summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPeter Volkov <pva@gentoo.org>2011-04-01 18:19:43 +0000
committerPeter Volkov <pva@gentoo.org>2011-04-01 18:19:43 +0000
commit6560dbb12215fa53890ebc003f1d16c231ab01bc (patch)
treeaa586a9d9d8ef688b9a047b80a0df121c82e97ef /sys-kernel
parentppc64 stable wrt #324031, #361617 (diff)
downloadhistorical-6560dbb12215fa53890ebc003f1d16c231ab01bc.tar.gz
historical-6560dbb12215fa53890ebc003f1d16c231ab01bc.tar.bz2
historical-6560dbb12215fa53890ebc003f1d16c231ab01bc.zip
Version bump RHEL5 (2.6.18) kernel. Stabilize 2.6.32, bug #198632 and #360623. Drop old.
Package-Manager: portage-2.1.9.45/cvs/Linux x86_64
Diffstat (limited to 'sys-kernel')
-rw-r--r--sys-kernel/openvz-sources/ChangeLog24
-rw-r--r--sys-kernel/openvz-sources/Manifest21
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.068.3-build-fix.patch24
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-PPPoED-NULL-dereference.patch40
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-VDSO_sysenter_return.patch83
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-VE_IP_NAT-bit.patch32
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-build-fix.patch25
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials-build.patch38
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials.patch117
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-openreq-leak.patch29
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-orphans.patch107
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-ppp-CAP_VE_NET_ADMIN.patch27
-rw-r--r--sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-ppp-reconnect.patch120
-rw-r--r--sys-kernel/openvz-sources/openvz-sources-2.6.18.028.085.3.ebuild (renamed from sys-kernel/openvz-sources/openvz-sources-2.6.18.028.079.1.ebuild)6
-rw-r--r--sys-kernel/openvz-sources/openvz-sources-2.6.32.10.1-r1.ebuild66
-rw-r--r--sys-kernel/openvz-sources/openvz-sources-2.6.32.11.1.ebuild4
16 files changed, 32 insertions, 731 deletions
diff --git a/sys-kernel/openvz-sources/ChangeLog b/sys-kernel/openvz-sources/ChangeLog
index c814c9dd7b9e..22421fa8660a 100644
--- a/sys-kernel/openvz-sources/ChangeLog
+++ b/sys-kernel/openvz-sources/ChangeLog
@@ -1,6 +1,28 @@
# ChangeLog for sys-kernel/openvz-sources
# Copyright 1999-2011 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/ChangeLog,v 1.163 2011/03/09 13:38:59 pva Exp $
+# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/ChangeLog,v 1.164 2011/04/01 18:19:43 pva Exp $
+
+*openvz-sources-2.6.18.028.085.3 (01 Apr 2011)
+
+ 01 Apr 2011; Peter Volkov <pva@gentoo.org>
+ -files/openvz-sources-2.6.18.028.068.3-build-fix.patch,
+ -openvz-sources-2.6.18.028.079.1.ebuild,
+ +openvz-sources-2.6.18.028.085.3.ebuild,
+ -openvz-sources-2.6.32.10.1-r1.ebuild,
+ -files/openvz-sources-2.6.32.10.1-PPPoED-NULL-dereference.patch,
+ -files/openvz-sources-2.6.32.10.1-VDSO_sysenter_return.patch,
+ -files/openvz-sources-2.6.32.10.1-VE_IP_NAT-bit.patch,
+ -files/openvz-sources-2.6.32.10.1-build-fix.patch,
+ -files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials.patch
+ ,
+ -files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials-build
+ .patch, -files/openvz-sources-2.6.32.10.1-openreq-leak.patch,
+ -files/openvz-sources-2.6.32.10.1-orphans.patch,
+ -files/openvz-sources-2.6.32.10.1-ppp-CAP_VE_NET_ADMIN.patch,
+ -files/openvz-sources-2.6.32.10.1-ppp-reconnect.patch,
+ openvz-sources-2.6.32.11.1.ebuild:
+ Version bump RHEL5 (2.6.18) kernel. Stabilize 2.6.32, bug #198632 and
+ #360623. Drop old.
*openvz-sources-2.6.32.11.1 (09 Mar 2011)
*openvz-sources-2.6.18.028.081.1 (09 Mar 2011)
diff --git a/sys-kernel/openvz-sources/Manifest b/sys-kernel/openvz-sources/Manifest
index cc3a5e34133e..c8da79dc97e7 100644
--- a/sys-kernel/openvz-sources/Manifest
+++ b/sys-kernel/openvz-sources/Manifest
@@ -1,16 +1,5 @@
AUX openvz-sources-2.6.18.028.064.7-bridgemac.patch 514 RMD160 bdd04c4dc86c79b91b7675d8c59b569483e444c4 SHA1 ef092a68c4dab7dc7284b2be8cc74b1510def485 SHA256 250bc852aedca35624d9352c1d693e147812504b2799cd2ba20f0c9763e61908
-AUX openvz-sources-2.6.18.028.068.3-build-fix.patch 742 RMD160 1c6e51e8e9d490cfeae747229deafbe129b73be6 SHA1 9e21887303534a76956ba8cafdd31c7168f8eae1 SHA256 0e04df4445fcea66ea771b727dc50800ff4e7065fc5cda3767f8a5fedee9b786
-AUX openvz-sources-2.6.32.10.1-PPPoED-NULL-dereference.patch 1381 RMD160 c296cf0a2ee955d66c9ee9b7032489dc09aab768 SHA1 60a66c580665550dc9ad2cbaafde85a4941ab1b4 SHA256 0fb3be147929cdf1863c3eb81c18349364567aeed3f3b39b3ba5ec85f795f8e4
-AUX openvz-sources-2.6.32.10.1-VDSO_sysenter_return.patch 2649 RMD160 03f361915975ea1ec94608d66dee360a8ff39dcc SHA1 679c986c7c680966246c4eb505db22ff3ac50d68 SHA256 3c840d5d5d00253dbe59ce12e3c3a9440106c1e362d50a1334bfdd3645c95a65
-AUX openvz-sources-2.6.32.10.1-VE_IP_NAT-bit.patch 1330 RMD160 32b3debbf9c22ec8ef1d030962b6bb65e015cd0e SHA1 72e62c36beadf9cede34a4e29c18eea687a615ac SHA256 6b12bf2a018abbd6d29138fb141310d86febdac82d9691dbf3e8833d1ed739b7
-AUX openvz-sources-2.6.32.10.1-build-fix.patch 717 RMD160 7c39b6f16782680ab8a18a0cb58d42e65ad54ac5 SHA1 30723259b1a44c2b3635212ca13cd01a80f8b6c2 SHA256 793839519be649c2c880597a3ff9c794b0a87d38c6163a1676ab41673d218d46
AUX openvz-sources-2.6.32.10.1-cpt_process.c-build.patch 1355 RMD160 10ed708f8981a8da5c48e85f8d4ab92fd8c52a6b SHA1 34623bd06d781e25ed18781bc48a30ffc3a0f29d SHA256 5d3c0cd848f2546025374b1da77fb34bbae85bdf955bf21e9451c03b7221457d
-AUX openvz-sources-2.6.32.10.1-file-restore-init_task-credentials-build.patch 1395 RMD160 9159fdc183df0754ca45fbc3f29631c8e5dc59dd SHA1 4cff64cd4c4916459823c9577081441d2b6c7df5 SHA256 ac41148984321d433273fd0bbb1dc2b3f935313c74ef285f28d5c2d946fb7501
-AUX openvz-sources-2.6.32.10.1-file-restore-init_task-credentials.patch 3575 RMD160 431fd64893b211c0098cb7bfe5616cc198449e6c SHA1 e26cba6218e7f2821247c30a27befa9865a606f1 SHA256 c9e2fd606c81299734fe9f5e55c6d1f6c654caf065f792a4a119d747ce5f3835
-AUX openvz-sources-2.6.32.10.1-openreq-leak.patch 928 RMD160 e5c365860cacd5bee6b9d6b989a23b2c1a74d2ed SHA1 623d19d35ebc49fec9f0bf7409b2fa24bd720615 SHA256 050c348fc2b68f0870315b88ffd44ac3765ac79d0e4be4a66109bf238c195e19
-AUX openvz-sources-2.6.32.10.1-orphans.patch 3294 RMD160 3e56e9a503a1f15682a65709ab2cfff5a6d1239d SHA1 51890a4730e3c45cdd7602c15b56d158575a101e SHA256 856f8d92026ef4856aede3f19ca01b016bf01e8744878889463077e64302d130
-AUX openvz-sources-2.6.32.10.1-ppp-CAP_VE_NET_ADMIN.patch 995 RMD160 1cf178fd32a8ab117e4b7baeb5bc0a16468430c1 SHA1 8a7069d73f3c40355694cc30a394cad8fb4c42a3 SHA256 c4b332a05e3e6a7008325016fe835e2c87fc3591fcbca3e0819d9463ab146842
-AUX openvz-sources-2.6.32.10.1-ppp-reconnect.patch 3206 RMD160 93433b108e7846489766cd7ddcf4c26a2057befd SHA1 a0786783d13ff05e2a2e431e232588cd2b21d652 SHA256 5bd52680db3c41443b21ab065745809feff5c8fbe12d6da13199d6a657611505
DIST deblob-2.6.27 67810 RMD160 2d697e569fb4ba294c94a50798de10d2ad930b84 SHA1 45b2a16c2df2c14380cd813c74be721b9537d03d SHA256 2eab6480d170a7204b09f2c1091f2b3e4c19c3525ea4887e6887501bfa263efc
DIST deblob-2.6.32 84094 RMD160 394f46ec5b869638a7bc2e87beb118167c9bd6cb SHA1 1a2a1efb72126609d9e3b9be99ae5be2751efd06 SHA256 de625f0bd221c9c38d4453f1b709622f222d86a0ae9350d2b7b0e17795e6de6d
DIST deblob-check-2.6.27 247608 RMD160 840bf8a229ea79810519eee6241edb85b78a6562 SHA1 d45a24eb16e5ac956c0fcddbc1ac4d67e326c7b8 SHA256 da1aecdf3ab7f1207b90642d303e52262ccc2ed9e49739b729512b88950d17f3
@@ -18,15 +7,13 @@ DIST deblob-check-2.6.32 247608 RMD160 840bf8a229ea79810519eee6241edb85b78a6562
DIST linux-2.6.18.tar.bz2 41863580 RMD160 f92283f956880676bfb1f1d5288325461e4e02e7 SHA1 178f7d5bb3af0978d42b37651b8753323c7129c2 SHA256 c95280ff6c5d2a17788f7cc582d23ae8a9a7ba3f202ec6e4238eaadfce7c163d
DIST linux-2.6.27.tar.bz2 50355835 RMD160 5be4595ad824a4af67c1ec0c692838ad0c31f0c0 SHA1 8425ec3be2652f9d511911ff4fcf99039d4574be SHA256 0e99bf9e83f4d1ae0c656741a84dfddfa9c4d2469cf35475f5939d02dc3e4393
DIST linux-2.6.32.tar.bz2 64424138 RMD160 b93742cbaf8174f2200d2dbef0d47a26c618039c SHA1 410b4fc818023bfef60064e973ff0ab46d3bfb19 SHA256 5099786d80b8407d98a619df00209c2353517f22d804fdd9533b362adcb4504e
-DIST patch-194.26.1.el5.028stab079.1-combined.gz 18856580 RMD160 a921efd42c1bb803a272d967b7e1ada066194505 SHA1 0b4c75501c5662ab476094f35aadf434489bfcd5 SHA256 fa7a6341e10a64d13afe09b512d424eefdabbd3566f51b9185d60d23a9bb6bc5
DIST patch-194.26.1.el5.028stab081.1-combined.gz 18859161 RMD160 fc50d11a307b347c3905829098117e0ff684fecb SHA1 b38f98f791ec8e99265988f4c9e93d81e8c09d0f SHA256 1aece511fe598ddd4f71e55d64f50d900ace707b4c077b1653ce8d96329f7388
-DIST patch-dzhanibekov.1-combined.gz 1288000 RMD160 7d85773fbac4237568351d2d2652249f88319742 SHA1 48fb44a7e9ea322e4a8d5a449ca93dfae5667bb5 SHA256 092bec284abb3a3e5b6c836319e646c1e89b72369681e6bfbfa9e79bd0df4e03
+DIST patch-238.5.1.el5.028stab085.3-combined.gz 19531851 RMD160 459943905bc99681db638169c3729891fac62443 SHA1 84e842b598d5aa29ec16f3e039c13c52d117382a SHA256 b5ab0e8bf4a95d7cc9cc75cf245ed1149640e445c291bc797a6904393d5fb671
DIST patch-feoktistov.1-combined.gz 1355929 RMD160 ccbd50e0f3d2372d4cc59dc1aed253e997566a33 SHA1 e979dacb7679a63ef8263a8cb5ce5640e6d2bd97 SHA256 0edab86be0a13f0f865e1bbd9b83b61188fd8ecd24b2b0c582b076b6872ddeb5
DIST patch-repin.1-combined.gz 1151642 RMD160 751b0cf0226c0e5f91ab709f718b72caa4998f0f SHA1 7aeda62cf6be7cb84b6756de8d62eae370f77452 SHA256 5c81b2f6e0fcdd0f78f8209634f0e989bb986738efe0fec2b5d355a8cd5f9ea7
-EBUILD openvz-sources-2.6.18.028.079.1.ebuild 1844 RMD160 753cec8d0e4bf091c5dc2f26088fc14b01ea56a1 SHA1 5b04dda1c03c44e7c1731ef3413230dff2d1494b SHA256 6f158362842cbbda2385b8a69e3c65af1653cd40bc2be0fb0988fa4f7fde0d40
EBUILD openvz-sources-2.6.18.028.081.1.ebuild 1844 RMD160 8dd8ea0fdafb37273bc4a56fa05708c1f0ab6097 SHA1 21dec0263bc08ea1df959b62dd4e596ef77f85fe SHA256 b1a1953f9f4581aa646ff78b1409b66378f123663838f6200bea1d3790e63cac
+EBUILD openvz-sources-2.6.18.028.085.3.ebuild 1843 RMD160 a68fd2d1e5fbf9f931d53403942d02289f1caea8 SHA1 22fedfaed2a75a94674dd4004f4aee0d1d15911d SHA256 e62e9376a41eeaf8b68e0216bf4cafca643bb7cfe6fbd7f394f0ceb7448bab88
EBUILD openvz-sources-2.6.27.9.1.ebuild 1889 RMD160 c7ee49a28480dac5d41922ef6731f82e871a3f38 SHA1 23b304ac4973102741ce36cde3e8793d51479b42 SHA256 d8d65a6b40dbeedfb70f007777a0ec31aec4dbd623c2df3d702d6b7bf6471c11
-EBUILD openvz-sources-2.6.32.10.1-r1.ebuild 2259 RMD160 04797c847c7fac970c78085d9832bcb57c74f287 SHA1 3537c6740450580347c3cdf4819c911ccd853f5e SHA256 bf8b496b81450cd9f68ae47f1d3fa9a740427c47849421c3f3adc052b94bd55c
-EBUILD openvz-sources-2.6.32.11.1.ebuild 1837 RMD160 c1827de4b6c79844987f8010301002dba02c72a2 SHA1 d6d7c3491267972979fc4a68734600cd0b7f0f7d SHA256 937487e55044f3a57904414543c4536144f942d7b175493b456e8ef8f2e5f302
-MISC ChangeLog 41076 RMD160 e7c21213b01c650bc405c0bf1384571656bc60e7 SHA1 0f9c3fb18b6c60371f5d756dcf530cb4bb21d6d1 SHA256 20c28e34aa027d0967e9d5b79072a33ae23031d4855ed172369cb1638feac30a
+EBUILD openvz-sources-2.6.32.11.1.ebuild 1835 RMD160 daf01437180cc570f1afd64eb9f20b932d895034 SHA1 cbd4c14e75bde531dd326ba112051d5236c5f8e2 SHA256 78c6206fd2aa430baa130b98a48e892f0ef6330cf43f857aad5b9e668915f6df
+MISC ChangeLog 42120 RMD160 b9eb0bef78fa49a20ca9844d69cad7199d3bb080 SHA1 8168417a16d1e2cd820ec119d2456d6b88e2eff4 SHA256 dcdb8a6d4104d97147b58c0e8cf89b0d8765e77e52f76cc38222855747d6c150
MISC metadata.xml 681 RMD160 2506e8f34c2b1c706419e24c14ae0dbce7912a5f SHA1 bc3c7c37e15a4ffc097a823eb3a0758364781c9b SHA256 1a1794adcc3b2443635b21dee50f86ac796c7fdc44a276f8852357f8bedde9b8
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.068.3-build-fix.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.068.3-build-fix.patch
deleted file mode 100644
index ce1e7305f4ad..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.18.028.068.3-build-fix.patch
+++ /dev/null
@@ -1,24 +0,0 @@
-x86,amd_detect_cmp: Dont forget to retrieve cpu number
-
-In non-NUMA case we have to retrieve cpu number in a sake
-of HT compatibility.
-
-Signed-off-by: Cyrill Gorcunov <gorcunov@openvz.org>
----
- arch/x86_64/kernel/setup.c | 2 +-
- 1 file changed, 1 insertion(+), 1 deletion(-)
-
-Index: linux-2.6.18-ovz/arch/x86_64/kernel/setup.c
-=====================================================================
---- linux-2.6.18-ovz.orig/arch/x86_64/kernel/setup.c
-+++ linux-2.6.18-ovz/arch/x86_64/kernel/setup.c
-@@ -857,8 +857,8 @@ static void __init amd_detect_cmp(struct
- {
- #ifdef CONFIG_SMP
- unsigned bits;
--#ifdef CONFIG_NUMA
- int cpu = smp_processor_id();
-+#ifdef CONFIG_NUMA
- int node = 0;
- unsigned apicid = hard_smp_processor_id();
- #endif
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-PPPoED-NULL-dereference.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-PPPoED-NULL-dereference.patch
deleted file mode 100644
index b92e8f9a3eb9..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-PPPoED-NULL-dereference.patch
+++ /dev/null
@@ -1,40 +0,0 @@
-From: Cyrill Gorcunov <gorcunov@openvz.org>
-Date: Wed, 8 Dec 2010 13:28:42 +0000 (+0300)
-Subject: net: pppoe - Fix NULL dereference on PPPoED frames
-X-Git-Url: http://git.openvz.org/?p=linux-2.6.32-openvz;a=commitdiff_plain;h=09c67a4c47f8dfeac50c3122550e8d8163b2d2d3
-
-net: pppoe - Fix NULL dereference on PPPoED frames
-
-In case if VE configured without VE_FEATURE_PPP
-PPPoED frame causes NULL dereference. In real there is
-a chance to receive a malformed packet (ie packets with
-PPPoE type) which would cause null dereference as well.
-Fix both cases.
-
-Signed-off-by: Cyrill Gorcunov <gorcunov@openvz.org>
-Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
----
-
-diff --git a/drivers/net/pppoe.c b/drivers/net/pppoe.c
-index 326958b..9bf064c 100644
---- a/drivers/net/pppoe.c
-+++ b/drivers/net/pppoe.c
-@@ -453,6 +453,8 @@ static int pppoe_rcv(struct sk_buff *skb, struct net_device *dev,
- goto drop;
-
- pn = pppoe_pernet(dev_net(dev));
-+ if (!pn) /* no VE_FEATURE_PPP */
-+ goto drop;
-
- /* Note that get_item does a sock_hold(), so sk_pppox(po)
- * is known to be safe.
-@@ -495,6 +497,9 @@ static int pppoe_disc_rcv(struct sk_buff *skb, struct net_device *dev,
- goto abort;
-
- pn = pppoe_pernet(dev_net(dev));
-+ if (!pn) /* no VE_FEATURE_PPP */
-+ goto abort;
-+
- po = get_item(pn, ph->sid, eth_hdr(skb)->h_source, dev->ifindex);
- if (po) {
- struct sock *sk = sk_pppox(po);
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-VDSO_sysenter_return.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-VDSO_sysenter_return.patch
deleted file mode 100644
index 384fc755e69f..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-VDSO_sysenter_return.patch
+++ /dev/null
@@ -1,83 +0,0 @@
-http://bugzilla.openvz.org/show_bug.cgi?id=1586
-http://bugs.gentoo.org/show_bug.cgi?id=329083
-
- - Add tricks for hrtimer C/R code
- - More vDSO32 conditional compilation on dump/restore
- kernel/cpt/cpt_dump.c | 4 ++--
- kernel/cpt/cpt_mm.h | 2 +-
- kernel/cpt/rst_mm.c | 2 ++
- kernel/cpt/rst_undump.c | 6 +++---
- 4 files changed, 8 insertions(+), 6 deletions(-)
---- linux-2.6-openvz/kernel/cpt/cpt_dump.c
-+++ linux-2.6-openvz/kernel/cpt/cpt_dump.c
-@@ -843,7 +843,7 @@ static int cpt_dump_utsname(cpt_context_
- return 0;
- }
-
--#ifndef CONFIG_IA64
-+#if defined(CONFIG_X86_32) || defined(CONFIG_COMPAT)
- static int cpt_dump_vsyscall(cpt_context_t *ctx)
- {
- struct cpt_page_block *pgb = cpt_get_buf(ctx);
-@@ -947,7 +947,7 @@ int cpt_dump(struct cpt_context *ctx)
- if (!err)
- err = cpt_dump_utsname(ctx);
-
--#ifndef CONFIG_IA64
-+#if defined(CONFIG_X86_32) || defined(CONFIG_COMPAT)
- if (!err)
- err = cpt_dump_vsyscall(ctx);
- #endif
---- linux-2.6-openvz/kernel/cpt/cpt_mm.h
-+++ linux-2.6-openvz/kernel/cpt/cpt_mm.h
-@@ -27,7 +27,7 @@ extern int arch_setup_additional_pages(s
- unsigned long map_address);
- #endif
-
--#ifdef CONFIG_X86
-+#if defined(CONFIG_X86_32) || defined(CONFIG_COMPAT)
- extern struct page *vdso32_pages[1];
- #define vsyscall_addr page_address(vdso32_pages[0])
- #endif
---- linux-2.6-openvz/kernel/cpt/rst_mm.c
-+++ linux-2.6-openvz/kernel/cpt/rst_mm.c
-@@ -982,8 +982,10 @@ static int do_rst_mm(struct cpt_mm_image
- #ifndef CONFIG_IA64
- if (ctx->image_version >= CPT_VERSION_9) {
- mm->context.vdso = cpt_ptr_import(vmi->cpt_vdso);
-+#if defined(CONFIG_X86_32) || defined(CONFIG_COMPAT)
- current_thread_info()->sysenter_return =
- VDSO32_SYMBOL(mm->context.vdso, SYSENTER_RETURN);
-+#endif
- }
- #endif
-
---- linux-2.6-openvz/kernel/cpt/rst_undump.c
-+++ linux-2.6-openvz/kernel/cpt/rst_undump.c
-@@ -397,7 +397,7 @@ static int hook(void *arg)
-
- rb = &task_thread_info(current)->restart_block;
- rb->fn = hrtimer_nanosleep_restart;
--#ifdef CONFIG_COMPAT
-+#if defined(CONFIG_X86_64) && defined(CONFIG_COMPAT)
- if (ti->cpt_restart.fn == CPT_RBL_COMPAT_NANOSLEEP)
- rb->fn = compat_nanosleep_restart;
- #endif
-@@ -797,7 +797,7 @@ static int vps_rst_restore_tree(struct c
- return err;
- }
-
--#ifndef CONFIG_IA64
-+#if defined(CONFIG_X86_32) || defined(CONFIG_COMPAT)
- int rst_read_vdso(struct cpt_context *ctx)
- {
- int err;
-@@ -871,7 +871,7 @@ int vps_rst_undump(struct cpt_context *c
- #ifdef CONFIG_VZ_CHECKPOINT_LAZY
- err = rst_setup_pagein(ctx);
- #endif
--#ifndef CONFIG_IA64
-+#if defined(CONFIG_X86_32) || defined(CONFIG_COMPAT)
- if (err == 0)
- err = rst_read_vdso(ctx);
- #endif
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-VE_IP_NAT-bit.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-VE_IP_NAT-bit.patch
deleted file mode 100644
index e3f5aadcb90f..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-VE_IP_NAT-bit.patch
+++ /dev/null
@@ -1,32 +0,0 @@
-From: Cyrill Gorcunov <gorcunov@openvz.org>
-Date: Wed, 8 Dec 2010 14:12:39 +0000 (+0300)
-Subject: net, iptables: Restore setting VE_IP_NAT bit in running modules mask
-X-Git-Url: http://git.openvz.org/?p=linux-2.6.32-openvz;a=commitdiff_plain;h=04e9b2f949ad9c2ded425caecc17341d5300f2b5
-
-net, iptables: Restore setting VE_IP_NAT bit in running modules mask
-
-During migration to new iptables management code the setting of
-VE_IP_NAT bit was lost. In the former code it set at module symbol
-resolving time (which was cut off eventually). Restore this
-functionality by setting this bit if VE is allowed to.
-
-http://bugzilla.openvz.org/show_bug.cgi?id=1603
-
-Signed-off-by: Cyrill Gorcunov <gorcunov@openvz.org>
-Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
----
-
-diff --git a/net/ipv4/netfilter/nf_nat_core.c b/net/ipv4/netfilter/nf_nat_core.c
-index 2c77ffe..96f07a4 100644
---- a/net/ipv4/netfilter/nf_nat_core.c
-+++ b/net/ipv4/netfilter/nf_nat_core.c
-@@ -682,6 +682,9 @@ nfnetlink_parse_nat_setup(struct nf_conn *ct,
-
- static int __net_init nf_nat_net_init(struct net *net)
- {
-+ if (net_ipt_permitted(net, VE_IP_NAT))
-+ net_ipt_module_set(net, VE_IP_NAT);
-+
- /* Leave them the same for the moment. */
- net->ipv4.nat_htable_size = net->ct.htable_size;
- net->ipv4.nat_bysource = nf_ct_alloc_hashtable(&net->ipv4.nat_htable_size,
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-build-fix.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-build-fix.patch
deleted file mode 100644
index d18259471b16..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-build-fix.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-From: Pavel Emelaynov <xemul@openvz.org>
-Date: Wed, 8 Dec 2010 14:28:28 +0000 (+0300)
-Subject: proc: Compilation fix (lost headers)
-X-Git-Url: http://git.openvz.org/?p=linux-2.6.32-openvz;a=commitdiff_plain;h=9cfc84d64b73f2bbf752b1df68aa190313407afb
-
-proc: Compilation fix (lost headers)
-
-http://bugzilla.openvz.org/show_bug.cgi?id=1688
-
-Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
----
-
-diff --git a/fs/proc/inode.c b/fs/proc/inode.c
-index 3693efa..20fcc37 100644
---- a/fs/proc/inode.c
-+++ b/fs/proc/inode.c
-@@ -18,6 +18,8 @@
- #include <linux/module.h>
- #include <linux/smp_lock.h>
- #include <linux/sysctl.h>
-+#include <linux/sched.h>
-+#include <linux/ve.h>
-
- #include <asm/system.h>
- #include <asm/uaccess.h>
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials-build.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials-build.patch
deleted file mode 100644
index 3d46d25ca13d..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials-build.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-From: Cyrill Gorcunov <gorcunov@openvz.org>
-Date: Fri, 10 Dec 2010 15:38:51 +0000 (+0300)
-Subject: C/R: Restore variable name missed
-X-Git-Url: http://git.openvz.org/?p=linux-2.6.32-openvz;a=commitdiff_plain;h=eb1f3c62b3fc652945dd108dde30cde8be7a6867
-
-C/R: Restore variable name missed
-
-In patch 66d247cf6dd51c6725cef2d01285398fe667ef6f
-we've lost a part of variable name during the merge
-which causes kernel to not build anymore. Fix it
-by restoring the name we need.
-
-Signed-off-by: Cyrill Gorcunov <gorcunov@openvz.org>
-Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
----
-
-diff --git a/kernel/cpt/rst_files.c b/kernel/cpt/rst_files.c
-index 75d591e..6f3963a 100644
---- a/kernel/cpt/rst_files.c
-+++ b/kernel/cpt/rst_files.c
-@@ -873,7 +873,7 @@ struct file *rst_file(loff_t pos, int fd, struct cpt_context *ctx)
- err = rst_get_object(CPT_OBJ_FILE, pos, &fi, ctx);
- if (err < 0)
- goto err_out;
-- fixup_file_flags(file, rst_cred, &fi, 0, pos, ctx);
-+ fixup_file_flags(file, rst_cred_origin, &fi, 0, pos, ctx);
- }
- get_file(file);
- rst_creds_restore_current();
-@@ -1036,7 +1036,7 @@ open_file:
- }
- map_file:
- if (!IS_ERR(file)) {
-- fixup_file_flags(file, rst_cred, &fi, was_dentry_open, pos, ctx);
-+ fixup_file_flags(file, rst_cred_origin, &fi, was_dentry_open, pos, ctx);
-
- if (S_ISFIFO(fi.cpt_i_mode) && !was_dentry_open) {
- err = fixup_pipe_data(file, &fi, ctx);
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials.patch
deleted file mode 100644
index d9563a78864d..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-file-restore-init_task-credentials.patch
+++ /dev/null
@@ -1,117 +0,0 @@
-From: Cyrill Gorcunov <gorcunov@openvz.org>
-Date: Wed, 8 Dec 2010 14:10:42 +0000 (+0300)
-Subject: cpt: Use init_task credentials for file restoring procedure
-X-Git-Url: http://git.openvz.org/?p=linux-2.6.32-openvz;a=commitdiff_plain;h=66d247cf6dd51c6725cef2d01285398fe667ef6f
-
-cpt: Use init_task credentials for file restoring procedure
-
-We need highest credentials for file restoring procedure otherwise
-we might hit the situation where credentials for restoring thread
-is not high enough (happens with programs changing their uids).
-
-http://bugzilla.openvz.org/show_bug.cgi?id=1603
-
-Signed-off-by: Cyrill Gorcunov <gorcunov@openvz.org>
-Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
----
-
-diff --git a/kernel/cpt/rst_files.c b/kernel/cpt/rst_files.c
-index a84e3d3..75d591e 100644
---- a/kernel/cpt/rst_files.c
-+++ b/kernel/cpt/rst_files.c
-@@ -616,12 +616,11 @@ out:
- return err;
- }
-
--static int fixup_file_flags(struct file *file, struct cpt_file_image *fi,
-+static int fixup_file_flags(struct file *file, const struct cred *cred,
-+ struct cpt_file_image *fi,
- int was_dentry_open, loff_t pos,
- cpt_context_t *ctx)
- {
-- const struct cred *cred = current_cred() /* should be valid already */;
--
- if (fi->cpt_pos != file->f_pos) {
- int err = -ESPIPE;
- if (file->f_op->llseek)
-@@ -824,6 +823,34 @@ static struct file *open_signalfd(struct cpt_file_image *fi, int flags, struct c
- }
- #endif
-
-+/*
-+ * It may happen that a process which created a file
-+ * had changed its UID after that (keeping file opened/referenced
-+ * with write permissions for 'own' only) as a result we might
-+ * be unable to read it at restore time due to credentials
-+ * mismatch, to break this tie we temporary take 'init_task' credentials
-+ * and as only the file gets read into the memory we restore original
-+ * credentials back
-+ *
-+ * Same time if between credentials rise/restore you need
-+ * the former credentials (for fixups or whatever) --
-+ * use rst_cred_origin for that
-+ */
-+static const struct cred *rst_cred_origin;
-+
-+void rst_creds_rise_current(void)
-+{
-+ struct task_struct *tsk = &init_task;
-+ BUG_ON(rst_cred_origin);
-+ rst_cred_origin = override_creds(tsk->cred);
-+}
-+
-+void rst_creds_restore_current(void)
-+{
-+ revert_creds(rst_cred_origin);
-+ rst_cred_origin = NULL;
-+}
-+
- struct file *rst_file(loff_t pos, int fd, struct cpt_context *ctx)
- {
- int err;
-@@ -836,6 +863,8 @@ struct file *rst_file(loff_t pos, int fd, struct cpt_context *ctx)
- struct proc_dir_entry *proc_dead_file;
- int flags;
-
-+ rst_creds_rise_current();
-+
- obj = lookup_cpt_obj_bypos(CPT_OBJ_FILE, pos, ctx);
- if (obj) {
- file = obj->o_obj;
-@@ -844,9 +873,10 @@ struct file *rst_file(loff_t pos, int fd, struct cpt_context *ctx)
- err = rst_get_object(CPT_OBJ_FILE, pos, &fi, ctx);
- if (err < 0)
- goto err_out;
-- fixup_file_flags(file, &fi, 0, pos, ctx);
-+ fixup_file_flags(file, rst_cred, &fi, 0, pos, ctx);
- }
- get_file(file);
-+ rst_creds_restore_current();
- return file;
- }
-
-@@ -1006,7 +1036,7 @@ open_file:
- }
- map_file:
- if (!IS_ERR(file)) {
-- fixup_file_flags(file, &fi, was_dentry_open, pos, ctx);
-+ fixup_file_flags(file, rst_cred, &fi, was_dentry_open, pos, ctx);
-
- if (S_ISFIFO(fi.cpt_i_mode) && !was_dentry_open) {
- err = fixup_pipe_data(file, &fi, ctx);
-@@ -1059,6 +1089,7 @@ map_file:
- out:
- if (name)
- rst_put_name(name, ctx);
-+ rst_creds_restore_current();
- return file;
-
- err_put:
-@@ -1067,6 +1098,7 @@ err_put:
- err_out:
- if (name)
- rst_put_name(name, ctx);
-+ rst_creds_restore_current();
- return ERR_PTR(err);
- }
-
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-openreq-leak.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-openreq-leak.patch
deleted file mode 100644
index 1e5ee56f1ffd..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-openreq-leak.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-From: Pavel Emelyanov <xemul@openvz.org>
-Date: Wed, 8 Dec 2010 13:29:54 +0000 (+0300)
-Subject: netns: Don't leak others' openreq-s in proc
-X-Git-Url: http://git.openvz.org/?p=linux-2.6.32-openvz;a=commitdiff_plain;h=6aa0026d95af8b9a83113a3907c328eaa492333a
-
-netns: Don't leak others' openreq-s in proc
-
-The /proc/net/tcp leaks openreq sockets from other namespaces.
-http://bugzilla.openvz.org/show_bug.cgi?id=1705
-
-Signed-off-by: Pavel Emelyanov <xemul@parallels.com>
-Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
----
-
-diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c
-index e141833..e360965 100644
---- a/net/ipv4/tcp_ipv4.c
-+++ b/net/ipv4/tcp_ipv4.c
-@@ -1964,7 +1964,9 @@ get_req:
- }
- get_sk:
- sk_nulls_for_each_from(sk, node) {
-- if (sk->sk_family == st->family && net_eq(sock_net(sk), net)) {
-+ if (!net_eq(sock_net(sk), net))
-+ continue;
-+ if (sk->sk_family == st->family) {
- cur = sk;
- goto out;
- }
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-orphans.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-orphans.patch
deleted file mode 100644
index ea9893faa0dc..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-orphans.patch
+++ /dev/null
@@ -1,107 +0,0 @@
-From: Pavel Emelyanov <xemul@openvz.org>
-Date: Sat, 6 Nov 2010 14:02:43 +0000 (+0300)
-Subject: ubc: Fix orphan count checks after merge
-X-Git-Url: http://git.openvz.org/?p=linux-2.6.32-openvz;a=commitdiff_plain;h=e5db932edffe86ddc4a8f9cdfc6e267ed887570c
-
-ubc: Fix orphan count checks after merge
-
-After merging -stable the orphans checking function started checking
-the wrong counter.
-
-http://bugzilla.openvz.org/show_bug.cgi?id=1693
-
-Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
----
-
-diff --git a/include/bc/sock_orphan.h b/include/bc/sock_orphan.h
-index c5b2412..8f829c3 100644
---- a/include/bc/sock_orphan.h
-+++ b/include/bc/sock_orphan.h
-@@ -19,9 +19,13 @@
-
- static inline struct percpu_counter *__ub_get_orphan_count_ptr(struct sock *sk)
- {
-- if (sock_has_ubc(sk))
-- return &sock_bc(sk)->ub->ub_orphan_count;
-- return sk->sk_prot->orphan_count;
-+ if (sock_has_ubc(sk)) {
-+ struct user_beancounter *ub;
-+
-+ ub = top_beancounter(sock_bc(sk)->ub);
-+ return &ub->ub_orphan_count;
-+ } else
-+ return sk->sk_prot->orphan_count;
- }
-
- static inline void ub_inc_orphan_count(struct sock *sk)
-@@ -39,15 +43,7 @@ static inline int ub_get_orphan_count(struct sock *sk)
- return percpu_counter_sum_positive(__ub_get_orphan_count_ptr(sk));
- }
-
--extern int __ub_too_many_orphans(struct sock *sk, int count);
--static inline int ub_too_many_orphans(struct sock *sk, int shift)
--{
--#ifdef CONFIG_BEANCOUNTERS
-- if (__ub_too_many_orphans(sk, shift))
-- return 1;
--#endif
-- return tcp_too_many_orphans(sk, shift);
--}
-+extern int ub_too_many_orphans(struct sock *sk, int count);
-
- #include <bc/kmem.h>
-
-diff --git a/include/net/tcp.h b/include/net/tcp.h
-index 6fa5f0d..ac5f07d 100644
---- a/include/net/tcp.h
-+++ b/include/net/tcp.h
-@@ -272,9 +272,9 @@ static inline int between(__u32 seq1, __u32 seq2, __u32 seq3)
- return seq3 - seq2 >= seq1 - seq2;
- }
-
--static inline bool tcp_too_many_orphans(struct sock *sk, int shift)
-+static inline bool tcp_too_many_orphans(struct sock *sk,
-+ struct percpu_counter *ocp, int shift)
- {
-- struct percpu_counter *ocp = sk->sk_prot->orphan_count;
- int orphans = percpu_counter_read_positive(ocp);
-
- if (orphans << shift > sysctl_tcp_max_orphans) {
-diff --git a/kernel/bc/net.c b/kernel/bc/net.c
-index 2866ebb..427fc42 100644
---- a/kernel/bc/net.c
-+++ b/kernel/bc/net.c
-@@ -102,17 +102,18 @@ EXPORT_SYMBOL(skb_charge_fullsize);
- static int ub_sock_makewreserv_locked(struct sock *sk,
- int bufid, unsigned long size);
-
--int __ub_too_many_orphans(struct sock *sk, int shift)
-+int ub_too_many_orphans(struct sock *sk, int shift)
- {
-- struct user_beancounter *ub;
- struct percpu_counter *cnt;
-
-+ cnt = sk->sk_prot->orphan_count;
- if (sock_has_ubc(sk)) {
-- int orphans, limit;
-+ struct user_beancounter *ub;
-+ unsigned int orphans, limit;
-
- ub = top_beancounter(sock_bc(sk)->ub);
-- limit = ((int)ub->ub_parms[UB_NUMTCPSOCK].barrier) >> 2;
-- cnt = __ub_get_orphan_count_ptr(sk);
-+ limit = ub->ub_parms[UB_NUMTCPSOCK].barrier >> 2;
-+ cnt = &ub->ub_orphan_count;
-
- orphans = percpu_counter_read_positive(cnt);
- if ((orphans << shift) >= limit)
-@@ -122,7 +123,8 @@ int __ub_too_many_orphans(struct sock *sk, int shift)
- if ((orphans << shift) >= limit)
- return 1;
- }
-- return 0;
-+
-+ return tcp_too_many_orphans(sk, cnt, shift);
- }
-
- /*
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-ppp-CAP_VE_NET_ADMIN.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-ppp-CAP_VE_NET_ADMIN.patch
deleted file mode 100644
index d5fd3feb1f3f..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-ppp-CAP_VE_NET_ADMIN.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-From: Cyrill Gorcunov <gorcunov@gmail.com>
-Date: Sun, 7 Nov 2010 18:01:45 +0000 (+0300)
-Subject: ppp: Restore virtualization v3
-X-Git-Url: http://git.openvz.org/?p=linux-2.6.32-openvz;a=commitdiff_plain;h=aaf7d79ecd409182c101fa22a977b11fa95122f1
-
-ppp: Restore virtualization v3
-
-net, ppp: ppp_open should check for CAP_VE_NET_ADMIN
-http://bugzilla.openvz.org/show_bug.cgi?id=1663
-
-Signed-off-by: Cyrill Gorcunov <gorcunov@openvz.org>
-Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
----
-
-diff --git a/drivers/net/ppp_generic.c b/drivers/net/ppp_generic.c
-index f8545d0..bece346 100644
---- a/drivers/net/ppp_generic.c
-+++ b/drivers/net/ppp_generic.c
-@@ -369,7 +369,7 @@ static int ppp_open(struct inode *inode, struct file *file)
- /*
- * This could (should?) be enforced by the permissions on /dev/ppp.
- */
-- if (!capable(CAP_NET_ADMIN))
-+ if (!capable(CAP_VE_NET_ADMIN))
- return -EPERM;
- if (!net_generic(get_exec_env()->ve_netns, ppp_net_id)) /* no VE_FEATURE_PPP */
- return -EACCES;
diff --git a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-ppp-reconnect.patch b/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-ppp-reconnect.patch
deleted file mode 100644
index 87f9b6218d72..000000000000
--- a/sys-kernel/openvz-sources/files/openvz-sources-2.6.32.10.1-ppp-reconnect.patch
+++ /dev/null
@@ -1,120 +0,0 @@
-From: Cyrill Gorcunov <gorcunov@gmail.com>
-Date: Wed, 8 Dec 2010 13:35:42 +0000 (+0300)
-Subject: net, ppp: Report correct error code if unit allocation failed v7
-X-Git-Url: http://git.openvz.org/?p=linux-2.6.32-openvz;a=commitdiff_plain;h=6bb1ed0512b651893df1794a494e5eeb713e3d02
-
-net, ppp: Report correct error code if unit allocation failed v7
-
-Allocating unit from ird might return various error codes
-not EAGAIN one, so it should not be changed to anything else
-but returned precisely.
-
-v2: Do not free interface unit until it's freed, otherwise
- sysfs will find that device is still present and allocation
- of new interace will fail.
-v3: Close a small race window in unit release procedure
-v5: Be ready for PADO if PPP feature disabled.
-v6: Correct freeing of PPP units in generic level.
-v7: Put units if device is being unregistered.
-
-bcc70bb3aeae7c3d035881d41055685f08a2b745
-http://bugzilla.openvz.org/show_bug.cgi?id=1697
-
-Signed-off-by: Cyrill Gorcunov <gorcunov@openvz.org>
-Signed-off-by: Pavel Emelyanov <xemul@openvz.org>
----
-
-diff --git a/drivers/net/ppp_generic.c b/drivers/net/ppp_generic.c
-index bece346..091f629 100644
---- a/drivers/net/ppp_generic.c
-+++ b/drivers/net/ppp_generic.c
-@@ -2579,16 +2579,16 @@ ppp_create_interface(struct net *net, int unit, int *retp)
- */
- dev_net_set(dev, net);
-
-- ret = -EEXIST;
- mutex_lock(&pn->all_ppp_mutex);
-
- if (unit < 0) {
- unit = unit_get(&pn->units_idr, ppp);
- if (unit < 0) {
-- *retp = unit;
-+ ret = unit;
- goto out2;
- }
- } else {
-+ ret = -EEXIST;
- if (unit_find(&pn->units_idr, unit))
- goto out2; /* unit already exists */
- /*
-@@ -2663,10 +2663,10 @@ static void ppp_shutdown_interface(struct ppp *ppp)
- ppp->closing = 1;
- ppp_unlock(ppp);
- unregister_netdev(ppp->dev);
-+ unit_put(&pn->units_idr, ppp->file.index);
- } else
- ppp_unlock(ppp);
-
-- unit_put(&pn->units_idr, ppp->file.index);
- ppp->file.dead = 1;
- ppp->owner = NULL;
- wake_up_interruptible(&ppp->file.rwait);
-@@ -2854,8 +2854,7 @@ static void __exit ppp_cleanup(void)
- * by holding all_ppp_mutex
- */
-
--/* associate pointer with specified number */
--static int unit_set(struct idr *p, void *ptr, int n)
-+static int __unit_alloc(struct idr *p, void *ptr, int n)
- {
- int unit, err;
-
-@@ -2866,10 +2865,24 @@ again:
- }
-
- err = idr_get_new_above(p, ptr, n, &unit);
-- if (err == -EAGAIN)
-- goto again;
-+ if (err < 0) {
-+ if (err == -EAGAIN)
-+ goto again;
-+ return err;
-+ }
-+
-+ return unit;
-+}
-+
-+/* associate pointer with specified number */
-+static int unit_set(struct idr *p, void *ptr, int n)
-+{
-+ int unit;
-
-- if (unit != n) {
-+ unit = __unit_alloc(p, ptr, n);
-+ if (unit < 0)
-+ return unit;
-+ else if (unit != n) {
- idr_remove(p, unit);
- return -EINVAL;
- }
-@@ -2880,19 +2893,7 @@ again:
- /* get new free unit number and associate pointer with it */
- static int unit_get(struct idr *p, void *ptr)
- {
-- int unit, err;
--
--again:
-- if (!idr_pre_get(p, GFP_KERNEL)) {
-- printk(KERN_ERR "PPP: No free memory for idr\n");
-- return -ENOMEM;
-- }
--
-- err = idr_get_new_above(p, ptr, 0, &unit);
-- if (err == -EAGAIN)
-- goto again;
--
-- return unit;
-+ return __unit_alloc(p, ptr, 0);
- }
-
- /* put unit number back to a pool */
diff --git a/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.079.1.ebuild b/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.085.3.ebuild
index 4fb9aba7be9a..baa2d4284e6b 100644
--- a/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.079.1.ebuild
+++ b/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.085.3.ebuild
@@ -1,6 +1,6 @@
-# Copyright 1999-2010 Gentoo Foundation
+# Copyright 1999-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.079.1.ebuild,v 1.1 2010/12/19 15:25:55 pva Exp $
+# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/openvz-sources-2.6.18.028.085.3.ebuild,v 1.1 2011/04/01 18:19:43 pva Exp $
inherit versionator
@@ -23,7 +23,7 @@ detect_version
KEYWORDS="~amd64 ~ia64 ~ppc64 ~sparc ~x86"
IUSE=""
-PATCHV="194.26.1.el5"
+PATCHV="238.5.1.el5"
DESCRIPTION="Full sources including OpenVZ patchset for the 2.6.18 kernel tree"
HOMEPAGE="http://www.openvz.org"
SRC_URI="${KERNEL_URI} ${ARCH_URI}
diff --git a/sys-kernel/openvz-sources/openvz-sources-2.6.32.10.1-r1.ebuild b/sys-kernel/openvz-sources/openvz-sources-2.6.32.10.1-r1.ebuild
deleted file mode 100644
index ca944a41357b..000000000000
--- a/sys-kernel/openvz-sources/openvz-sources-2.6.32.10.1-r1.ebuild
+++ /dev/null
@@ -1,66 +0,0 @@
-# Copyright 1999-2010 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/openvz-sources-2.6.32.10.1-r1.ebuild,v 1.1 2010/12/19 16:01:59 pva Exp $
-
-inherit versionator
-
-# Upstream uses string to version their releases. To make portage version
-# comparisment working we have to use numbers instead of strings, that is 4th
-# component of our version. So we have aivazovsky - 1, briullov - 2 and so on.
-# Keep this string on top since we have to modify it each new release.
-OVZ_CODENAME="dzhanibekov"
-OVZ_CODENAME_SUBRELEASE=$(get_version_component_range 5)
-
-OVZ_KV="${OVZ_CODENAME}.${OVZ_CODENAME_SUBRELEASE}"
-
-ETYPE="sources"
-
-CKV=$(get_version_component_range 1-3)
-OKV=${OKV:-${CKV}}
-EXTRAVERSION=-${PN/-*}-${OVZ_KV}
-KV_FULL=${CKV}${EXTRAVERSION}
-if [[ ${PR} != r0 ]]; then
- KV_FULL+=-${PR}
- EXTRAVERSION+=-${PR}
-fi
-
-# ${KV_MAJOR}.${KV_MINOR}.${KV_PATCH} should succeed.
-KV_MAJOR=$(get_version_component_range 1 ${OKV})
-KV_MINOR=$(get_version_component_range 2 ${OKV})
-KV_PATCH=$(get_version_component_range 3 ${OKV})
-
-KERNEL_URI="mirror://kernel/linux/kernel/v${KV_MAJOR}.${KV_MINOR}/linux-${OKV}.tar.bz2"
-
-inherit kernel-2
-detect_version
-
-SLOT=${CKV}-${OVZ_KV}
-if [[ ${PR} != r0 ]]; then
- SLOT+=-${PR}
-fi
-
-KEYWORDS="~amd64 ~ppc64 ~sparc ~x86"
-IUSE=""
-
-DESCRIPTION="Kernel sources with OpenVZ patchset"
-HOMEPAGE="http://www.openvz.org"
-SRC_URI="${KERNEL_URI} ${ARCH_URI}
- http://download.openvz.org/kernel/branches/${CKV}/${CKV}-${OVZ_KV}/patches/patch-${OVZ_KV}-combined.gz"
-
-UNIPATCH_STRICTORDER=1
-UNIPATCH_LIST="${DISTDIR}/patch-${OVZ_KV}-combined.gz
-${FILESDIR}/${P}-cpt_process.c-build.patch
-${FILESDIR}/${P}-orphans.patch
-${FILESDIR}/${P}-VDSO_sysenter_return.patch
-${FILESDIR}/${P}-build-fix.patch
-${FILESDIR}/${P}-file-restore-init_task-credentials.patch
-${FILESDIR}/${P}-file-restore-init_task-credentials-build.patch
-${FILESDIR}/${P}-openreq-leak.patch
-${FILESDIR}/${P}-ppp-CAP_VE_NET_ADMIN.patch
-${FILESDIR}/${P}-PPPoED-NULL-dereference.patch
-${FILESDIR}/${P}-ppp-reconnect.patch
-${FILESDIR}/${P}-VE_IP_NAT-bit.patch
-"
-
-K_EXTRAEINFO="For more information about this kernel take a look at:
-http://wiki.openvz.org/Download/kernel/${CKV}/${CKV}-${OVZ_KV}"
diff --git a/sys-kernel/openvz-sources/openvz-sources-2.6.32.11.1.ebuild b/sys-kernel/openvz-sources/openvz-sources-2.6.32.11.1.ebuild
index 618d39497505..d277bbf2a0b0 100644
--- a/sys-kernel/openvz-sources/openvz-sources-2.6.32.11.1.ebuild
+++ b/sys-kernel/openvz-sources/openvz-sources-2.6.32.11.1.ebuild
@@ -1,6 +1,6 @@
# Copyright 1999-2011 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/openvz-sources-2.6.32.11.1.ebuild,v 1.1 2011/03/09 13:38:59 pva Exp $
+# $Header: /var/cvsroot/gentoo-x86/sys-kernel/openvz-sources/openvz-sources-2.6.32.11.1.ebuild,v 1.2 2011/04/01 18:19:43 pva Exp $
inherit versionator
@@ -39,7 +39,7 @@ if [[ ${PR} != r0 ]]; then
SLOT+=-${PR}
fi
-KEYWORDS="~amd64 ~ppc64 ~sparc ~x86"
+KEYWORDS="amd64 ~ppc64 ~sparc x86"
IUSE=""
DESCRIPTION="Kernel sources with OpenVZ patchset"