4 #if LINUX_VERSION_CODE <= KERNEL_VERSION(2,6,26)
5 #define trylock_page(page) (!TestSetPageLocked(page))
8 #if LINUX_VERSION_CODE <= KERNEL_VERSION(2,6,27)
9 static inline struct dentry *d_obtain_alias(struct inode *inode)
16 return ERR_CAST(inode);
18 d = d_alloc_anon(inode);
25 #if LINUX_VERSION_CODE <= KERNEL_VERSION(2,6,18)
26 static inline void btrfs_drop_nlink(struct inode *inode)
31 static inline void btrfs_inc_nlink(struct inode *inode)
36 # define btrfs_drop_nlink(inode) drop_nlink(inode)
37 # define btrfs_inc_nlink(inode) inc_nlink(inode)
41 * Even if AppArmor isn't enabled, it still has different prototypes.
42 * Add more distro/version pairs here to declare which has AppArmor applied.
44 #if defined(CONFIG_SUSE_KERNEL)
45 # if LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,22)
46 # define REMOVE_SUID_PATH 1
51 * catch any other distros that have patched in apparmor. This isn't
52 * 100% reliable because it won't catch people that hand compile their
53 * own distro kernels without apparmor compiled in. But, it is better
56 #ifdef CONFIG_SECURITY_APPARMOR
57 # define REMOVE_SUID_PATH 1
60 #endif /* _COMPAT_H_ */