diff options
author | 2009-12-18 17:32:10 +0000 | |
---|---|---|
committer | 2009-12-18 17:32:10 +0000 | |
commit | 1074f0772644e50e67cee67de29fa8b532c33f55 (patch) | |
tree | a5bac6f20846e83a723c1126b7ffe7921e1e3664 /sys-fs/aufs2 | |
parent | Stable for HPPA (bug #297297). (diff) | |
download | historical-1074f0772644e50e67cee67de29fa8b532c33f55.tar.gz historical-1074f0772644e50e67cee67de29fa8b532c33f55.tar.bz2 historical-1074f0772644e50e67cee67de29fa8b532c33f55.zip |
Bump to latest version, include support for 2.6.32
Package-Manager: portage-2.2_rc60-r1/cvs/Linux x86_64
Diffstat (limited to 'sys-fs/aufs2')
-rw-r--r-- | sys-fs/aufs2/ChangeLog | 9 | ||||
-rw-r--r-- | sys-fs/aufs2/Manifest | 17 | ||||
-rw-r--r-- | sys-fs/aufs2/aufs2-0_p20091214.ebuild | 89 | ||||
-rw-r--r-- | sys-fs/aufs2/files/aufs2-base-32.patch | 81 | ||||
-rw-r--r-- | sys-fs/aufs2/files/aufs2-standalone-32.patch | 182 | ||||
-rw-r--r-- | sys-fs/aufs2/files/utils-Makefile.patch | 18 |
6 files changed, 370 insertions, 26 deletions
diff --git a/sys-fs/aufs2/ChangeLog b/sys-fs/aufs2/ChangeLog index 9e8f353a693f..73c4d94e8e9e 100644 --- a/sys-fs/aufs2/ChangeLog +++ b/sys-fs/aufs2/ChangeLog @@ -1,6 +1,13 @@ # ChangeLog for sys-fs/aufs2 # Copyright 1999-2009 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-fs/aufs2/ChangeLog,v 1.12 2009/11/27 14:14:40 tommy Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-fs/aufs2/ChangeLog,v 1.13 2009/12/18 17:32:10 tommy Exp $ + +*aufs2-0_p20091214 (18 Dec 2009) + + 18 Dec 2009; Thomas Sachau (Tommy[D]) <tommy@gentoo.org> + +aufs2-0_p20091214.ebuild, +files/aufs2-base-32.patch, + +files/aufs2-standalone-32.patch, -files/utils-Makefile.patch: + Bump to latest version, include support for 2.6.32 27 Nov 2009; Thomas Sachau (Tommy[D]) <tommy@gentoo.org> -aufs2-0_p20090916.ebuild, aufs2-0_p20090916-r1.ebuild: diff --git a/sys-fs/aufs2/Manifest b/sys-fs/aufs2/Manifest index b25ae559c247..c0f3629e1c57 100644 --- a/sys-fs/aufs2/Manifest +++ b/sys-fs/aufs2/Manifest @@ -6,23 +6,26 @@ AUX aufs2-base-28.patch 2895 RMD160 8055dd188e288ba4e66fafd11d78dcf5e97cae90 SHA AUX aufs2-base-29.patch 2895 RMD160 bf89ba5f9f52ea1b9e320439e0bc18f8a006c8c3 SHA1 92a4aff3a945ea7a4a4509ed3539d0a3689c0737 SHA256 b4d8c9883f7f919f0d0a15792420e59f14d41bc1b0daab906ba7affc29485dac AUX aufs2-base-30.patch 2895 RMD160 13d6fcb45135e4177d6dd506bc7a32fc6b2741fe SHA1 4845f3608540dbc0fa2fa5c914907eb14b51a0f0 SHA256 11f9061805e715c9d9a58dab04a32876ed27bced61c3157cde4e58a08dcdde51 AUX aufs2-base-31.patch 3086 RMD160 df84e409111526f48e5ffcf7b9d269aa6f9abce6 SHA1 e422dc0a95e3fe398d8ab178d7b34caaf8d0507f SHA256 c75e1f1d6d8320347f109535d65d36d4b3843cf95f3db2b0198b7f61c0f50948 +AUX aufs2-base-32.patch 3088 RMD160 d2225a227dcee3ceb166dcbb52757c07da93621c SHA1 ce9f64ff2b3e173ab7caf226683a73e41cf58d91 SHA256 46522f1701f907e02776f5ae049802337b583fd6259f4e8468ff4a48cbf8d957 AUX aufs2-standalone-27.patch 7441 RMD160 754f282fb14e1c8be0e1f4e84c131c4bdb50f1a7 SHA1 6d38c1b43d5d2af37fd926a6cf7f9ab159733a5a SHA256 0eb880e1313c1a446bcdf63e7e8132d2c44efb47dc16c7f2c0c141dc8cc7b90e AUX aufs2-standalone-28.patch 3930 RMD160 40c2efb98084887425e3de60e44c893624e05802 SHA1 a66d3cf45b66a71c3848f593ac8a9ca084945d29 SHA256 84e1f4afb7897551f72661b4c2c5e459147309c8cf29be13821b7b5e695a489f AUX aufs2-standalone-29.patch 5748 RMD160 67fdda784ef736559e4b12038e625f5422351005 SHA1 8feb9ed859c239cda93863c8a965b3a13c563f71 SHA256 1b6d93c6b0fedbed48caa539ec231196f84cf697ca5bfe117f64a87aa17db33b AUX aufs2-standalone-30.patch 5432 RMD160 4a9979bb29164ee81e25c920df0dadbb6c496698 SHA1 1bcebf7b22f784834e5d5f0a25467de31f12320f SHA256 c2972ecca3562b34a2b68800b2322801f614d1945923b6fe7da711392ec37484 AUX aufs2-standalone-31.patch 5826 RMD160 e7405edce064d3a163fccd390845442926b9c490 SHA1 e626a1632ba55b43b46449020b2a547e9572f417 SHA256 b6e61dd2cf5919879de6c668b8de6e0661dbaa0ac1ebe25868513360a6602601 +AUX aufs2-standalone-32.patch 5828 RMD160 8d525c7155df964a933bf6ec01bb6904211a33e2 SHA1 b1ee87a3fdc2a204b141afbb390ce65698349fbd SHA256 adb37eddf529631e0fc9dc04b79e1988581fc10fbe1dd883f32ecdca6d541654 AUX utils-2.6.31.patch 444 RMD160 b89f0373c7d9537cc3124e7d8beaa0eda411a6f3 SHA1 8dcb097c0ddb4a325aef7f043db6809dcbef4035 SHA256 d10f948b03dd47cf2e5635a064c02231d4b7af2c28d45e0368fb0470b15cae62 -AUX utils-Makefile.patch 526 RMD160 9c580ad02f9b7398cead7e3d86d03e696b214f18 SHA1 cc22287e7b89d8640989ee38c0293e0933693699 SHA256 fdad12ea3339b4532b00269326951ec848534c4da53c365e9806f859cb4b40e1 DIST aufs2-0_p20090916.tar.bz2 3239334 RMD160 619c1656514ddaf4b046b27d065208823d4c502e SHA1 aaae8f72a9388c40bca68ae2147afa32ad930ac7 SHA256 a68818cd382cf93ed7a32839a6ec6b23c0291b8125657db8b559659bbb89db10 +DIST aufs2-0_p20091214.tar.bz2 4253193 RMD160 df114f6e040bb3fb9a319e39313b59b5190742b7 SHA1 f8d1efa056fd657318b212e1b3b5bd344d0648d8 SHA256 2a9c6b4f69bb1d3fbab1ab403ad446af8efb5c794c451ec40166841dfd40b297 EBUILD aufs2-0_p20090916-r1.ebuild 2958 RMD160 68da42877796919e684b32106dd3a5c35b3ea09f SHA1 09c41c34e1f5d18b29b4f89275342b69765ac09e SHA256 b3ce3776fa79794844642112a6dbc16fafe41d1f160c83e8736faf9ed2a80344 -MISC ChangeLog 2798 RMD160 992851045d5b7fc8733bcb905c1c3cea51b90ec7 SHA1 1657669e10991d18d797cce7607004680ebe1e9b SHA256 ccfe2270fb4e65e38ae272c639d6ac5b5a32231baefe7592a318ac0febd7a1d8 +EBUILD aufs2-0_p20091214.ebuild 2888 RMD160 c2e96ffb0012186a7d26744e44fbb086d9b2cae9 SHA1 3259c4b2d853382882e10f567f396e5bc22bab56 SHA256 89e7fd4899301c9f601861282c89227c922e52ea2045c2477defd471c51edd3f +MISC ChangeLog 3067 RMD160 4dbfdea364321ef6903af2aa49efa50a919bd91f SHA1 fdfeece1bf48b65167a5a41b0ad23334f454d598 SHA256 06e70a7f94709686818fbca4f8a54810bbe070b0813c80232069d488d1755044 MISC metadata.xml 550 RMD160 7269bc138013ec091e6025c4cb09148bd7740db5 SHA1 18b669d81765a665d50d3df22d14d77b576a89c1 SHA256 e9ea661a4a691f3c119d65ebab8ee933df91862f63a8cbfb8a1591307e49fc03 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.13 (GNU/Linux) -iJwEAQECAAYFAksP3uMACgkQG7kqcTWJkGel4QP+KAizkNXTJA6Np5f97IMb4GAA -ZmjeGG63EXHGI2VjKEXuvjC9vlz8HGiVhxO4uyUdnMtzlpCJlc6yAJpfOylP2JvD -sgGpb5yb4zhsk8WrIPlhDaiFR0k9aSuz5JyWkhRXixzxxACoWThdIDwE03GNfY7N -N1o1yDKeF2W409zojF0= -=1pMx +iJwEAQECAAYFAksrvKUACgkQG7kqcTWJkGd+SgQAkY0fO5d/lHn2mgYmsLeup0VZ +PFaULCgeV0xSlxl9ZdC9dKwroE7/wYxwP6tjiPCxl70gsjousCR/krcyjDdPhTcT +LcIZsE/0AYU12/SidG4XFzW0oDGuLWe+dfdne+pzxiHO1ccDEE8CMmEd90OTKwFw +SW34Z8MrjTZlhMrN/+c= +=6C76 -----END PGP SIGNATURE----- diff --git a/sys-fs/aufs2/aufs2-0_p20091214.ebuild b/sys-fs/aufs2/aufs2-0_p20091214.ebuild new file mode 100644 index 000000000000..7d1f1b55c4d1 --- /dev/null +++ b/sys-fs/aufs2/aufs2-0_p20091214.ebuild @@ -0,0 +1,89 @@ +# Copyright 1999-2009 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sys-fs/aufs2/aufs2-0_p20091214.ebuild,v 1.1 2009/12/18 17:32:10 tommy Exp $ + +EAPI="2" + +inherit linux-mod toolchain-funcs + +DESCRIPTION="An entirely re-designed and re-implemented Unionfs" +HOMEPAGE="http://aufs.sourceforge.net" +SRC_URI="mirror://gentoo/${P}.tar.bz2" + +LICENSE="GPL-2" +SLOT="0" +KEYWORDS="~amd64 ~x86" +IUSE="debug inotify kernel-patch nfs ramfs" + +DEPEND="dev-util/git" +RDEPEND="!sys-fs/aufs" + +S=${WORKDIR}/${PN}-standalone + +MODULE_NAMES="aufs(misc:${S})" + +pkg_setup() { + get_version + kernel_is lt 2 6 27 && die "kernel too old" + kernel_is gt 2 6 32 && die "kernel too new" + + if ! ( patch -p1 --dry-run --force -R -d ${KV_DIR} < "${FILESDIR}"/aufs2-standalone-${KV_PATCH}.patch >/dev/null && \ + patch -p1 --dry-run --force -R -d ${KV_DIR} < "${FILESDIR}"/aufs2-base-${KV_PATCH}.patch >/dev/null ); then + if use kernel-patch; then + cd ${KV_DIR} + ewarn "Patching your kernel..." + patch --no-backup-if-mismatch --force -p1 -R -d ${KV_DIR} < "${FILESDIR}"/aufs2-standalone-${KV_PATCH}.patch >/dev/null + patch --no-backup-if-mismatch --force -p1 -R -d ${KV_DIR} < "${FILESDIR}"/aufs2-base-${KV_PATCH}.patch >/dev/null + epatch "${FILESDIR}"/aufs2-{base,standalone}-${KV_PATCH}.patch + elog "You need to compile your kernel with the applied patch" + elog "to be able to load and use the aufs kernel module" + else + eerror "You need to apply a patch to your kernel to compile and run the aufs2 module" + eerror "Either enable the kernel-patch useflag to do it with this ebuild" + eerror "or apply ${FILESDIR}/aufs2-base-${KV_PATCH}.patch and" + eerror "${FILESDIR}/aufs2-standalone-${KV_PATCH}.patch by hand" + die "missing kernel patch, please apply it first" + fi + fi + linux-mod_pkg_setup +} + +src_prepare() { + local branch=origin/aufs2-${KV_PATCH} + if [[ $KV_PATCH == 33 ]] ; then + branch=origin/aufs2 + fi + git checkout -q $branch || die + if ! use debug; then + sed -i "s:DEBUG = y:DEBUG =:g" config.mk || die + fi + if use inotify; then + sed -i "s:HINOTIFY =:HINOTIFY = y:g" config.mk || die + fi + if use ramfs; then + sed -i "s:RAMFS =:RAMFS = y:g" config.mk || die + fi + + cd "${WORKDIR}"/${PN}-util + sed -i "/LDFLAGS += -static -s/d" Makefile || die +} + +src_compile() { + local myargs="" ARCH=x86 + use nfs && myargs="CONFIG_EXPORTFS=y CONFIG_AUFS_EXPORT=y " + use nfs && use amd64 && myargs+="CONFIG_AUFS_INO_T_64=y" + emake CC=$(tc-getCC) CONFIG_AUFS_FS=m ${myargs} KDIR=${KV_DIR} || die + cd "${WORKDIR}"/${PN}-util + emake CC=$(tc-getCC) AR=$(tc-getAR) KDIR=${KV_DIR} C_INCLUDE_PATH="${S}"/include || die +} + +src_install() { + linux-mod_src_install + dodoc README || die + docinto design + dodoc design/*.txt || die + cd "${WORKDIR}"/${PN}-util + emake DESTDIR="${D}" install || die + docinto + newdoc README README-utils || die +} diff --git a/sys-fs/aufs2/files/aufs2-base-32.patch b/sys-fs/aufs2/files/aufs2-base-32.patch new file mode 100644 index 000000000000..b8db42f2ac1c --- /dev/null +++ b/sys-fs/aufs2/files/aufs2-base-32.patch @@ -0,0 +1,81 @@ +aufs2 base patch for linux-2.6.32 + +diff --git a/fs/namei.c b/fs/namei.c +index d11f404..7d28f56 100644 +--- a/fs/namei.c ++++ b/fs/namei.c +@@ -1219,7 +1219,7 @@ out: + * needs parent already locked. Doesn't follow mounts. + * SMP-safe. + */ +-static struct dentry *lookup_hash(struct nameidata *nd) ++struct dentry *lookup_hash(struct nameidata *nd) + { + int err; + +@@ -1229,7 +1229,7 @@ static struct dentry *lookup_hash(struct nameidata *nd) + return __lookup_hash(&nd->last, nd->path.dentry, nd); + } + +-static int __lookup_one_len(const char *name, struct qstr *this, ++int __lookup_one_len(const char *name, struct qstr *this, + struct dentry *base, int len) + { + unsigned long hash; +diff --git a/fs/splice.c b/fs/splice.c +index 7394e9e..77184f0 100644 +--- a/fs/splice.c ++++ b/fs/splice.c +@@ -1051,8 +1051,8 @@ EXPORT_SYMBOL(generic_splice_sendpage); + /* + * Attempt to initiate a splice from pipe to file. + */ +-static long do_splice_from(struct pipe_inode_info *pipe, struct file *out, +- loff_t *ppos, size_t len, unsigned int flags) ++long do_splice_from(struct pipe_inode_info *pipe, struct file *out, ++ loff_t *ppos, size_t len, unsigned int flags) + { + ssize_t (*splice_write)(struct pipe_inode_info *, struct file *, + loff_t *, size_t, unsigned int); +@@ -1078,9 +1078,9 @@ static long do_splice_from(struct pipe_inode_info *pipe, struct file *out, + /* + * Attempt to initiate a splice from a file to a pipe. + */ +-static long do_splice_to(struct file *in, loff_t *ppos, +- struct pipe_inode_info *pipe, size_t len, +- unsigned int flags) ++long do_splice_to(struct file *in, loff_t *ppos, ++ struct pipe_inode_info *pipe, size_t len, ++ unsigned int flags) + { + ssize_t (*splice_read)(struct file *, loff_t *, + struct pipe_inode_info *, size_t, unsigned int); +diff --git a/include/linux/namei.h b/include/linux/namei.h +index ec0f607..1438153 100644 +--- a/include/linux/namei.h ++++ b/include/linux/namei.h +@@ -75,6 +75,9 @@ extern struct file *lookup_instantiate_filp(struct nameidata *nd, struct dentry + extern struct file *nameidata_to_filp(struct nameidata *nd, int flags); + extern void release_open_intent(struct nameidata *); + ++extern struct dentry *lookup_hash(struct nameidata *nd); ++extern int __lookup_one_len(const char *name, struct qstr *this, ++ struct dentry *base, int len); + extern struct dentry *lookup_one_len(const char *, struct dentry *, int); + extern struct dentry *lookup_one_noperm(const char *, struct dentry *); + +diff --git a/include/linux/splice.h b/include/linux/splice.h +index 18e7c7c..8393b5c 100644 +--- a/include/linux/splice.h ++++ b/include/linux/splice.h +@@ -82,4 +82,10 @@ extern ssize_t splice_to_pipe(struct pipe_inode_info *, + extern ssize_t splice_direct_to_actor(struct file *, struct splice_desc *, + splice_direct_actor *); + ++extern long do_splice_from(struct pipe_inode_info *pipe, struct file *out, ++ loff_t *ppos, size_t len, unsigned int flags); ++extern long do_splice_to(struct file *in, loff_t *ppos, ++ struct pipe_inode_info *pipe, size_t len, ++ unsigned int flags); ++ + #endif diff --git a/sys-fs/aufs2/files/aufs2-standalone-32.patch b/sys-fs/aufs2/files/aufs2-standalone-32.patch new file mode 100644 index 000000000000..1780b91e0616 --- /dev/null +++ b/sys-fs/aufs2/files/aufs2-standalone-32.patch @@ -0,0 +1,182 @@ +aufs2 standalone patch for linux-2.6.32 + +diff --git a/fs/namei.c b/fs/namei.c +index 7d28f56..0f6117c 100644 +--- a/fs/namei.c ++++ b/fs/namei.c +@@ -350,6 +350,7 @@ int deny_write_access(struct file * file) + + return 0; + } ++EXPORT_SYMBOL(deny_write_access); + + /** + * path_get - get a reference to a path +@@ -1228,6 +1229,7 @@ struct dentry *lookup_hash(struct nameidata *nd) + return ERR_PTR(err); + return __lookup_hash(&nd->last, nd->path.dentry, nd); + } ++EXPORT_SYMBOL(lookup_hash); + + int __lookup_one_len(const char *name, struct qstr *this, + struct dentry *base, int len) +@@ -1250,6 +1252,7 @@ int __lookup_one_len(const char *name, struct qstr *this, + this->hash = end_name_hash(hash); + return 0; + } ++EXPORT_SYMBOL(__lookup_one_len); + + /** + * lookup_one_len - filesystem helper to lookup single pathname component +diff --git a/fs/namespace.c b/fs/namespace.c +index bdc3cb4..a2cadcf 100644 +--- a/fs/namespace.c ++++ b/fs/namespace.c +@@ -39,6 +39,7 @@ + + /* spinlock for vfsmount related operations, inplace of dcache_lock */ + __cacheline_aligned_in_smp DEFINE_SPINLOCK(vfsmount_lock); ++EXPORT_SYMBOL(vfsmount_lock); + + static int event; + static DEFINE_IDA(mnt_id_ida); +diff --git a/fs/open.c b/fs/open.c +index 4f01e06..ef09031 100644 +--- a/fs/open.c ++++ b/fs/open.c +@@ -223,6 +223,7 @@ int do_truncate(struct dentry *dentry, loff_t length, unsigned int time_attrs, + mutex_unlock(&dentry->d_inode->i_mutex); + return ret; + } ++EXPORT_SYMBOL(do_truncate); + + static long do_sys_truncate(const char __user *pathname, loff_t length) + { +diff --git a/fs/splice.c b/fs/splice.c +index 77184f0..8479d95 100644 +--- a/fs/splice.c ++++ b/fs/splice.c +@@ -1074,6 +1074,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out, + + return splice_write(pipe, out, ppos, len, flags); + } ++EXPORT_SYMBOL(do_splice_from); + + /* + * Attempt to initiate a splice from a file to a pipe. +@@ -1099,6 +1100,7 @@ long do_splice_to(struct file *in, loff_t *ppos, + + return splice_read(in, ppos, pipe, len, flags); + } ++EXPORT_SYMBOL(do_splice_to); + + /** + * splice_direct_to_actor - splices data directly between two non-pipes +diff --git a/security/device_cgroup.c b/security/device_cgroup.c +index 6cf8fd2..008e0d8 100644 +--- a/security/device_cgroup.c ++++ b/security/device_cgroup.c +@@ -514,6 +514,7 @@ found: + + return -EPERM; + } ++EXPORT_SYMBOL(devcgroup_inode_permission); + + int devcgroup_inode_mknod(int mode, dev_t dev) + { +diff --git a/security/integrity/ima/ima_main.c b/security/integrity/ima/ima_main.c +index b85e61b..a23fad4 100644 +--- a/security/integrity/ima/ima_main.c ++++ b/security/integrity/ima/ima_main.c +@@ -324,6 +324,7 @@ int ima_file_mmap(struct file *file, unsigned long prot) + MAY_EXEC, FILE_MMAP); + return 0; + } ++EXPORT_SYMBOL(ima_file_mmap); + + /** + * ima_bprm_check - based on policy, collect/store measurement. +diff --git a/security/security.c b/security/security.c +index c4c6732..854d15c 100644 +--- a/security/security.c ++++ b/security/security.c +@@ -386,6 +386,7 @@ int security_path_mkdir(struct path *path, struct dentry *dentry, int mode) + return 0; + return security_ops->path_mkdir(path, dentry, mode); + } ++EXPORT_SYMBOL(security_path_mkdir); + + int security_path_rmdir(struct path *path, struct dentry *dentry) + { +@@ -393,6 +394,7 @@ int security_path_rmdir(struct path *path, struct dentry *dentry) + return 0; + return security_ops->path_rmdir(path, dentry); + } ++EXPORT_SYMBOL(security_path_rmdir); + + int security_path_unlink(struct path *path, struct dentry *dentry) + { +@@ -400,6 +402,7 @@ int security_path_unlink(struct path *path, struct dentry *dentry) + return 0; + return security_ops->path_unlink(path, dentry); + } ++EXPORT_SYMBOL(security_path_unlink); + + int security_path_symlink(struct path *path, struct dentry *dentry, + const char *old_name) +@@ -408,6 +411,7 @@ int security_path_symlink(struct path *path, struct dentry *dentry, + return 0; + return security_ops->path_symlink(path, dentry, old_name); + } ++EXPORT_SYMBOL(security_path_symlink); + + int security_path_link(struct dentry *old_dentry, struct path *new_dir, + struct dentry *new_dentry) +@@ -416,6 +420,7 @@ int security_path_link(struct dentry *old_dentry, struct path *new_dir, + return 0; + return security_ops->path_link(old_dentry, new_dir, new_dentry); + } ++EXPORT_SYMBOL(security_path_link); + + int security_path_rename(struct path *old_dir, struct dentry *old_dentry, + struct path *new_dir, struct dentry *new_dentry) +@@ -426,6 +431,7 @@ int security_path_rename(struct path *old_dir, struct dentry *old_dentry, + return security_ops->path_rename(old_dir, old_dentry, new_dir, + new_dentry); + } ++EXPORT_SYMBOL(security_path_rename); + + int security_path_truncate(struct path *path, loff_t length, + unsigned int time_attrs) +@@ -434,6 +440,7 @@ int security_path_truncate(struct path *path, loff_t length, + return 0; + return security_ops->path_truncate(path, length, time_attrs); + } ++EXPORT_SYMBOL(security_path_truncate); + #endif + + int security_inode_create(struct inode *dir, struct dentry *dentry, int mode) +@@ -505,6 +512,7 @@ int security_inode_readlink(struct dentry *dentry) + return 0; + return security_ops->inode_readlink(dentry); + } ++EXPORT_SYMBOL(security_inode_readlink); + + int security_inode_follow_link(struct dentry *dentry, struct nameidata *nd) + { +@@ -519,6 +527,7 @@ int security_inode_permission(struct inode *inode, int mask) + return 0; + return security_ops->inode_permission(inode, mask); + } ++EXPORT_SYMBOL(security_inode_permission); + + int security_inode_setattr(struct dentry *dentry, struct iattr *attr) + { +@@ -619,6 +628,7 @@ int security_file_permission(struct file *file, int mask) + { + return security_ops->file_permission(file, mask); + } ++EXPORT_SYMBOL(security_file_permission); + + int security_file_alloc(struct file *file) + { diff --git a/sys-fs/aufs2/files/utils-Makefile.patch b/sys-fs/aufs2/files/utils-Makefile.patch deleted file mode 100644 index b989fdab2770..000000000000 --- a/sys-fs/aufs2/files/utils-Makefile.patch +++ /dev/null @@ -1,18 +0,0 @@ ---- Makefile 2009-05-10 19:23:32.000000000 +0200 -+++ Makefile.new 2009-05-10 19:23:49.000000000 +0200 -@@ -21,7 +21,6 @@ - - CFLAGS += -I${KDIR}/include - CFLAGS += -O -Wall --LDFLAGS += -static -s - - Cmd = umount.aufs auchk #aubrsync - Etc = etc_default_aufs -@@ -55,6 +54,7 @@ - install_etc: File = etc_default_aufs - install_etc: Tgt = ${DESTDIR}/etc/default/aufs - install_sbin install_ubin install_etc: ${File} -+ mkdir -p ${Tgt} - install -m 755 -o root -g root -p ${File} ${Tgt} - install: install_sbin install_ubin install_etc - |