summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPeter Volkov <pva@gentoo.org>2008-08-22 19:39:28 +0000
committerPeter Volkov <pva@gentoo.org>2008-08-22 19:39:28 +0000
commitb2de6369118904a13ed23783bdb4f02205e44497 (patch)
treef3cfc73d11a03e42c7bec3a55d6e7f1da53a041b /sys-kernel/openvz-sources/files
parentStable on ppc wrt bug 235479 (diff)
downloadgentoo-2-b2de6369118904a13ed23783bdb4f02205e44497.tar.gz
gentoo-2-b2de6369118904a13ed23783bdb4f02205e44497.tar.bz2
gentoo-2-b2de6369118904a13ed23783bdb4f02205e44497.zip
Version bump. Should fix bug #233280, thank Christopher Covington for report, and Peter Alfredsen for reopening and Daniel Robbins for comments.
(Portage version: 2.2_rc8/cvs/Linux 2.6.25-gentoo-r7 i686)
Diffstat (limited to 'sys-kernel/openvz-sources/files')
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-another-fix-build-xfrm.h.patch15
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-CIFS-build.patch25
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-build-xfrm.h.patch44
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-missed-PATH_MAX-sumversion.c.patch13
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-prevent-gcc-smartness.patch31
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-qouta-compat-build.patch13
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-utimenstat.patch18
7 files changed, 159 insertions, 0 deletions
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-another-fix-build-xfrm.h.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-another-fix-build-xfrm.h.patch
new file mode 100644
index 000000000000..a33676f7737e
--- /dev/null
+++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-another-fix-build-xfrm.h.patch
@@ -0,0 +1,15 @@
+http://bugzilla.openvz.org/show_bug.cgi?id=951
+
+--- ./include/net/xfrm.h.xxx 2008-08-20 17:40:52.000000000 +0400
++++ ./include/net/xfrm.h 2008-08-20 20:18:25.000000000 +0400
+@@ -429,8 +429,8 @@ static inline struct audit_buffer *xfrm_
+ #else
+ #define xfrm_audit_log(a,s,t,r,p,x) do { ; } while (0)
+ #define xfrm_audit_state_replay_overflow(x, s) do { ; } while (0)
+-#define xfrm_audit_state_replay(s, f, sp, sq) do { ; } while (0)
+-#define xfrm_naudit_state_replay(s, f, sp, sq) do { ; } while (0)
++#define xfrm_audit_state_replay(s, f, sp) do { ; } while (0)
++#define xfrm_naudit_state_replay(s, f, sp) do { ; } while (0)
+ #define xfrm_audit_state_notfound(s, f, sp, sq) do { ; } while (0)
+ #define xfrm_naudit_state_notfound(s, f, sp, sq) do { ; } while (0)
+ #define xfrm_audit_state_icvfail(x, s, p) do { ; } while (0)
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-CIFS-build.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-CIFS-build.patch
new file mode 100644
index 000000000000..f6dda3340bba
--- /dev/null
+++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-CIFS-build.patch
@@ -0,0 +1,25 @@
+http://bugzilla.openvz.org/show_bug.cgi?id=951
+
+commit 516897a208bc1423d561ce2ccce0624c3b652275
+Author: Steve French <sfrench@us.ibm.com>
+Date: Fri Oct 12 19:24:06 2007 +0000
+
+ [CIFS] fix build break when lanman not enabled
+
+ Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+ Signed-off-by: Steve French <sfrench@us.ibm.com>
+
+diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
+index fbde55c..61d6173 100644
+--- a/fs/cifs/cifsglob.h
++++ b/fs/cifs/cifsglob.h
+@@ -479,6 +479,9 @@ struct dir_notify_req {
+ #ifdef CONFIG_CIFS_WEAK_PW_HASH
+ #define CIFSSEC_MAY_LANMAN 0x00010
+ #define CIFSSEC_MAY_PLNTXT 0x00020
++#else
++#define CIFSSEC_MAY_LANMAN 0
++#define CIFSSEC_MAY_PLNTXT 0
+ #endif /* weak passwords */
+ #define CIFSSEC_MAY_SEAL 0x00040 /* not supported yet */
+
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-build-xfrm.h.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-build-xfrm.h.patch
new file mode 100644
index 000000000000..a2ebc7e8351f
--- /dev/null
+++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-build-xfrm.h.patch
@@ -0,0 +1,44 @@
+http://bugzilla.openvz.org/show_bug.cgi?id=963
+
+--- linux-2.6.18-ovz-057.6/include/net/icmp.h~route 2008-08-18 14:19:23.000000000 +0400
++++ linux-2.6.18-ovz-057.6/include/net/icmp.h 2008-08-18 14:20:10.000000000 +0400
+@@ -79,7 +79,4 @@ extern int sysctl_icmp_errors_use_inboun
+ extern int sysctl_icmp_ratelimit;
+ extern int sysctl_icmp_ratemask;
+
+-extern void xfrm4_decode_session_reverse(struct sk_buff *skb, struct flowi *fl);
+-extern int xfrm4_icmp_check(struct sk_buff *skb);
+-
+ #endif /* _ICMP_H */
+--- linux-2.6.18-ovz-057.6/include/net/xfrm.h~route 2008-08-18 14:19:37.000000000 +0400
++++ linux-2.6.18-ovz-057.6/include/net/xfrm.h 2008-08-18 14:20:29.000000000 +0400
+@@ -794,6 +794,7 @@ static inline int xfrm6_policy_check_rev
+ extern int xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family);
+ extern void xfrm4_decode_session_reverse(struct sk_buff *skb, struct flowi *fl);
+ extern void xfrm6_decode_session_reverse(struct sk_buff *skb, struct flowi *fl);
++extern int xfrm4_icmp_check(struct sk_buff *skb);
+
+ extern int __xfrm_route_forward(struct sk_buff *skb, unsigned short family);
+
+@@ -875,6 +876,11 @@ static inline int xfrm6_policy_check_rev
+ {
+ return 1;
+ }
++
++static inline int xfrm4_icmp_check(struct sk_buff *skb)
++{
++ return 1;
++}
+ #endif
+
+ static __inline__
+--- linux-2.6.18-ovz-057.6/net/ipv4/icmp.c~route 2008-08-18 14:21:18.000000000 +0400
++++ linux-2.6.18-ovz-057.6/net/ipv4/icmp.c 2008-08-18 14:21:35.000000000 +0400
+@@ -93,6 +93,7 @@
+ #include <asm/uaccess.h>
+ #include <net/checksum.h>
+ #include <linux/xfrm.h>
++#include <net/xfrm.h>
+
+ /*
+ * Build xmit assembly blocks
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-missed-PATH_MAX-sumversion.c.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-missed-PATH_MAX-sumversion.c.patch
new file mode 100644
index 000000000000..9efd6ab15124
--- /dev/null
+++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-missed-PATH_MAX-sumversion.c.patch
@@ -0,0 +1,13 @@
+http://bugzilla.openvz.org/show_bug.cgi?id=951
+
+diff -up ./scripts/mod/sumversion.c.cfx ./scripts/mod/sumversion.c
+--- ./scripts/mod/sumversion.c.cfx 2006-09-20 07:42:06.000000000 +0400
++++ ./scripts/mod/sumversion.c 2008-08-20 16:59:14.000000000 +0400
+@@ -7,6 +7,7 @@
+ #include <ctype.h>
+ #include <errno.h>
+ #include <string.h>
++#include <limits.h>
+ #include "modpost.h"
+
+ /*
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-prevent-gcc-smartness.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-prevent-gcc-smartness.patch
new file mode 100644
index 000000000000..a68aece756c9
--- /dev/null
+++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-prevent-gcc-smartness.patch
@@ -0,0 +1,31 @@
+http://bugzilla.openvz.org/show_bug.cgi?id=951
+
+commit 38332cb98772f5ea757e6486bed7ed0381cb5f98
+Author: Segher Boessenkool <segher@kernel.crashing.org>
+Date: Tue Mar 4 14:59:54 2008 -0800
+
+ time: prevent the loop in timespec_add_ns() from being optimised away
+
+ Since some architectures don't support __udivdi3().
+
+ Signed-off-by: Segher Boessenkool <segher@kernel.crashing.org>
+ Cc: john stultz <johnstul@us.ibm.com>
+ Cc: Ingo Molnar <mingo@elte.hu>
+ Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
+ Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
+
+diff --git a/include/linux/time.h b/include/linux/time.h
+index 2091a19..d32ef0a 100644
+--- a/include/linux/time.h
++++ b/include/linux/time.h
+@@ -174,6 +174,10 @@ static inline void timespec_add_ns(struct timespec *a, u64 ns)
+ {
+ ns += a->tv_nsec;
+ while(unlikely(ns >= NSEC_PER_SEC)) {
++ /* The following asm() prevents the compiler from
++ * optimising this loop into a modulo operation. */
++ asm("" : "+r"(ns));
++
+ ns -= NSEC_PER_SEC;
+ a->tv_sec++;
+ }
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-qouta-compat-build.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-qouta-compat-build.patch
new file mode 100644
index 000000000000..b34ed695d75a
--- /dev/null
+++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-qouta-compat-build.patch
@@ -0,0 +1,13 @@
+--- ./fs/compat.c.bk 2008-08-06 15:31:16.000000000 +0400
++++ ./fs/compat.c 2008-08-06 15:41:47.000000000 +0400
+@@ -1565,8 +1565,10 @@ asmlinkage long sys32_quotactl(unsigned
+ __u32 dqb_itime[2];
+ __u32 dqb_valid;
+ } dqblk32;
++#ifdef CONFIG_QUOTA_COMPAT
+ struct compat_v2_dqblk cdq;
+ struct compat_v2_dqblk_32 cdq32;
++#endif
+
+ cmds = cmd >> SUBCMDSHIFT;
+
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-utimenstat.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-utimenstat.patch
new file mode 100644
index 000000000000..7ddc69688618
--- /dev/null
+++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-utimenstat.patch
@@ -0,0 +1,18 @@
+diff -up ./fs/utimes.c.touchkludge ./fs/utimes.c
+--- ./fs/utimes.c.touchkludge 2008-08-20 20:54:10.000000000 +0400
++++ ./fs/utimes.c 2008-08-20 21:07:40.000000000 +0400
+@@ -14,6 +14,14 @@ asmlinkage long sys_utimensat(int dfd, c
+ {
+ struct timespec tstimes[2];
+ struct timeval time[2];
++
++ if (filename == NULL)
++ /*
++ * a kludge for thuse, checking for utimensat
++ * availability via this maneuver
++ */
++ return -ENOSYS;
++
+ if (utimes) {
+ if (copy_from_user(&tstimes, utimes, sizeof(tstimes)))
+ return -EFAULT;