Adapted from Debian: https://sources.debian.org/patches/sqlite3/3.32.3-1/20-hurd-locking-style.patch Upstream status: Not upstreamed. This patch is needed to get offloading to work. Sqlite can use simple file locking mode, but that does not work for the Hurd; a second sqlite process fails with a "locking protocol" error. See also: https://bugs.debian.org/529734. diff -purN sqlite-autoconf-3310100/sqlite3.c sqlite-autoconf-3310100-/sqlite3.c --- sqlite-autoconf-3310100/sqlite3.c 2020-01-27 21:25:19.000000000 +0100 +++ sqlite-autoconf-3310100-/sqlite3.c 2020-07-01 11:50:13.768333806 +0200 @@ -33189,7 +33189,7 @@ SQLITE_PRIVATE const char *sqlite3Opcode # include #endif -#if SQLITE_ENABLE_LOCKING_STYLE +#if SQLITE_ENABLE_LOCKING_STYLE || defined(__GNU__) /* # include */ # include # include @@ -35676,7 +35676,7 @@ static int dotlockClose(sqlite3_file *id ** ** Omit this section if SQLITE_ENABLE_LOCKING_STYLE is turned off */ -#if SQLITE_ENABLE_LOCKING_STYLE +#if SQLITE_ENABLE_LOCKING_STYLE || defined(__GNU__) /* ** Retry flock() calls that fail with EINTR @@ -38586,7 +38586,7 @@ IOMETHODS( 0 /* xShmMap method */ ) -#if SQLITE_ENABLE_LOCKING_STYLE +#if SQLITE_ENABLE_LOCKING_STYLE || defined(__GNU__) IOMETHODS( flockIoFinder, /* Finder function name */ flockIoMethods, /* sqlite3_io_methods object name */ @@ -41142,6 +41142,8 @@ SQLITE_API int sqlite3_os_init(void){ UNIXVFS("unix", autolockIoFinder ), #elif OS_VXWORKS UNIXVFS("unix", vxworksIoFinder ), +#elif defined(__GNU__) + UNIXVFS("unix", flockIoFinder ), #else UNIXVFS("unix", posixIoFinder ), #endif @@ -41151,7 +41153,7 @@ SQLITE_API int sqlite3_os_init(void){ #if OS_VXWORKS UNIXVFS("unix-namedsem", semIoFinder ), #endif -#if SQLITE_ENABLE_LOCKING_STYLE || OS_VXWORKS +#if SQLITE_ENABLE_LOCKING_STYLE || OS_VXWORKS || defined(__GNU__) UNIXVFS("unix-posix", posixIoFinder ), #endif #if SQLITE_ENABLE_LOCKING_STYLE 5faad615da9'>root/gnu/packages/ssh.scm
AgeCommit message (Expand)Author
2024-08-31gnu: lsh: Add libxcrypt dependency....* gnu/packages/ssh.scm (lsh)[inputs]: Add libxcrypt. Change-Id: Ic67704e2a60d4e2fe7397204570efca4493c88fe 宋文武
2024-08-31gnu: dropbear: Add libxcrypt dependency....* gnu/packages/ssh.scm (dropbear)[inputs]: Add libxcrypt. Change-Id: I951b01354e195c09d8ecf0b06ef8d88715f3023c 宋文武
2024-08-31gnu: mosh: Add 'bash' input for 'wrap-program'....It is required for cross-compilation. * gnu/packages/ssh.scm (mosh)[inputs]: Add 'bash-minimal'. Signed-off-by: Maxim Cournoyer <maxim.cournoyer@gmail.com> Change-Id: I2d03972a6acf31e63e2629356eb862445eecf1aa Maxime Devos
2024-07-03gnu: dropbear: Update to 2024.85....* gnu/packages/ssh.scm (dropbear): Update to 2024.85. Change-Id: I6c729f22732244e6c44bc0d6a1866ab1663a537e Signed-off-by: jgart <jgart@dismail.de> Attila Lendvai
2024-07-01gnu: openssh: Update to 9.8p1 [security fixes]....Fixes a critical security bug allowing remote code execution as root: https://www.openssh.com/txt/release-9.8 This may be CVE-2024-6387 (currently embargoed): https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6387 * gnu/packages/ssh.scm (openssh): Update to 9.8p1. Change-Id: I32e1001ca4d7f9bfbdad58ddcba58670e151a8cb Zheng Junjie
2024-04-05gnu: openssh: Update to 9.7p1....* gnu/packages/ssh.scm (openssh): Update to 9.7p1 [source]: Remove openssh-gcc-13-ppc64le-fzero-call-used-regs.patch'. * gnu/packages/patches/openssh-gcc-13-ppc64le-fzero-call-used-regs.patch: Delete file. * gnu/packages/local.mk (dist_patch_DATA): Remove it. Change-Id: Ia13c32869afa6c964770243ecacf5a3ce473e5e2 Signed-off-by: Ludovic Courtès <ludo@gnu.org> Jack Hill