
Bug: 342523881
Change-Id: Ida0184d397abaa0de9fcdd4d50d34a74361ffebb
Signed-off-by: Ying Wang <wangying37@xiaomi.corp-partner.google.com>
|
|
Original change: https://android-review.googlesource.com/c/platform/prebuilts/rust/+/3106861
Change-Id: Ibb42027d9f9e5f5847eccbc973f867cb0b282fa7
Signed-off-by: Automerger Merge Worker <android-build-automerger-merge-worker@system.gserviceaccount.com>
|
|
30 function symbol(s) added
'void __sk_flush_backlog(struct sock*)'
'void __sk_mem_reclaim(struct sock*, int)'
'ssize_t iov_iter_extract_pages(struct iov_iter*, struct page***, size_t, unsigned int, iov_iter_extraction_t, size_t*)'
'ssize_t iov_iter_get_pages2(struct iov_iter*, struct page**, size_t, unsigned int, size_t*)'
'int sk_msg_alloc(struct sock*, struct sk_msg*, int, int)'
'int sk_msg_clone(struct sock*, struct sk_msg*, struct sk_msg*, u32, u32)'
'int sk_msg_free(struct sock*, struct sk_msg*)'
'int sk_msg_free_nocharge(struct sock*, struct sk_msg*)'
'void sk_msg_free_partial(struct sock*, struct sk_msg*, u32)'
'int sk_msg_memcopy_from_iter(struct sock*, struct iov_iter*, struct sk_msg*, u32)'
'int sk_msg_recvmsg(struct sock*, struct sk_psock*, struct msghdr*, int, int)'
'void sk_msg_return_zero(struct sock*, struct sk_msg*, int)'
'void sk_msg_trim(struct sock*, struct sk_msg*, int)'
'int sk_msg_zerocopy_from_iter(struct sock*, struct iov_iter*, struct sk_msg*, u32)'
'void sk_psock_drop(struct sock*, struct sk_psock*)'
'int sk_psock_msg_verdict(struct sock*, struct sk_psock*, struct sk_msg*)'
'int sk_psock_tls_strp_read(struct sk_psock*, struct sk_buff*)'
'int sk_stream_error(struct sock*, int, int)'
'int sk_stream_wait_memory(struct sock*, long*)'
'void skb_copy_header(struct sk_buff*, const struct sk_buff*)'
'int skb_splice_bits(struct sk_buff*, struct sock*, unsigned int, struct pipe_inode_info*, unsigned int, unsigned int)'
'int tcp_bpf_sendmsg_redir(struct sock*, bool, struct sk_msg*, u32, int)'
'__poll_t tcp_poll(struct file*, struct socket*, poll_table*)'
'void tcp_rate_check_app_limited(struct sock*)'
'void tcp_read_done(struct sock*, size_t)'
'int tcp_read_sock(struct sock*, read_descriptor_t*, sk_read_actor_t)'
'struct sk_buff* tcp_recv_skb(struct sock*, u32, u32*)'
'int tcp_register_ulp(struct tcp_ulp_ops*)'
'int tcp_sendmsg_locked(struct sock*, struct msghdr*, size_t)'
'void tcp_unregister_ulp(struct tcp_ulp_ops*)'
3 variable symbol(s) added
'struct static_key_false memcg_sockets_enabled_key'
'struct static_key_true memory_cgrp_subsys_on_dfl_key'
'unsigned long tcp_memory_pressure'
Bug: 343101486
Change-Id: Ia3d3322c31efd911559b22f8272b0c23a68054db
Signed-off-by: Pengtao He <hepengtao@xiaomi.com>
|