1 |
commit: 9ec2fda0de0eaa6e4275498f5be54678cc4292ea |
2 |
Author: Michael Mair-Keimberger <mmk <AT> levelnine <DOT> at> |
3 |
AuthorDate: Fri Nov 5 15:30:47 2021 +0000 |
4 |
Commit: Jakov Smolić <jsmolic <AT> gentoo <DOT> org> |
5 |
CommitDate: Sat Nov 6 09:30:13 2021 +0000 |
6 |
URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=9ec2fda0 |
7 |
|
8 |
sys-cluster/openmpi: remove unused patch |
9 |
|
10 |
Package-Manager: Portage-3.0.28, Repoman-3.0.3 |
11 |
Signed-off-by: Michael Mair-Keimberger <mmk <AT> levelnine.at> |
12 |
Closes: https://github.com/gentoo/gentoo/pull/22831 |
13 |
Signed-off-by: Jakov Smolić <jsmolic <AT> gentoo.org> |
14 |
|
15 |
...le-malloc-override-inside-of-Gentoo-sandb.patch | 42 ---------------------- |
16 |
1 file changed, 42 deletions(-) |
17 |
|
18 |
diff --git a/sys-cluster/openmpi/files/hooks-disable-malloc-override-inside-of-Gentoo-sandb.patch b/sys-cluster/openmpi/files/hooks-disable-malloc-override-inside-of-Gentoo-sandb.patch |
19 |
deleted file mode 100644 |
20 |
index 197430aee6f..00000000000 |
21 |
--- a/sys-cluster/openmpi/files/hooks-disable-malloc-override-inside-of-Gentoo-sandb.patch |
22 |
+++ /dev/null |
23 |
@@ -1,42 +0,0 @@ |
24 |
-From 3bd5897c7ca8ab61fb024957aeae891e204b3e3f Mon Sep 17 00:00:00 2001 |
25 |
-From: Justin Bronder <jsbronder@×××××.com> |
26 |
-Date: Mon, 1 Jul 2013 20:37:17 -0400 |
27 |
-Subject: [PATCH] hooks: disable malloc override inside of Gentoo sandbox |
28 |
- |
29 |
-As described in the comments in the source, Gentoo's own version of |
30 |
-fakeroot, sandbox, also runs into hangs when malloc is overridden. |
31 |
-Sandbox environments can easily be detected by looking for SANDBOX_PID |
32 |
-in the environment. When detected, employ the same fix used for |
33 |
-fakeroot. |
34 |
- |
35 |
-See https://bugs.gentoo.org/show_bug.cgi?id=462602 |
36 |
---- |
37 |
- opal/mca/memory/linux/hooks.c | 11 +++++++++-- |
38 |
- 1 file changed, 9 insertions(+), 2 deletions(-) |
39 |
- |
40 |
-diff --git a/opal/mca/memory/linux/hooks.c b/opal/mca/memory/linux/hooks.c |
41 |
-index 6a1646f..5ded08c 100644 |
42 |
---- a/opal/mca/memory/linux/hooks.c |
43 |
-+++ b/opal/mca/memory/linux/hooks.c |
44 |
-@@ -747,9 +747,16 @@ static void opal_memory_linux_malloc_init_hook(void) |
45 |
- "fakeroot" build environment that allocates memory during |
46 |
- stat() (see http://bugs.debian.org/531522). It may not be |
47 |
- necessary any more since we're using access(), not stat(). But |
48 |
-- we'll leave the check, anyway. */ |
49 |
-+ we'll leave the check, anyway. |
50 |
-+ |
51 |
-+ This is also an issue when using Gentoo's version of 'fakeroot', |
52 |
-+ sandbox v2.5. Sandbox environments can also be detected fairly |
53 |
-+ easily by looking for SANDBOX_ON. |
54 |
-+ */ |
55 |
-+ |
56 |
- if (getenv("FAKEROOTKEY") != NULL || |
57 |
-- getenv("FAKED_MODE") != NULL) { |
58 |
-+ getenv("FAKED_MODE") != NULL || |
59 |
-+ getenv("SANDBOX_ON") != NULL ) { |
60 |
- return; |
61 |
- } |
62 |
- |
63 |
--- |
64 |
-1.8.1.5 |
65 |
- |