Your message dated Sat, 05 Mar 2016 22:49:48 +0000
with message-id <e1acl1a-0001l7...@franck.debian.org>
and subject line Bug#813678: fixed in blktap-dkms 2.0.93-0.6
has caused the Debian Bug report #813678,
regarding blktap-dkms: fails to build with mainline 4.4 based kernels
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
813678: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813678
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: blktap-dkms
Version: 2.0.93-0.5
Severity: important
Tags: patch
User: a...@ubuntu.com
Usertags: origin-ubuntu xenial ubuntu-patch
Mainline 4.4 switches how we detect atomicity. Follow that change when
compiling against 4.4 based kernels. We are using this in Ubuntu with
our latest kernels.
Thanks for considering the patch.
-apw
-- System Information:
Debian Release: stretch/sid
APT prefers xenial-updates
APT policy: (500, 'xenial-updates'), (500, 'xenial-security'), (500,
'xenial'), (100, 'xenial-backports')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 4.4.0-2-generic (SMP w/4 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
diff -Nru blktap-dkms-2.0.93/debian/patches/series blktap-dkms-2.0.93/debian/patches/series
--- blktap-dkms-2.0.93/debian/patches/series 2015-12-17 08:41:17.000000000 +0000
+++ blktap-dkms-2.0.93/debian/patches/series 2016-02-04 09:42:41.000000000 +0000
@@ -3,3 +3,4 @@
bi_sector-fix.patch
mempool_resize.patch
disallow_mempools_with_ctor.patch
+use-gfpflags_allow_blocking-when-available.patch
diff -Nru blktap-dkms-2.0.93/debian/patches/use-gfpflags_allow_blocking-when-available.patch blktap-dkms-2.0.93/debian/patches/use-gfpflags_allow_blocking-when-available.patch
--- blktap-dkms-2.0.93/debian/patches/use-gfpflags_allow_blocking-when-available.patch 1970-01-01 01:00:00.000000000 +0100
+++ blktap-dkms-2.0.93/debian/patches/use-gfpflags_allow_blocking-when-available.patch 2016-01-22 15:26:56.000000000 +0000
@@ -0,0 +1,28 @@
+Description: use gfpflags_allow_blocking when available
+ Follow changes in mainline 4.4 which moves to using
+ gfpflags_allow_blocking() to identify critical sections.
+Author: Andy Whitcroft <a...@ubuntu.com>
+
+--- blktap-dkms-2.0.93.orig/request.c
++++ blktap-dkms-2.0.93/request.c
+@@ -26,6 +26,7 @@
+ #include <linux/sched.h>
+ #include <linux/device.h>
+ #include <linux/slab.h>
++#include <linux/version.h>
+
+ #include "blktap.h"
+
+@@ -338,8 +339,11 @@ static void*
+ __mempool_page_alloc(gfp_t gfp_mask, void *pool_data)
+ {
+ struct page *page;
+-
++#if LINUX_VERSION_CODE < KERNEL_VERSION(4, 4, 0)
+ if (!(gfp_mask & __GFP_WAIT))
++#else
++ if (!gfpflags_allow_blocking(gfp_mask))
++#endif
+ return NULL;
+
+ page = alloc_page(gfp_mask);
--- End Message ---
--- Begin Message ---
Source: blktap-dkms
Source-Version: 2.0.93-0.6
We believe that the bug you reported is fixed in the latest version of
blktap-dkms, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 813...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Chrysostomos Nanakos <cnana...@debian.org> (supplier of updated blktap-dkms
package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Sat, 05 Mar 2016 21:44:41 +0200
Source: blktap-dkms
Binary: blktap-dkms
Architecture: source
Version: 2.0.93-0.6
Distribution: unstable
Urgency: medium
Maintainer: Debian Xen Team <pkg-xen-de...@lists.alioth.debian.org>
Changed-By: Chrysostomos Nanakos <cnana...@debian.org>
Description:
blktap-dkms - Xen API blktap kernel component DKMS package
Closes: 813678
Changes:
blktap-dkms (2.0.93-0.6) unstable; urgency=medium
.
* Non-maintainer upload.
* Follow changes in mainline 4.4 which moves to
using gfpflags_allow_blocking() to identify critical
sections. Thanks to Andy Whitcroft <a...@canonical.com>
(Closes: #813678)
Checksums-Sha1:
6afc0c2bab17289551d50ebf3b8c78a14f2e421f 1975 blktap-dkms_2.0.93-0.6.dsc
27c936ab378a098fcaeb134924e69d7e78b06210 21971 blktap-dkms_2.0.93.orig.tar.gz
384b27ad3eba7ad34951d2db4ebcc8c0d4be24c4 6084
blktap-dkms_2.0.93-0.6.debian.tar.xz
Checksums-Sha256:
d4a0a28d25672d12f87f31ca9b705199f9817c80ae24d389d251d264e40e86b0 1975
blktap-dkms_2.0.93-0.6.dsc
7211a14bda91b69667b98bda2a3faaed3e4a22b79f1b47b88307374927fa1ab6 21971
blktap-dkms_2.0.93.orig.tar.gz
78b1022d6aceecd4cacbb1d63d5d8f3297e86132d2c6c4cb3b84213f2cd8ad79 6084
blktap-dkms_2.0.93-0.6.debian.tar.xz
Files:
fc388630dbfafbbfe3625e5f552354da 1975 kernel optional
blktap-dkms_2.0.93-0.6.dsc
3f44cc47caf09485497e28405b94aa02 21971 kernel optional
blktap-dkms_2.0.93.orig.tar.gz
f44ef7058bacfa80fa43fb64ef43e133 6084 kernel optional
blktap-dkms_2.0.93-0.6.debian.tar.xz
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2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=Khje
-----END PGP SIGNATURE-----
--- End Message ---