summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThomas Sachau <tommy@gentoo.org>2010-05-25 16:09:36 +0000
committerThomas Sachau <tommy@gentoo.org>2010-05-25 16:09:36 +0000
commit9e11ce1f1c278d66489335ee07fe84ec5850a407 (patch)
treedbc53ada7bbaa48cb245eaddecf8a80481f535fd /sys-fs/aufs2
parentStable on amd64 wrt bug #320711 (diff)
downloadhistorical-9e11ce1f1c278d66489335ee07fe84ec5850a407.tar.gz
historical-9e11ce1f1c278d66489335ee07fe84ec5850a407.tar.bz2
historical-9e11ce1f1c278d66489335ee07fe84ec5850a407.zip
Version bump, includes support for kernel 2.6.34
Package-Manager: portage-2.2_rc67-r7/cvs/Linux x86_64
Diffstat (limited to 'sys-fs/aufs2')
-rw-r--r--sys-fs/aufs2/ChangeLog12
-rw-r--r--sys-fs/aufs2/Manifest29
-rw-r--r--sys-fs/aufs2/aufs2-0_p20100524.ebuild (renamed from sys-fs/aufs2/aufs2-0_p20100308.ebuild)13
-rw-r--r--sys-fs/aufs2/files/aufs2-base-27.patch81
-rw-r--r--sys-fs/aufs2/files/aufs2-base-31.patch4
-rw-r--r--sys-fs/aufs2/files/aufs2-base-34.patch81
-rw-r--r--sys-fs/aufs2/files/aufs2-standalone-27.patch169
-rw-r--r--sys-fs/aufs2/files/aufs2-standalone-28.patch34
-rw-r--r--sys-fs/aufs2/files/aufs2-standalone-29.patch30
-rw-r--r--sys-fs/aufs2/files/aufs2-standalone-30.patch10
-rw-r--r--sys-fs/aufs2/files/aufs2-standalone-34.patch272
11 files changed, 556 insertions, 179 deletions
diff --git a/sys-fs/aufs2/ChangeLog b/sys-fs/aufs2/ChangeLog
index ec0ad605b130..3b59756e524e 100644
--- a/sys-fs/aufs2/ChangeLog
+++ b/sys-fs/aufs2/ChangeLog
@@ -1,6 +1,16 @@
# ChangeLog for sys-fs/aufs2
# Copyright 1999-2010 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/sys-fs/aufs2/ChangeLog,v 1.20 2010/05/17 17:04:58 tommy Exp $
+# $Header: /var/cvsroot/gentoo-x86/sys-fs/aufs2/ChangeLog,v 1.21 2010/05/25 16:09:36 tommy Exp $
+
+*aufs2-0_p20100524 (25 May 2010)
+
+ 25 May 2010; Thomas Sachau (Tommy[D]) <tommy@gentoo.org>
+ -aufs2-0_p20100308.ebuild, +aufs2-0_p20100524.ebuild,
+ +files/aufs2-base-27.patch, files/aufs2-standalone-27.patch,
+ files/aufs2-standalone-28.patch, files/aufs2-standalone-29.patch,
+ files/aufs2-standalone-30.patch, files/aufs2-base-31.patch,
+ +files/aufs2-base-34.patch, +files/aufs2-standalone-34.patch:
+ Version bump, includes support for kernel 2.6.34
17 May 2010; Thomas Sachau (Tommy[D]) <tommy@gentoo.org>
aufs2-0_p20100405.ebuild:
diff --git a/sys-fs/aufs2/Manifest b/sys-fs/aufs2/Manifest
index 49978480d264..cf19883af938 100644
--- a/sys-fs/aufs2/Manifest
+++ b/sys-fs/aufs2/Manifest
@@ -1,32 +1,35 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
+AUX aufs2-base-27.patch 2895 RMD160 5159918ce498d82923bbda6ee6766b6cc40cf74a SHA1 909c52e7343ac990918f7cbb78ca8eb7126c7c24 SHA256 26f82b4d623579e0fd721dcee7191ad54c9742804468769dc32f18f451060a97
AUX aufs2-base-28.patch 2895 RMD160 8055dd188e288ba4e66fafd11d78dcf5e97cae90 SHA1 ed691340ef5abce398f8b11e679b64db9bcee312 SHA256 d1869072da1a25d908a06dd34700cf8c5b03fde93b3d7ffef0d6a2948396430e
AUX aufs2-base-29.patch 2895 RMD160 bf89ba5f9f52ea1b9e320439e0bc18f8a006c8c3 SHA1 92a4aff3a945ea7a4a4509ed3539d0a3689c0737 SHA256 b4d8c9883f7f919f0d0a15792420e59f14d41bc1b0daab906ba7affc29485dac
AUX aufs2-base-30.patch 2895 RMD160 13d6fcb45135e4177d6dd506bc7a32fc6b2741fe SHA1 4845f3608540dbc0fa2fa5c914907eb14b51a0f0 SHA256 11f9061805e715c9d9a58dab04a32876ed27bced61c3157cde4e58a08dcdde51
-AUX aufs2-base-31.patch 3086 RMD160 df84e409111526f48e5ffcf7b9d269aa6f9abce6 SHA1 e422dc0a95e3fe398d8ab178d7b34caaf8d0507f SHA256 c75e1f1d6d8320347f109535d65d36d4b3843cf95f3db2b0198b7f61c0f50948
+AUX aufs2-base-31.patch 3088 RMD160 7e5c9cb60e39d7584a84536d3380bafab1e80a4d SHA1 257ba953b26d1fb47897e0ab4573baab834d4bbf SHA256 53e89145de687d0258ded6c889ad284ae5525fb4aa1a05f432b96d67c6b9b3e5
AUX aufs2-base-32.patch 3088 RMD160 d2225a227dcee3ceb166dcbb52757c07da93621c SHA1 ce9f64ff2b3e173ab7caf226683a73e41cf58d91 SHA256 46522f1701f907e02776f5ae049802337b583fd6259f4e8468ff4a48cbf8d957
AUX aufs2-base-33.patch 3049 RMD160 227353c3964819b745c57d404df80e5dea393bf9 SHA1 aaa0b1a41d513cd939db9e6d4369b188f25b79df SHA256 3e602dfd1791d21d9067b95698ab123c00b89b63e2147e8c2f62959c7d39c2ee
-AUX aufs2-standalone-27.patch 7441 RMD160 754f282fb14e1c8be0e1f4e84c131c4bdb50f1a7 SHA1 6d38c1b43d5d2af37fd926a6cf7f9ab159733a5a SHA256 0eb880e1313c1a446bcdf63e7e8132d2c44efb47dc16c7f2c0c141dc8cc7b90e
-AUX aufs2-standalone-28.patch 3930 RMD160 40c2efb98084887425e3de60e44c893624e05802 SHA1 a66d3cf45b66a71c3848f593ac8a9ca084945d29 SHA256 84e1f4afb7897551f72661b4c2c5e459147309c8cf29be13821b7b5e695a489f
-AUX aufs2-standalone-29.patch 5748 RMD160 67fdda784ef736559e4b12038e625f5422351005 SHA1 8feb9ed859c239cda93863c8a965b3a13c563f71 SHA256 1b6d93c6b0fedbed48caa539ec231196f84cf697ca5bfe117f64a87aa17db33b
-AUX aufs2-standalone-30.patch 5432 RMD160 4a9979bb29164ee81e25c920df0dadbb6c496698 SHA1 1bcebf7b22f784834e5d5f0a25467de31f12320f SHA256 c2972ecca3562b34a2b68800b2322801f614d1945923b6fe7da711392ec37484
+AUX aufs2-base-34.patch 3049 RMD160 ef1e9613801baafb198fe7708ad91e4302dd4a0a SHA1 97bdaf3dbb860a4ee2d13c2d639424d7ef83b3f7 SHA256 717d41a01a596789a976ce79a04fe130efd1b0f59a7dd5d1625d338fc95e83f0
+AUX aufs2-standalone-27.patch 4322 RMD160 a3b0adae7a34369d5835848b32c8bdb90ceb1f14 SHA1 9677eea003fad79255ad876e132d3c5b436f9c14 SHA256 2db4ce52e67f31aeac41010279dd3bc680218ad3080437834caaddd6397a0353
+AUX aufs2-standalone-28.patch 4322 RMD160 5bab72a393a5a5878930d25d20d9c916cd374ba3 SHA1 f9cd11351679e3f759d9e4cccdcb3adfc2590157 SHA256 272bc7bd5873de054370868588646de9a0a71430570c7670cb9201d27268b0a7
+AUX aufs2-standalone-29.patch 6140 RMD160 f97d4bb7a27c83a7de40bf37754f51ccddd962fd SHA1 22d7ed995a5efa3d5c57835b6496c857e91eda92 SHA256 237bedbfc270c0042e62aebd0caa79a0372150f884492435503e6d838fc04d4c
+AUX aufs2-standalone-30.patch 5747 RMD160 84b1d573d66ba7c72c5969190a251e3e446bc30b SHA1 f6ae5849c36bb621c953131f5aa96c3de72ef327 SHA256 4e6169ec73d4eb45e57370bf586f3f75fe79cb064176d1570770ac40e8be6e86
AUX aufs2-standalone-31.patch 8573 RMD160 62ccf355504e99a4bdcc2e66eb4ef6426a6bcea4 SHA1 965e181bd2121d8d10ec71fcabc14999e8adcc37 SHA256 d0cc154608cb65523671d16f3a301ff82fb03b3a36889d86802b6bb246641a1f
AUX aufs2-standalone-32.patch 8573 RMD160 47958e632664dd24dab86102b11cd897dc1a3e43 SHA1 72bb326aa6dfd166f09d4f180dd0d3704e0a6743 SHA256 aea4df11245b7f6cc9fa981840c7ebcc7f21d27e20fd0e569c249a08a8b7ceef
AUX aufs2-standalone-33.patch 8629 RMD160 948926f2067e122a075a5aa03d5a4d5b2d3cf11a SHA1 510fc63ab879377227f036f73841f69b411f79ad SHA256 ce3414ac7976ac2a357d0a20ccd0c5a0d5d1a4a1154b4c24f017ded3aebb8341
+AUX aufs2-standalone-34.patch 8602 RMD160 c39575d284e355d98148907689ca115b23cbf492 SHA1 9dd81c20ab21f35e544c5e966b6eb7423199fc78 SHA256 185f7948c4fdefa0687edfcc7de73836690a3bfae5c28ab06e7fbf4101cb4139
AUX utils-2.6.31.patch 444 RMD160 b89f0373c7d9537cc3124e7d8beaa0eda411a6f3 SHA1 8dcb097c0ddb4a325aef7f043db6809dcbef4035 SHA256 d10f948b03dd47cf2e5635a064c02231d4b7af2c28d45e0368fb0470b15cae62
-DIST aufs2-0_p20100308.tar.bz2 5279852 RMD160 d9399bcaf02037c0e6b9cff2c0e2c5430a4bb174 SHA1 d9e69bd75b7290dd661eebfea7c3e6e9643a13c5 SHA256 6216f67753dddb42fdcc5c54267be151e9acb9ee76d409f3a322128a12e91057
DIST aufs2-0_p20100405.tar.bz2 7105573 RMD160 69c638543e247730cb6be3de3741d18db20be08b SHA1 ccbe21cab7bf67c63e9986d620f2d037557242ea SHA256 8d09d5c101186f01a49bd40acf83f97c9161b5c26e307f0592f55fd0b88a5701
-EBUILD aufs2-0_p20100308.ebuild 3099 RMD160 e8f48485e9a4f239a2a255f7afb2bfa77c1bdc3c SHA1 ce065d62c622f8d1abb2b7fdd625d83903379039 SHA256 03eff3988ec89d768260dc89cb99c36d7fb98b5a22559a4818f26cd9c017ef8f
+DIST aufs2-0_p20100524.tar.bz2 9050579 RMD160 68babff24c29ecebfe8b412a63fe08c5f22be5c5 SHA1 2305c0f58d8057d13f8ecbe1376a570c53d087af SHA256 be7974855c79d2bb9e3f6f69763151d18aeea040d892cb2d71f51e74def0ee2d
EBUILD aufs2-0_p20100405.ebuild 3098 RMD160 ab217a1e1c3f2d97b8f510928749638ef9c38924 SHA1 0b9897f7a20d6491c305ba1950d4a55b98322ec2 SHA256 396557502b782ceeb1c0f7c26e501a1e8ef4c7eec4f91f479109ee2424d247b9
-MISC ChangeLog 4472 RMD160 908a34fe2f86946d89cf61164165c77be0c10c22 SHA1 ae1dbbce7631aae4674d8e4afff8b893e30d37ca SHA256 f5a4becb4c8b87087f1b412cb0b96e736b1bbb46462b7f0c9fbefb160e217ff4
+EBUILD aufs2-0_p20100524.ebuild 3098 RMD160 5533f0954d928344eeab257658238e2a4d8366b2 SHA1 a94211ff7b735d4cbd955e1d89e2e9291ed03ba5 SHA256 9440038b9e94bc2c283c958e48ea873960ff98c88a5b792c1a2ac3a149f714ad
+MISC ChangeLog 4930 RMD160 3ce948ebdfcece5118c78eef66b137600d714fad SHA1 e448f51857a09ee467fd8a0b8a731e797fed7c15 SHA256 425936fdd225df9bcb29dafc744b7eef738f1fe44e17bb024b21a9f09e511420
MISC metadata.xml 550 RMD160 7269bc138013ec091e6025c4cb09148bd7740db5 SHA1 18b669d81765a665d50d3df22d14d77b576a89c1 SHA256 e9ea661a4a691f3c119d65ebab8ee933df91862f63a8cbfb8a1591307e49fc03
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.15 (GNU/Linux)
-iJwEAQECAAYFAkvxd0YACgkQG7kqcTWJkGfSXAP/SlpZg99hmH74tfwfXf2LJVrV
-2TlFbIrn/nA2DLE3Tu6tJWk0HnJLZKw1b13NRjClqiU31RieYsY/sBZCiJWXATLX
-I6XivG6UqUqFNQr7nok7SfVYuBPLYcY+6uck8D6JcbZ/nAYfWVuYJF5mzxZCd0so
-QCj19GToqfTRbdyuwfU=
-=azma
+iJwEAQECAAYFAkv79ksACgkQG7kqcTWJkGcmYgP+LsXxueY0XhhdxrNfsjpxa7h/
+74lGwBcUko6u2x2SZB3Xqa3ZN5477+owIQ7W741ovBNjTJ94WgySn4qWVuiqSpQn
+Wi9/InrTAO0q9HfkKvPUBUBhPwwM/FYd5PDfZ94uarfpnSZY5YOhOoZTrWulefqr
+Rg8fSfRocbodRnHKyLY=
+=H8xu
-----END PGP SIGNATURE-----
diff --git a/sys-fs/aufs2/aufs2-0_p20100308.ebuild b/sys-fs/aufs2/aufs2-0_p20100524.ebuild
index 35d4bdd29849..c203dcf3951c 100644
--- a/sys-fs/aufs2/aufs2-0_p20100308.ebuild
+++ b/sys-fs/aufs2/aufs2-0_p20100524.ebuild
@@ -1,6 +1,6 @@
# Copyright 1999-2010 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-fs/aufs2/aufs2-0_p20100308.ebuild,v 1.3 2010/05/13 01:45:28 ferringb Exp $
+# $Header: /var/cvsroot/gentoo-x86/sys-fs/aufs2/aufs2-0_p20100524.ebuild,v 1.1 2010/05/25 16:09:36 tommy Exp $
EAPI="2"
@@ -23,11 +23,12 @@ S=${WORKDIR}/${PN}-standalone
MODULE_NAMES="aufs(misc:${S})"
pkg_setup() {
- # uesd to allow merging of binpkg aufs2 on systems lacking kernel sources
- [ -n "$PKG_SETUP_HAS_ALREADY_BEEN_RAN" ] && return
+ # this is needed so merging a binpkg aufs2 is possible w/out a kernel unpacked on the system
+ [ -n "$PKG_SETUP_HAS_BEEN_RAN" ] && return
+
get_version
kernel_is lt 2 6 27 && die "kernel too old"
- kernel_is gt 2 6 33 && die "kernel too new"
+ kernel_is gt 2 6 34 && die "kernel too new"
if ! ( patch -p1 --dry-run --force -R -d ${KV_DIR} < "${FILESDIR}"/aufs2-standalone-${KV_PATCH}.patch >/dev/null && \
patch -p1 --dry-run --force -R -d ${KV_DIR} < "${FILESDIR}"/aufs2-base-${KV_PATCH}.patch >/dev/null ); then
@@ -48,7 +49,7 @@ pkg_setup() {
fi
fi
linux-mod_pkg_setup
- export PKG_SETUP_HAS_ALREADY_BEEN_RAN=1
+ export PKG_SETUP_HAS_BEEN_RAN=1
}
src_prepare() {
@@ -58,7 +59,7 @@ src_prepare() {
sed -i "s:DEBUG = y:DEBUG =:g" config.mk || die
fi
if use inotify; then
- sed -i "s:HINOTIFY =:HINOTIFY = y:g" config.mk || die
+ sed -i "s:HNOTIFY =:HNOTIFY = y:g" config.mk || die
fi
if use ramfs; then
sed -i "s:RAMFS =:RAMFS = y:g" config.mk || die
diff --git a/sys-fs/aufs2/files/aufs2-base-27.patch b/sys-fs/aufs2/files/aufs2-base-27.patch
new file mode 100644
index 000000000000..b97a4cace208
--- /dev/null
+++ b/sys-fs/aufs2/files/aufs2-base-27.patch
@@ -0,0 +1,81 @@
+aufs2 base patch for linux-2.6.27
+
+diff --git a/fs/namei.c b/fs/namei.c
+index 4ea63ed..2759ad4 100644
+--- a/fs/namei.c
++++ b/fs/namei.c
+@@ -1241,7 +1241,7 @@ out:
+ * needs parent already locked. Doesn't follow mounts.
+ * SMP-safe.
+ */
+-static struct dentry *lookup_hash(struct nameidata *nd)
++struct dentry *lookup_hash(struct nameidata *nd)
+ {
+ int err;
+
+@@ -1251,7 +1251,7 @@ static struct dentry *lookup_hash(struct nameidata *nd)
+ return __lookup_hash(&nd->last, nd->path.dentry, nd);
+ }
+
+-static int __lookup_one_len(const char *name, struct qstr *this,
++int __lookup_one_len(const char *name, struct qstr *this,
+ struct dentry *base, int len)
+ {
+ unsigned long hash;
+diff --git a/fs/splice.c b/fs/splice.c
+index a1e701c..409245a 100644
+--- a/fs/splice.c
++++ b/fs/splice.c
+@@ -887,8 +887,8 @@ EXPORT_SYMBOL(generic_splice_sendpage);
+ /*
+ * Attempt to initiate a splice from pipe to file.
+ */
+-static long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
+- loff_t *ppos, size_t len, unsigned int flags)
++long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
++ loff_t *ppos, size_t len, unsigned int flags)
+ {
+ int ret;
+
+@@ -911,9 +911,9 @@ static long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
+ /*
+ * Attempt to initiate a splice from a file to a pipe.
+ */
+-static long do_splice_to(struct file *in, loff_t *ppos,
+- struct pipe_inode_info *pipe, size_t len,
+- unsigned int flags)
++long do_splice_to(struct file *in, loff_t *ppos,
++ struct pipe_inode_info *pipe, size_t len,
++ unsigned int flags)
+ {
+ int ret;
+
+diff --git a/include/linux/namei.h b/include/linux/namei.h
+index 68f8c32..5522432 100644
+--- a/include/linux/namei.h
++++ b/include/linux/namei.h
+@@ -71,6 +71,9 @@ extern struct file *lookup_instantiate_filp(struct nameidata *nd, struct dentry
+ extern struct file *nameidata_to_filp(struct nameidata *nd, int flags);
+ extern void release_open_intent(struct nameidata *);
+
++extern struct dentry *lookup_hash(struct nameidata *nd);
++extern int __lookup_one_len(const char *name, struct qstr *this,
++ struct dentry *base, int len);
+ extern struct dentry *lookup_one_len(const char *, struct dentry *, int);
+ extern struct dentry *lookup_one_noperm(const char *, struct dentry *);
+
+diff --git a/include/linux/splice.h b/include/linux/splice.h
+index 528dcb9..5123bc6 100644
+--- a/include/linux/splice.h
++++ b/include/linux/splice.h
+@@ -71,4 +71,10 @@ extern ssize_t splice_to_pipe(struct pipe_inode_info *,
+ extern ssize_t splice_direct_to_actor(struct file *, struct splice_desc *,
+ splice_direct_actor *);
+
++extern long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
++ loff_t *ppos, size_t len, unsigned int flags);
++extern long do_splice_to(struct file *in, loff_t *ppos,
++ struct pipe_inode_info *pipe, size_t len,
++ unsigned int flags);
++
+ #endif
diff --git a/sys-fs/aufs2/files/aufs2-base-31.patch b/sys-fs/aufs2/files/aufs2-base-31.patch
index f8a34eb0de82..7b26e3e44ac3 100644
--- a/sys-fs/aufs2/files/aufs2-base-31.patch
+++ b/sys-fs/aufs2/files/aufs2-base-31.patch
@@ -1,7 +1,7 @@
-aufs2 base patch for linux-2.6.
+aufs2 base patch for linux-2.6.31
diff --git a/fs/namei.c b/fs/namei.c
-index f3c5b27..dcedad1 100644
+index 1f13751..b49c2af 100644
--- a/fs/namei.c
+++ b/fs/namei.c
@@ -1219,7 +1219,7 @@ out:
diff --git a/sys-fs/aufs2/files/aufs2-base-34.patch b/sys-fs/aufs2/files/aufs2-base-34.patch
new file mode 100644
index 000000000000..57e37f64ed1d
--- /dev/null
+++ b/sys-fs/aufs2/files/aufs2-base-34.patch
@@ -0,0 +1,81 @@
+aufs2 base patch for linux-2.6.34
+
+diff --git a/fs/namei.c b/fs/namei.c
+index b86b96f..c43d6b8 100644
+--- a/fs/namei.c
++++ b/fs/namei.c
+@@ -1177,7 +1177,7 @@ out:
+ * needs parent already locked. Doesn't follow mounts.
+ * SMP-safe.
+ */
+-static struct dentry *lookup_hash(struct nameidata *nd)
++struct dentry *lookup_hash(struct nameidata *nd)
+ {
+ int err;
+
+@@ -1187,7 +1187,7 @@ static struct dentry *lookup_hash(struct nameidata *nd)
+ return __lookup_hash(&nd->last, nd->path.dentry, nd);
+ }
+
+-static int __lookup_one_len(const char *name, struct qstr *this,
++int __lookup_one_len(const char *name, struct qstr *this,
+ struct dentry *base, int len)
+ {
+ unsigned long hash;
+diff --git a/fs/splice.c b/fs/splice.c
+index 9313b61..b9e871f 100644
+--- a/fs/splice.c
++++ b/fs/splice.c
+@@ -1054,8 +1054,8 @@ EXPORT_SYMBOL(generic_splice_sendpage);
+ /*
+ * Attempt to initiate a splice from pipe to file.
+ */
+-static long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
+- loff_t *ppos, size_t len, unsigned int flags)
++long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
++ loff_t *ppos, size_t len, unsigned int flags)
+ {
+ ssize_t (*splice_write)(struct pipe_inode_info *, struct file *,
+ loff_t *, size_t, unsigned int);
+@@ -1082,9 +1082,9 @@ static long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
+ /*
+ * Attempt to initiate a splice from a file to a pipe.
+ */
+-static long do_splice_to(struct file *in, loff_t *ppos,
+- struct pipe_inode_info *pipe, size_t len,
+- unsigned int flags)
++long do_splice_to(struct file *in, loff_t *ppos,
++ struct pipe_inode_info *pipe, size_t len,
++ unsigned int flags)
+ {
+ ssize_t (*splice_read)(struct file *, loff_t *,
+ struct pipe_inode_info *, size_t, unsigned int);
+diff --git a/include/linux/namei.h b/include/linux/namei.h
+index 05b441d..91bc74e 100644
+--- a/include/linux/namei.h
++++ b/include/linux/namei.h
+@@ -73,6 +73,9 @@ extern int vfs_path_lookup(struct dentry *, struct vfsmount *,
+ extern struct file *lookup_instantiate_filp(struct nameidata *nd, struct dentry *dentry,
+ int (*open)(struct inode *, struct file *));
+
++extern struct dentry *lookup_hash(struct nameidata *nd);
++extern int __lookup_one_len(const char *name, struct qstr *this,
++ struct dentry *base, int len);
+ extern struct dentry *lookup_one_len(const char *, struct dentry *, int);
+
+ extern int follow_down(struct path *);
+diff --git a/include/linux/splice.h b/include/linux/splice.h
+index 18e7c7c..8393b5c 100644
+--- a/include/linux/splice.h
++++ b/include/linux/splice.h
+@@ -82,4 +82,10 @@ extern ssize_t splice_to_pipe(struct pipe_inode_info *,
+ extern ssize_t splice_direct_to_actor(struct file *, struct splice_desc *,
+ splice_direct_actor *);
+
++extern long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
++ loff_t *ppos, size_t len, unsigned int flags);
++extern long do_splice_to(struct file *in, loff_t *ppos,
++ struct pipe_inode_info *pipe, size_t len,
++ unsigned int flags);
++
+ #endif
diff --git a/sys-fs/aufs2/files/aufs2-standalone-27.patch b/sys-fs/aufs2/files/aufs2-standalone-27.patch
index 52a140be38b4..451cb71878e9 100644
--- a/sys-fs/aufs2/files/aufs2-standalone-27.patch
+++ b/sys-fs/aufs2/files/aufs2-standalone-27.patch
@@ -1,29 +1,7 @@
aufs2 standalone patch for linux-2.6.27
-diff --git a/fs/Kconfig b/fs/Kconfig
-index abccb5d..b987e5e 100644
---- a/fs/Kconfig
-+++ b/fs/Kconfig
-@@ -1539,6 +1539,8 @@ config UFS_DEBUG
- Y here. This will result in _many_ additional debugging messages to be
- written to the system log.
-
-+source "fs/aufs/Kconfig"
-+
- endmenu
-
- menuconfig NETWORK_FILESYSTEMS
-diff --git a/fs/Makefile b/fs/Makefile
-index a1482a5..aa51c5a 100644
---- a/fs/Makefile
-+++ b/fs/Makefile
-@@ -122,3 +122,4 @@ obj-$(CONFIG_HPPFS) += hppfs/
- obj-$(CONFIG_DEBUG_FS) += debugfs/
- obj-$(CONFIG_OCFS2_FS) += ocfs2/
- obj-$(CONFIG_GFS2_FS) += gfs2/
-+obj-$(CONFIG_AUFS_FS) += aufs/
diff --git a/fs/namei.c b/fs/namei.c
-index 4ea63ed..b207821 100644
+index 2759ad4..b207821 100644
--- a/fs/namei.c
+++ b/fs/namei.c
@@ -354,6 +354,7 @@ int deny_write_access(struct file * file)
@@ -34,27 +12,15 @@ index 4ea63ed..b207821 100644
/**
* path_get - get a reference to a path
-@@ -1241,7 +1242,7 @@ out:
- * needs parent already locked. Doesn't follow mounts.
- * SMP-safe.
- */
--static struct dentry *lookup_hash(struct nameidata *nd)
-+struct dentry *lookup_hash(struct nameidata *nd)
- {
- int err;
-
-@@ -1250,8 +1251,9 @@ static struct dentry *lookup_hash(struct nameidata *nd)
+@@ -1250,6 +1251,7 @@ struct dentry *lookup_hash(struct nameidata *nd)
return ERR_PTR(err);
return __lookup_hash(&nd->last, nd->path.dentry, nd);
}
+EXPORT_SYMBOL(lookup_hash);
--static int __lookup_one_len(const char *name, struct qstr *this,
-+int __lookup_one_len(const char *name, struct qstr *this,
+ int __lookup_one_len(const char *name, struct qstr *this,
struct dentry *base, int len)
- {
- unsigned long hash;
-@@ -1272,6 +1274,7 @@ static int __lookup_one_len(const char *name, struct qstr *this,
+@@ -1272,6 +1274,7 @@ int __lookup_one_len(const char *name, struct qstr *this,
this->hash = end_name_hash(hash);
return 0;
}
@@ -63,16 +29,14 @@ index 4ea63ed..b207821 100644
/**
* lookup_one_len - filesystem helper to lookup single pathname component
diff --git a/fs/namespace.c b/fs/namespace.c
-index 6e283c9..98f56b9 100644
+index 6e283c9..36030e8 100644
--- a/fs/namespace.c
+++ b/fs/namespace.c
-@@ -37,6 +37,9 @@
+@@ -37,6 +37,7 @@
/* spinlock for vfsmount related operations, inplace of dcache_lock */
__cacheline_aligned_in_smp DEFINE_SPINLOCK(vfsmount_lock);
-+#ifdef CONFIG_AUFS_EXPORT
+EXPORT_SYMBOL(vfsmount_lock);
-+#endif
static int event;
static DEFINE_IDA(mnt_id_ida);
@@ -89,21 +53,10 @@ index 07da935..b8e9726 100644
static long do_sys_truncate(const char __user *pathname, loff_t length)
{
diff --git a/fs/splice.c b/fs/splice.c
-index a1e701c..48d7e72 100644
+index 409245a..48d7e72 100644
--- a/fs/splice.c
+++ b/fs/splice.c
-@@ -887,8 +887,8 @@ EXPORT_SYMBOL(generic_splice_sendpage);
- /*
- * Attempt to initiate a splice from pipe to file.
- */
--static long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
-- loff_t *ppos, size_t len, unsigned int flags)
-+long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
-+ loff_t *ppos, size_t len, unsigned int flags)
- {
- int ret;
-
-@@ -907,13 +907,14 @@ static long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
+@@ -907,6 +907,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
return out->f_op->splice_write(pipe, out, ppos, len, flags);
}
@@ -111,17 +64,7 @@ index a1e701c..48d7e72 100644
/*
* Attempt to initiate a splice from a file to a pipe.
- */
--static long do_splice_to(struct file *in, loff_t *ppos,
-- struct pipe_inode_info *pipe, size_t len,
-- unsigned int flags)
-+long do_splice_to(struct file *in, loff_t *ppos,
-+ struct pipe_inode_info *pipe, size_t len,
-+ unsigned int flags)
- {
- int ret;
-
-@@ -929,6 +930,7 @@ static long do_splice_to(struct file *in, loff_t *ppos,
+@@ -929,6 +930,7 @@ long do_splice_to(struct file *in, loff_t *ppos,
return in->f_op->splice_read(in, ppos, pipe, len, flags);
}
@@ -129,18 +72,6 @@ index a1e701c..48d7e72 100644
/**
* splice_direct_to_actor - splices data directly between two non-pipes
-diff --git a/fs/super.c b/fs/super.c
-index e931ae9..141853c 100644
---- a/fs/super.c
-+++ b/fs/super.c
-@@ -270,6 +270,7 @@ int fsync_super(struct super_block *sb)
- __fsync_super(sb);
- return sync_blockdev(sb->s_bdev);
- }
-+EXPORT_SYMBOL(fsync_super);
-
- /**
- * generic_shutdown_super - common helper for ->kill_sb()
diff --git a/fs/sync.c b/fs/sync.c
index 2967562..34040d6 100644
--- a/fs/sync.c
@@ -153,60 +84,18 @@ index 2967562..34040d6 100644
static long __do_fsync(unsigned int fd, int datasync)
{
-diff --git a/include/linux/Kbuild b/include/linux/Kbuild
-index b68ec09..22d182c 100644
---- a/include/linux/Kbuild
-+++ b/include/linux/Kbuild
-@@ -34,6 +34,7 @@ header-y += atmppp.h
- header-y += atmsap.h
- header-y += atmsvc.h
- header-y += atm_zatm.h
-+header-y += aufs_type.h
- header-y += auto_fs4.h
- header-y += ax25.h
- header-y += b1lli.h
-diff --git a/include/linux/lockdep.h b/include/linux/lockdep.h
-index 331e5f1..606bf6e 100644
---- a/include/linux/lockdep.h
-+++ b/include/linux/lockdep.h
-@@ -58,7 +58,7 @@ enum lock_usage_bit
- #define LOCKF_USED_IN_IRQ_READ \
- (LOCKF_USED_IN_HARDIRQ_READ | LOCKF_USED_IN_SOFTIRQ_READ)
-
--#define MAX_LOCKDEP_SUBCLASSES 8UL
-+#define MAX_LOCKDEP_SUBCLASSES 12UL
+diff --git a/kernel/mutex-debug.c b/kernel/mutex-debug.c
+index 1d94160..34fda4a 100644
+--- a/kernel/mutex-debug.c
++++ b/kernel/mutex-debug.c
+@@ -30,6 +30,7 @@ void debug_mutex_set_owner(struct mutex *lock, struct thread_info *new_owner)
+ {
+ lock->owner = new_owner;
+ }
++EXPORT_SYMBOL(debug_mutex_set_owner);
- /*
- * Lock-classes are keyed via unique addresses, by embedding the
-diff --git a/include/linux/namei.h b/include/linux/namei.h
-index 68f8c32..5522432 100644
---- a/include/linux/namei.h
-+++ b/include/linux/namei.h
-@@ -71,6 +71,9 @@ extern struct file *lookup_instantiate_filp(struct nameidata *nd, struct dentry
- extern struct file *nameidata_to_filp(struct nameidata *nd, int flags);
- extern void release_open_intent(struct nameidata *);
-
-+extern struct dentry *lookup_hash(struct nameidata *nd);
-+extern int __lookup_one_len(const char *name, struct qstr *this,
-+ struct dentry *base, int len);
- extern struct dentry *lookup_one_len(const char *, struct dentry *, int);
- extern struct dentry *lookup_one_noperm(const char *, struct dentry *);
-
-diff --git a/include/linux/splice.h b/include/linux/splice.h
-index 528dcb9..5123bc6 100644
---- a/include/linux/splice.h
-+++ b/include/linux/splice.h
-@@ -71,4 +71,10 @@ extern ssize_t splice_to_pipe(struct pipe_inode_info *,
- extern ssize_t splice_direct_to_actor(struct file *, struct splice_desc *,
- splice_direct_actor *);
-
-+extern long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
-+ loff_t *ppos, size_t len, unsigned int flags);
-+extern long do_splice_to(struct file *in, loff_t *ppos,
-+ struct pipe_inode_info *pipe, size_t len,
-+ unsigned int flags);
-+
- #endif
+ void debug_mutex_lock_common(struct mutex *lock, struct mutex_waiter *waiter)
+ {
diff --git a/security/device_cgroup.c b/security/device_cgroup.c
index 46f2397..00ec611 100644
--- a/security/device_cgroup.c
@@ -220,7 +109,7 @@ index 46f2397..00ec611 100644
int devcgroup_inode_mknod(int mode, dev_t dev)
{
diff --git a/security/security.c b/security/security.c
-index 3a4b4f5..4d7882e 100644
+index 3a4b4f5..cd573d3 100644
--- a/security/security.c
+++ b/security/security.c
@@ -425,6 +425,7 @@ int security_inode_readlink(struct dentry *dentry)
@@ -239,3 +128,19 @@ index 3a4b4f5..4d7882e 100644
int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
{
+@@ -539,6 +541,7 @@ int security_file_permission(struct file *file, int mask)
+ {
+ return security_ops->file_permission(file, mask);
+ }
++EXPORT_SYMBOL(security_file_permission);
+
+ int security_file_alloc(struct file *file)
+ {
+@@ -561,6 +564,7 @@ int security_file_mmap(struct file *file, unsigned long reqprot,
+ {
+ return security_ops->file_mmap(file, reqprot, prot, flags, addr, addr_only);
+ }
++EXPORT_SYMBOL(security_file_mmap);
+
+ int security_file_mprotect(struct vm_area_struct *vma, unsigned long reqprot,
+ unsigned long prot)
diff --git a/sys-fs/aufs2/files/aufs2-standalone-28.patch b/sys-fs/aufs2/files/aufs2-standalone-28.patch
index 5ce4bc016778..0cd970e12bc8 100644
--- a/sys-fs/aufs2/files/aufs2-standalone-28.patch
+++ b/sys-fs/aufs2/files/aufs2-standalone-28.patch
@@ -72,18 +72,6 @@ index 678100b..7b7d65e 100644
/**
* splice_direct_to_actor - splices data directly between two non-pipes
-diff --git a/fs/super.c b/fs/super.c
-index 400a760..a1df361 100644
---- a/fs/super.c
-+++ b/fs/super.c
-@@ -270,6 +270,7 @@ int fsync_super(struct super_block *sb)
- __fsync_super(sb);
- return sync_blockdev(sb->s_bdev);
- }
-+EXPORT_SYMBOL(fsync_super);
-
- /**
- * generic_shutdown_super - common helper for ->kill_sb()
diff --git a/fs/sync.c b/fs/sync.c
index 2967562..34040d6 100644
--- a/fs/sync.c
@@ -96,6 +84,18 @@ index 2967562..34040d6 100644
static long __do_fsync(unsigned int fd, int datasync)
{
+diff --git a/kernel/mutex-debug.c b/kernel/mutex-debug.c
+index 1d94160..34fda4a 100644
+--- a/kernel/mutex-debug.c
++++ b/kernel/mutex-debug.c
+@@ -30,6 +30,7 @@ void debug_mutex_set_owner(struct mutex *lock, struct thread_info *new_owner)
+ {
+ lock->owner = new_owner;
+ }
++EXPORT_SYMBOL(debug_mutex_set_owner);
+
+ void debug_mutex_lock_common(struct mutex *lock, struct mutex_waiter *waiter)
+ {
diff --git a/security/device_cgroup.c b/security/device_cgroup.c
index 5ba7870..8f880c2 100644
--- a/security/device_cgroup.c
@@ -109,7 +109,7 @@ index 5ba7870..8f880c2 100644
int devcgroup_inode_mknod(int mode, dev_t dev)
{
diff --git a/security/security.c b/security/security.c
-index c0acfa7..812ebf4 100644
+index c0acfa7..8b1dadc 100644
--- a/security/security.c
+++ b/security/security.c
@@ -434,6 +434,7 @@ int security_inode_readlink(struct dentry *dentry)
@@ -136,3 +136,11 @@ index c0acfa7..812ebf4 100644
int security_file_alloc(struct file *file)
{
+@@ -570,6 +573,7 @@ int security_file_mmap(struct file *file, unsigned long reqprot,
+ {
+ return security_ops->file_mmap(file, reqprot, prot, flags, addr, addr_only);
+ }
++EXPORT_SYMBOL(security_file_mmap);
+
+ int security_file_mprotect(struct vm_area_struct *vma, unsigned long reqprot,
+ unsigned long prot)
diff --git a/sys-fs/aufs2/files/aufs2-standalone-29.patch b/sys-fs/aufs2/files/aufs2-standalone-29.patch
index 4ea6675ac92e..ed7914daf7e4 100644
--- a/sys-fs/aufs2/files/aufs2-standalone-29.patch
+++ b/sys-fs/aufs2/files/aufs2-standalone-29.patch
@@ -72,18 +72,18 @@ index 2fb3d17..57cce07 100644
/**
* splice_direct_to_actor - splices data directly between two non-pipes
-diff --git a/fs/super.c b/fs/super.c
-index 6ce5014..af66b69 100644
---- a/fs/super.c
-+++ b/fs/super.c
-@@ -287,6 +287,7 @@ int fsync_super(struct super_block *sb)
- __fsync_super(sb);
- return sync_blockdev(sb->s_bdev);
+diff --git a/kernel/mutex-debug.c b/kernel/mutex-debug.c
+index 1d94160..34fda4a 100644
+--- a/kernel/mutex-debug.c
++++ b/kernel/mutex-debug.c
+@@ -30,6 +30,7 @@ void debug_mutex_set_owner(struct mutex *lock, struct thread_info *new_owner)
+ {
+ lock->owner = new_owner;
}
-+EXPORT_SYMBOL(fsync_super);
++EXPORT_SYMBOL(debug_mutex_set_owner);
- /**
- * generic_shutdown_super - common helper for ->kill_sb()
+ void debug_mutex_lock_common(struct mutex *lock, struct mutex_waiter *waiter)
+ {
diff --git a/security/device_cgroup.c b/security/device_cgroup.c
index 3aacd0f..b900dc3 100644
--- a/security/device_cgroup.c
@@ -97,7 +97,7 @@ index 3aacd0f..b900dc3 100644
int devcgroup_inode_mknod(int mode, dev_t dev)
{
diff --git a/security/security.c b/security/security.c
-index c3586c0..9841a3e 100644
+index c3586c0..4f3a666 100644
--- a/security/security.c
+++ b/security/security.c
@@ -389,6 +389,7 @@ int security_path_mkdir(struct path *path, struct dentry *dentry, int mode)
@@ -180,3 +180,11 @@ index c3586c0..9841a3e 100644
int security_file_alloc(struct file *file)
{
+@@ -642,6 +652,7 @@ int security_file_mmap(struct file *file, unsigned long reqprot,
+ {
+ return security_ops->file_mmap(file, reqprot, prot, flags, addr, addr_only);
+ }
++EXPORT_SYMBOL(security_file_mmap);
+
+ int security_file_mprotect(struct vm_area_struct *vma, unsigned long reqprot,
+ unsigned long prot)
diff --git a/sys-fs/aufs2/files/aufs2-standalone-30.patch b/sys-fs/aufs2/files/aufs2-standalone-30.patch
index f14058dc455e..53c84625ccbd 100644
--- a/sys-fs/aufs2/files/aufs2-standalone-30.patch
+++ b/sys-fs/aufs2/files/aufs2-standalone-30.patch
@@ -85,7 +85,7 @@ index 5fda7df..440e476 100644
int devcgroup_inode_mknod(int mode, dev_t dev)
{
diff --git a/security/security.c b/security/security.c
-index 5284255..ed62ecd 100644
+index 5284255..e419efc 100644
--- a/security/security.c
+++ b/security/security.c
@@ -389,6 +389,7 @@ int security_path_mkdir(struct path *path, struct dentry *dentry, int mode)
@@ -168,3 +168,11 @@ index 5284255..ed62ecd 100644
int security_file_alloc(struct file *file)
{
+@@ -644,6 +654,7 @@ int security_file_mmap(struct file *file, unsigned long reqprot,
+ {
+ return security_ops->file_mmap(file, reqprot, prot, flags, addr, addr_only);
+ }
++EXPORT_SYMBOL(security_file_mmap);
+
+ int security_file_mprotect(struct vm_area_struct *vma, unsigned long reqprot,
+ unsigned long prot)
diff --git a/sys-fs/aufs2/files/aufs2-standalone-34.patch b/sys-fs/aufs2/files/aufs2-standalone-34.patch
new file mode 100644
index 000000000000..c219578b5a21
--- /dev/null
+++ b/sys-fs/aufs2/files/aufs2-standalone-34.patch
@@ -0,0 +1,272 @@
+aufs2 standalone patch for linux-2.6.34
+
+diff --git a/fs/namei.c b/fs/namei.c
+index c43d6b8..538d40a 100644
+--- a/fs/namei.c
++++ b/fs/namei.c
+@@ -348,6 +348,7 @@ int deny_write_access(struct file * file)
+
+ return 0;
+ }
++EXPORT_SYMBOL(deny_write_access);
+
+ /**
+ * path_get - get a reference to a path
+@@ -1186,6 +1187,7 @@ struct dentry *lookup_hash(struct nameidata *nd)
+ return ERR_PTR(err);
+ return __lookup_hash(&nd->last, nd->path.dentry, nd);
+ }
++EXPORT_SYMBOL(lookup_hash);
+
+ int __lookup_one_len(const char *name, struct qstr *this,
+ struct dentry *base, int len)
+@@ -1208,6 +1210,7 @@ int __lookup_one_len(const char *name, struct qstr *this,
+ this->hash = end_name_hash(hash);
+ return 0;
+ }
++EXPORT_SYMBOL(__lookup_one_len);
+
+ /**
+ * lookup_one_len - filesystem helper to lookup single pathname component
+diff --git a/fs/namespace.c b/fs/namespace.c
+index f20cb57..7cc1b42 100644
+--- a/fs/namespace.c
++++ b/fs/namespace.c
+@@ -1282,6 +1282,7 @@ int iterate_mounts(int (*f)(struct vfsmount *, void *), void *arg,
+ }
+ return 0;
+ }
++EXPORT_SYMBOL(iterate_mounts);
+
+ static void cleanup_group_ids(struct vfsmount *mnt, struct vfsmount *end)
+ {
+diff --git a/fs/notify/group.c b/fs/notify/group.c
+index 0e16771..3fab10a 100644
+--- a/fs/notify/group.c
++++ b/fs/notify/group.c
+@@ -22,6 +22,7 @@
+ #include <linux/srcu.h>
+ #include <linux/rculist.h>
+ #include <linux/wait.h>
++#include <linux/module.h>
+
+ #include <linux/fsnotify_backend.h>
+ #include "fsnotify.h"
+@@ -169,6 +170,7 @@ void fsnotify_put_group(struct fsnotify_group *group)
+ fsnotify_recalc_global_mask();
+ fsnotify_destroy_group(group);
+ }
++EXPORT_SYMBOL(fsnotify_put_group);
+
+ /*
+ * Simply run the fsnotify_groups list and find a group which matches
+@@ -252,3 +254,4 @@ struct fsnotify_group *fsnotify_obtain_group(unsigned int group_num, __u32 mask,
+
+ return group;
+ }
++EXPORT_SYMBOL(fsnotify_obtain_group);
+diff --git a/fs/notify/inode_mark.c b/fs/notify/inode_mark.c
+index 0399bcb..74cdc13 100644
+--- a/fs/notify/inode_mark.c
++++ b/fs/notify/inode_mark.c
+@@ -105,6 +105,7 @@ void fsnotify_put_mark(struct fsnotify_mark_entry *entry)
+ if (atomic_dec_and_test(&entry->refcnt))
+ entry->free_mark(entry);
+ }
++EXPORT_SYMBOL(fsnotify_put_mark);
+
+ /*
+ * Recalculate the mask of events relevant to a given inode locked.
+@@ -215,6 +216,7 @@ void fsnotify_destroy_mark_by_entry(struct fsnotify_mark_entry *entry)
+ if (unlikely(atomic_dec_and_test(&group->num_marks)))
+ fsnotify_final_destroy_group(group);
+ }
++EXPORT_SYMBOL(fsnotify_destroy_mark_by_entry);
+
+ /*
+ * Given a group, destroy all of the marks associated with that group.
+@@ -281,6 +283,7 @@ struct fsnotify_mark_entry *fsnotify_find_mark_entry(struct fsnotify_group *grou
+ }
+ return NULL;
+ }
++EXPORT_SYMBOL(fsnotify_find_mark_entry);
+
+ /*
+ * Nothing fancy, just initialize lists and locks and counters.
+@@ -297,6 +300,7 @@ void fsnotify_init_mark(struct fsnotify_mark_entry *entry,
+ entry->inode = NULL;
+ entry->free_mark = free_mark;
+ }
++EXPORT_SYMBOL(fsnotify_init_mark);
+
+ /*
+ * Attach an initialized mark entry to a given group and inode.
+@@ -352,6 +356,7 @@ int fsnotify_add_mark(struct fsnotify_mark_entry *entry,
+
+ return ret;
+ }
++EXPORT_SYMBOL(fsnotify_add_mark);
+
+ /**
+ * fsnotify_unmount_inodes - an sb is unmounting. handle any watched inodes.
+diff --git a/fs/open.c b/fs/open.c
+index 74e5cd9..8192b46 100644
+--- a/fs/open.c
++++ b/fs/open.c
+@@ -225,6 +225,7 @@ int do_truncate(struct dentry *dentry, loff_t length, unsigned int time_attrs,
+ mutex_unlock(&dentry->d_inode->i_mutex);
+ return ret;
+ }
++EXPORT_SYMBOL(do_truncate);
+
+ static long do_sys_truncate(const char __user *pathname, loff_t length)
+ {
+diff --git a/fs/splice.c b/fs/splice.c
+index b9e871f..b069be4 100644
+--- a/fs/splice.c
++++ b/fs/splice.c
+@@ -1078,6 +1078,7 @@ long do_splice_from(struct pipe_inode_info *pipe, struct file *out,
+
+ return splice_write(pipe, out, ppos, len, flags);
+ }
++EXPORT_SYMBOL(do_splice_from);
+
+ /*
+ * Attempt to initiate a splice from a file to a pipe.
+@@ -1104,6 +1105,7 @@ long do_splice_to(struct file *in, loff_t *ppos,
+
+ return splice_read(in, ppos, pipe, len, flags);
+ }
++EXPORT_SYMBOL(do_splice_to);
+
+ /**
+ * splice_direct_to_actor - splices data directly between two non-pipes
+diff --git a/security/commoncap.c b/security/commoncap.c
+index 6166973..a702444 100644
+--- a/security/commoncap.c
++++ b/security/commoncap.c
+@@ -951,3 +951,4 @@ int cap_file_mmap(struct file *file, unsigned long reqprot,
+ }
+ return ret;
+ }
++EXPORT_SYMBOL(cap_file_mmap);
+diff --git a/security/device_cgroup.c b/security/device_cgroup.c
+index f77c604..743f39b 100644
+--- a/security/device_cgroup.c
++++ b/security/device_cgroup.c
+@@ -515,6 +515,7 @@ found:
+
+ return -EPERM;
+ }
++EXPORT_SYMBOL(devcgroup_inode_permission);
+
+ int devcgroup_inode_mknod(int mode, dev_t dev)
+ {
+diff --git a/security/security.c b/security/security.c
+index 687c6fd..e9e5f6b 100644
+--- a/security/security.c
++++ b/security/security.c
+@@ -411,6 +411,7 @@ int security_path_mkdir(struct path *dir, struct dentry *dentry, int mode)
+ return 0;
+ return security_ops->path_mkdir(dir, dentry, mode);
+ }
++EXPORT_SYMBOL(security_path_mkdir);
+
+ int security_path_rmdir(struct path *dir, struct dentry *dentry)
+ {
+@@ -418,6 +419,7 @@ int security_path_rmdir(struct path *dir, struct dentry *dentry)
+ return 0;
+ return security_ops->path_rmdir(dir, dentry);
+ }
++EXPORT_SYMBOL(security_path_rmdir);
+
+ int security_path_unlink(struct path *dir, struct dentry *dentry)
+ {
+@@ -425,6 +427,7 @@ int security_path_unlink(struct path *dir, struct dentry *dentry)
+ return 0;
+ return security_ops->path_unlink(dir, dentry);
+ }
++EXPORT_SYMBOL(security_path_unlink);
+
+ int security_path_symlink(struct path *dir, struct dentry *dentry,
+ const char *old_name)
+@@ -433,6 +436,7 @@ int security_path_symlink(struct path *dir, struct dentry *dentry,
+ return 0;
+ return security_ops->path_symlink(dir, dentry, old_name);
+ }
++EXPORT_SYMBOL(security_path_symlink);
+
+ int security_path_link(struct dentry *old_dentry, struct path *new_dir,
+ struct dentry *new_dentry)
+@@ -441,6 +445,7 @@ int security_path_link(struct dentry *old_dentry, struct path *new_dir,
+ return 0;
+ return security_ops->path_link(old_dentry, new_dir, new_dentry);
+ }
++EXPORT_SYMBOL(security_path_link);
+
+ int security_path_rename(struct path *old_dir, struct dentry *old_dentry,
+ struct path *new_dir, struct dentry *new_dentry)
+@@ -451,6 +456,7 @@ int security_path_rename(struct path *old_dir, struct dentry *old_dentry,
+ return security_ops->path_rename(old_dir, old_dentry, new_dir,
+ new_dentry);
+ }
++EXPORT_SYMBOL(security_path_rename);
+
+ int security_path_truncate(struct path *path, loff_t length,
+ unsigned int time_attrs)
+@@ -459,6 +465,7 @@ int security_path_truncate(struct path *path, loff_t length,
+ return 0;
+ return security_ops->path_truncate(path, length, time_attrs);
+ }
++EXPORT_SYMBOL(security_path_truncate);
+
+ int security_path_chmod(struct dentry *dentry, struct vfsmount *mnt,
+ mode_t mode)
+@@ -467,6 +474,7 @@ int security_path_chmod(struct dentry *dentry, struct vfsmount *mnt,
+ return 0;
+ return security_ops->path_chmod(dentry, mnt, mode);
+ }
++EXPORT_SYMBOL(security_path_chmod);
+
+ int security_path_chown(struct path *path, uid_t uid, gid_t gid)
+ {
+@@ -474,6 +482,7 @@ int security_path_chown(struct path *path, uid_t uid, gid_t gid)
+ return 0;
+ return security_ops->path_chown(path, uid, gid);
+ }
++EXPORT_SYMBOL(security_path_chown);
+
+ int security_path_chroot(struct path *path)
+ {
+@@ -550,6 +559,7 @@ int security_inode_readlink(struct dentry *dentry)
+ return 0;
+ return security_ops->inode_readlink(dentry);
+ }
++EXPORT_SYMBOL(security_inode_readlink);
+
+ int security_inode_follow_link(struct dentry *dentry, struct nameidata *nd)
+ {
+@@ -564,6 +574,7 @@ int security_inode_permission(struct inode *inode, int mask)
+ return 0;
+ return security_ops->inode_permission(inode, mask);
+ }
++EXPORT_SYMBOL(security_inode_permission);
+
+ int security_inode_setattr(struct dentry *dentry, struct iattr *attr)
+ {
+@@ -664,6 +675,7 @@ int security_file_permission(struct file *file, int mask)
+ {
+ return security_ops->file_permission(file, mask);
+ }
++EXPORT_SYMBOL(security_file_permission);
+
+ int security_file_alloc(struct file *file)
+ {
+@@ -691,6 +703,7 @@ int security_file_mmap(struct file *file, unsigned long reqprot,
+ return ret;
+ return ima_file_mmap(file, prot);
+ }
++EXPORT_SYMBOL(security_file_mmap);
+
+ int security_file_mprotect(struct vm_area_struct *vma, unsigned long reqprot,
+ unsigned long prot)