summaryrefslogtreecommitdiffstats
path: root/meta/recipes-extended/rpcbind
diff options
context:
space:
mode:
authorRoss Burton <ross.burton@intel.com>2018-03-09 20:56:01 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2018-03-11 06:27:01 -0700
commit4adcf277bc35a561860e5289a89d4c66cf115acc (patch)
tree4161f15563e431355705d46f57053ae19398d9ca /meta/recipes-extended/rpcbind
parent3c02fc2788ab4a78f0aef129d8a73855fb2fd784 (diff)
downloadpoky-4adcf277bc35a561860e5289a89d4c66cf115acc.tar.gz
rpcbind: refresh patches
The patch tool will apply patches by default with "fuzz", which is where if the hunk context isn't present but what is there is close enough, it will force the patch in. Whilst this is useful when there's just whitespace changes, when applied to source it is possible for a patch applied with fuzz to produce broken code which still compiles (see #10450). This is obviously bad. We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For that to be realistic the existing patches with fuzz need to be rebased and reviewed. (From OE-Core rev: df9b991d1f453aae4dca5558f10fd23e866778dc) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Alexander Kanavin <alexander.kanavin@linux.intel.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended/rpcbind')
-rw-r--r--meta/recipes-extended/rpcbind/rpcbind/pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch15
1 files changed, 6 insertions, 9 deletions
diff --git a/meta/recipes-extended/rpcbind/rpcbind/pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch b/meta/recipes-extended/rpcbind/rpcbind/pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch
index 859e67bbe0..4c23ee01ca 100644
--- a/meta/recipes-extended/rpcbind/rpcbind/pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch
+++ b/meta/recipes-extended/rpcbind/rpcbind/pmapproc_dump-Fixed-typo-in-memory-leak-patch.patch
@@ -15,19 +15,16 @@ Signed-off-by: Jackie Huang <jackie.huang@windriver.com>
15 src/pmap_svc.c | 2 +- 15 src/pmap_svc.c | 2 +-
16 1 file changed, 1 insertion(+), 1 deletion(-) 16 1 file changed, 1 insertion(+), 1 deletion(-)
17 17
18diff --git a/src/pmap_svc.c b/src/pmap_svc.c 18Index: rpcbind-0.2.4/src/pmap_svc.c
19index e926cdc..26c31d0 100644 19===================================================================
20--- a/src/pmap_svc.c 20--- rpcbind-0.2.4.orig/src/pmap_svc.c
21+++ b/src/pmap_svc.c 21+++ rpcbind-0.2.4/src/pmap_svc.c
22@@ -384,7 +384,7 @@ pmapproc_dump(struct svc_req *rqstp /*__unused*/, SVCXPRT *xprt) 22@@ -384,7 +384,7 @@ pmapproc_dump(struct svc_req *rqstp /*__
23 } 23 }
24 24
25 done: 25 done:
26- if (!svc_freeargs(xprt, (xdrproc_t) xdr_pmap, (char *)NULL)) { 26- if (!svc_freeargs(xprt, (xdrproc_t) xdr_pmap, (char *)NULL)) {
27+ if (!svc_freeargs(xprt, (xdrproc_t) xdr_void, (char *)NULL)) { 27+ if (!svc_freeargs(xprt, (xdrproc_t) xdr_void, (char *)NULL)) {
28 if (debugging) { 28 if (debugging) {
29 (void) xlog(LOG_DEBUG, "unable to free arguments\n"); 29 /*(void) xlog(LOG_DEBUG, "unable to free arguments\n");*/
30 if (doabort) { 30 if (doabort) {
31--
322.7.4
33