Your message dated Sat, 05 Mar 2016 22:49:48 +0000
with message-id <e1acl1a-0001l7...@franck.debian.org>
and subject line Bug#813678: fixed in blktap-dkms 2.0.93-0.6
has caused the Debian Bug report #813678,
regarding blktap-dkms: fails to build with mainline 4.4 based kernels
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
813678: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813678
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: blktap-dkms
Version: 2.0.93-0.5
Severity: important
Tags: patch
User: a...@ubuntu.com
Usertags: origin-ubuntu xenial ubuntu-patch

Mainline 4.4 switches how we detect atomicity.  Follow that change when
compiling against 4.4 based kernels.  We are using this in Ubuntu with
our latest kernels.

Thanks for considering the patch.

-apw

-- System Information:
Debian Release: stretch/sid
  APT prefers xenial-updates
  APT policy: (500, 'xenial-updates'), (500, 'xenial-security'), (500, 
'xenial'), (100, 'xenial-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.4.0-2-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru blktap-dkms-2.0.93/debian/patches/series blktap-dkms-2.0.93/debian/patches/series
--- blktap-dkms-2.0.93/debian/patches/series	2015-12-17 08:41:17.000000000 +0000
+++ blktap-dkms-2.0.93/debian/patches/series	2016-02-04 09:42:41.000000000 +0000
@@ -3,3 +3,4 @@
 bi_sector-fix.patch
 mempool_resize.patch
 disallow_mempools_with_ctor.patch
+use-gfpflags_allow_blocking-when-available.patch
diff -Nru blktap-dkms-2.0.93/debian/patches/use-gfpflags_allow_blocking-when-available.patch blktap-dkms-2.0.93/debian/patches/use-gfpflags_allow_blocking-when-available.patch
--- blktap-dkms-2.0.93/debian/patches/use-gfpflags_allow_blocking-when-available.patch	1970-01-01 01:00:00.000000000 +0100
+++ blktap-dkms-2.0.93/debian/patches/use-gfpflags_allow_blocking-when-available.patch	2016-01-22 15:26:56.000000000 +0000
@@ -0,0 +1,28 @@
+Description: use gfpflags_allow_blocking when available
+ Follow changes in mainline 4.4 which moves to using
+ gfpflags_allow_blocking() to identify critical sections.
+Author: Andy Whitcroft <a...@ubuntu.com>
+
+--- blktap-dkms-2.0.93.orig/request.c
++++ blktap-dkms-2.0.93/request.c
+@@ -26,6 +26,7 @@
+ #include <linux/sched.h>
+ #include <linux/device.h>
+ #include <linux/slab.h>
++#include <linux/version.h>
+ 
+ #include "blktap.h"
+ 
+@@ -338,8 +339,11 @@ static void*
+ __mempool_page_alloc(gfp_t gfp_mask, void *pool_data)
+ {
+ 	struct page *page;
+-
++#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 4, 0)
+ 	if (!(gfp_mask & __GFP_WAIT))
++#else
++        if (!gfpflags_allow_blocking(gfp_mask))
++#endif
+ 		return NULL;
+ 
+ 	page = alloc_page(gfp_mask);

--- End Message ---
--- Begin Message ---
Source: blktap-dkms
Source-Version: 2.0.93-0.6

We believe that the bug you reported is fixed in the latest version of
blktap-dkms, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 813...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chrysostomos Nanakos <cnana...@debian.org> (supplier of updated blktap-dkms 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sat, 05 Mar 2016 21:44:41 +0200
Source: blktap-dkms
Binary: blktap-dkms
Architecture: source
Version: 2.0.93-0.6
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org>
Changed-By: Chrysostomos Nanakos <cnana...@debian.org>
Description:
 blktap-dkms - Xen API blktap kernel component DKMS package
Closes: 813678
Changes:
 blktap-dkms (2.0.93-0.6) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Follow changes in mainline 4.4 which moves to
     using gfpflags_allow_blocking() to identify critical
     sections. Thanks to Andy Whitcroft <a...@canonical.com>
     (Closes: #813678)
Checksums-Sha1:
 6afc0c2bab17289551d50ebf3b8c78a14f2e421f 1975 blktap-dkms_2.0.93-0.6.dsc
 27c936ab378a098fcaeb134924e69d7e78b06210 21971 blktap-dkms_2.0.93.orig.tar.gz
 384b27ad3eba7ad34951d2db4ebcc8c0d4be24c4 6084 
blktap-dkms_2.0.93-0.6.debian.tar.xz
Checksums-Sha256:
 d4a0a28d25672d12f87f31ca9b705199f9817c80ae24d389d251d264e40e86b0 1975 
blktap-dkms_2.0.93-0.6.dsc
 7211a14bda91b69667b98bda2a3faaed3e4a22b79f1b47b88307374927fa1ab6 21971 
blktap-dkms_2.0.93.orig.tar.gz
 78b1022d6aceecd4cacbb1d63d5d8f3297e86132d2c6c4cb3b84213f2cd8ad79 6084 
blktap-dkms_2.0.93-0.6.debian.tar.xz
Files:
 fc388630dbfafbbfe3625e5f552354da 1975 kernel optional 
blktap-dkms_2.0.93-0.6.dsc
 3f44cc47caf09485497e28405b94aa02 21971 kernel optional 
blktap-dkms_2.0.93.orig.tar.gz
 f44ef7058bacfa80fa43fb64ef43e133 6084 kernel optional 
blktap-dkms_2.0.93-0.6.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=Khje
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to