[kodi-inputstream-adaptive] Update sources
by Mohamed ElMorabity
commit e4734d30b79296c17361b0ee094c6533cb8900d7
Author: Mohamed El Morabity <melmorabity(a)fedoraproject.org>
Date: Sat Dec 5 12:36:02 2020 +0100
Update sources
sources | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
---
diff --git a/sources b/sources
index 981fd08..c01d708 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-SHA512 (inputstream.adaptive-2.6.4-Matrix.tar.gz) = 2d5b56f6adc5402841e3d61f5daccfd045222137e58d18b35b4a81110377dcb0284060abb0e31dc07e2a27b8143381bd4c355439d4c3bff482bdcb517bd943c5
+SHA512 (inputstream.adaptive-2.6.6-Matrix.tar.gz) = e434ceabefacab99b95f5d0ebb8bcc0ddf67acacc8ff938aeae90a11263a64e9ba335777941d0a042af3afa15932cbba5a9a80aa243cb5b300ac2d83f724013a
3 years, 11 months
[kodi-inputstream-adaptive/f33] Update sources
by Mohamed ElMorabity
commit eaeb1a2e59e1871d4b41724eb4d1c30f9024d3e1
Author: Mohamed El Morabity <melmorabity(a)fedoraproject.org>
Date: Sat Dec 5 12:36:02 2020 +0100
Update sources
sources | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
---
diff --git a/sources b/sources
index 981fd08..c01d708 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-SHA512 (inputstream.adaptive-2.6.4-Matrix.tar.gz) = 2d5b56f6adc5402841e3d61f5daccfd045222137e58d18b35b4a81110377dcb0284060abb0e31dc07e2a27b8143381bd4c355439d4c3bff482bdcb517bd943c5
+SHA512 (inputstream.adaptive-2.6.6-Matrix.tar.gz) = e434ceabefacab99b95f5d0ebb8bcc0ddf67acacc8ff938aeae90a11263a64e9ba335777941d0a042af3afa15932cbba5a9a80aa243cb5b300ac2d83f724013a
3 years, 11 months
[kodi-pvr-hts] Update sources
by Mohamed ElMorabity
commit 4918e8d29a1eef66f910d615c5b2b1e2171efa63
Author: Mohamed El Morabity <melmorabity(a)fedoraproject.org>
Date: Sat Dec 5 12:33:33 2020 +0100
Update sources
.gitignore | 1 +
sources | 2 +-
2 files changed, 2 insertions(+), 1 deletion(-)
---
diff --git a/.gitignore b/.gitignore
index 2ff8400..4f6f740 100644
--- a/.gitignore
+++ b/.gitignore
@@ -5,3 +5,4 @@
/pvr.hts-4.4.20.tar.gz
/pvr.hts-7.1.1.tar.gz
/pvr.hts-8.1.0.tar.gz
+/pvr.hts-8.1.2.tar.gz
diff --git a/sources b/sources
index 49b9c49..13f37af 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-SHA512 (pvr.hts-8.1.0.tar.gz) = dd3cdd183a1bfcb281ca72dac852e8ff8751747b5d2bc6a50234bf30954925e101235760052742ba7b82ba35177a80f0ea3833974912ac010ec666e718177676
+SHA512 (pvr.hts-8.1.2.tar.gz) = 92a510336a7ca7563149909c6d155d0ee7adf633653860d32cc29e1c88b88577d9ed8eea75bb507707645e254e116aa3ffc4f8a4acb95b1fb15157f7c8e3a2dc
3 years, 11 months
[kodi-pvr-hts/f33] Update sources
by Mohamed ElMorabity
commit 3450ee5b04bfb6ae91b90e0d3e044169fa37a4a7
Author: Mohamed El Morabity <melmorabity(a)fedoraproject.org>
Date: Sat Dec 5 12:33:33 2020 +0100
Update sources
.gitignore | 1 +
sources | 2 +-
2 files changed, 2 insertions(+), 1 deletion(-)
---
diff --git a/.gitignore b/.gitignore
index 2ff8400..4f6f740 100644
--- a/.gitignore
+++ b/.gitignore
@@ -5,3 +5,4 @@
/pvr.hts-4.4.20.tar.gz
/pvr.hts-7.1.1.tar.gz
/pvr.hts-8.1.0.tar.gz
+/pvr.hts-8.1.2.tar.gz
diff --git a/sources b/sources
index 49b9c49..13f37af 100644
--- a/sources
+++ b/sources
@@ -1 +1 @@
-SHA512 (pvr.hts-8.1.0.tar.gz) = dd3cdd183a1bfcb281ca72dac852e8ff8751747b5d2bc6a50234bf30954925e101235760052742ba7b82ba35177a80f0ea3833974912ac010ec666e718177676
+SHA512 (pvr.hts-8.1.2.tar.gz) = 92a510336a7ca7563149909c6d155d0ee7adf633653860d32cc29e1c88b88577d9ed8eea75bb507707645e254e116aa3ffc4f8a4acb95b1fb15157f7c8e3a2dc
3 years, 11 months
[kodi-pvr-hts/f33] Update to 8.1.2
by Mohamed ElMorabity
commit 4234d15bc1757ffe3502ea25c560a08e620ab458
Author: Mohamed El Morabity <melmorabity(a)fedoraproject.org>
Date: Sat Dec 5 12:29:42 2020 +0100
Update to 8.1.2
kodi-pvr-hts.spec | 12 +++++++++---
1 file changed, 9 insertions(+), 3 deletions(-)
---
diff --git a/kodi-pvr-hts.spec b/kodi-pvr-hts.spec
index 74be2fa..456dbfb 100644
--- a/kodi-pvr-hts.spec
+++ b/kodi-pvr-hts.spec
@@ -6,7 +6,7 @@ Name: kodi-%(tr "." "-" <<<%{kodi_addon})
# Use Epoch to manage upgrades from older upstream
# (https://github.com/opdenkamp/xbmc-pvr-addons/)
Epoch: 1
-Version: 8.1.0
+Version: 8.1.2
Release: 1%{?dist}
Summary: TVHeadEnd PVR for Kodi
@@ -19,7 +19,6 @@ Source0: %{url}/archive/%{version}-%{kodi_codename}/%{kodi_addon}-%{versi
BuildRequires: cmake3
BuildRequires: gcc-c++
BuildRequires: kodi-devel >= %{kodi_version}
-BuildRequires: platform-devel
Requires: kodi >= %{kodi_version}
Provides: bundled(sha1-ffmpeg)
ExcludeArch: %{power64} ppc64le
@@ -43,12 +42,19 @@ ExcludeArch: %{power64} ppc64le
%files
%doc README.md %{kodi_addon}/changelog.txt
+%license LICENSE.md
%{_libdir}/kodi/addons/%{kodi_addon}/
%{_datadir}/kodi/addons/%{kodi_addon}/
%changelog
-* Mon Nov 16 10:19:16 CET 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:8.1.0-1
+* Sat Dec 5 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:8.1.2-1
+- Update to 8.1.2
+
+* Mon Nov 30 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:8.1.1-1
+- Update to 8.1.1
+
+* Mon Nov 16 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:8.1.0-1
- Update to 8.1.0
* Thu Aug 20 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:7.1.1-1
3 years, 11 months
[kodi-pvr-hts] Update to 8.1.2
by Mohamed ElMorabity
commit 085c3ae13f7dafcd6d9b0e24f8aed9931fc347a2
Author: Mohamed El Morabity <melmorabity(a)fedoraproject.org>
Date: Sat Dec 5 12:29:42 2020 +0100
Update to 8.1.2
kodi-pvr-hts.spec | 12 +++++++++---
1 file changed, 9 insertions(+), 3 deletions(-)
---
diff --git a/kodi-pvr-hts.spec b/kodi-pvr-hts.spec
index 74be2fa..456dbfb 100644
--- a/kodi-pvr-hts.spec
+++ b/kodi-pvr-hts.spec
@@ -6,7 +6,7 @@ Name: kodi-%(tr "." "-" <<<%{kodi_addon})
# Use Epoch to manage upgrades from older upstream
# (https://github.com/opdenkamp/xbmc-pvr-addons/)
Epoch: 1
-Version: 8.1.0
+Version: 8.1.2
Release: 1%{?dist}
Summary: TVHeadEnd PVR for Kodi
@@ -19,7 +19,6 @@ Source0: %{url}/archive/%{version}-%{kodi_codename}/%{kodi_addon}-%{versi
BuildRequires: cmake3
BuildRequires: gcc-c++
BuildRequires: kodi-devel >= %{kodi_version}
-BuildRequires: platform-devel
Requires: kodi >= %{kodi_version}
Provides: bundled(sha1-ffmpeg)
ExcludeArch: %{power64} ppc64le
@@ -43,12 +42,19 @@ ExcludeArch: %{power64} ppc64le
%files
%doc README.md %{kodi_addon}/changelog.txt
+%license LICENSE.md
%{_libdir}/kodi/addons/%{kodi_addon}/
%{_datadir}/kodi/addons/%{kodi_addon}/
%changelog
-* Mon Nov 16 10:19:16 CET 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:8.1.0-1
+* Sat Dec 5 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:8.1.2-1
+- Update to 8.1.2
+
+* Mon Nov 30 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:8.1.1-1
+- Update to 8.1.1
+
+* Mon Nov 16 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:8.1.0-1
- Update to 8.1.0
* Thu Aug 20 2020 Mohamed El Morabity <melmorabity(a)fedoraproject.org> - 1:7.1.1-1
3 years, 11 months
[VirtualBox-kmod] Add fixes for kernel 5.10
by Sérgio M. Basto
commit 00a771f5a8025404926f049a5ee23b1eb836581f
Author: Sérgio M. Basto <sergio(a)serjux.com>
Date: Fri Dec 4 13:32:33 2020 +0000
Add fixes for kernel 5.10
VirtualBox-kmod.spec | 7 +-
fixes_4.10.patch | 188 +++++++++++++++++++++++++++++++++++++++++++++++++++
2 files changed, 194 insertions(+), 1 deletion(-)
---
diff --git a/VirtualBox-kmod.spec b/VirtualBox-kmod.spec
index cf95719..32b612f 100644
--- a/VirtualBox-kmod.spec
+++ b/VirtualBox-kmod.spec
@@ -37,7 +37,7 @@
Name: VirtualBox-kmod
Version: 6.1.16
-Release: 1%{?dist}
+Release: 2%{?dist}
#Release: 1%%{?prerel:.%%{prerel}}%%{?dist}
Summary: Kernel module for VirtualBox
@@ -45,6 +45,7 @@ License: GPLv2 or CDDL
URL: http://www.virtualbox.org/wiki/VirtualBox
# This filters out the XEN kernel, since we don't run on XEN
Source1: excludekernel-filter.txt
+Patch1: fixes_4.10.patch
%global AkmodsBuildRequires %{_bindir}/kmodtool, VirtualBox-kmodsrc >= %{version}%{vboxreltag}, xz, time, elfutils-libelf-devel, gcc
@@ -67,6 +68,7 @@ Kernel module for VirtualBox
%prep
%setup -T -c
tar --use-compress-program xz -xf %{_datadir}/%{name}-%{version}/%{name}-%{version}.tar.xz
+%patch1 -p0
pushd %{name}-%{version}
popd
@@ -131,6 +133,9 @@ DIRS=$(ls %{name}-%{version} |wc -l)
%changelog
+* Fri Dec 04 2020 Sérgio Basto <sergio(a)serjux.com> - 6.1.16-2
+- Add fixes for kernel 5.10
+
* Wed Oct 21 2020 Sérgio Basto <sergio(a)serjux.com> - 6.1.16-1
- Update to 6.1.16
diff --git a/fixes_4.10.patch b/fixes_4.10.patch
new file mode 100644
index 0000000..0a6b691
--- /dev/null
+++ b/fixes_4.10.patch
@@ -0,0 +1,188 @@
+diff -rup VirtualBox-kmod-6.1.16/vboxdrv/r0drv/linux/memobj-r0drv-linux.c VirtualBox-kmod-6.1.16.new/vboxdrv/r0drv/linux/memobj-r0drv-linux.c
+--- VirtualBox-kmod-6.1.16/vboxdrv/r0drv/linux/memobj-r0drv-linux.c 2020-10-16 17:38:11.000000000 +0100
++++ VirtualBox-kmod-6.1.16.new/vboxdrv/r0drv/linux/memobj-r0drv-linux.c 2020-12-04 13:05:02.345818731 +0000
+@@ -56,9 +56,12 @@
+ * Whether we use alloc_vm_area (3.2+) for executable memory.
+ * This is a must for 5.8+, but we enable it all the way back to 3.2.x for
+ * better W^R compliance (fExecutable flag). */
+-#if RTLNX_VER_MIN(3,2,0) || defined(DOXYGEN_RUNNING)
++#if RTLNX_VER_RANGE(3,2,0, 5,10,0) || defined(DOXYGEN_RUNNING)
+ # define IPRT_USE_ALLOC_VM_AREA_FOR_EXEC
+ #endif
++#if RTLNX_VER_MIN(5,10,0) || defined(DOXYGEN_RUNNING)
++# define IPRT_USE_APPLY_TO_PAGE_RANGE_FOR_EXEC
++#endif
+
+ /*
+ * 2.6.29+ kernels don't work with remap_pfn_range() anymore because
+@@ -502,6 +505,42 @@ static void rtR0MemObjLinuxFreePages(PRT
+ }
+
+
++#ifdef IPRT_USE_APPLY_TO_PAGE_RANGE_FOR_EXEC
++/**
++ * User data passed to the apply_to_page_range() callback.
++ */
++typedef struct LNXAPPLYPGRANGE
++{
++ /** Pointer to the memory object. */
++ PRTR0MEMOBJLNX pMemLnx;
++ /** The page protection flags to apply. */
++ pgprot_t fPg;
++} LNXAPPLYPGRANGE;
++/** Pointer to the user data. */
++typedef LNXAPPLYPGRANGE *PLNXAPPLYPGRANGE;
++/** Pointer to the const user data. */
++typedef const LNXAPPLYPGRANGE *PCLNXAPPLYPGRANGE;
++
++/**
++ * Callback called in apply_to_page_range().
++ *
++ * @returns Linux status code.
++ * @param pPte Pointer to the page table entry for the given address.
++ * @param uAddr The address to apply the new protection to.
++ * @param pvUser The opaque user data.
++ */
++static DECLCALLBACK(int) rtR0MemObjLinuxApplyPageRange(pte_t *pPte, unsigned long uAddr, void *pvUser)
++{
++ PCLNXAPPLYPGRANGE pArgs = (PCLNXAPPLYPGRANGE)pvUser;
++ PRTR0MEMOBJLNX pMemLnx = pArgs->pMemLnx;
++ uint32_t idxPg = (uAddr - (unsigned long)pMemLnx->Core.pv) >> PAGE_SHIFT;
++
++ set_pte(pPte, mk_pte(pMemLnx->apPages[idxPg], pArgs->fPg));
++ return 0;
++}
++#endif
++
++
+ /**
+ * Maps the allocation into ring-0.
+ *
+@@ -584,6 +623,11 @@ static int rtR0MemObjLinuxVMap(PRTR0MEMO
+ else
+ # endif
+ {
++# if defined(IPRT_USE_APPLY_TO_PAGE_RANGE_FOR_EXEC)
++ if (fExecutable)
++ pgprot_val(fPg) |= _PAGE_NX; /* Uses RTR0MemObjProtect to clear NX when memory ready, W^X fashion. */
++# endif
++
+ # ifdef VM_MAP
+ pMemLnx->Core.pv = vmap(&pMemLnx->apPages[0], pMemLnx->cPages, VM_MAP, fPg);
+ # else
+@@ -1851,6 +1895,21 @@ DECLHIDDEN(int) rtR0MemObjNativeProtect(
+ preempt_enable();
+ return VINF_SUCCESS;
+ }
++# elif defined(IPRT_USE_APPLY_TO_PAGE_RANGE_FOR_EXEC)
++ PRTR0MEMOBJLNX pMemLnx = (PRTR0MEMOBJLNX)pMem;
++ if ( pMemLnx->fExecutable
++ && pMemLnx->fMappedToRing0)
++ {
++ LNXAPPLYPGRANGE Args;
++ Args.pMemLnx = pMemLnx;
++ Args.fPg = rtR0MemObjLinuxConvertProt(fProt, true /*fKernel*/);
++ int rcLnx = apply_to_page_range(current->active_mm, (unsigned long)pMemLnx->Core.pv + offSub, cbSub,
++ rtR0MemObjLinuxApplyPageRange, (void *)&Args);
++ if (rcLnx)
++ return VERR_NOT_SUPPORTED;
++
++ return VINF_SUCCESS;
++ }
+ # endif
+
+ NOREF(pMem);
+diff -rup VirtualBox-kmod-6.1.16/vboxguest/r0drv/linux/memobj-r0drv-linux.c VirtualBox-kmod-6.1.16.new/vboxguest/r0drv/linux/memobj-r0drv-linux.c
+--- VirtualBox-kmod-6.1.16/vboxguest/r0drv/linux/memobj-r0drv-linux.c 2020-10-16 17:38:11.000000000 +0100
++++ VirtualBox-kmod-6.1.16.new/vboxguest/r0drv/linux/memobj-r0drv-linux.c 2020-12-04 13:07:32.088769617 +0000
+@@ -56,9 +56,12 @@
+ * Whether we use alloc_vm_area (3.2+) for executable memory.
+ * This is a must for 5.8+, but we enable it all the way back to 3.2.x for
+ * better W^R compliance (fExecutable flag). */
+-#if RTLNX_VER_MIN(3,2,0) || defined(DOXYGEN_RUNNING)
++#if RTLNX_VER_RANGE(3,2,0, 5,10,0) || defined(DOXYGEN_RUNNING)
+ # define IPRT_USE_ALLOC_VM_AREA_FOR_EXEC
+ #endif
++#if RTLNX_VER_MIN(5,10,0) || defined(DOXYGEN_RUNNING)
++# define IPRT_USE_APPLY_TO_PAGE_RANGE_FOR_EXEC
++#endif
+
+ /*
+ * 2.6.29+ kernels don't work with remap_pfn_range() anymore because
+@@ -502,6 +505,42 @@ static void rtR0MemObjLinuxFreePages(PRT
+ }
+
+
++#ifdef IPRT_USE_APPLY_TO_PAGE_RANGE_FOR_EXEC
++/**
++ * User data passed to the apply_to_page_range() callback.
++ */
++typedef struct LNXAPPLYPGRANGE
++{
++ /** Pointer to the memory object. */
++ PRTR0MEMOBJLNX pMemLnx;
++ /** The page protection flags to apply. */
++ pgprot_t fPg;
++} LNXAPPLYPGRANGE;
++/** Pointer to the user data. */
++typedef LNXAPPLYPGRANGE *PLNXAPPLYPGRANGE;
++/** Pointer to the const user data. */
++typedef const LNXAPPLYPGRANGE *PCLNXAPPLYPGRANGE;
++
++/**
++ * Callback called in apply_to_page_range().
++ *
++ * @returns Linux status code.
++ * @param pPte Pointer to the page table entry for the given address.
++ * @param uAddr The address to apply the new protection to.
++ * @param pvUser The opaque user data.
++ */
++static DECLCALLBACK(int) rtR0MemObjLinuxApplyPageRange(pte_t *pPte, unsigned long uAddr, void *pvUser)
++{
++ PCLNXAPPLYPGRANGE pArgs = (PCLNXAPPLYPGRANGE)pvUser;
++ PRTR0MEMOBJLNX pMemLnx = pArgs->pMemLnx;
++ uint32_t idxPg = (uAddr - (unsigned long)pMemLnx->Core.pv) >> PAGE_SHIFT;
++
++ set_pte(pPte, mk_pte(pMemLnx->apPages[idxPg], pArgs->fPg));
++ return 0;
++}
++#endif
++
++
+ /**
+ * Maps the allocation into ring-0.
+ *
+@@ -584,6 +623,11 @@ static int rtR0MemObjLinuxVMap(PRTR0MEMO
+ else
+ # endif
+ {
++# if defined(IPRT_USE_APPLY_TO_PAGE_RANGE_FOR_EXEC)
++ if (fExecutable)
++ pgprot_val(fPg) |= _PAGE_NX; /* Uses RTR0MemObjProtect to clear NX when memory ready, W^X fashion. */
++# endif
++
+ # ifdef VM_MAP
+ pMemLnx->Core.pv = vmap(&pMemLnx->apPages[0], pMemLnx->cPages, VM_MAP, fPg);
+ # else
+@@ -1851,6 +1895,21 @@ DECLHIDDEN(int) rtR0MemObjNativeProtect(
+ preempt_enable();
+ return VINF_SUCCESS;
+ }
++# elif defined(IPRT_USE_APPLY_TO_PAGE_RANGE_FOR_EXEC)
++ PRTR0MEMOBJLNX pMemLnx = (PRTR0MEMOBJLNX)pMem;
++ if ( pMemLnx->fExecutable
++ && pMemLnx->fMappedToRing0)
++ {
++ LNXAPPLYPGRANGE Args;
++ Args.pMemLnx = pMemLnx;
++ Args.fPg = rtR0MemObjLinuxConvertProt(fProt, true /*fKernel*/);
++ int rcLnx = apply_to_page_range(current->active_mm, (unsigned long)pMemLnx->Core.pv + offSub, cbSub,
++ rtR0MemObjLinuxApplyPageRange, (void *)&Args);
++ if (rcLnx)
++ return VERR_NOT_SUPPORTED;
++
++ return VINF_SUCCESS;
++ }
+ # endif
+
+ NOREF(pMem);
3 years, 11 months
[vdr-markad/f32] Update to 2.4.3
by Martin Gansser
Summary of changes:
fced476... Update to 2.4.3 (*)
(*) This commit already existed in another branch; no separate mail sent
3 years, 11 months