diff options
author | Peter Volkov <pva@gentoo.org> | 2008-08-22 19:39:28 +0000 |
---|---|---|
committer | Peter Volkov <pva@gentoo.org> | 2008-08-22 19:39:28 +0000 |
commit | 6dc116ed991f2c03a8dd40d19624db1d0b80b90f (patch) | |
tree | 9f7be71ab6981662d158f4e35f3c59929175a242 /sys-kernel | |
parent | Stable on ppc wrt bug 235479 (diff) | |
download | historical-6dc116ed991f2c03a8dd40d19624db1d0b80b90f.tar.gz historical-6dc116ed991f2c03a8dd40d19624db1d0b80b90f.tar.bz2 historical-6dc116ed991f2c03a8dd40d19624db1d0b80b90f.zip |
Version bump. Should fix bug #233280, thank Christopher Covington for report, and Peter Alfredsen for reopening and Daniel Robbins for comments.
Package-Manager: portage-2.2_rc8/cvs/Linux 2.6.25-gentoo-r7 i686
Diffstat (limited to 'sys-kernel')
10 files changed, 231 insertions, 2 deletions
diff --git a/sys-kernel/openvz-sources/ChangeLog b/sys-kernel/openvz-sources/ChangeLog index 54c78973eb05..ead6be80ceee 100644 --- a/sys-kernel/openvz-sources/ChangeLog +++ b/sys-kernel/openvz-sources/ChangeLog @@ -1,6 +1,20 @@ # ChangeLog for sys-kernel/openvz-sources # Copyright 1999-2008 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/ChangeLog,v 1.92 2008/07/24 07:56:21 pva Exp $ +# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/ChangeLog,v 1.93 2008/08/22 19:39:27 pva Exp $ + +*openvz-sources-2.6.18.028.057.2 (22 Aug 2008) + + 22 Aug 2008; Peter Volkov <pva@gentoo.org> + +files/openvz-sources-2.6.18.028.057.2-another-fix-build-xfrm.h.patch, + +files/openvz-sources-2.6.18.028.057.2-fix-CIFS-build.patch, + +files/openvz-sources-2.6.18.028.057.2-fix-build-xfrm.h.patch, + +files/openvz-sources-2.6.18.028.057.2-missed-PATH_MAX-sumversion.c.patch, + +files/openvz-sources-2.6.18.028.057.2-prevent-gcc-smartness.patch, + +files/openvz-sources-2.6.18.028.057.2-qouta-compat-build.patch, + +files/openvz-sources-2.6.18.028.057.2-utimenstat.patch, + +openvz-sources-2.6.18.028.057.2.ebuild: + Version bump. Should fix bug #233280, thank Christopher Covington for + report, and Peter Alfredsen for reopening and Daniel Robbins for comments. 23 Jul 2008; Peter Volkov <pva@gentoo.org> +files/openvz-sources-2.6.24.005.1-CONFIG_SYSVIPC-build-fix.patch, diff --git a/sys-kernel/openvz-sources/Manifest b/sys-kernel/openvz-sources/Manifest index 4e82960c2641..b764875abdf1 100644 --- a/sys-kernel/openvz-sources/Manifest +++ b/sys-kernel/openvz-sources/Manifest @@ -1,14 +1,23 @@ AUX openvz-sources-2.6.18-ms-splice-access.patch 712 RMD160 9c9125f4500fefcbd14e36a8ee5f5028bab9f467 SHA1 7c5d45417380edd8e3c3b4f64722791ab0132f19 SHA256 46f19b681afb0d0b101eb92695108e7b60b0b191cbc77bbf56446116e591d7ad +AUX openvz-sources-2.6.18.028.057.2-another-fix-build-xfrm.h.patch 822 RMD160 40a9e9e8a7ef128ed8a1f953ea5dbd87b5e5849a SHA1 dc4c2215ebbe0e75aa97757a70be591021d4e36d SHA256 51e6d613f248cb9f384ba42bb1402418eedcd9e3127402cc4e0da33e76a16d82 +AUX openvz-sources-2.6.18.028.057.2-fix-CIFS-build.patch 803 RMD160 fbffc246d035b816d26d91161b1db8e393a897b7 SHA1 eb9a883a9d987e6fd7e68dc390effadeaaf5e219 SHA256 2b7dbb4bf4b4120e699a9242840ccd1023b24b4a008c928ace6b3f8b8ef8a36d +AUX openvz-sources-2.6.18.028.057.2-fix-build-xfrm.h.patch 1634 RMD160 7fd86d605352ce8ccc128fe007e9c080de925f2e SHA1 a16ffff52b2bd7980567681d04067f5811e47b78 SHA256 14b01087412f7bc5d96bdab1be733bc37588a5cbc746f077f0f0193b9a1cfe72 +AUX openvz-sources-2.6.18.028.057.2-missed-PATH_MAX-sumversion.c.patch 379 RMD160 12c3045b42807927f937ace65df548ba5ec00a34 SHA1 8878d2e2f782026bce65d0c0202f79266860122f SHA256 bd70ec387bf0d4b453ea04be59fe9e10d1448207d63c1de2c32fb199d588c885 +AUX openvz-sources-2.6.18.028.057.2-prevent-gcc-smartness.patch 1059 RMD160 4daadab57df2984ce7ffd2d245598aa50a75d29c SHA1 118d8ada3d6f6edf332ce9926f5ce12a988b012b SHA256 eecb5e6a4d86c541fb157a229d275cb1404389bef55ac52e83c30357a2da5ff6 +AUX openvz-sources-2.6.18.028.057.2-qouta-compat-build.patch 365 RMD160 1d7dea5718e0e889c8fe6c6c6cfbd3636fa91ad3 SHA1 5fb1d346e362cb8cd54b4f02283ce185782f7d28 SHA256 c7d3ae9adfe7464ebe7d25948978392c244d2021cda678e30a316295a96ec4ff +AUX openvz-sources-2.6.18.028.057.2-utimenstat.patch 528 RMD160 1edc34e5e0fddd8c0960b8dcbc54d0f0f486a0fa SHA1 26190020c24645e71c10c4da8ab79f120be946e2 SHA256 79cbf231ecea1eb45d94c5f2ef38082e8c9745f25d4fc6e53fa46fb69631dd25 AUX openvz-sources-2.6.24.005.1-CONFIG_SYSVIPC-build-fix.patch 6614 RMD160 48efe68f1c8b5aacd49e5fe0a5ac8194a0807340 SHA1 1a48a82c50e3ad76b1fe0900d3a23468ea2e1ced SHA256 8dd224fef4f272ac66b7b080e6fdda575e668d5cb49cb9e32e4c3e780b5bcc53 DIST linux-2.6.18.tar.bz2 41863580 RMD160 f92283f956880676bfb1f1d5288325461e4e02e7 SHA1 178f7d5bb3af0978d42b37651b8753323c7129c2 SHA256 c95280ff6c5d2a17788f7cc582d23ae8a9a7ba3f202ec6e4238eaadfce7c163d DIST linux-2.6.24.tar.bz2 46737783 RMD160 0e5194c69c3d82c41ece689c4f84e638f8776d34 SHA1 351aebc784a5395fe4c92d1e514a89680482f7e2 SHA256 413c64fbbcf81244cb5571be4963644a1e81166a2b0f008a016528363b65c5d3 DIST patch-53.1.19.el5.028stab053.14-combined.gz 8020156 RMD160 4abd03abd0a5937163444b700cf2e57b5995fa6d SHA1 0a04e05827cfe0017d02326408947bfd4b7d6f95 SHA256 3c7a59ef1ad153efd724cdb62d20fedf27973add3154a2178483c73a36bf4ee9 +DIST patch-92.1.1.el5.028stab057.2-combined.gz 10632553 RMD160 baee5d57f70c81cd60927b7a819f1607d73ff885 SHA1 7b917f330e435053bb80736d8639de94cf0db3f0 SHA256 b1014ecdc99a9a7e007a4b3208ea573a8cbb366b0a2222632299c933fac0d3d3 DIST patch-ovz004.1-combined.gz 773228 RMD160 db11a51448dfc50265bdefe2c1216647856aab38 SHA1 40777b27e7da931f2fb8f61456e3fb3608464813 SHA256 e65de9ac1bef2476ccaa9974e5cde2896e90ee9e181936aecb7644a5a18bcc1d DIST patch-ovz005.1-combined.gz 844882 RMD160 717292c9e339efff9536770889fd432c998ed5af SHA1 21699b446b0f2703b53601e3ab9003bec727c2e6 SHA256 a518bdb32f6531d71af2b80fd90ffe3094198d35ad7cfc790019b065c5c67389 DIST patch-ovz028stab053.4-combined.gz 1142095 RMD160 d4ac3f1d6c6db92bae89859c96e94df24a9e37ca SHA1 7e0a8c3caf808cec70d8676770cc32859ef4f4df SHA256 3d7901582c35b70c9581e2cd1d3e1a3ddae79b607c7de927cd99edc878e73f27 EBUILD openvz-sources-2.6.18.028.053-r2.ebuild 1308 RMD160 faa90fe50a134a7f18e74744fb786b05fe2b2830 SHA1 2a0c0a3c05bef299999992403ab4608b832a4b06 SHA256 3a588a2b6fad71661d97c6628b0d8dcdb1c73acda7739cac7f9821dfce00351c EBUILD openvz-sources-2.6.18.028.053.14.ebuild 1549 RMD160 7c9bdde4b14ac3a264c758168daa1c3f7be04db9 SHA1 2a307e29d3e456301df3049eed8d3c517ec8512b SHA256 6d9fd83eb6e1478b0842c7731170496a3a40352aea8ce012052b7c51b594293a +EBUILD openvz-sources-2.6.18.028.057.2.ebuild 2044 RMD160 b576e49fc51433fa0060b206e56619ef13fca5dc SHA1 a92a0ab4e81c056407e51fbf8e0b9f42d5d31378 SHA256 24ce9a9330180e7ae654a3e78b447344b1fc1f7da184be77b4741c7857763d97 EBUILD openvz-sources-2.6.24.004.1.ebuild 1282 RMD160 aa6bdb7a55dc33de1868d9d01d90bb3f1e5768df SHA1 a9b285a713b2fda38e4a9932d31e390902b63a72 SHA256 f4813d186b93a2d327daf8a72956fe637d15ea362b13a721f6a502762dab741d EBUILD openvz-sources-2.6.24.005.1.ebuild 1352 RMD160 1eae2759e7727b80e7d10904f170288b07743b6d SHA1 88d77f1377485b26798511914b97c0ad35009613 SHA256 acb1b7be6bc236988ee4ca6088a18e2b853928dbe8ec137fb5caf8c11cf8ca92 -MISC ChangeLog 21406 RMD160 cf54f11bd899192eceffccd6628a306eca5f6cfa SHA1 69147c7f3aac3aa08623618c17ce1422ee0267ec SHA256 9942d67ee210166a1d8ad73d51034db5f889b6ce442b738e183deccb254d0983 +MISC ChangeLog 22166 RMD160 d417e8a91e3236795b91320963a7e179d86a874c SHA1 6e39fca9e0698e1a7f8fec133bccd00445609afd SHA256 b6ae4f527832b4b1650583fd14b56f3caf8da1b60a6bd307f4fe0629ab4c88c3 MISC metadata.xml 554 RMD160 0d62a03694a7c0e0caa538a603b3a41916451887 SHA1 d4d18f1c2c52425a1a819ac0d76ff1c906853047 SHA256 78f7ce5323a1a18773d5a6a01cffcc729fb51f4a667b5d2df37450907a007a31 diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-another-fix-build-xfrm.h.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-another-fix-build-xfrm.h.patch new file mode 100644 index 000000000000..a33676f7737e --- /dev/null +++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-another-fix-build-xfrm.h.patch @@ -0,0 +1,15 @@ +http://bugzilla.openvz.org/show_bug.cgi?id=951 + +--- ./include/net/xfrm.h.xxx 2008-08-20 17:40:52.000000000 +0400 ++++ ./include/net/xfrm.h 2008-08-20 20:18:25.000000000 +0400 +@@ -429,8 +429,8 @@ static inline struct audit_buffer *xfrm_ + #else + #define xfrm_audit_log(a,s,t,r,p,x) do { ; } while (0) + #define xfrm_audit_state_replay_overflow(x, s) do { ; } while (0) +-#define xfrm_audit_state_replay(s, f, sp, sq) do { ; } while (0) +-#define xfrm_naudit_state_replay(s, f, sp, sq) do { ; } while (0) ++#define xfrm_audit_state_replay(s, f, sp) do { ; } while (0) ++#define xfrm_naudit_state_replay(s, f, sp) do { ; } while (0) + #define xfrm_audit_state_notfound(s, f, sp, sq) do { ; } while (0) + #define xfrm_naudit_state_notfound(s, f, sp, sq) do { ; } while (0) + #define xfrm_audit_state_icvfail(x, s, p) do { ; } while (0) diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-CIFS-build.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-CIFS-build.patch new file mode 100644 index 000000000000..f6dda3340bba --- /dev/null +++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-CIFS-build.patch @@ -0,0 +1,25 @@ +http://bugzilla.openvz.org/show_bug.cgi?id=951 + +commit 516897a208bc1423d561ce2ccce0624c3b652275 +Author: Steve French <sfrench@us.ibm.com> +Date: Fri Oct 12 19:24:06 2007 +0000 + + [CIFS] fix build break when lanman not enabled + + Signed-off-by: Andrew Morton <akpm@linux-foundation.org> + Signed-off-by: Steve French <sfrench@us.ibm.com> + +diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h +index fbde55c..61d6173 100644 +--- a/fs/cifs/cifsglob.h ++++ b/fs/cifs/cifsglob.h +@@ -479,6 +479,9 @@ struct dir_notify_req { + #ifdef CONFIG_CIFS_WEAK_PW_HASH + #define CIFSSEC_MAY_LANMAN 0x00010 + #define CIFSSEC_MAY_PLNTXT 0x00020 ++#else ++#define CIFSSEC_MAY_LANMAN 0 ++#define CIFSSEC_MAY_PLNTXT 0 + #endif /* weak passwords */ + #define CIFSSEC_MAY_SEAL 0x00040 /* not supported yet */ + diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-build-xfrm.h.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-build-xfrm.h.patch new file mode 100644 index 000000000000..a2ebc7e8351f --- /dev/null +++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-fix-build-xfrm.h.patch @@ -0,0 +1,44 @@ +http://bugzilla.openvz.org/show_bug.cgi?id=963 + +--- linux-2.6.18-ovz-057.6/include/net/icmp.h~route 2008-08-18 14:19:23.000000000 +0400 ++++ linux-2.6.18-ovz-057.6/include/net/icmp.h 2008-08-18 14:20:10.000000000 +0400 +@@ -79,7 +79,4 @@ extern int sysctl_icmp_errors_use_inboun + extern int sysctl_icmp_ratelimit; + extern int sysctl_icmp_ratemask; + +-extern void xfrm4_decode_session_reverse(struct sk_buff *skb, struct flowi *fl); +-extern int xfrm4_icmp_check(struct sk_buff *skb); +- + #endif /* _ICMP_H */ +--- linux-2.6.18-ovz-057.6/include/net/xfrm.h~route 2008-08-18 14:19:37.000000000 +0400 ++++ linux-2.6.18-ovz-057.6/include/net/xfrm.h 2008-08-18 14:20:29.000000000 +0400 +@@ -794,6 +794,7 @@ static inline int xfrm6_policy_check_rev + extern int xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family); + extern void xfrm4_decode_session_reverse(struct sk_buff *skb, struct flowi *fl); + extern void xfrm6_decode_session_reverse(struct sk_buff *skb, struct flowi *fl); ++extern int xfrm4_icmp_check(struct sk_buff *skb); + + extern int __xfrm_route_forward(struct sk_buff *skb, unsigned short family); + +@@ -875,6 +876,11 @@ static inline int xfrm6_policy_check_rev + { + return 1; + } ++ ++static inline int xfrm4_icmp_check(struct sk_buff *skb) ++{ ++ return 1; ++} + #endif + + static __inline__ +--- linux-2.6.18-ovz-057.6/net/ipv4/icmp.c~route 2008-08-18 14:21:18.000000000 +0400 ++++ linux-2.6.18-ovz-057.6/net/ipv4/icmp.c 2008-08-18 14:21:35.000000000 +0400 +@@ -93,6 +93,7 @@ + #include <asm/uaccess.h> + #include <net/checksum.h> + #include <linux/xfrm.h> ++#include <net/xfrm.h> + + /* + * Build xmit assembly blocks diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-missed-PATH_MAX-sumversion.c.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-missed-PATH_MAX-sumversion.c.patch new file mode 100644 index 000000000000..9efd6ab15124 --- /dev/null +++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-missed-PATH_MAX-sumversion.c.patch @@ -0,0 +1,13 @@ +http://bugzilla.openvz.org/show_bug.cgi?id=951 + +diff -up ./scripts/mod/sumversion.c.cfx ./scripts/mod/sumversion.c +--- ./scripts/mod/sumversion.c.cfx 2006-09-20 07:42:06.000000000 +0400 ++++ ./scripts/mod/sumversion.c 2008-08-20 16:59:14.000000000 +0400 +@@ -7,6 +7,7 @@ + #include <ctype.h> + #include <errno.h> + #include <string.h> ++#include <limits.h> + #include "modpost.h" + + /* diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-prevent-gcc-smartness.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-prevent-gcc-smartness.patch new file mode 100644 index 000000000000..a68aece756c9 --- /dev/null +++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-prevent-gcc-smartness.patch @@ -0,0 +1,31 @@ +http://bugzilla.openvz.org/show_bug.cgi?id=951 + +commit 38332cb98772f5ea757e6486bed7ed0381cb5f98 +Author: Segher Boessenkool <segher@kernel.crashing.org> +Date: Tue Mar 4 14:59:54 2008 -0800 + + time: prevent the loop in timespec_add_ns() from being optimised away + + Since some architectures don't support __udivdi3(). + + Signed-off-by: Segher Boessenkool <segher@kernel.crashing.org> + Cc: john stultz <johnstul@us.ibm.com> + Cc: Ingo Molnar <mingo@elte.hu> + Signed-off-by: Andrew Morton <akpm@linux-foundation.org> + Signed-off-by: Thomas Gleixner <tglx@linutronix.de> + +diff --git a/include/linux/time.h b/include/linux/time.h +index 2091a19..d32ef0a 100644 +--- a/include/linux/time.h ++++ b/include/linux/time.h +@@ -174,6 +174,10 @@ static inline void timespec_add_ns(struct timespec *a, u64 ns) + { + ns += a->tv_nsec; + while(unlikely(ns >= NSEC_PER_SEC)) { ++ /* The following asm() prevents the compiler from ++ * optimising this loop into a modulo operation. */ ++ asm("" : "+r"(ns)); ++ + ns -= NSEC_PER_SEC; + a->tv_sec++; + } diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-qouta-compat-build.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-qouta-compat-build.patch new file mode 100644 index 000000000000..b34ed695d75a --- /dev/null +++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-qouta-compat-build.patch @@ -0,0 +1,13 @@ +--- ./fs/compat.c.bk 2008-08-06 15:31:16.000000000 +0400 ++++ ./fs/compat.c 2008-08-06 15:41:47.000000000 +0400 +@@ -1565,8 +1565,10 @@ asmlinkage long sys32_quotactl(unsigned + __u32 dqb_itime[2]; + __u32 dqb_valid; + } dqblk32; ++#ifdef CONFIG_QUOTA_COMPAT + struct compat_v2_dqblk cdq; + struct compat_v2_dqblk_32 cdq32; ++#endif + + cmds = cmd >> SUBCMDSHIFT; + diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-utimenstat.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-utimenstat.patch new file mode 100644 index 000000000000..7ddc69688618 --- /dev/null +++ b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.057.2-utimenstat.patch @@ -0,0 +1,18 @@ +diff -up ./fs/utimes.c.touchkludge ./fs/utimes.c +--- ./fs/utimes.c.touchkludge 2008-08-20 20:54:10.000000000 +0400 ++++ ./fs/utimes.c 2008-08-20 21:07:40.000000000 +0400 +@@ -14,6 +14,14 @@ asmlinkage long sys_utimensat(int dfd, c + { + struct timespec tstimes[2]; + struct timeval time[2]; ++ ++ if (filename == NULL) ++ /* ++ * a kludge for thuse, checking for utimensat ++ * availability via this maneuver ++ */ ++ return -ENOSYS; ++ + if (utimes) { + if (copy_from_user(&tstimes, utimes, sizeof(tstimes))) + return -EFAULT; diff --git a/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.057.2.ebuild b/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.057.2.ebuild new file mode 100644 index 000000000000..4fab14b9da44 --- /dev/null +++ b/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.057.2.ebuild @@ -0,0 +1,47 @@ +# Copyright 1999-2008 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 +# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.057.2.ebuild,v 1.1 2008/08/22 19:39:27 pva Exp $ + +inherit versionator + +ETYPE="sources" + +CKV=$(get_version_component_range 1-3) +OKV=${OKV:-${CKV}} +if [[ ${PR} == "r0" ]]; then +KV_FULL=${CKV}-${PN/-*}-$(get_version_component_range 4).$(get_version_component_range 5) +else +KV_FULL=${CKV}-${PN/-*}-$(get_version_component_range 4).$(get_version_component_range 5)-${PR} +fi +OVZ_KERNEL="$(get_version_component_range 4)stab$(get_version_component_range 5)" +OVZ_REV="$(get_version_component_range 6)" +EXTRAVERSION=-${OVZ_KERNEL} +KERNEL_URI="mirror://kernel/linux/kernel/v${KV_MAJOR}.${KV_MINOR}/linux-${OKV}.tar.bz2" + +inherit kernel-2 +detect_version + +KEYWORDS="~amd64 ~ia64 ~ppc64 ~sparc ~x86" +IUSE="" + +DESCRIPTION="Full sources including OpenVZ patchset for the ${KV_MAJOR}.${KV_MINOR} kernel tree" +HOMEPAGE="http://www.openvz.org" +SRC_URI="${KERNEL_URI} ${ARCH_URI} + http://download.openvz.org/kernel/branches/rhel5-${CKV}/${OVZ_KERNEL}.${OVZ_REV}/patches/patch-92.1.1.el5.${OVZ_KERNEL}.${OVZ_REV}-combined.gz" + +UNIPATCH_STRICTORDER=1 +UNIPATCH_LIST="${DISTDIR}/patch-92.1.1.el5.${OVZ_KERNEL}.${OVZ_REV}-combined.gz +${FILESDIR}/${P}-utimenstat.patch +${FILESDIR}/${P}-qouta-compat-build.patch +${FILESDIR}/${P}-fix-build-xfrm.h.patch +${FILESDIR}/${P}-missed-PATH_MAX-sumversion.c.patch +${FILESDIR}/${P}-prevent-gcc-smartness.patch +${FILESDIR}/${P}-fix-CIFS-build.patch +${FILESDIR}/${P}-another-fix-build-xfrm.h.patch" + +K_EXTRAEINFO="Starting with openvz-sources-2.6.18.028.053.14 we use RHEL5 patchset +instead of previously used 2.6.18 one. This patchset considered to be more stable +and security supported by upstream, that why they suggested us to use it. +But note: RHEL5 patchset is very fragile and fails to build in many +configurations so if you have problems use config files from openvz team +http://wiki.openvz.org/Download/kernel/rhel5/028stab057.2" |