summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDonnie Berkholz <dberkholz@gentoo.org>2008-06-11 21:13:33 +0000
committerDonnie Berkholz <dberkholz@gentoo.org>2008-06-11 21:13:33 +0000
commit8772ef7f89d9eb48fad529669a858bfbb77bc41a (patch)
tree43fa93426a561426fc4921de2ace7a01141e654f /x11-base
parentMarking freetype-2.3.6 ppc64 for bug 225851 (diff)
downloadhistorical-8772ef7f89d9eb48fad529669a858bfbb77bc41a.tar.gz
historical-8772ef7f89d9eb48fad529669a858bfbb77bc41a.tar.bz2
historical-8772ef7f89d9eb48fad529669a858bfbb77bc41a.zip
This had pretty much the same patches that are in 1.4.2.
Package-Manager: portage-2.1.5.4
Diffstat (limited to 'x11-base')
-rw-r--r--x11-base/xorg-server/ChangeLog94
-rw-r--r--x11-base/xorg-server/Manifest72
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0001-Bug-13308-Verify-and-reject-obviously-broken-modes.patch30
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0002-bgPixel-unsigned-long-is-64-bit-on-x86_64-so-1.patch34
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0003-Xprint-Clean-up-generated-files.patch24
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0004-Config-D-Bus-Don-t-leak-timers.patch44
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0005-Config-HAL-Don-t-leak-options-on-failure-to-add-de.patch57
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0006-OS-Don-t-leak-connection-translation-table-on-regen.patch27
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0007-KDrive-Xephyr-Don-t-leak-screen-damage-structure.patch25
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0008-Input-Don-t-reinit-devices.patch29
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0009-include-never-overwrite-realInputProc-with-enqueueI.patch37
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0010-OS-IO-Zero-out-client-buffers.patch28
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0011-XKB-XkbCopyKeymap-Don-t-leak-all-the-sections.patch27
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0012-Xephyr-One-time-keyboard-leak-fix.patch26
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0013-Fix-for-CVE-2007-5760-XFree86-Misc-extension-out-o.patch27
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0014-Fix-for-CVE-2007-6428-TOG-cup-extension-memory-cor.patch26
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0015-Fix-for-CVE-2007-6427-Xinput-extension-memory-corr.patch262
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0016-Fix-for-CVE-2007-6429-MIT-SHM-and-EVI-extensions-i.patch210
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0017-Fix-for-CVE-2008-0006-PCF-Font-parser-buffer-overf.patch30
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0018-Fix-for-CVE-2007-5958-File-existence-disclosure.patch34
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0019-CVE-2007-6429-Don-t-spuriously-reject-8bpp-shm-pix.patch86
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0020-dix-set-the-correct-number-of-valuators-in-valuator.patch29
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0021-xkb-don-t-update-LEDs-if-they-don-t-exist.-Bug-13.patch31
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0022-security-Fix-for-Bug-14480-untrusted-access-broke.patch25
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0023-Resize-composite-overlay-window-when-the-root-window.patch62
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0024-Fix-rotation-for-multi-monitor-situation.patch31
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0025-Don-t-break-grab-and-focus-state-for-a-window-when-r.patch40
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0026-CVE-2007-6429-Always-test-for-size-offset-wrapping.patch44
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0027-Fix-context-sharing-between-direct-indirect-contexts.patch38
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0028-Add-some-more-support-for-DragonFly.-From-Joerg-Sonn.patch83
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0029-configure.ac-DragonFly-BSD-support.patch53
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0030-Fixed-configure.ac-for-autoconf-2.62.patch28
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0031-EXA-Fix-off-by-one-in-polyline-drawing.patch26
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0032-XKB-Fix-processInputProc-wrapping.patch83
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0033-xfree86-fix-AlwaysCore-handling.-Bug-14256.patch29
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0034-Ignore-not-just-block-SIGALRM-around-Popen-Pcl.patch58
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0035-Fix-build-on-FreeBSD-after-Popen-changes.patch25
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0036-So-like-checking-return-codes-of-system-calls-sig.patch83
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0037-Check-for-sys-sdt.h-as-well-when-determining-to-en.patch39
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0038-dix-Always-add-valuator-information-if-present.patch47
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0039-Bug-10324-dix-Allow-arbitrary-value-ranges-in-Ge.patch40
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0040-Bug-10324-dix-Add-scaling-of-X-and-Y-on-the-repo.patch173
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0041-dix-Skip-call-to-clipAxis-for-relative-core-events.patch93
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0042-dix-Move-motion-history-update-until-after-screen-c.patch51
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0043-XKB-Actually-explain-keymap-failures.patch145
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0044-kdrive-allow-disabling-Composite.patch33
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0045-When-XKB-fails-to-open-rules-file-log-the-file-name.patch26
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0046-dmx-fix-build-by-adding-New-Delete-InputDeviceRequ.patch31
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0047-dmx-link-in-XSERVER_LIBS.patch24
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0048-xephyr-fix-linking-by-adding-pixman-and-using-XSERV.patch38
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0049-xprint-fix-build-by-adding-New-Delete-InputDeviceR.patch34
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0050-xprint-fix-linking-by-including-XSERVER_LIBS.patch25
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0051-Fix-RandR-1.2-driver-interface-conversion-of-two-col.patch31
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0052-Fix-overly-restrictive-integer-overflow-check-in-EXA.patch28
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0053-Fix-hal-shutdown-crash.patch44
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0054-Bump-DEFAULT_DPI-to-96.patch27
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0055-Bug-13962-Re-arm-the-DPMS-timer-when-re-enabling-D.patch35
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0056-Prevent-the-wm-command-line-option-from-causing-a-S.patch47
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0057-EXA-Skip-empty-glyphs.-cherry-picked-from-commit-c.patch24
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0058-xf86-Add-AutoConfig-driver-for-PCI-ID-1022-2081-to.patch39
-rw-r--r--x11-base/xorg-server/files/1.4.0.90/0059-xkb-when-copying-the-keymap-make-sure-the-structs.patch121
-rw-r--r--x11-base/xorg-server/xorg-server-1.4.0.90-r4.ebuild576
62 files changed, 104 insertions, 3664 deletions
diff --git a/x11-base/xorg-server/ChangeLog b/x11-base/xorg-server/ChangeLog
index 6d343ade2757..a215426e1ccb 100644
--- a/x11-base/xorg-server/ChangeLog
+++ b/x11-base/xorg-server/ChangeLog
@@ -1,6 +1,98 @@
# ChangeLog for x11-base/xorg-server
# Copyright 1999-2008 Gentoo Foundation; Distributed under the GPL v2
-# $Header: /var/cvsroot/gentoo-x86/x11-base/xorg-server/ChangeLog,v 1.334 2008/06/11 21:06:11 ranger Exp $
+# $Header: /var/cvsroot/gentoo-x86/x11-base/xorg-server/ChangeLog,v 1.335 2008/06/11 21:13:32 dberkholz Exp $
+
+ 11 Jun 2008; Donnie Berkholz <dberkholz@gentoo.org>;
+ -files/1.4.0.90/0004-Config-D-Bus-Don-t-leak-timers.patch,
+ -files/1.4.0.90/0006-OS-Don-t-leak-connection-translation-table-on-regen.p
+ atch, -files/1.4.0.90/0012-Xephyr-One-time-keyboard-leak-fix.patch,
+ -files/1.4.0.90/0002-bgPixel-unsigned-long-is-64-bit-on-x86_64-so-1.patch,
+ -files/1.4.0.90/0013-Fix-for-CVE-2007-5760-XFree86-Misc-extension-out-o.pa
+ tch,
+ -files/1.4.0.90/0005-Config-HAL-Don-t-leak-options-on-failure-to-add-de.pa
+ tch,
+ -files/1.4.0.90/0018-Fix-for-CVE-2007-5958-File-existence-disclosure.patch
+ ,
+ -files/1.4.0.90/0007-KDrive-Xephyr-Don-t-leak-screen-damage-structure.patc
+ h,
+ -files/1.4.0.90/0015-Fix-for-CVE-2007-6427-Xinput-extension-memory-corr.pa
+ tch,
+ -files/1.4.0.90/0014-Fix-for-CVE-2007-6428-TOG-cup-extension-memory-cor.pa
+ tch,
+ -files/1.4.0.90/0019-CVE-2007-6429-Don-t-spuriously-reject-8bpp-shm-pix.pa
+ tch,
+ -files/1.4.0.90/0016-Fix-for-CVE-2007-6429-MIT-SHM-and-EVI-extensions-i.pa
+ tch,
+ -files/1.4.0.90/0017-Fix-for-CVE-2008-0006-PCF-Font-parser-buffer-overf.pa
+ tch,
+ -files/1.4.0.90/0040-Bug-10324-dix-Add-scaling-of-X-and-Y-on-the-repo.patc
+ h,
+ -files/1.4.0.90/0001-Bug-13308-Verify-and-reject-obviously-broken-modes.pa
+ tch, -files/1.4.0.90/0003-Xprint-Clean-up-generated-files.patch,
+ -files/1.4.0.90/0008-Input-Don-t-reinit-devices.patch,
+ -files/1.4.0.90/0009-include-never-overwrite-realInputProc-with-enqueueI.p
+ atch, -files/1.4.0.90/0010-OS-IO-Zero-out-client-buffers.patch,
+ -files/1.4.0.90/0011-XKB-XkbCopyKeymap-Don-t-leak-all-the-sections.patch,
+ -files/1.4.0.90/0020-dix-set-the-correct-number-of-valuators-in-valuator.p
+ atch,
+ -files/1.4.0.90/0041-dix-Skip-call-to-clipAxis-for-relative-core-events.pa
+ tch,
+ -files/1.4.0.90/0021-xkb-don-t-update-LEDs-if-they-don-t-exist.-Bug-13.pat
+ ch,
+ -files/1.4.0.90/0042-dix-Move-motion-history-update-until-after-screen-c.p
+ atch,
+ -files/1.4.0.90/0022-security-Fix-for-Bug-14480-untrusted-access-broke.pat
+ ch,
+ -files/1.4.0.90/0023-Resize-composite-overlay-window-when-the-root-window.
+ patch,
+ -files/1.4.0.90/0024-Fix-rotation-for-multi-monitor-situation.patch,
+ -files/1.4.0.90/0025-Don-t-break-grab-and-focus-state-for-a-window-when-r.
+ patch, -files/1.4.0.90/0043-XKB-Actually-explain-keymap-failures.patch,
+ -files/1.4.0.90/0026-CVE-2007-6429-Always-test-for-size-offset-wrapping.pa
+ tch,
+ -files/1.4.0.90/0027-Fix-context-sharing-between-direct-indirect-contexts.
+ patch,
+ -files/1.4.0.90/0028-Add-some-more-support-for-DragonFly.-From-Joerg-Sonn.
+ patch, -files/1.4.0.90/0029-configure.ac-DragonFly-BSD-support.patch,
+ -files/1.4.0.90/0044-kdrive-allow-disabling-Composite.patch,
+ -files/1.4.0.90/0030-Fixed-configure.ac-for-autoconf-2.62.patch,
+ -files/1.4.0.90/0031-EXA-Fix-off-by-one-in-polyline-drawing.patch,
+ -files/1.4.0.90/0032-XKB-Fix-processInputProc-wrapping.patch,
+ -files/1.4.0.90/0045-When-XKB-fails-to-open-rules-file-log-the-file-name.p
+ atch,
+ -files/1.4.0.90/0033-xfree86-fix-AlwaysCore-handling.-Bug-14256.patch,
+ -files/1.4.0.90/0034-Ignore-not-just-block-SIGALRM-around-Popen-Pcl.patch,
+ -files/1.4.0.90/0035-Fix-build-on-FreeBSD-after-Popen-changes.patch,
+ -files/1.4.0.90/0036-So-like-checking-return-codes-of-system-calls-sig.pat
+ ch,
+ -files/1.4.0.90/0037-Check-for-sys-sdt.h-as-well-when-determining-to-en.pa
+ tch,
+ -files/1.4.0.90/0038-dix-Always-add-valuator-information-if-present.patch,
+ -files/1.4.0.90/0046-dmx-fix-build-by-adding-New-Delete-InputDeviceRequ.pa
+ tch,
+ -files/1.4.0.90/0039-Bug-10324-dix-Allow-arbitrary-value-ranges-in-Ge.patc
+ h, -files/1.4.0.90/0047-dmx-link-in-XSERVER_LIBS.patch,
+ -files/1.4.0.90/0048-xephyr-fix-linking-by-adding-pixman-and-using-XSERV.p
+ atch,
+ -files/1.4.0.90/0049-xprint-fix-build-by-adding-New-Delete-InputDeviceR.pa
+ tch,
+ -files/1.4.0.90/0050-xprint-fix-linking-by-including-XSERVER_LIBS.patch,
+ -files/1.4.0.90/0051-Fix-RandR-1.2-driver-interface-conversion-of-two-col.
+ patch,
+ -files/1.4.0.90/0052-Fix-overly-restrictive-integer-overflow-check-in-EXA.
+ patch, -files/1.4.0.90/0053-Fix-hal-shutdown-crash.patch,
+ -files/1.4.0.90/0054-Bump-DEFAULT_DPI-to-96.patch,
+ -files/1.4.0.90/0055-Bug-13962-Re-arm-the-DPMS-timer-when-re-enabling-D.pa
+ tch,
+ -files/1.4.0.90/0056-Prevent-the-wm-command-line-option-from-causing-a-S.p
+ atch,
+ -files/1.4.0.90/0057-EXA-Skip-empty-glyphs.-cherry-picked-from-commit-c.pa
+ tch,
+ -files/1.4.0.90/0058-xf86-Add-AutoConfig-driver-for-PCI-ID-1022-2081-to.pa
+ tch,
+ -files/1.4.0.90/0059-xkb-when-copying-the-keymap-make-sure-the-structs.pat
+ ch, -xorg-server-1.4.0.90-r4.ebuild:
+ This had pretty much the same patches that are in 1.4.2.
11 Jun 2008; Brent Baude <ranger@gentoo.org>
xorg-server-1.3.0.0-r6.ebuild:
diff --git a/x11-base/xorg-server/Manifest b/x11-base/xorg-server/Manifest
index c36deb35a622..47c6d0921048 100644
--- a/x11-base/xorg-server/Manifest
+++ b/x11-base/xorg-server/Manifest
@@ -1,3 +1,6 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA1
+
AUX 1.2.0-fix-amd-cpu-detection.patch 1715 RMD160 7290fd57dc2a9e2dd8edbe08da5074a30815486c SHA1 b749e5ac35fad295fd7a1f13cfee2e42a2a06035 SHA256 0126a880eb5f21eb8dbbd119a425e7412b37689e1321c2b9ff63c5dc8de47f6a
AUX 1.2.0-properly-free-device-devprivates-memory-leak-fix.patch 1199 RMD160 c55891ff6797d1b161524cd5c3e9a4382ec0bcad SHA1 98e07d5a542bc1e990921234f8f6399120ae5a63 SHA256 ba60d2fbb7944da45344f5ffc1431bf0e812ab861f4455522592ecb0c475138c
AUX 1.2.0-typo-fix.patch 1321 RMD160 237c072869df15afbc2b35dfd8cc6e5143cb59f9 SHA1 3a22190fde5487b84c0d9a8862421f102bf41c63 SHA256 9dbf526f9cb3bf2596ffdc1795eda16181384db33562daf4fd1ddb359b5a77bd
@@ -32,65 +35,6 @@ AUX 1.4-fix-xprint-link.patch 588 RMD160 4a5ec1cd69047a94917c0bf29f1f557ec05059c
AUX 1.4-fpic-libxf86config.patch 374 RMD160 614d69f83b7f4d4999efa906f2059b7f287e22c1 SHA1 1f113823c03f69e79b10965908945df629b73474 SHA256 017e7ba2954dcc2281f8626977d47fd8bd037f05e680e51b8e4ae7316455a237
AUX 1.4-ia64.patch 1872 RMD160 6bc82c87140ee81150c34df486b5b4d9620dde9c SHA1 b43aadafd7ce144790cf9eccf8a9840baf3205bd SHA256 950714ce230791ce9d54e21044961d9435e4eb774f82e5047f9adcd5fd4661ec
AUX 1.4.0.90-clean-generated-files.patch 595 RMD160 e4044e8c1f1b92db38a7e53b77109ff80fb4d22a SHA1 9eaf182c435946596462106547e9d52f819cb397 SHA256 8a57ddae701218b425bbe59c2d387c81d65af2d29c67ea9f8550c8201841f9a7
-AUX 1.4.0.90/0001-Bug-13308-Verify-and-reject-obviously-broken-modes.patch 1066 RMD160 7a7d2f10eba4e2f20ecf793a54faa22dabdde573 SHA1 e00b0e764771bddaf2541b6b8c2d0da4999733ca SHA256 aafce7a98dcfea631c44504ab5bff78e7010ca9899bfb8749d5190b3cb171d86
-AUX 1.4.0.90/0002-bgPixel-unsigned-long-is-64-bit-on-x86_64-so-1.patch 1115 RMD160 4fa84411171f2e6f965bd7a1911f603fdd4dbbf9 SHA1 60f5914ec97dec52e72a29cdfb36558f81ecda15 SHA256 55824948145bf996a43868dd93cdcd5df043e3ac3a672cdc5cf52abe06005eba
-AUX 1.4.0.90/0003-Xprint-Clean-up-generated-files.patch 719 RMD160 4bc21f3eac1c2ea737fbc5c46a4e6628795c6bcc SHA1 3803df8e78f91e0b069a87f2b1b8ab22da85b46e SHA256 f1afa2d771072bdb04e47228ef0067ed180f19e8967277e7aa0deab69104372c
-AUX 1.4.0.90/0004-Config-D-Bus-Don-t-leak-timers.patch 1353 RMD160 c745c7d25659d5d2a1694d4cd10e3e4af4385b33 SHA1 c3cb5a8f94c969825e6e4af83b082bc3fa754055 SHA256 22a3764f72cd888de7756965cdd7650c4bae1d34791604c7a073bbc2218668eb
-AUX 1.4.0.90/0005-Config-HAL-Don-t-leak-options-on-failure-to-add-de.patch 1919 RMD160 7d0f9d86e7eb5fe732203a7af52b9033e890ccad SHA1 bce54d3f452ea020e05ff012c279c6cc5d49cab9 SHA256 a46cafdfa293dc16b35a9977f449a84cc8deb347a1aabcb305546d9e3efc8711
-AUX 1.4.0.90/0006-OS-Don-t-leak-connection-translation-table-on-regen.patch 830 RMD160 fdd8a862086307bdfc3379ca24b94a6eb49b145c SHA1 41a08647dd535a45b0adb81401c8b8358b43cf7c SHA256 74b4171174d67ea019e961d562aff504704c815136d8bfff79ecbd166a017bcf
-AUX 1.4.0.90/0007-KDrive-Xephyr-Don-t-leak-screen-damage-structure.patch 872 RMD160 eaec47dfad778585659a4d6ba90dc67e94cb63a4 SHA1 be85ab848e1ad57076bf4852d2e7c8b88ed29c3c SHA256 bb950597d42649e799bca994c0a7958bdc28a64ac8e81e537e4ac10e2e5c7a0c
-AUX 1.4.0.90/0008-Input-Don-t-reinit-devices.patch 921 RMD160 4b7f1a8e27c65dee361aa75fc6738d823f0383b1 SHA1 8493c75328f58a882cc919541d4e0ecebed31852 SHA256 338b148789a84087f5208e2eda5925aa5e80e86c75e902640d0141e6034b619c
-AUX 1.4.0.90/0009-include-never-overwrite-realInputProc-with-enqueueI.patch 1489 RMD160 f17760b034b1e71dfe4a2e950d8624b973141ae8 SHA1 6467bfee92765e15355c3b7a4e7f45e86c265ba9 SHA256 d010e9bd9f5ecd47ca2de1995a390502dcfdbc9d73ac434e9e04229b7ba96365
-AUX 1.4.0.90/0010-OS-IO-Zero-out-client-buffers.patch 861 RMD160 0f6ac780a880dfab70159fbd770b7fbaf070e8f8 SHA1 36faf03d4133ae742479987ac90758aeedfa2193 SHA256 e220b704b72db42ea62c5a1b2fcf644137c4fd19dcb61f4b74d4b987222ff1a3
-AUX 1.4.0.90/0011-XKB-XkbCopyKeymap-Don-t-leak-all-the-sections.patch 941 RMD160 49d4dca11b70ae89ff21800fe85df7f82be34170 SHA1 20a243ba686462b857a022f2052988be9706593b SHA256 ac4fad50d2baf4988d53567d6a9ca59cd19aa9a5435ee4ad4a3b69a6c4028f9c
-AUX 1.4.0.90/0012-Xephyr-One-time-keyboard-leak-fix.patch 912 RMD160 75a735c8763090de987371cb13e76b2b12453d14 SHA1 62ca71d5f158f76edcab37e954b3b16798b82e61 SHA256 ea73a5ec0b0d75c88b852dbba533d0be66634f2df883ece2f938f250d47a4ec8
-AUX 1.4.0.90/0013-Fix-for-CVE-2007-5760-XFree86-Misc-extension-out-o.patch 980 RMD160 5088fb0cb840b9f6e77187a76bd2d48e397b9eba SHA1 8318fb14dee695e11771a3d83a669c63497f4c41 SHA256 22f66fb059e03e64d869d43aff6292271b830c64fd79d0d2a190f141f0da588d
-AUX 1.4.0.90/0014-Fix-for-CVE-2007-6428-TOG-cup-extension-memory-cor.patch 747 RMD160 3fc0e01aa2cf0f1f22691caff9001b35afb937ab SHA1 26b9473115e4e891364f0ef2d4f2702aa7654edf SHA256 31023b19e4731027b7f141da58a0b73e668f6479283d8d6a32b18c94dde5987e
-AUX 1.4.0.90/0015-Fix-for-CVE-2007-6427-Xinput-extension-memory-corr.patch 7342 RMD160 eca6339c9c94d3dba77a38ab5b18ba284db647ff SHA1 a018b5f3d83924c16c97a3f33ebf4c6244959210 SHA256 771f6f0b8d7db8df4a7a020684bd1f4bf67967e00fe18b8b178b0d396983380a
-AUX 1.4.0.90/0016-Fix-for-CVE-2007-6429-MIT-SHM-and-EVI-extensions-i.patch 6830 RMD160 4a5d691c978ad37440474710ed24c65a406ae77d SHA1 f5a8be495d0dcc97b2de9f63b92012e5b253982c SHA256 2b70079c797d3dee6ba7778f7abe86c9f2ffdef1e37cdbb02b5ca2ff49e82d5a
-AUX 1.4.0.90/0017-Fix-for-CVE-2008-0006-PCF-Font-parser-buffer-overf.patch 912 RMD160 cbce0d132c50cca78c49e19452e191ef68814816 SHA1 d44cf3bb2d43a932599b013c0acb8dc7a9b67ff9 SHA256 9f7a61d4c27cf3212e0403f3815a0ee1aa9c9834d536b26637960e777deda65e
-AUX 1.4.0.90/0018-Fix-for-CVE-2007-5958-File-existence-disclosure.patch 870 RMD160 5a1590a2c0ff8fa05f42bc521c6ff4eab835ed1c SHA1 168f778221d4946d23916ee90b8b23cef2e384a1 SHA256 c0cbaf1b750b7b34cdc6ac759927bde2c10fb9358c6f792b6762a690755a3d2f
-AUX 1.4.0.90/0019-CVE-2007-6429-Don-t-spuriously-reject-8bpp-shm-pix.patch 2663 RMD160 df43d1007c2d7929cc905578ce16e9190f86e5f9 SHA1 e441902688afceb3a69743f983d0cf8757583e5d SHA256 5879807da70afa579ca3cb4950e05ea4753e5c04393ebdf67bf3aea472246b42
-AUX 1.4.0.90/0020-dix-set-the-correct-number-of-valuators-in-valuator.patch 1141 RMD160 46d0bbc11476b5387dc6f40dc6ed364b91ed85e9 SHA1 6ec2db7ab5875001d697072603f7bbb0dd5b0918 SHA256 c1bcd5408be9ec752a0e9fbefc446cfba66e175a68fec7bbb4784b2afd84e690
-AUX 1.4.0.90/0021-xkb-don-t-update-LEDs-if-they-don-t-exist.-Bug-13.patch 1018 RMD160 74973f08908b1886771918c0d09d74bc18973291 SHA1 33bcdf1f34438b82f2f49f1230c454d44db806f7 SHA256 f01010eb2ebb0004ca5021d7d82e4ca9a7ca97fc601575c75458186113c89e59
-AUX 1.4.0.90/0022-security-Fix-for-Bug-14480-untrusted-access-broke.patch 778 RMD160 583086061e91f8bcabc65e8ca532ca17f3b33f62 SHA1 057838b8e32b1372e7fe5e9cacd3db26a3170e63 SHA256 16239f6f3eede01a10fc188664d5ec65bfc7abe2323c6a69eb3ce15b8e463c94
-AUX 1.4.0.90/0023-Resize-composite-overlay-window-when-the-root-window.patch 2001 RMD160 564a712f423ed253f3cb81cf095501a2058db25a SHA1 a58feb741cbb822a9662348ea8955db84309a669 SHA256 f6a012697d9c82b70f79f15e40dcd15eda1ea3712837ea489924a2f174fc9fff
-AUX 1.4.0.90/0024-Fix-rotation-for-multi-monitor-situation.patch 1160 RMD160 5f73d797e973e5bf7725d4e1676e0cc382c40658 SHA1 d8addba81bae9a2150c162b896619bd42ca4397d SHA256 c8b90041b3b2d30cfe203690064a5d377613b4518e3baffd8657d275c58b98e4
-AUX 1.4.0.90/0025-Don-t-break-grab-and-focus-state-for-a-window-when-r.patch 1353 RMD160 45f37da1ee642fc182d9977a59bf7b45403b8467 SHA1 c10b77bed7f2f016cb2d43a097a431461915af8d SHA256 215cd3641d36511a1184cffd248e580e8411caaf865c53b37ab5b1e32d1291c9
-AUX 1.4.0.90/0026-CVE-2007-6429-Always-test-for-size-offset-wrapping.patch 1332 RMD160 63011b66b47f30a4426559bb68aafac152b7c037 SHA1 219ca0a2bb455192c1944b7b18d4963cef499545 SHA256 e3e23bfd39b0d16fb31bef0ef3218e8548de43eee2b011e0a5d9b409d7d15b02
-AUX 1.4.0.90/0027-Fix-context-sharing-between-direct-indirect-contexts.patch 1019 RMD160 1939ba0bf9ede3b4f4742a987d89e3f3d85d0edf SHA1 d6125ad5ee945417fdf4c7adc1e9624d00e425a7 SHA256 caf657582c25de122ddebc930ebea9c0535a162192ac1338fcb6721485ef1627
-AUX 1.4.0.90/0028-Add-some-more-support-for-DragonFly.-From-Joerg-Sonn.patch 2993 RMD160 e843dd1b627bc669337b4de0fd2202c861897f8c SHA1 69e312c2687cfe2278ad57ab438808ba79ef9f37 SHA256 f7d2a501e60cf0f9eab3866a14852df8d4bfa57c12236506b5866fb77a7e733f
-AUX 1.4.0.90/0029-configure.ac-DragonFly-BSD-support.patch 1570 RMD160 10234d211dc79ac71bcef7606700db66d6f2dc5b SHA1 54b7ebe23e4efb9276b9413d2dde9c9d4edc7dcd SHA256 918d5a558afa80ad0c179652d23e6ef36f7316c5444ca3836540081ec4518d25
-AUX 1.4.0.90/0030-Fixed-configure.ac-for-autoconf-2.62.patch 780 RMD160 3c59fbd4af8344349bdd7c6c2b06a017a41946fe SHA1 2878663b1794200bae152631b63e3b26ffd9e94f SHA256 857e61a19a0acfb4e4ed4dca8943e72c2d0859b33c4968f5a48393e0ceea8423
-AUX 1.4.0.90/0031-EXA-Fix-off-by-one-in-polyline-drawing.patch 862 RMD160 ee5b9ed8ed0ac4499704a008c6e79254a6e508e7 SHA1 4bdad4e4a8100e18ae511292b34ca4bdf9bd45c9 SHA256 a00c0ebb2a523a5ecbe79b78af040df95ea25fb93c313507137add7530e35439
-AUX 1.4.0.90/0032-XKB-Fix-processInputProc-wrapping.patch 3158 RMD160 7aecd1b497f126ae520c2dff358ea7db762d9e37 SHA1 91ab28e5f463c22142112d3c0f03c205fe39be11 SHA256 9cc487dba264d9c170e8deae56ab42860fb40f9503b13b5b5b07ff84a0956fe7
-AUX 1.4.0.90/0033-xfree86-fix-AlwaysCore-handling.-Bug-14256.patch 1119 RMD160 9afa1abfa053ce22cf9106536b32367b963e2f15 SHA1 e8af7f18d14373e1b64f42a0af6cf51c9ac15a58 SHA256 6fca5d008038282ac4ea05ae80b68709be5902a5e6cfbb604636e3d454400173
-AUX 1.4.0.90/0034-Ignore-not-just-block-SIGALRM-around-Popen-Pcl.patch 1718 RMD160 81c0003858710177ddd879b67c301a1442996a98 SHA1 031231c784f39940281a2cf68387c09c821fa487 SHA256 4c7d930aa63f4e91e069552246097e6e3318718e740b8fa23bc8159e566d8bb9
-AUX 1.4.0.90/0035-Fix-build-on-FreeBSD-after-Popen-changes.patch 643 RMD160 22b1f3f586856c511ed6a4504c19623a22b53a81 SHA1 511eb3b79ce670a7246080989e778713e384de5c SHA256 943bedf7d50aa2edfdc863956c6d8aa421a8bcc117ee27553a9aa399b36493d2
-AUX 1.4.0.90/0036-So-like-checking-return-codes-of-system-calls-sig.patch 2084 RMD160 d88362f0aded245643a0983191b577a43a798326 SHA1 c46f7a38e1cdcc2ac8fca295dea84282ba2ba2a8 SHA256 b01b028be25c1732cf89c8d26dd563d44430d93b4d0ef5ec5cf64c31904581a3
-AUX 1.4.0.90/0037-Check-for-sys-sdt.h-as-well-when-determining-to-en.patch 1364 RMD160 efdb7e51394df787de77b19fcf2a671e5745c55b SHA1 56a4de5277f41692470eb7f5232abf370915e088 SHA256 01d007f64c4bf8ae70c62cd4fa0fa1b3d598f8776368edbd5e03be4ce680d84b
-AUX 1.4.0.90/0038-dix-Always-add-valuator-information-if-present.patch 1953 RMD160 3323165b1e1bac4975125c4484a3b189a9895c44 SHA1 17bb9013d53dcd062c3945af96c7876e2d05c9d0 SHA256 e4d5fad4931d37eedbb1056bc2cc3a45593b850a071851be4ef56ef39a9c3c2b
-AUX 1.4.0.90/0039-Bug-10324-dix-Allow-arbitrary-value-ranges-in-Ge.patch 1350 RMD160 7abec3b4353b95022c5a76cc38493866d2d44381 SHA1 0842a62ed2d0bed558dea0a3df696cc041d4d6e7 SHA256 20a2dc688886de6ac6516c9c15a493fb847460b4c67adf1a247cf104d23c90f6
-AUX 1.4.0.90/0040-Bug-10324-dix-Add-scaling-of-X-and-Y-on-the-repo.patch 7279 RMD160 4d3fe2057ccf82b001a3736b3bccbb956f9f3704 SHA1 1930d8d19b2afbd157349199a327548139b3d857 SHA256 3426664369211568b91fb0204b44327600d727efac7467fe7f0021ed64f7b5d9
-AUX 1.4.0.90/0041-dix-Skip-call-to-clipAxis-for-relative-core-events.patch 3670 RMD160 465cffebdcde7dc52022ae7133ff335347fd7605 SHA1 c311b2e4b5874718698671f56f89a269a9ebbaf7 SHA256 640f5b876364047fce4754615c159f7f9f527afb3deab5246b86853defb639ec
-AUX 1.4.0.90/0042-dix-Move-motion-history-update-until-after-screen-c.patch 2022 RMD160 d192c17c794335a6397dba46b61afaed60c47152 SHA1 8bd14bc6f88268657d010dbb82572cb8af13ea7e SHA256 4eb5b8066908d1d7b9b359a915bd3e08b6a5cf438459d100ebf5241029dc6408
-AUX 1.4.0.90/0043-XKB-Actually-explain-keymap-failures.patch 4163 RMD160 f9747730ee551ec64dd386aab41d4f560b313407 SHA1 29c45125eea26dc0a2163f19e0180e47fb886494 SHA256 bc9ca4b91b89a18db0fba597a0673f5b747a9fd79b1e046c769fca50239acea1
-AUX 1.4.0.90/0044-kdrive-allow-disabling-Composite.patch 1050 RMD160 d2f2412f12e2fb76264f7a24344deff1c9d16321 SHA1 149cfdd3939d3399814413acc71ec6e89179b822 SHA256 b3f4af02b772375b55d27a22a337ffaf172624bed584a734ec1c3f24db9b5970
-AUX 1.4.0.90/0045-When-XKB-fails-to-open-rules-file-log-the-file-name.patch 796 RMD160 83848f22aef12d307240ce8b17f099075a64239f SHA1 435295167b05b9adb0d132dbd2a9c02b1f507ef5 SHA256 075362c326cec8b0a6af42bfcec48c215dcf83c1e9d3d4caf4e3a09702045acd
-AUX 1.4.0.90/0046-dmx-fix-build-by-adding-New-Delete-InputDeviceRequ.patch 844 RMD160 4663e6dfdf034ba393c9fdc632be98f69c36d19b SHA1 ea4fa753c2e02696d2644d2263b74360b5a9973c SHA256 4c9492948fb0721917419c0556e29343e94cfb238a8e91087f0280423ddc8b4b
-AUX 1.4.0.90/0047-dmx-link-in-XSERVER_LIBS.patch 658 RMD160 ee1cb45df3c1afafaa816ba42236e15dce1aeafd SHA1 57876467dcd6db53bcb5437a72a9d5763cec5613 SHA256 2f0ffc69141a380d414719f7512a0135ead15e468470491b40a6f7e92893c0da
-AUX 1.4.0.90/0048-xephyr-fix-linking-by-adding-pixman-and-using-XSERV.patch 1227 RMD160 7a6f2c5da36ee4ae94e7f4df8c10ab3c67d02ddb SHA1 220cd64a44daf4d03cae35016704ce685bd616f4 SHA256 e487147bc623cb06ee024d8fd46360877de87f8d52343491dc5421ffa0a162bb
-AUX 1.4.0.90/0049-xprint-fix-build-by-adding-New-Delete-InputDeviceR.patch 753 RMD160 ef7de4bf03ad713e4a9b69c855329e124d80dbf9 SHA1 bb76d948b27ec9531202f563372faacba0d8236e SHA256 5d61910091e9a64b79da4b45641ad960bb0282cf24e0404581b81de985ad333a
-AUX 1.4.0.90/0050-xprint-fix-linking-by-including-XSERVER_LIBS.patch 907 RMD160 128ff0b4d09cf5b3f512ae35f82b277fd912ad24 SHA1 532055ecd8b9b961be2b852c6f4c0112269fdaff SHA256 6c67de2a596c1ea4e4c0ca0b6fdcfbde56d28133d690d3e5104bf4ceee777a01
-AUX 1.4.0.90/0051-Fix-RandR-1.2-driver-interface-conversion-of-two-col.patch 1235 RMD160 704bd4e2bf8a8524ad88cb6ad1fe582b8793b48e SHA1 a45979be8876ab34c101ed6c6b3f3656f99b0100 SHA256 9508abd1f68c6ff38b5d37c8499fea95cf87d92498e890ec8536c9ff72a65143
-AUX 1.4.0.90/0052-Fix-overly-restrictive-integer-overflow-check-in-EXA.patch 926 RMD160 442f6da089aa0b395a36a8c9928b42529f33c1ac SHA1 937d3f461cb7cd0df33d2647e8565371e3e57a26 SHA256 2d11a5a09f23bc9d2b892b21025d2c78d608830f2479b48ccbab644fe19f688a
-AUX 1.4.0.90/0053-Fix-hal-shutdown-crash.patch 1432 RMD160 85e5d8c4b04bff37433802b81c2977e05cb9ed40 SHA1 acc9044aeb136a3470e10fdc9ed53f45d434ee57 SHA256 1addcd220f38f8b9f1768050b86aa0e6fe658085a39d094dd7333d8c0cb993ba
-AUX 1.4.0.90/0054-Bump-DEFAULT_DPI-to-96.patch 794 RMD160 dfb7a79e81a1f87e22afb18650852c0d0897f644 SHA1 c0065bc58e64383801484db9f00e11ded981f728 SHA256 d5ba3eb439bd4d11af74292219950417bdd42fccee990be63df112cdcb2b0f52
-AUX 1.4.0.90/0055-Bug-13962-Re-arm-the-DPMS-timer-when-re-enabling-D.patch 879 RMD160 40ba09d2c272c15b74e177ef2e903c2177cdd130 SHA1 b22dc48b2801816adf2f7b8f1a50cab6dd538418 SHA256 b49f55c97a073532b3f8b6f05a80e5638a9ca66d312197684286b6db155c918a
-AUX 1.4.0.90/0056-Prevent-the-wm-command-line-option-from-causing-a-S.patch 1561 RMD160 2d875f064ac6ae66185d81d2cfcd1c0513bd93c6 SHA1 8efee6c3889adc5433e1a67165007b010f84be80 SHA256 1ea4bff6b753afb4f6a3cdf708cf6144e5a688d45fdd72cdc55696be1eadd3e5
-AUX 1.4.0.90/0057-EXA-Skip-empty-glyphs.-cherry-picked-from-commit-c.patch 788 RMD160 7e7d5c14ba2de2ff6df29ccd6e9069e747adb542 SHA1 f690819f1477941fa14d42eb281f854f9d98f3ed SHA256 005cd2a03b82eaf6244198fce0a7093a94fc6291b49a7bed36f5b316df04ed9d
-AUX 1.4.0.90/0058-xf86-Add-AutoConfig-driver-for-PCI-ID-1022-2081-to.patch 1214 RMD160 144b843906c0cd7291efecfe3226a3e1e0517137 SHA1 4cd9a1f5b95a97c6bcc343fc66154a271ee22f89 SHA256 82f60198adb225cf8da254974fd31752e850c10ba8c370fadef5d59f69dda843
-AUX 1.4.0.90/0059-xkb-when-copying-the-keymap-make-sure-the-structs.patch 4643 RMD160 960cda511797e67cf4762bfe47e04b41e9cd59e3 SHA1 f4bf815c417745a20789a19b4ed5b906a5f5634a SHA256 5e216b5d93284f2398a75c9843a41b7f1c17d6ed144fbad031aa576c4f2f9e5a
AUX avoid-crash-on-minimized-xv-window.patch 1970 RMD160 a41e37359a05b4dc4c796e569b3f00e9dcb210d4 SHA1 54447e96f4f10e2993e0e675091f6026e63b56b6 SHA256 6e1cbe4f588674d70d3564962a79b4b7d271162040f9a2390f29f03cfeac87bd
AUX use-composite-for-unequal-depths.patch 3528 RMD160 be7b5b07e8c890d596c5e2c49152f7df833487ea SHA1 1ade1846c1549c5a7eb3775d86973eb87bdb48ff SHA256 b38c079aaac0d8168cd4b45d2c1b8020338918c96855989dce89324c800622c0
AUX xorg-server-1.4.0.90-automake-1.10.1-fixup.patch 357 RMD160 06d03313a419fcad6b3668888e32dad28defb3a4 SHA1 3bdd2a6faa808445b2b365b420a9ce5882501035 SHA256 afb9593b3cedfdc9c768436df64b4878504804e93984672a58d96660b2b87afc
@@ -113,8 +57,14 @@ EBUILD xorg-server-1.3.0.0-r4.ebuild 17872 RMD160 caf61a35a2486a3248dab00dc2a928
EBUILD xorg-server-1.3.0.0-r5.ebuild 18114 RMD160 e6fffcc39506db21aafee5e70b8bb043026d5290 SHA1 3e716d92bc096757eb29c3e1e7ae9365a1925f07 SHA256 bb90fb9650d061d42625d99aefefe4de9e032c0b8e517be7c19a5b9ea15a742d
EBUILD xorg-server-1.3.0.0-r6.ebuild 18360 RMD160 765467f2f583284f2cf4c4d5496a2e1e6c261af1 SHA1 e064e4740ad87574cb96f127f1fe75e815aa4d64 SHA256 c61902207a7b6c7f91c1f9edcf53fa853f6fe2e377f5fd7905247b8264a92789
EBUILD xorg-server-1.4.0.90-r3.ebuild 19023 RMD160 6e6f374d79d0fb7ca2404e33314816829766085b SHA1 0c3707ddbf15604cf887843a52dcccc43c94db70 SHA256 3530c253f1087d4c7c782a2260294b0ca0d1bdd0eb11e4b1553ce93c68a1f319
-EBUILD xorg-server-1.4.0.90-r4.ebuild 18073 RMD160 91ec7eb6b104a41a0310ccec7ea3bd95e9997eb0 SHA1 98e48accd059cdcd77069ca35b5cd3f9a3e3e960 SHA256 f929b07a3387b77a5654507c8d126f1d6d18cfb8b38a4480d967469ef8d34ed1
EBUILD xorg-server-1.4.2.ebuild 17913 RMD160 6201c56afdb27a6496aa308b5e5919df81721daa SHA1 25a69e5fea191dab8d5d2429b68763967df569df SHA256 a3d6e4bd073781b82f3360cf7f1711ae085d656f96df8a903214830215735987
EBUILD xorg-server-1.4.99.902.ebuild 17595 RMD160 354412d2e44c6169e1967fdbcc552920050ef087 SHA1 fc57a9b7179aabd4c0281ef5a9770cb847cc3cf3 SHA256 3da84ccbca046dbb2184f5d5e621423d360d405c497b50d4693cf64eb6b20fa5
-MISC ChangeLog 78402 RMD160 0797152d780c53db9e752c2dbf2ff776f117a573 SHA1 cb9d0e6b81045636ef8029342f3af031f14fe3ed SHA256 ede9dd2ecfc211a27103078d37b4b2c9465aadf0e99ada2edc64f5445a32b59a
+MISC ChangeLog 83110 RMD160 38334520449010269839d15e5df4e955d99e87d0 SHA1 fb71ba36cb0389b82f0c93662422649b4f7bd63f SHA256 aef226ff71558ad76c68cb74d5112a3415e8559ef6a68ca23457b430540bd95a
MISC metadata.xml 156 RMD160 c1274bdccf57603d580de0075ba07a35b7509560 SHA1 6f78f604e3d079d39189b40aaaa1ddb06182ad91 SHA256 5101ab0d4cc8c7125eea733c44e86962769bd77acaf53b69223b9cadcdd29055
+-----BEGIN PGP SIGNATURE-----
+Version: GnuPG v2.0.9 (GNU/Linux)
+
+iEYEARECAAYFAkhQQAQACgkQXVaO67S1rtu76wCgkQWcThje5A6OwGpIG68+Pqfe
+P/cAoKpIu1RmbboSSq8dKc2FdihN74LH
+=l4sU
+-----END PGP SIGNATURE-----
diff --git a/x11-base/xorg-server/files/1.4.0.90/0001-Bug-13308-Verify-and-reject-obviously-broken-modes.patch b/x11-base/xorg-server/files/1.4.0.90/0001-Bug-13308-Verify-and-reject-obviously-broken-modes.patch
deleted file mode 100644
index 5a7c1aad6058..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0001-Bug-13308-Verify-and-reject-obviously-broken-modes.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-From f4bcb53e86bb103b6bcf8a3a170a36137c34d272 Mon Sep 17 00:00:00 2001
-From: Hong Liu <hong.liu@intel.com>
-Date: Wed, 5 Dec 2007 17:48:28 +0100
-Subject: [PATCH] Bug 13308: Verify and reject obviously broken modes.
- (cherry picked from commit c6cfcd408df3e44d0094946c0a7d2fa944b4d2d1)
-
----
- hw/xfree86/modes/xf86EdidModes.c | 6 ++++++
- 1 files changed, 6 insertions(+), 0 deletions(-)
-
-diff --git a/hw/xfree86/modes/xf86EdidModes.c b/hw/xfree86/modes/xf86EdidModes.c
-index 8b5e69d..e2ae665 100644
---- a/hw/xfree86/modes/xf86EdidModes.c
-+++ b/hw/xfree86/modes/xf86EdidModes.c
-@@ -239,6 +239,12 @@ DDCModeFromDetailedTiming(int scrnIndex, struct detailed_timings *timing,
- Mode->VSyncEnd = Mode->VSyncStart + timing->v_sync_width;
- Mode->VTotal = timing->v_active + timing->v_blanking;
-
-+ /* perform basic check on the detail timing */
-+ if (Mode->HSyncEnd > Mode->HTotal || Mode->VSyncEnd > Mode->VTotal) {
-+ xfree(Mode);
-+ return NULL;
-+ }
-+
- xf86SetModeDefaultName(Mode);
-
- /* We ignore h/v_size and h/v_border for now. */
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0002-bgPixel-unsigned-long-is-64-bit-on-x86_64-so-1.patch b/x11-base/xorg-server/files/1.4.0.90/0002-bgPixel-unsigned-long-is-64-bit-on-x86_64-so-1.patch
deleted file mode 100644
index 9ec86c51e4b0..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0002-bgPixel-unsigned-long-is-64-bit-on-x86_64-so-1.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From 41f735fbe02f59bc7bcca335c6e743c72c2fc44c Mon Sep 17 00:00:00 2001
-From: Hong Liu <hong.liu@intel.com>
-Date: Tue, 4 Sep 2007 08:46:46 +0100
-Subject: [PATCH] bgPixel (unsigned long) is 64-bit on x86_64, so -1 != 0xffffffff
-
-This patch should fix bug 8080.
-(cherry picked from commit 9adea807038b64292403ede982075fe1dcfd4c9a)
----
- hw/xfree86/xaa/xaaGC.c | 9 +++++----
- 1 files changed, 5 insertions(+), 4 deletions(-)
-
-diff --git a/hw/xfree86/xaa/xaaGC.c b/hw/xfree86/xaa/xaaGC.c
-index f3434c9..b3dc83a 100644
---- a/hw/xfree86/xaa/xaaGC.c
-+++ b/hw/xfree86/xaa/xaaGC.c
-@@ -80,10 +80,11 @@ XAAValidateGC(
- }
-
- if(pGC->depth != 32) {
-- if(pGC->bgPixel == -1) /* -1 is reserved for transparency */
-- pGC->bgPixel = 0x7fffffff;
-- if(pGC->fgPixel == -1) /* -1 is reserved for transparency */
-- pGC->fgPixel = 0x7fffffff;
-+ /* 0xffffffff is reserved for transparency */
-+ if(pGC->bgPixel == 0xffffffff)
-+ pGC->bgPixel = 0x7fffffff;
-+ if(pGC->fgPixel == 0xffffffff)
-+ pGC->fgPixel = 0x7fffffff;
- }
-
- if((pDraw->type == DRAWABLE_PIXMAP) && !IS_OFFSCREEN_PIXMAP(pDraw)){
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0003-Xprint-Clean-up-generated-files.patch b/x11-base/xorg-server/files/1.4.0.90/0003-Xprint-Clean-up-generated-files.patch
deleted file mode 100644
index 79d927ea6e0c..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0003-Xprint-Clean-up-generated-files.patch
+++ /dev/null
@@ -1,24 +0,0 @@
-From d988da6eee8422774dff364050bf431b843a714a Mon Sep 17 00:00:00 2001
-From: Arkadiusz Miskiewicz <arekm@maven.pl>
-Date: Thu, 13 Dec 2007 00:09:08 +0200
-Subject: [PATCH] Xprint: Clean up generated files
-
-Remember to clean generated wrapper files.
-(cherry picked from commit 977fcdea8198906936a64b8117e6a6d027c617e3)
----
- hw/xprint/Makefile.am | 2 ++
- 1 files changed, 2 insertions(+), 0 deletions(-)
-
-diff --git a/hw/xprint/Makefile.am b/hw/xprint/Makefile.am
-index dc8764a..f834966 100644
---- a/hw/xprint/Makefile.am
-+++ b/hw/xprint/Makefile.am
-@@ -41,3 +41,5 @@ Xprt_SOURCES = \
- $(top_srcdir)/fb/fbcmap_mi.c
-
- EXTRA_DIST = ValTree.c
-+
-+CLEANFILES = miinitext-wrapper.c dpmsstubs-wrapper.c
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0004-Config-D-Bus-Don-t-leak-timers.patch b/x11-base/xorg-server/files/1.4.0.90/0004-Config-D-Bus-Don-t-leak-timers.patch
deleted file mode 100644
index badf8a4bab30..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0004-Config-D-Bus-Don-t-leak-timers.patch
+++ /dev/null
@@ -1,44 +0,0 @@
-From 81c5950d0af8d5859f850b98c98a532784e9a757 Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Fri, 28 Dec 2007 15:47:21 +0200
-Subject: [PATCH] Config: D-Bus: Don't leak timers
-
-TimerCancel doesn't free the timer: you need TimerFree for that.
-(cherry picked from commit 25deaa7e6b29b3913b35efa39b9c8b25de5e6d95)
----
- config/dbus-core.c | 5 ++++-
- 1 files changed, 4 insertions(+), 1 deletions(-)
-
-diff --git a/config/dbus-core.c b/config/dbus-core.c
-index eab72a5..9cf1530 100644
---- a/config/dbus-core.c
-+++ b/config/dbus-core.c
-@@ -76,7 +76,7 @@ teardown(void)
- struct config_dbus_core_hook *hook;
-
- if (bus_info.timer) {
-- TimerCancel(bus_info.timer);
-+ TimerFree(bus_info.timer);
- bus_info.timer = NULL;
- }
-
-@@ -116,6 +116,8 @@ message_filter(DBusConnection *connection, DBusMessage *message, void *data)
- bus_info.connection = NULL;
- teardown();
-
-+ if (bus_info.timer)
-+ TimerFree(bus_info.timer);
- bus_info.timer = TimerSet(NULL, 0, 1, reconnect_timer, NULL);
-
- return DBUS_HANDLER_RESULT_HANDLED;
-@@ -186,6 +188,7 @@ static CARD32
- reconnect_timer(OsTimerPtr timer, CARD32 time, pointer arg)
- {
- if (connect_to_bus()) {
-+ TimerFree(bus_info.timer);
- bus_info.timer = NULL;
- return 0;
- }
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0005-Config-HAL-Don-t-leak-options-on-failure-to-add-de.patch b/x11-base/xorg-server/files/1.4.0.90/0005-Config-HAL-Don-t-leak-options-on-failure-to-add-de.patch
deleted file mode 100644
index bd49b58cbbf6..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0005-Config-HAL-Don-t-leak-options-on-failure-to-add-de.patch
+++ /dev/null
@@ -1,57 +0,0 @@
-From 30fc8053a5e734c3b70156bdae94fd7d5d7865a5 Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Fri, 28 Dec 2007 15:47:57 +0200
-Subject: [PATCH] Config: HAL: Don't leak options on failure to add device
-
-This showed up in Xephyr in particular, which denies new device requests.
-(cherry picked from commit 2bb199056edf6c63cf978d1a8ad49a57ce1938f3)
----
- config/hal.c | 11 ++++++++++-
- 1 files changed, 10 insertions(+), 1 deletions(-)
-
-diff --git a/config/hal.c b/config/hal.c
-index 4427deb..16f16ec 100644
---- a/config/hal.c
-+++ b/config/hal.c
-@@ -92,6 +92,8 @@ add_option(InputOption **options, const char *key, const char *value)
- for (; *options; options = &(*options)->next)
- ;
- *options = xcalloc(sizeof(**options), 1);
-+ if (!*options) /* Yeesh. */
-+ return;
- (*options)->key = xstrdup(key);
- (*options)->value = xstrdup(value);
- (*options)->next = NULL;
-@@ -156,7 +158,7 @@ device_added(LibHalContext *hal_ctx, const char *udi)
- char *path = NULL, *driver = NULL, *name = NULL, *xkb_rules = NULL;
- char *xkb_model = NULL, *xkb_layout = NULL, *xkb_variant = NULL;
- char *xkb_options = NULL, *config_info = NULL;
-- InputOption *options = NULL;
-+ InputOption *options = NULL, *tmpo = NULL;
- DeviceIntPtr dev;
- DBusError error;
- int type = TYPE_NONE;
-@@ -232,6 +234,7 @@ device_added(LibHalContext *hal_ctx, const char *udi)
-
- if (NewInputDeviceRequest(options, &dev) != Success) {
- DebugF("[config/hal] NewInputDeviceRequest failed\n");
-+ dev = NULL;
- goto unwind;
- }
-
-@@ -255,6 +258,12 @@ unwind:
- xfree(xkb_options);
- if (config_info)
- xfree(config_info);
-+ while (!dev && (tmpo = options)) {
-+ options = tmpo->next;
-+ xfree(tmpo->key);
-+ xfree(tmpo->value);
-+ xfree(tmpo);
-+ }
-
- out_error:
- dbus_error_free(&error);
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0006-OS-Don-t-leak-connection-translation-table-on-regen.patch b/x11-base/xorg-server/files/1.4.0.90/0006-OS-Don-t-leak-connection-translation-table-on-regen.patch
deleted file mode 100644
index d688b5bea13f..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0006-OS-Don-t-leak-connection-translation-table-on-regen.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-From 38d8cfaaff0ae6273d9e921aae08b2706355f0d2 Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Fri, 28 Dec 2007 15:48:25 +0200
-Subject: [PATCH] OS: Don't leak connection translation table on regeneration
- (cherry picked from commit e868e0bc0d2318e62707d3ae68532b0029959154)
-
----
- os/connection.c | 3 ++-
- 1 files changed, 2 insertions(+), 1 deletions(-)
-
-diff --git a/os/connection.c b/os/connection.c
-index b944593..d1ba845 100644
---- a/os/connection.c
-+++ b/os/connection.c
-@@ -353,7 +353,8 @@ InitConnectionLimits(void)
- #endif
-
- #if !defined(WIN32)
-- ConnectionTranslation = (int *)xnfalloc(sizeof(int)*(lastfdesc + 1));
-+ if (!ConnectionTranslation)
-+ ConnectionTranslation = (int *)xnfalloc(sizeof(int)*(lastfdesc + 1));
- #else
- InitConnectionTranslation();
- #endif
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0007-KDrive-Xephyr-Don-t-leak-screen-damage-structure.patch b/x11-base/xorg-server/files/1.4.0.90/0007-KDrive-Xephyr-Don-t-leak-screen-damage-structure.patch
deleted file mode 100644
index 73b0fdb7302b..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0007-KDrive-Xephyr-Don-t-leak-screen-damage-structure.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-From a304fc1d4a7062f65161ef8748fd358639ec73de Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Fri, 28 Dec 2007 15:48:57 +0200
-Subject: [PATCH] KDrive: Xephyr: Don't leak screen damage structure
- (cherry picked from commit 0b03d97a244540824c922c300adbc3d3ae4855d5)
-
----
- hw/kdrive/ephyr/ephyr.c | 1 +
- 1 files changed, 1 insertions(+), 0 deletions(-)
-
-diff --git a/hw/kdrive/ephyr/ephyr.c b/hw/kdrive/ephyr/ephyr.c
-index e8001df..27165a5 100644
---- a/hw/kdrive/ephyr/ephyr.c
-+++ b/hw/kdrive/ephyr/ephyr.c
-@@ -394,6 +394,7 @@ ephyrUnsetInternalDamage (ScreenPtr pScreen)
-
- pPixmap = (*pScreen->GetScreenPixmap) (pScreen);
- DamageUnregister (&pPixmap->drawable, scrpriv->pDamage);
-+ DamageDestroy (scrpriv->pDamage);
-
- RemoveBlockAndWakeupHandlers (ephyrInternalDamageBlockHandler,
- ephyrInternalDamageWakeupHandler,
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0008-Input-Don-t-reinit-devices.patch b/x11-base/xorg-server/files/1.4.0.90/0008-Input-Don-t-reinit-devices.patch
deleted file mode 100644
index 1ecac07ccb57..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0008-Input-Don-t-reinit-devices.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-From 102c012c206cbb3bbf0fa5b0c8f0ce2ce9bba72a Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Fri, 28 Dec 2007 15:49:50 +0200
-Subject: [PATCH] Input: Don't reinit devices
-
-If a device is already initialised (i.e. the virtual core devices) during
-IASD, don't init them again. This fixes a leak.
-(cherry picked from commit 1f6015c8fe62c28cfaa82cc855b5b9c28fd34607)
----
- dix/devices.c | 3 ++-
- 1 files changed, 2 insertions(+), 1 deletions(-)
-
-diff --git a/dix/devices.c b/dix/devices.c
-index 287d730..f6f3c8e 100644
---- a/dix/devices.c
-+++ b/dix/devices.c
-@@ -473,7 +473,8 @@ InitAndStartDevices(void)
-
- for (dev = inputInfo.off_devices; dev; dev = dev->next) {
- DebugF("(dix) initialising device %d\n", dev->id);
-- ActivateDevice(dev);
-+ if (!dev->inited)
-+ ActivateDevice(dev);
- }
- for (dev = inputInfo.off_devices; dev; dev = next)
- {
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0009-include-never-overwrite-realInputProc-with-enqueueI.patch b/x11-base/xorg-server/files/1.4.0.90/0009-include-never-overwrite-realInputProc-with-enqueueI.patch
deleted file mode 100644
index aa9019b64f2e..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0009-include-never-overwrite-realInputProc-with-enqueueI.patch
+++ /dev/null
@@ -1,37 +0,0 @@
-From 60144ac814ee26e151186f7c93cb1a273468d497 Mon Sep 17 00:00:00 2001
-From: Peter Hutterer <peter@cs.unisa.edu.au>
-Date: Wed, 19 Dec 2007 16:20:36 +1030
-Subject: [PATCH] include: never overwrite realInputProc with enqueueInputProc. Bug #13511
-
-In some cases (triggered by a key repeat during a sync grab) XKB unwrapping
-can overwrite the device's realInputProc with the enqueueInputProc. When the
-grab is released and the events are replayed, we end up in an infinite loop.
-Each event is replayed and in replaying pushed to the end of the queue again.
-
-This fix is a hack only. It ensures that the realInputProc is never
-overwritten with the enqueueInputProc.
-
-This fixes Bug #13511 (https://bugs.freedesktop.org/show_bug.cgi?id=13511)
-(cherry picked from commit eace88989c3b65d5c20e9f37ea9b23c7c8e19335)
-(cherry picked from commit 50e80c39870adfdc84fdbc00dddf1362117ad443)
----
- include/xkbsrv.h | 3 ++-
- 1 files changed, 2 insertions(+), 1 deletions(-)
-
-diff --git a/include/xkbsrv.h b/include/xkbsrv.h
-index 167dbec..9174eb6 100644
---- a/include/xkbsrv.h
-+++ b/include/xkbsrv.h
-@@ -258,7 +258,8 @@ typedef struct
- device->public.processInputProc = proc; \
- oldprocs->processInputProc = \
- oldprocs->realInputProc = device->public.realInputProc; \
-- device->public.realInputProc = proc; \
-+ if (proc != device->public.enqueueInputProc) \
-+ device->public.realInputProc = proc; \
- oldprocs->unwrapProc = device->unwrapProc; \
- device->unwrapProc = unwrapproc;
-
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0010-OS-IO-Zero-out-client-buffers.patch b/x11-base/xorg-server/files/1.4.0.90/0010-OS-IO-Zero-out-client-buffers.patch
deleted file mode 100644
index 2102d4bef552..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0010-OS-IO-Zero-out-client-buffers.patch
+++ /dev/null
@@ -1,28 +0,0 @@
-From 02e805f0ff4b6af551372ba5fc5fb369c8834d1d Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Sat, 5 Jan 2008 10:38:16 +0200
-Subject: [PATCH] OS: IO: Zero out client buffers
-
-For alignment reasons, we can write out uninitialised bytes, so allocate
-the whole thing with xcalloc.
-(cherry picked from commit b99a43dfe97c1813e1c61f298b1c83c5d5ca88a2)
----
- os/io.c | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/os/io.c b/os/io.c
-index 9de75ee..a8b84fb 100644
---- a/os/io.c
-+++ b/os/io.c
-@@ -1197,7 +1197,7 @@ AllocateOutputBuffer(void)
- oco = (ConnectionOutputPtr)xalloc(sizeof(ConnectionOutput));
- if (!oco)
- return (ConnectionOutputPtr)NULL;
-- oco->buf = (unsigned char *) xalloc(BUFSIZE);
-+ oco->buf = (unsigned char *) xcalloc(1, BUFSIZE);
- if (!oco->buf)
- {
- xfree(oco);
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0011-XKB-XkbCopyKeymap-Don-t-leak-all-the-sections.patch b/x11-base/xorg-server/files/1.4.0.90/0011-XKB-XkbCopyKeymap-Don-t-leak-all-the-sections.patch
deleted file mode 100644
index 9aa87c8a9985..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0011-XKB-XkbCopyKeymap-Don-t-leak-all-the-sections.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-From 8a3acd3ec41b887b4aeaa0b2932265522c1e2836 Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Sat, 5 Jan 2008 10:43:53 +0200
-Subject: [PATCH] XKB: XkbCopyKeymap: Don't leak all the sections
-
-Previously, we'd just keep num_sections at 0, which would break the
-geometry and lead us to leak sections. Don't do that.
-(cherry picked from commit 0137b0394a248f694448a7d97c9a1a3efcf24e81)
----
- xkb/xkbUtils.c | 1 +
- 1 files changed, 1 insertions(+), 0 deletions(-)
-
-diff --git a/xkb/xkbUtils.c b/xkb/xkbUtils.c
-index c7f9a26..e90df0d 100644
---- a/xkb/xkbUtils.c
-+++ b/xkb/xkbUtils.c
-@@ -1770,6 +1770,7 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- if (!tmp)
- return FALSE;
- dst->geom->sections = tmp;
-+ dst->geom->num_sections = src->geom->num_sections;
-
- for (i = 0,
- ssection = src->geom->sections,
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0012-Xephyr-One-time-keyboard-leak-fix.patch b/x11-base/xorg-server/files/1.4.0.90/0012-Xephyr-One-time-keyboard-leak-fix.patch
deleted file mode 100644
index a26dce5bf835..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0012-Xephyr-One-time-keyboard-leak-fix.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-From 636aa9e7be2822a0148067a11499ad48fe682cd9 Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Sat, 5 Jan 2008 10:47:39 +0200
-Subject: [PATCH] Xephyr: One-time keyboard leak fix
-
-Don't leak the originally-allocated keysym map.
-(cherry picked from commit e85130c85f727466fc27be1cfa46c88b257499fb)
----
- hw/kdrive/ephyr/ephyr.c | 1 +
- 1 files changed, 1 insertions(+), 0 deletions(-)
-
-diff --git a/hw/kdrive/ephyr/ephyr.c b/hw/kdrive/ephyr/ephyr.c
-index 27165a5..86e8f1f 100644
---- a/hw/kdrive/ephyr/ephyr.c
-+++ b/hw/kdrive/ephyr/ephyr.c
-@@ -915,6 +915,7 @@ EphyrKeyboardInit (KdKeyboardInfo *ki)
- ki->minScanCode = ki->keySyms.minKeyCode;
- ki->maxScanCode = ki->keySyms.maxKeyCode;
- ki->keySyms.mapWidth = ephyrKeySyms.mapWidth;
-+ xfree(ki->keySyms.map);
- ki->keySyms.map = ephyrKeySyms.map;
- ki->name = KdSaveString("Xephyr virtual keyboard");
- ephyrKbd = ki;
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0013-Fix-for-CVE-2007-5760-XFree86-Misc-extension-out-o.patch b/x11-base/xorg-server/files/1.4.0.90/0013-Fix-for-CVE-2007-5760-XFree86-Misc-extension-out-o.patch
deleted file mode 100644
index e63fc49b8378..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0013-Fix-for-CVE-2007-5760-XFree86-Misc-extension-out-o.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-From 59a3b83922c810316a374a19484b24901c7437ae Mon Sep 17 00:00:00 2001
-From: Matthieu Herrb <matthieu@bluenote.herrb.com>
-Date: Thu, 17 Jan 2008 15:26:41 +0100
-Subject: [PATCH] Fix for CVE-2007-5760 - XFree86 Misc extension out of bounds array index
-
----
- hw/xfree86/common/xf86MiscExt.c | 4 ++++
- 1 files changed, 4 insertions(+), 0 deletions(-)
-
-diff --git a/hw/xfree86/common/xf86MiscExt.c b/hw/xfree86/common/xf86MiscExt.c
-index c1b9c60..40c196a 100644
---- a/hw/xfree86/common/xf86MiscExt.c
-+++ b/hw/xfree86/common/xf86MiscExt.c
-@@ -548,6 +548,10 @@ MiscExtPassMessage(int scrnIndex, const char *msgtype, const char *msgval,
- {
- ScrnInfoPtr pScr = xf86Screens[scrnIndex];
-
-+ /* should check this in the protocol, but xf86NumScreens isn't exported */
-+ if (scrnIndex >= xf86NumScreens)
-+ return BadValue;
-+
- if (*pScr->HandleMessage == NULL)
- return BadImplementation;
- return (*pScr->HandleMessage)(scrnIndex, msgtype, msgval, retstr);
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0014-Fix-for-CVE-2007-6428-TOG-cup-extension-memory-cor.patch b/x11-base/xorg-server/files/1.4.0.90/0014-Fix-for-CVE-2007-6428-TOG-cup-extension-memory-cor.patch
deleted file mode 100644
index c5d0a946ea4f..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0014-Fix-for-CVE-2007-6428-TOG-cup-extension-memory-cor.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-From 4848d49d05a318559afe7a17a19ba055947ee1f5 Mon Sep 17 00:00:00 2001
-From: Matthieu Herrb <matthieu@bluenote.herrb.com>
-Date: Thu, 17 Jan 2008 15:28:03 +0100
-Subject: [PATCH] Fix for CVE-2007-6428 - TOG-cup extension memory corruption.
-
----
- Xext/cup.c | 3 +++
- 1 files changed, 3 insertions(+), 0 deletions(-)
-
-diff --git a/Xext/cup.c b/Xext/cup.c
-index 6bfa278..781b9ce 100644
---- a/Xext/cup.c
-+++ b/Xext/cup.c
-@@ -196,6 +196,9 @@ int ProcGetReservedColormapEntries(
-
- REQUEST_SIZE_MATCH (xXcupGetReservedColormapEntriesReq);
-
-+ if (stuff->screen >= screenInfo.numScreens)
-+ return BadValue;
-+
- #ifndef HAVE_SPECIAL_DESKTOP_COLORS
- citems[CUP_BLACK_PIXEL].pixel =
- screenInfo.screens[stuff->screen]->blackPixel;
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0015-Fix-for-CVE-2007-6427-Xinput-extension-memory-corr.patch b/x11-base/xorg-server/files/1.4.0.90/0015-Fix-for-CVE-2007-6427-Xinput-extension-memory-corr.patch
deleted file mode 100644
index b69a980f7f76..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0015-Fix-for-CVE-2007-6427-Xinput-extension-memory-corr.patch
+++ /dev/null
@@ -1,262 +0,0 @@
-From d244c8272e0ac47c41a9416e37293903b842a78b Mon Sep 17 00:00:00 2001
-From: Matthieu Herrb <matthieu@bluenote.herrb.com>
-Date: Thu, 17 Jan 2008 15:27:34 +0100
-Subject: [PATCH] Fix for CVE-2007-6427 - Xinput extension memory corruption.
-
----
- Xi/chgfctl.c | 7 +------
- Xi/chgkmap.c | 13 ++++++-------
- Xi/chgprop.c | 10 +++-------
- Xi/grabdev.c | 12 +++++-------
- Xi/grabdevb.c | 10 +++-------
- Xi/grabdevk.c | 9 ++-------
- Xi/selectev.c | 11 ++++-------
- Xi/sendexev.c | 14 ++++++++------
- 8 files changed, 32 insertions(+), 54 deletions(-)
-
-diff --git a/Xi/chgfctl.c b/Xi/chgfctl.c
-index 2e0e13c..235d659 100644
---- a/Xi/chgfctl.c
-+++ b/Xi/chgfctl.c
-@@ -327,18 +327,13 @@ ChangeStringFeedback(ClientPtr client, DeviceIntPtr dev,
- xStringFeedbackCtl * f)
- {
- char n;
-- long *p;
- int i, j;
- KeySym *syms, *sup_syms;
-
- syms = (KeySym *) (f + 1);
- if (client->swapped) {
- swaps(&f->length, n); /* swapped num_keysyms in calling proc */
-- p = (long *)(syms);
-- for (i = 0; i < f->num_keysyms; i++) {
-- swapl(p, n);
-- p++;
-- }
-+ SwapLongs((CARD32 *) syms, f->num_keysyms);
- }
-
- if (f->num_keysyms > s->ctrl.max_symbols) {
-diff --git a/Xi/chgkmap.c b/Xi/chgkmap.c
-index eac520f..f8f85bc 100644
---- a/Xi/chgkmap.c
-+++ b/Xi/chgkmap.c
-@@ -79,18 +79,14 @@ int
- SProcXChangeDeviceKeyMapping(ClientPtr client)
- {
- char n;
-- long *p;
-- int i, count;
-+ unsigned int count;
-
- REQUEST(xChangeDeviceKeyMappingReq);
- swaps(&stuff->length, n);
- REQUEST_AT_LEAST_SIZE(xChangeDeviceKeyMappingReq);
-- p = (long *)&stuff[1];
- count = stuff->keyCodes * stuff->keySymsPerKeyCode;
-- for (i = 0; i < count; i++) {
-- swapl(p, n);
-- p++;
-- }
-+ REQUEST_FIXED_SIZE(xChangeDeviceKeyMappingReq, count * sizeof(CARD32));
-+ SwapLongs((CARD32 *) (&stuff[1]), count);
- return (ProcXChangeDeviceKeyMapping(client));
- }
-
-@@ -106,10 +102,13 @@ ProcXChangeDeviceKeyMapping(ClientPtr client)
- int ret;
- unsigned len;
- DeviceIntPtr dev;
-+ unsigned int count;
-
- REQUEST(xChangeDeviceKeyMappingReq);
- REQUEST_AT_LEAST_SIZE(xChangeDeviceKeyMappingReq);
-
-+ count = stuff->keyCodes * stuff->keySymsPerKeyCode;
-+ REQUEST_FIXED_SIZE(xChangeDeviceKeyMappingReq, count * sizeof(CARD32));
- dev = LookupDeviceIntRec(stuff->deviceid);
- if (dev == NULL) {
- SendErrorToClient(client, IReqCode, X_ChangeDeviceKeyMapping, 0,
-diff --git a/Xi/chgprop.c b/Xi/chgprop.c
-index 59a93c6..21bda5b 100644
---- a/Xi/chgprop.c
-+++ b/Xi/chgprop.c
-@@ -81,19 +81,15 @@ int
- SProcXChangeDeviceDontPropagateList(ClientPtr client)
- {
- char n;
-- long *p;
-- int i;
-
- REQUEST(xChangeDeviceDontPropagateListReq);
- swaps(&stuff->length, n);
- REQUEST_AT_LEAST_SIZE(xChangeDeviceDontPropagateListReq);
- swapl(&stuff->window, n);
- swaps(&stuff->count, n);
-- p = (long *)&stuff[1];
-- for (i = 0; i < stuff->count; i++) {
-- swapl(p, n);
-- p++;
-- }
-+ REQUEST_FIXED_SIZE(xChangeDeviceDontPropagateListReq,
-+ stuff->count * sizeof(CARD32));
-+ SwapLongs((CARD32 *) (&stuff[1]), stuff->count);
- return (ProcXChangeDeviceDontPropagateList(client));
- }
-
-diff --git a/Xi/grabdev.c b/Xi/grabdev.c
-index e2809ef..d0b4ae7 100644
---- a/Xi/grabdev.c
-+++ b/Xi/grabdev.c
-@@ -82,8 +82,6 @@ int
- SProcXGrabDevice(ClientPtr client)
- {
- char n;
-- long *p;
-- int i;
-
- REQUEST(xGrabDeviceReq);
- swaps(&stuff->length, n);
-@@ -91,11 +89,11 @@ SProcXGrabDevice(ClientPtr client)
- swapl(&stuff->grabWindow, n);
- swapl(&stuff->time, n);
- swaps(&stuff->event_count, n);
-- p = (long *)&stuff[1];
-- for (i = 0; i < stuff->event_count; i++) {
-- swapl(p, n);
-- p++;
-- }
-+
-+ if (stuff->length != (sizeof(xGrabDeviceReq) >> 2) + stuff->event_count)
-+ return BadLength;
-+
-+ SwapLongs((CARD32 *) (&stuff[1]), stuff->event_count);
-
- return (ProcXGrabDevice(client));
- }
-diff --git a/Xi/grabdevb.c b/Xi/grabdevb.c
-index df62d0c..18db1f7 100644
---- a/Xi/grabdevb.c
-+++ b/Xi/grabdevb.c
-@@ -80,8 +80,6 @@ int
- SProcXGrabDeviceButton(ClientPtr client)
- {
- char n;
-- long *p;
-- int i;
-
- REQUEST(xGrabDeviceButtonReq);
- swaps(&stuff->length, n);
-@@ -89,11 +87,9 @@ SProcXGrabDeviceButton(ClientPtr client)
- swapl(&stuff->grabWindow, n);
- swaps(&stuff->modifiers, n);
- swaps(&stuff->event_count, n);
-- p = (long *)&stuff[1];
-- for (i = 0; i < stuff->event_count; i++) {
-- swapl(p, n);
-- p++;
-- }
-+ REQUEST_FIXED_SIZE(xGrabDeviceButtonReq,
-+ stuff->event_count * sizeof(CARD32));
-+ SwapLongs((CARD32 *) (&stuff[1]), stuff->event_count);
-
- return (ProcXGrabDeviceButton(client));
- }
-diff --git a/Xi/grabdevk.c b/Xi/grabdevk.c
-index b74592f..429b2f7 100644
---- a/Xi/grabdevk.c
-+++ b/Xi/grabdevk.c
-@@ -80,8 +80,6 @@ int
- SProcXGrabDeviceKey(ClientPtr client)
- {
- char n;
-- long *p;
-- int i;
-
- REQUEST(xGrabDeviceKeyReq);
- swaps(&stuff->length, n);
-@@ -89,11 +87,8 @@ SProcXGrabDeviceKey(ClientPtr client)
- swapl(&stuff->grabWindow, n);
- swaps(&stuff->modifiers, n);
- swaps(&stuff->event_count, n);
-- p = (long *)&stuff[1];
-- for (i = 0; i < stuff->event_count; i++) {
-- swapl(p, n);
-- p++;
-- }
-+ REQUEST_FIXED_SIZE(xGrabDeviceKeyReq, stuff->event_count * sizeof(CARD32));
-+ SwapLongs((CARD32 *) (&stuff[1]), stuff->event_count);
- return (ProcXGrabDeviceKey(client));
- }
-
-diff --git a/Xi/selectev.c b/Xi/selectev.c
-index d52db1b..19415c5 100644
---- a/Xi/selectev.c
-+++ b/Xi/selectev.c
-@@ -131,19 +131,16 @@ int
- SProcXSelectExtensionEvent(ClientPtr client)
- {
- char n;
-- long *p;
-- int i;
-
- REQUEST(xSelectExtensionEventReq);
- swaps(&stuff->length, n);
- REQUEST_AT_LEAST_SIZE(xSelectExtensionEventReq);
- swapl(&stuff->window, n);
- swaps(&stuff->count, n);
-- p = (long *)&stuff[1];
-- for (i = 0; i < stuff->count; i++) {
-- swapl(p, n);
-- p++;
-- }
-+ REQUEST_FIXED_SIZE(xSelectExtensionEventReq,
-+ stuff->count * sizeof(CARD32));
-+ SwapLongs((CARD32 *) (&stuff[1]), stuff->count);
-+
- return (ProcXSelectExtensionEvent(client));
- }
-
-diff --git a/Xi/sendexev.c b/Xi/sendexev.c
-index eac9abe..9803cf3 100644
---- a/Xi/sendexev.c
-+++ b/Xi/sendexev.c
-@@ -83,7 +83,7 @@ int
- SProcXSendExtensionEvent(ClientPtr client)
- {
- char n;
-- long *p;
-+ CARD32 *p;
- int i;
- xEvent eventT;
- xEvent *eventP;
-@@ -94,6 +94,11 @@ SProcXSendExtensionEvent(ClientPtr client)
- REQUEST_AT_LEAST_SIZE(xSendExtensionEventReq);
- swapl(&stuff->destination, n);
- swaps(&stuff->count, n);
-+
-+ if (stuff->length != (sizeof(xSendExtensionEventReq) >> 2) + stuff->count +
-+ (stuff->num_events * (sizeof(xEvent) >> 2)))
-+ return BadLength;
-+
- eventP = (xEvent *) & stuff[1];
- for (i = 0; i < stuff->num_events; i++, eventP++) {
- proc = EventSwapVector[eventP->u.u.type & 0177];
-@@ -103,11 +108,8 @@ SProcXSendExtensionEvent(ClientPtr client)
- *eventP = eventT;
- }
-
-- p = (long *)(((xEvent *) & stuff[1]) + stuff->num_events);
-- for (i = 0; i < stuff->count; i++) {
-- swapl(p, n);
-- p++;
-- }
-+ p = (CARD32 *)(((xEvent *) & stuff[1]) + stuff->num_events);
-+ SwapLongs(p, stuff->count);
- return (ProcXSendExtensionEvent(client));
- }
-
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0016-Fix-for-CVE-2007-6429-MIT-SHM-and-EVI-extensions-i.patch b/x11-base/xorg-server/files/1.4.0.90/0016-Fix-for-CVE-2007-6429-MIT-SHM-and-EVI-extensions-i.patch
deleted file mode 100644
index 48448dd550ba..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0016-Fix-for-CVE-2007-6429-MIT-SHM-and-EVI-extensions-i.patch
+++ /dev/null
@@ -1,210 +0,0 @@
-From 8b14f7b74284900b95a319ec80c4333e63af2296 Mon Sep 17 00:00:00 2001
-From: Matthieu Herrb <matthieu@bluenote.herrb.com>
-Date: Thu, 17 Jan 2008 15:28:42 +0100
-Subject: [PATCH] Fix for CVE-2007-6429 - MIT-SHM and EVI extensions integer overflows.
-
----
- Xext/EVI.c | 15 ++++++++++++++-
- Xext/sampleEVI.c | 29 ++++++++++++++++++++++++-----
- Xext/shm.c | 46 ++++++++++++++++++++++++++++++++++++++--------
- 3 files changed, 76 insertions(+), 14 deletions(-)
-
-diff --git a/Xext/EVI.c b/Xext/EVI.c
-index 8fe3481..13bd32a 100644
---- a/Xext/EVI.c
-+++ b/Xext/EVI.c
-@@ -34,6 +34,7 @@ THE USE OR PERFORMANCE OF THIS SOFTWARE.
- #include <X11/extensions/XEVIstr.h>
- #include "EVIstruct.h"
- #include "modinit.h"
-+#include "scrnintstr.h"
-
- #if 0
- static unsigned char XEVIReqCode = 0;
-@@ -87,10 +88,22 @@ ProcEVIGetVisualInfo(ClientPtr client)
- {
- REQUEST(xEVIGetVisualInfoReq);
- xEVIGetVisualInfoReply rep;
-- int n, n_conflict, n_info, sz_info, sz_conflict;
-+ int i, n, n_conflict, n_info, sz_info, sz_conflict;
- VisualID32 *conflict;
-+ unsigned int total_visuals = 0;
- xExtendedVisualInfo *eviInfo;
- int status;
-+
-+ /*
-+ * do this first, otherwise REQUEST_FIXED_SIZE can overflow. we assume
-+ * here that you don't have more than 2^32 visuals over all your screens;
-+ * this seems like a safe assumption.
-+ */
-+ for (i = 0; i < screenInfo.numScreens; i++)
-+ total_visuals += screenInfo.screens[i]->numVisuals;
-+ if (stuff->n_visual > total_visuals)
-+ return BadValue;
-+
- REQUEST_FIXED_SIZE(xEVIGetVisualInfoReq, stuff->n_visual * sz_VisualID32);
- status = eviPriv->getVisualInfo((VisualID32 *)&stuff[1], (int)stuff->n_visual,
- &eviInfo, &n_info, &conflict, &n_conflict);
-diff --git a/Xext/sampleEVI.c b/Xext/sampleEVI.c
-index 7508aa7..b871bfd 100644
---- a/Xext/sampleEVI.c
-+++ b/Xext/sampleEVI.c
-@@ -34,6 +34,13 @@ THE USE OR PERFORMANCE OF THIS SOFTWARE.
- #include <X11/extensions/XEVIstr.h>
- #include "EVIstruct.h"
- #include "scrnintstr.h"
-+
-+#if HAVE_STDINT_H
-+#include <stdint.h>
-+#elif !defined(UINT32_MAX)
-+#define UINT32_MAX 0xffffffffU
-+#endif
-+
- static int sampleGetVisualInfo(
- VisualID32 *visual,
- int n_visual,
-@@ -42,24 +49,36 @@ static int sampleGetVisualInfo(
- VisualID32 **conflict_rn,
- int *n_conflict_rn)
- {
-- int max_sz_evi = n_visual * sz_xExtendedVisualInfo * screenInfo.numScreens;
-+ unsigned int max_sz_evi;
- VisualID32 *temp_conflict;
- xExtendedVisualInfo *evi;
-- int max_visuals = 0, max_sz_conflict, sz_conflict = 0;
-+ unsigned int max_visuals = 0, max_sz_conflict, sz_conflict = 0;
- register int visualI, scrI, sz_evi = 0, conflictI, n_conflict;
-- *evi_rn = evi = (xExtendedVisualInfo *)xalloc(max_sz_evi);
-- if (!*evi_rn)
-- return BadAlloc;
-+
-+ if (n_visual > UINT32_MAX/(sz_xExtendedVisualInfo * screenInfo.numScreens))
-+ return BadAlloc;
-+ max_sz_evi = n_visual * sz_xExtendedVisualInfo * screenInfo.numScreens;
-+
- for (scrI = 0; scrI < screenInfo.numScreens; scrI++) {
- if (screenInfo.screens[scrI]->numVisuals > max_visuals)
- max_visuals = screenInfo.screens[scrI]->numVisuals;
- }
-+
-+ if (n_visual > UINT32_MAX/(sz_VisualID32 * screenInfo.numScreens
-+ * max_visuals))
-+ return BadAlloc;
- max_sz_conflict = n_visual * sz_VisualID32 * screenInfo.numScreens * max_visuals;
-+
-+ *evi_rn = evi = (xExtendedVisualInfo *)xalloc(max_sz_evi);
-+ if (!*evi_rn)
-+ return BadAlloc;
-+
- temp_conflict = (VisualID32 *)xalloc(max_sz_conflict);
- if (!temp_conflict) {
- xfree(*evi_rn);
- return BadAlloc;
- }
-+
- for (scrI = 0; scrI < screenInfo.numScreens; scrI++) {
- for (visualI = 0; visualI < n_visual; visualI++) {
- evi[sz_evi].core_visual_id = visual[visualI];
-diff --git a/Xext/shm.c b/Xext/shm.c
-index ac587be..5633be9 100644
---- a/Xext/shm.c
-+++ b/Xext/shm.c
-@@ -711,6 +711,8 @@ ProcPanoramiXShmCreatePixmap(
- int i, j, result, rc;
- ShmDescPtr shmdesc;
- REQUEST(xShmCreatePixmapReq);
-+ unsigned int width, height, depth;
-+ unsigned long size;
- PanoramiXRes *newPix;
-
- REQUEST_SIZE_MATCH(xShmCreatePixmapReq);
-@@ -724,11 +726,26 @@ ProcPanoramiXShmCreatePixmap(
- return rc;
-
- VERIFY_SHMPTR(stuff->shmseg, stuff->offset, TRUE, shmdesc, client);
-- if (!stuff->width || !stuff->height)
-+
-+ width = stuff->width;
-+ height = stuff->height;
-+ depth = stuff->depth;
-+ if (!width || !height || !depth)
- {
- client->errorValue = 0;
- return BadValue;
- }
-+ if (width > 32767 || height > 32767)
-+ return BadAlloc;
-+ size = PixmapBytePad(width, depth) * height;
-+ if (sizeof(size) == 4) {
-+ if (size < width * height)
-+ return BadAlloc;
-+ /* thankfully, offset is unsigned */
-+ if (stuff->offset + size < size)
-+ return BadAlloc;
-+ }
-+
- if (stuff->depth != 1)
- {
- pDepth = pDraw->pScreen->allowedDepths;
-@@ -739,9 +756,7 @@ ProcPanoramiXShmCreatePixmap(
- return BadValue;
- }
- CreatePmap:
-- VERIFY_SHMSIZE(shmdesc, stuff->offset,
-- PixmapBytePad(stuff->width, stuff->depth) * stuff->height,
-- client);
-+ VERIFY_SHMSIZE(shmdesc, stuff->offset, size, client);
-
- if(!(newPix = (PanoramiXRes *) xalloc(sizeof(PanoramiXRes))))
- return BadAlloc;
-@@ -1040,6 +1055,8 @@ ProcShmCreatePixmap(client)
- register int i, rc;
- ShmDescPtr shmdesc;
- REQUEST(xShmCreatePixmapReq);
-+ unsigned int width, height, depth;
-+ unsigned long size;
-
- REQUEST_SIZE_MATCH(xShmCreatePixmapReq);
- client->errorValue = stuff->pid;
-@@ -1052,11 +1069,26 @@ ProcShmCreatePixmap(client)
- return rc;
-
- VERIFY_SHMPTR(stuff->shmseg, stuff->offset, TRUE, shmdesc, client);
-- if (!stuff->width || !stuff->height)
-+
-+ width = stuff->width;
-+ height = stuff->height;
-+ depth = stuff->depth;
-+ if (!width || !height || !depth)
- {
- client->errorValue = 0;
- return BadValue;
- }
-+ if (width > 32767 || height > 32767)
-+ return BadAlloc;
-+ size = PixmapBytePad(width, depth) * height;
-+ if (sizeof(size) == 4) {
-+ if (size < width * height)
-+ return BadAlloc;
-+ /* thankfully, offset is unsigned */
-+ if (stuff->offset + size < size)
-+ return BadAlloc;
-+ }
-+
- if (stuff->depth != 1)
- {
- pDepth = pDraw->pScreen->allowedDepths;
-@@ -1067,9 +1099,7 @@ ProcShmCreatePixmap(client)
- return BadValue;
- }
- CreatePmap:
-- VERIFY_SHMSIZE(shmdesc, stuff->offset,
-- PixmapBytePad(stuff->width, stuff->depth) * stuff->height,
-- client);
-+ VERIFY_SHMSIZE(shmdesc, stuff->offset, size, client);
- pMap = (*shmFuncs[pDraw->pScreen->myNum]->CreatePixmap)(
- pDraw->pScreen, stuff->width,
- stuff->height, stuff->depth,
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0017-Fix-for-CVE-2008-0006-PCF-Font-parser-buffer-overf.patch b/x11-base/xorg-server/files/1.4.0.90/0017-Fix-for-CVE-2008-0006-PCF-Font-parser-buffer-overf.patch
deleted file mode 100644
index c16294c055f4..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0017-Fix-for-CVE-2008-0006-PCF-Font-parser-buffer-overf.patch
+++ /dev/null
@@ -1,30 +0,0 @@
-From f09b8007e7f6e60e0b9c9665ec632b578ae08b6f Mon Sep 17 00:00:00 2001
-From: Matthieu Herrb <matthieu@bluenote.herrb.com>
-Date: Thu, 17 Jan 2008 15:29:06 +0100
-Subject: [PATCH] Fix for CVE-2008-0006 - PCF Font parser buffer overflow.
-
----
- dix/dixfonts.c | 7 +++++++
- 1 files changed, 7 insertions(+), 0 deletions(-)
-
-diff --git a/dix/dixfonts.c b/dix/dixfonts.c
-index c21b3ec..7bb2404 100644
---- a/dix/dixfonts.c
-+++ b/dix/dixfonts.c
-@@ -325,6 +325,13 @@ doOpenFont(ClientPtr client, OFclosurePtr c)
- err = BadFontName;
- goto bail;
- }
-+ /* check values for firstCol, lastCol, firstRow, and lastRow */
-+ if (pfont->info.firstCol > pfont->info.lastCol ||
-+ pfont->info.firstRow > pfont->info.lastRow ||
-+ pfont->info.lastCol - pfont->info.firstCol > 255) {
-+ err = AllocError;
-+ goto bail;
-+ }
- if (!pfont->fpe)
- pfont->fpe = fpe;
- pfont->refcnt++;
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0018-Fix-for-CVE-2007-5958-File-existence-disclosure.patch b/x11-base/xorg-server/files/1.4.0.90/0018-Fix-for-CVE-2007-5958-File-existence-disclosure.patch
deleted file mode 100644
index 889e57adc3e7..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0018-Fix-for-CVE-2007-5958-File-existence-disclosure.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From 19b95cdd1d14a1e7d1abba1880ab023c96f19bf5 Mon Sep 17 00:00:00 2001
-From: Matthieu Herrb <matthieu@bluenote.herrb.com>
-Date: Thu, 17 Jan 2008 17:03:39 +0100
-Subject: [PATCH] Fix for CVE-2007-5958 - File existence disclosure.
-
----
- Xext/security.c | 4 ++--
- 1 files changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/Xext/security.c b/Xext/security.c
-index ba057de..e9d48c9 100644
---- a/Xext/security.c
-+++ b/Xext/security.c
-@@ -1563,7 +1563,7 @@ SecurityLoadPropertyAccessList(void)
- if (!SecurityPolicyFile)
- return;
-
-- f = fopen(SecurityPolicyFile, "r");
-+ f = Fopen(SecurityPolicyFile, "r");
- if (!f)
- {
- ErrorF("error opening security policy file %s\n",
-@@ -1646,7 +1646,7 @@ SecurityLoadPropertyAccessList(void)
- }
- #endif /* PROPDEBUG */
-
-- fclose(f);
-+ Fclose(f);
- } /* SecurityLoadPropertyAccessList */
-
-
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0019-CVE-2007-6429-Don-t-spuriously-reject-8bpp-shm-pix.patch b/x11-base/xorg-server/files/1.4.0.90/0019-CVE-2007-6429-Don-t-spuriously-reject-8bpp-shm-pix.patch
deleted file mode 100644
index bd5758fbf908..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0019-CVE-2007-6429-Don-t-spuriously-reject-8bpp-shm-pix.patch
+++ /dev/null
@@ -1,86 +0,0 @@
-From b6d4cdf64f43ae805beada6122c8be2ed138742c Mon Sep 17 00:00:00 2001
-From: Adam Jackson <ajax@redhat.com>
-Date: Fri, 18 Jan 2008 14:41:20 -0500
-Subject: [PATCH] CVE-2007-6429: Don't spuriously reject <8bpp shm pixmaps.
-
-Move size validation after depth validation, and only validate size if
-the bpp of the pixmap format is > 8. If bpp < 8 then we're already
-protected from overflow by the width and height checks.
-(cherry picked from commit e9fa7c1c88a8130a48f772c92b186b8b777986b5)
----
- Xext/shm.c | 36 ++++++++++++++++++++----------------
- 1 files changed, 20 insertions(+), 16 deletions(-)
-
-diff --git a/Xext/shm.c b/Xext/shm.c
-index 5633be9..6f99e90 100644
---- a/Xext/shm.c
-+++ b/Xext/shm.c
-@@ -737,14 +737,6 @@ ProcPanoramiXShmCreatePixmap(
- }
- if (width > 32767 || height > 32767)
- return BadAlloc;
-- size = PixmapBytePad(width, depth) * height;
-- if (sizeof(size) == 4) {
-- if (size < width * height)
-- return BadAlloc;
-- /* thankfully, offset is unsigned */
-- if (stuff->offset + size < size)
-- return BadAlloc;
-- }
-
- if (stuff->depth != 1)
- {
-@@ -755,7 +747,17 @@ ProcPanoramiXShmCreatePixmap(
- client->errorValue = stuff->depth;
- return BadValue;
- }
-+
- CreatePmap:
-+ size = PixmapBytePad(width, depth) * height;
-+ if (sizeof(size) == 4 && BitsPerPixel(depth) > 8) {
-+ if (size < width * height)
-+ return BadAlloc;
-+ /* thankfully, offset is unsigned */
-+ if (stuff->offset + size < size)
-+ return BadAlloc;
-+ }
-+
- VERIFY_SHMSIZE(shmdesc, stuff->offset, size, client);
-
- if(!(newPix = (PanoramiXRes *) xalloc(sizeof(PanoramiXRes))))
-@@ -1080,14 +1082,6 @@ ProcShmCreatePixmap(client)
- }
- if (width > 32767 || height > 32767)
- return BadAlloc;
-- size = PixmapBytePad(width, depth) * height;
-- if (sizeof(size) == 4) {
-- if (size < width * height)
-- return BadAlloc;
-- /* thankfully, offset is unsigned */
-- if (stuff->offset + size < size)
-- return BadAlloc;
-- }
-
- if (stuff->depth != 1)
- {
-@@ -1098,7 +1092,17 @@ ProcShmCreatePixmap(client)
- client->errorValue = stuff->depth;
- return BadValue;
- }
-+
- CreatePmap:
-+ size = PixmapBytePad(width, depth) * height;
-+ if (sizeof(size) == 4 && BitsPerPixel(depth) > 8) {
-+ if (size < width * height)
-+ return BadAlloc;
-+ /* thankfully, offset is unsigned */
-+ if (stuff->offset + size < size)
-+ return BadAlloc;
-+ }
-+
- VERIFY_SHMSIZE(shmdesc, stuff->offset, size, client);
- pMap = (*shmFuncs[pDraw->pScreen->myNum]->CreatePixmap)(
- pDraw->pScreen, stuff->width,
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0020-dix-set-the-correct-number-of-valuators-in-valuator.patch b/x11-base/xorg-server/files/1.4.0.90/0020-dix-set-the-correct-number-of-valuators-in-valuator.patch
deleted file mode 100644
index 12bdac48926c..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0020-dix-set-the-correct-number-of-valuators-in-valuator.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-From e98027c3ac7195fec665ef393d980b02870ca1b8 Mon Sep 17 00:00:00 2001
-From: Peter Hutterer <peter@cs.unisa.edu.au>
-Date: Tue, 18 Dec 2007 13:57:07 +1030
-Subject: [PATCH] dix: set the correct number of valuators in valuator events.
-
-(first_valuator + num_valuators) must never be larger than the number of axes,
-otherwise DIX freaks out. And from looking at libXI, anything larger than 6 is
-wrong too.
-(cherry picked from commit 9f6ae61ad12cc2813d04405458e1ca5aed8a539e)
----
- dix/getevents.c | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/dix/getevents.c b/dix/getevents.c
-index 12d8189..b7ba69b 100644
---- a/dix/getevents.c
-+++ b/dix/getevents.c
-@@ -344,7 +344,7 @@ getValuatorEvents(xEvent *events, DeviceIntPtr pDev, int first_valuator,
- for (i = first_valuator; i < final_valuator; i += 6, xv++, events++) {
- xv->type = DeviceValuator;
- xv->first_valuator = i;
-- xv->num_valuators = num_valuators;
-+ xv->num_valuators = ((num_valuators - i) > 6) ? 6 : (num_valuators - i);
- xv->deviceid = pDev->id;
- switch (final_valuator - i) {
- case 6:
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0021-xkb-don-t-update-LEDs-if-they-don-t-exist.-Bug-13.patch b/x11-base/xorg-server/files/1.4.0.90/0021-xkb-don-t-update-LEDs-if-they-don-t-exist.-Bug-13.patch
deleted file mode 100644
index 5bbcfc33dcc5..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0021-xkb-don-t-update-LEDs-if-they-don-t-exist.-Bug-13.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-From bc72ef3a159efd67067322c043bba444869dc356 Mon Sep 17 00:00:00 2001
-From: Peter Hutterer <peter@cs.unisa.edu.au>
-Date: Wed, 30 Jan 2008 10:39:54 +1030
-Subject: [PATCH] xkb: don't update LEDs if they don't exist. (Bug #13961)
-
-In some weird cases we call this function when there is no SrvLedInfo on the
-device. And it turns out null-pointer dereferences are bad.
-
-X.Org Bug 13961 <http://bugs.freedesktop.org/show_bug.cgi?id=13961>
-(cherry picked from commit d954f9c80348de294602d931d387e5cd1ef4b9a5)
----
- xkb/xkbLEDs.c | 3 +++
- 1 files changed, 3 insertions(+), 0 deletions(-)
-
-diff --git a/xkb/xkbLEDs.c b/xkb/xkbLEDs.c
-index d607d90..d28973c 100644
---- a/xkb/xkbLEDs.c
-+++ b/xkb/xkbLEDs.c
-@@ -63,6 +63,9 @@ XkbSrvLedInfoPtr sli;
-
- sli= XkbFindSrvLedInfo(dev,XkbDfltXIClass,XkbDfltXIId,0);
-
-+ if (!sli)
-+ return update;
-+
- if (state_changes&(XkbModifierStateMask|XkbGroupStateMask))
- update|= sli->usesEffective;
- if (state_changes&(XkbModifierBaseMask|XkbGroupBaseMask))
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0022-security-Fix-for-Bug-14480-untrusted-access-broke.patch b/x11-base/xorg-server/files/1.4.0.90/0022-security-Fix-for-Bug-14480-untrusted-access-broke.patch
deleted file mode 100644
index 0df2277305d0..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0022-security-Fix-for-Bug-14480-untrusted-access-broke.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-From 74b40bba327a2e97780e8e3f995f784add2d6231 Mon Sep 17 00:00:00 2001
-From: Eamon Walsh <ewalsh@tycho.nsa.gov>
-Date: Thu, 14 Feb 2008 19:47:44 -0500
-Subject: [PATCH] security: Fix for Bug #14480: untrusted access broken in 7.3.
-
----
- Xext/security.c | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/Xext/security.c b/Xext/security.c
-index e9d48c9..14ad354 100644
---- a/Xext/security.c
-+++ b/Xext/security.c
-@@ -1014,7 +1014,7 @@ CALLBACK(SecurityCheckResourceIDAccess)
- }
- else /* server-owned resource - probably a default colormap or root window */
- {
-- if (RT_WINDOW == rtype || RC_DRAWABLE == rtype)
-+ if (RC_DRAWABLE & rtype)
- {
- switch (reqtype)
- { /* the following operations are allowed on root windows */
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0023-Resize-composite-overlay-window-when-the-root-window.patch b/x11-base/xorg-server/files/1.4.0.90/0023-Resize-composite-overlay-window-when-the-root-window.patch
deleted file mode 100644
index 53864528fa3d..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0023-Resize-composite-overlay-window-when-the-root-window.patch
+++ /dev/null
@@ -1,62 +0,0 @@
-From 3db5930c61aeb849de3b21e7ba0d86d3c0cf72bb Mon Sep 17 00:00:00 2001
-From: Maarten Maathuis <madman2003@gmail.com>
-Date: Sun, 17 Feb 2008 11:21:01 +0100
-Subject: [PATCH] Resize composite overlay window when the root window changes.
-
-- This allows some compositing managers to work, even after randr12 has changed the root window size.
-- Thanks to ajax for figuring out the best place to put this.
-- Example:
- - xf86RandR12SetMode() calls EnableDisableFBAccess().
- - That calls xf86SetRootClip() which in turn calls ResizeChildrenWinSize().
- - The final step is the call to PositionWindow().
-(cherry picked from commit 70c0592a97c7dc9db0576d32b3bdbe4766520509)
----
- composite/compwindow.c | 25 +++++++++++++++++++++++++
- 1 files changed, 25 insertions(+), 0 deletions(-)
-
-diff --git a/composite/compwindow.c b/composite/compwindow.c
-index bfd2946..33192ad 100644
---- a/composite/compwindow.c
-+++ b/composite/compwindow.c
-@@ -165,6 +165,29 @@ compCheckRedirect (WindowPtr pWin)
- return TRUE;
- }
-
-+static int
-+updateOverlayWindow(ScreenPtr pScreen)
-+{
-+ CompScreenPtr cs;
-+ WindowPtr pWin; /* overlay window */
-+ XID vlist[2];
-+
-+ cs = GetCompScreen(pScreen);
-+ if ((pWin = cs->pOverlayWin) != NULL) {
-+ if ((pWin->drawable.width == pScreen->width) &&
-+ (pWin->drawable.height == pScreen->height))
-+ return Success;
-+
-+ /* Let's resize the overlay window. */
-+ vlist[0] = pScreen->width;
-+ vlist[1] = pScreen->height;
-+ return ConfigureWindow(pWin, CWWidth | CWHeight, vlist, wClient(pWin));
-+ }
-+
-+ /* Let's be on the safe side and not assume an overlay window is always allocated. */
-+ return Success;
-+}
-+
- Bool
- compPositionWindow (WindowPtr pWin, int x, int y)
- {
-@@ -203,6 +226,8 @@ compPositionWindow (WindowPtr pWin, int x, int y)
- cs->PositionWindow = pScreen->PositionWindow;
- pScreen->PositionWindow = compPositionWindow;
- compCheckTree (pWin->drawable.pScreen);
-+ if (updateOverlayWindow(pScreen) != Success)
-+ ret = FALSE;
- return ret;
- }
-
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0024-Fix-rotation-for-multi-monitor-situation.patch b/x11-base/xorg-server/files/1.4.0.90/0024-Fix-rotation-for-multi-monitor-situation.patch
deleted file mode 100644
index 33a9cc04f728..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0024-Fix-rotation-for-multi-monitor-situation.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-From dc30ade6496c7cc24e38c419e229159525fe042f Mon Sep 17 00:00:00 2001
-From: Maarten Maathuis <madman2003@gmail.com>
-Date: Sun, 17 Feb 2008 18:47:28 +0100
-Subject: [PATCH] Fix rotation for multi-monitor situation.
-
-- The (x,y)-coordinates of the crtc were not being passed as xFixed values, which made it an obscure bug to find.
-- Fix bug #13787.
-(cherry picked from commit a48cc88ea2674c28b69b8d738b168cbafcf4001f)
----
- hw/xfree86/modes/xf86Rotate.c | 4 ++--
- 1 files changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/hw/xfree86/modes/xf86Rotate.c b/hw/xfree86/modes/xf86Rotate.c
-index 380478f..dd0e659 100644
---- a/hw/xfree86/modes/xf86Rotate.c
-+++ b/hw/xfree86/modes/xf86Rotate.c
-@@ -579,9 +579,9 @@ xf86CrtcRotate (xf86CrtcPtr crtc, DisplayModePtr mode, Rotation rotation)
- }
- else
- {
-- PictureTransformTranslate (&crtc_to_fb, &fb_to_crtc, crtc->x, crtc->y);
-+ PictureTransformTranslate (&crtc_to_fb, &fb_to_crtc, F(crtc->x), F(crtc->y));
- PictureTransformIsInverse ("offset", &crtc_to_fb, &fb_to_crtc);
--
-+
- /*
- * these are the size of the shadow pixmap, which
- * matches the mode, not the pre-rotated copy in the
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0025-Don-t-break-grab-and-focus-state-for-a-window-when-r.patch b/x11-base/xorg-server/files/1.4.0.90/0025-Don-t-break-grab-and-focus-state-for-a-window-when-r.patch
deleted file mode 100644
index 9e5904dd2110..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0025-Don-t-break-grab-and-focus-state-for-a-window-when-r.patch
+++ /dev/null
@@ -1,40 +0,0 @@
-From bcbfd619f8da888224afd80ee3a2db7d500523eb Mon Sep 17 00:00:00 2001
-From: =?utf-8?q?Kristian=20H=C3=B8gsberg?= <krh@redhat.com>
-Date: Wed, 16 Jan 2008 20:24:11 -0500
-Subject: [PATCH] Don't break grab and focus state for a window when redirecting it.
-
-Composite uses an unmap/map cycle to trigger backing pixmap allocation
-and cliprect recomputation when a window is redirected or unredirected.
-To avoid protocol visible side effects, map and unmap events are
-disabled temporarily. However, when a window is unmapped it is also
-removed from grabs and loses focus, but these state changes are not
-disabled.
-
-This change supresses the unmap side effects during the composite
-unmap/map cycle and fixes this bug:
-
- http://bugzilla.gnome.org/show_bug.cgi?id=488264
-
-where compiz would cause gnome-screensaver to lose its grab when
-compiz unredirects the fullscreen lock window.
----
- dix/window.c | 3 ++-
- 1 files changed, 2 insertions(+), 1 deletions(-)
-
-diff --git a/dix/window.c b/dix/window.c
-index be4ea2c..961c02a 100644
---- a/dix/window.c
-+++ b/dix/window.c
-@@ -3023,7 +3023,8 @@ UnrealizeTree(
- }
- #endif
- (* Unrealize)(pChild);
-- DeleteWindowFromAnyEvents(pChild, FALSE);
-+ if (MapUnmapEventsEnabled(pWin))
-+ DeleteWindowFromAnyEvents(pChild, FALSE);
- if (pChild->viewable)
- {
- #ifdef DO_SAVE_UNDERS
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0026-CVE-2007-6429-Always-test-for-size-offset-wrapping.patch b/x11-base/xorg-server/files/1.4.0.90/0026-CVE-2007-6429-Always-test-for-size-offset-wrapping.patch
deleted file mode 100644
index aa4900834e0d..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0026-CVE-2007-6429-Always-test-for-size-offset-wrapping.patch
+++ /dev/null
@@ -1,44 +0,0 @@
-From 44f46bfb981ca69515dafc520f62f33654711194 Mon Sep 17 00:00:00 2001
-From: Matthias Hopf <mhopf@suse.de>
-Date: Mon, 21 Jan 2008 16:13:21 +0100
-Subject: [PATCH] CVE-2007-6429: Always test for size+offset wrapping.
-
----
- Xext/shm.c | 12 ++++++------
- 1 files changed, 6 insertions(+), 6 deletions(-)
-
-diff --git a/Xext/shm.c b/Xext/shm.c
-index 6f99e90..376f123 100644
---- a/Xext/shm.c
-+++ b/Xext/shm.c
-@@ -753,10 +753,10 @@ CreatePmap:
- if (sizeof(size) == 4 && BitsPerPixel(depth) > 8) {
- if (size < width * height)
- return BadAlloc;
-- /* thankfully, offset is unsigned */
-- if (stuff->offset + size < size)
-- return BadAlloc;
- }
-+ /* thankfully, offset is unsigned */
-+ if (stuff->offset + size < size)
-+ return BadAlloc;
-
- VERIFY_SHMSIZE(shmdesc, stuff->offset, size, client);
-
-@@ -1098,10 +1098,10 @@ CreatePmap:
- if (sizeof(size) == 4 && BitsPerPixel(depth) > 8) {
- if (size < width * height)
- return BadAlloc;
-- /* thankfully, offset is unsigned */
-- if (stuff->offset + size < size)
-- return BadAlloc;
- }
-+ /* thankfully, offset is unsigned */
-+ if (stuff->offset + size < size)
-+ return BadAlloc;
-
- VERIFY_SHMSIZE(shmdesc, stuff->offset, size, client);
- pMap = (*shmFuncs[pDraw->pScreen->myNum]->CreatePixmap)(
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0027-Fix-context-sharing-between-direct-indirect-contexts.patch b/x11-base/xorg-server/files/1.4.0.90/0027-Fix-context-sharing-between-direct-indirect-contexts.patch
deleted file mode 100644
index 07642e134f94..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0027-Fix-context-sharing-between-direct-indirect-contexts.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-From a65d4aed06acd839fb21153f74144498abda3e18 Mon Sep 17 00:00:00 2001
-From: Alan Hourihane <alanh@tungstengraphics.com>
-Date: Wed, 27 Feb 2008 16:49:34 +0000
-Subject: [PATCH] Fix context sharing between direct/indirect contexts
-
----
- GL/glx/glxdri.c | 8 ++++++++
- 1 files changed, 8 insertions(+), 0 deletions(-)
-
-diff --git a/GL/glx/glxdri.c b/GL/glx/glxdri.c
-index 685683d..09abca3 100644
---- a/GL/glx/glxdri.c
-+++ b/GL/glx/glxdri.c
-@@ -598,6 +598,9 @@ __glXDRIscreenCreateContext(__GLXscreen *baseScreen,
- else
- sharePrivate = NULL;
-
-+ if (baseShareContext && baseShareContext->isDirect)
-+ return NULL;
-+
- context = xalloc(sizeof *context);
- if (context == NULL)
- return NULL;
-@@ -617,6 +620,11 @@ __glXDRIscreenCreateContext(__GLXscreen *baseScreen,
- 0, /* render type */
- sharePrivate,
- &context->driContext);
-+
-+ if (!context->driContext.private) {
-+ xfree(context);
-+ return NULL;
-+ }
-
- context->driContext.mode = modes;
-
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0028-Add-some-more-support-for-DragonFly.-From-Joerg-Sonn.patch b/x11-base/xorg-server/files/1.4.0.90/0028-Add-some-more-support-for-DragonFly.-From-Joerg-Sonn.patch
deleted file mode 100644
index 7f1e0dda5d80..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0028-Add-some-more-support-for-DragonFly.-From-Joerg-Sonn.patch
+++ /dev/null
@@ -1,83 +0,0 @@
-From 76b950cd6e03f0060afe463871de4570fca90213 Mon Sep 17 00:00:00 2001
-From: Jeremy C. Reed <reed@glacier.reedmedia.net>
-Date: Thu, 16 Aug 2007 11:20:12 -0500
-Subject: [PATCH] Add some more support for DragonFly. From Joerg Sonnenberger
- and pkgsrc.
- (cherry picked from commit 1d4bea6106d7a1c83e1dfe37fad8268589feaa0b)
-
----
- Xext/shm.c | 2 +-
- Xext/xf86bigfont.c | 2 +-
- hw/xfree86/loader/os.c | 2 ++
- hw/xfree86/os-support/bus/Pci.h | 2 +-
- hw/xfree86/os-support/bus/freebsdPci.c | 2 +-
- 5 files changed, 6 insertions(+), 4 deletions(-)
-
-diff --git a/Xext/shm.c b/Xext/shm.c
-index 376f123..3c0d1ee 100644
---- a/Xext/shm.c
-+++ b/Xext/shm.c
-@@ -154,7 +154,7 @@ static ShmFuncs fbFuncs = {fbShmCreatePixmap, fbShmPutImage};
- }
-
-
--#if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(__CYGWIN__)
-+#if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(__CYGWIN__) || defined(__DragonFly__)
- #include <sys/signal.h>
-
- static Bool badSysCall = FALSE;
-diff --git a/Xext/xf86bigfont.c b/Xext/xf86bigfont.c
-index f50481f..c2f891a 100644
---- a/Xext/xf86bigfont.c
-+++ b/Xext/xf86bigfont.c
-@@ -104,7 +104,7 @@ static unsigned int pagesize;
-
- static Bool badSysCall = FALSE;
-
--#if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(__CYGWIN__)
-+#if defined(__FreeBSD__) || defined(__NetBSD__) || defined(__OpenBSD__) || defined(__CYGWIN__) || defined(__DragonFly__)
-
- #include <sys/signal.h>
-
-diff --git a/hw/xfree86/loader/os.c b/hw/xfree86/loader/os.c
-index fdddce8..12cf3d8 100644
---- a/hw/xfree86/loader/os.c
-+++ b/hw/xfree86/loader/os.c
-@@ -42,6 +42,8 @@
- #define OSNAME "linux"
- #elif defined(__FreeBSD__)
- #define OSNAME "freebsd"
-+#elif defined(__DragonFly__)
-+#define OSNAME "dragonfly"
- #elif defined(__NetBSD__)
- #define OSNAME "netbsd"
- #elif defined(__OpenBSD__)
-diff --git a/hw/xfree86/os-support/bus/Pci.h b/hw/xfree86/os-support/bus/Pci.h
-index f0cb916..5ebbdd5 100644
---- a/hw/xfree86/os-support/bus/Pci.h
-+++ b/hw/xfree86/os-support/bus/Pci.h
-@@ -235,7 +235,7 @@
- # if defined(linux)
- # define ARCH_PCI_INIT axpPciInit
- # define INCLUDE_XF86_MAP_PCI_MEM
--# elif defined(__FreeBSD__) || defined(__OpenBSD__)
-+# elif defined(__FreeBSD__) || defined(__OpenBSD__) || defined(__DragonFly__)
- # define ARCH_PCI_INIT freebsdPciInit
- # define INCLUDE_XF86_MAP_PCI_MEM
- # define INCLUDE_XF86_NO_DOMAIN
-diff --git a/hw/xfree86/os-support/bus/freebsdPci.c b/hw/xfree86/os-support/bus/freebsdPci.c
-index 61cb405..63c00b2 100644
---- a/hw/xfree86/os-support/bus/freebsdPci.c
-+++ b/hw/xfree86/os-support/bus/freebsdPci.c
-@@ -83,7 +83,7 @@ static pciBusInfo_t freebsdPci0 = {
- /* bridge */ NULL
- };
-
--#if !defined(__OpenBSD__) && !defined(__FreeBSD__)
-+#if !defined(__OpenBSD__) && !defined(__FreeBSD__) && !defined(__DragonFly__)
- #if X_BYTE_ORDER == X_BIG_ENDIAN
- #ifdef __sparc__
- #ifndef ASI_PL
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0029-configure.ac-DragonFly-BSD-support.patch b/x11-base/xorg-server/files/1.4.0.90/0029-configure.ac-DragonFly-BSD-support.patch
deleted file mode 100644
index 27320bdd19ea..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0029-configure.ac-DragonFly-BSD-support.patch
+++ /dev/null
@@ -1,53 +0,0 @@
-From dd6b0de38d649617600a8357e576955c9b831328 Mon Sep 17 00:00:00 2001
-From: Hasso Tepper <hasso@estpak.ee>
-Date: Mon, 7 Apr 2008 14:09:04 +0300
-Subject: [PATCH] configure.ac: DragonFly BSD support
-
-Add support for DragonFly BSD, which is just the same as FreeBSD for all
-of these cases.
-(cherry picked from commit 0f87b41a432a6472a15ec0c9dee997e3bddbd0f2)
----
- configure.ac | 6 ++++--
- 1 files changed, 4 insertions(+), 2 deletions(-)
-
-diff --git a/configure.ac b/configure.ac
-index 72d9819..dfb2950 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -291,6 +291,7 @@ case $host_cpu in
- darwin*) use_x86_asm="no" ;;
- *linux*) DEFAULT_INT10=vm86 ;;
- *freebsd*) AC_DEFINE(USE_DEV_IO) ;;
-+ *dragonfly*) AC_DEFINE(USE_DEV_IO) ;;
- *netbsd*) AC_DEFINE(USE_I386_IOPL)
- SYS_LIBS=-li386
- ;;
-@@ -316,6 +317,7 @@ case $host_cpu in
- case $host_os in
- darwin*) use_x86_asm="no" ;;
- *freebsd*) AC_DEFINE(USE_DEV_IO, 1, [BSD /dev/io]) ;;
-+ *dragonfly*) AC_DEFINE(USE_DEV_IO, 1, [BSD /dev/io]) ;;
- *netbsd*) AC_DEFINE(USE_I386_IOPL, 1, [BSD i386 iopl])
- SYS_LIBS=-lx86_64
- ;;
-@@ -337,7 +339,7 @@ DRI=no
- KDRIVE_HW=no
- dnl it would be nice to autodetect these *CONS_SUPPORTs
- case $host_os in
-- *freebsd*)
-+ *freebsd* | *dragonfly*)
- case $host_os in
- kfreebsd*-gnu) ;;
- *) AC_DEFINE(CSRG_BASED, 1, [System is BSD-like]) ;;
-@@ -1363,7 +1365,7 @@ return 0;}
- ;;
- esac
- ;;
-- freebsd* | kfreebsd*-gnu)
-+ freebsd* | kfreebsd*-gnu | dragonfly*)
- XORG_OS="freebsd"
- XORG_OS_SUBDIR="bsd"
- case $host_cpu in
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0030-Fixed-configure.ac-for-autoconf-2.62.patch b/x11-base/xorg-server/files/1.4.0.90/0030-Fixed-configure.ac-for-autoconf-2.62.patch
deleted file mode 100644
index cd4ba964abb2..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0030-Fixed-configure.ac-for-autoconf-2.62.patch
+++ /dev/null
@@ -1,28 +0,0 @@
-From 9e9eeca2b094fa9edb9c20002d42aeafb14ad1e4 Mon Sep 17 00:00:00 2001
-From: Tilman Sauerbeck <tilman@code-monkey.de>
-Date: Thu, 10 Apr 2008 21:36:19 +0200
-Subject: [PATCH] Fixed configure.ac for autoconf 2.62.
- (cherry picked from commit 3c337e18b933881e22b0d03312511f1d23a8640b)
-
----
- configure.ac | 4 +++-
- 1 files changed, 3 insertions(+), 1 deletions(-)
-
-diff --git a/configure.ac b/configure.ac
-index dfb2950..4841d26 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -1964,7 +1964,9 @@ DIX_CFLAGS="-DHAVE_DIX_CONFIG_H $XSERVER_CFLAGS"
-
- AC_SUBST([DIX_CFLAGS])
-
--AC_SUBST([libdir exec_prefix prefix])
-+AC_SUBST([libdir])
-+AC_SUBST([exec_prefix])
-+AC_SUBST([prefix])
-
- # Man page sections - used in config utils & generating man pages
- XORG_MANPAGE_SECTIONS
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0031-EXA-Fix-off-by-one-in-polyline-drawing.patch b/x11-base/xorg-server/files/1.4.0.90/0031-EXA-Fix-off-by-one-in-polyline-drawing.patch
deleted file mode 100644
index 07ea963dcb90..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0031-EXA-Fix-off-by-one-in-polyline-drawing.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-From 6afcf996cade0c9464d6af9b04b177b1de138cfd Mon Sep 17 00:00:00 2001
-From: Pierre Willenbrock <pierre@pirsoft.dnsalias.org>
-Date: Tue, 23 Oct 2007 16:45:13 +0200
-Subject: [PATCH] EXA: Fix off-by-one in polyline drawing.
- (cherry picked from commit d502521c3669f3f22b94c39a64ab63bfd92c6a97)
-
----
- exa/exa_accel.c | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/exa/exa_accel.c b/exa/exa_accel.c
-index aed4e42..e8444c6 100644
---- a/exa/exa_accel.c
-+++ b/exa/exa_accel.c
-@@ -535,7 +535,7 @@ exaPolylines(DrawablePtr pDrawable, GCPtr pGC, int mode, int npt,
- x1 = ppt[0].x;
- y1 = ppt[0].y;
- /* If we have any non-horizontal/vertical, fall back. */
-- for (i = 0; i < npt; i++) {
-+ for (i = 0; i < npt - 1; i++) {
- if (mode == CoordModePrevious) {
- x2 = x1 + ppt[i + 1].x;
- y2 = y1 + ppt[i + 1].y;
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0032-XKB-Fix-processInputProc-wrapping.patch b/x11-base/xorg-server/files/1.4.0.90/0032-XKB-Fix-processInputProc-wrapping.patch
deleted file mode 100644
index e3efcdad3724..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0032-XKB-Fix-processInputProc-wrapping.patch
+++ /dev/null
@@ -1,83 +0,0 @@
-From fdfb57d342da0ace14eed635804ebc31441240c5 Mon Sep 17 00:00:00 2001
-From: Thomas Jaeger <thjaeger@gmail.com>
-Date: Tue, 1 Apr 2008 15:27:06 +0300
-Subject: [PATCH] XKB: Fix processInputProc wrapping
-
-If input processing is frozen, only wrap realInputProc: don't smash
-processInputProc as well. When input processing is thawed, pIP will be
-rewrapped correctly.
-
-This supersedes the previous workaround in 50e80c9.
-
-Signed-off-by: Daniel Stone <daniel@fooishbar.org>
-(cherry picked from commit 37b1258f0a288a79ce6a3eef3559e17a67c4dd96)
----
- include/xkbsrv.h | 16 ++++++++++++----
- xkb/xkbActions.c | 9 ++++-----
- 2 files changed, 16 insertions(+), 9 deletions(-)
-
-diff --git a/include/xkbsrv.h b/include/xkbsrv.h
-index 9174eb6..acf3bb0 100644
---- a/include/xkbsrv.h
-+++ b/include/xkbsrv.h
-@@ -241,6 +241,14 @@ typedef struct _XkbSrvLedInfo {
- typedef struct
- {
- ProcessInputProc processInputProc;
-+ /* If processInputProc is set to something different than realInputProc,
-+ * UNWRAP and COND_WRAP will not touch processInputProc and update only
-+ * realInputProc. This ensures that
-+ * processInputProc == (frozen ? EnqueueEvent : realInputProc)
-+ *
-+ * WRAP_PROCESS_INPUT_PROC should only be called during initialization,
-+ * since it may destroy this invariant.
-+ */
- ProcessInputProc realInputProc;
- DeviceUnwrapProc unwrapProc;
- } xkbDeviceInfoRec, *xkbDeviceInfoPtr;
-@@ -258,14 +266,14 @@ typedef struct
- device->public.processInputProc = proc; \
- oldprocs->processInputProc = \
- oldprocs->realInputProc = device->public.realInputProc; \
-- if (proc != device->public.enqueueInputProc) \
-- device->public.realInputProc = proc; \
-+ device->public.realInputProc = proc; \
- oldprocs->unwrapProc = device->unwrapProc; \
- device->unwrapProc = unwrapproc;
-
- #define UNWRAP_PROCESS_INPUT_PROC(device, oldprocs, backupproc) \
-- backupproc = device->public.processInputProc; \
-- device->public.processInputProc = oldprocs->processInputProc; \
-+ backupproc = device->public.realInputProc; \
-+ if (device->public.processInputProc == device->public.realInputProc)\
-+ device->public.processInputProc = oldprocs->realInputProc; \
- device->public.realInputProc = oldprocs->realInputProc; \
- device->unwrapProc = oldprocs->unwrapProc;
-
-diff --git a/xkb/xkbActions.c b/xkb/xkbActions.c
-index 6edac29..59d34c5 100644
---- a/xkb/xkbActions.c
-+++ b/xkb/xkbActions.c
-@@ -50,15 +50,14 @@ xkbUnwrapProc(DeviceIntPtr device, DeviceHandleProc proc,
- pointer data)
- {
- xkbDeviceInfoPtr xkbPrivPtr = XKBDEVICEINFO(device);
-- ProcessInputProc tmp = device->public.processInputProc;
-- ProcessInputProc dummy; /* unused, but neede for macro */
-+ ProcessInputProc backupproc;
- if(xkbPrivPtr->unwrapProc)
- xkbPrivPtr->unwrapProc = NULL;
-
-- UNWRAP_PROCESS_INPUT_PROC(device,xkbPrivPtr, dummy);
-+ UNWRAP_PROCESS_INPUT_PROC(device,xkbPrivPtr, backupproc);
- proc(device,data);
-- WRAP_PROCESS_INPUT_PROC(device,xkbPrivPtr,
-- tmp,xkbUnwrapProc);
-+ COND_WRAP_PROCESS_INPUT_PROC(device,xkbPrivPtr,
-+ backupproc,xkbUnwrapProc);
- }
-
-
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0033-xfree86-fix-AlwaysCore-handling.-Bug-14256.patch b/x11-base/xorg-server/files/1.4.0.90/0033-xfree86-fix-AlwaysCore-handling.-Bug-14256.patch
deleted file mode 100644
index 4f99da55be7b..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0033-xfree86-fix-AlwaysCore-handling.-Bug-14256.patch
+++ /dev/null
@@ -1,29 +0,0 @@
-From ff4006bd5a71d39cc5655679447c5c47a99a2751 Mon Sep 17 00:00:00 2001
-From: Peter Hutterer <peter@cs.unisa.edu.au>
-Date: Tue, 29 Jan 2008 10:01:37 +1030
-Subject: [PATCH] xfree86: fix AlwaysCore handling. (Bug #14256)
-
-Assume AlwaysCore being set by default, just like the other options.
-
-X.Org Bug 14256 <http://bugs.freedesktop.org/show_bug.cgi?id=14256>
-(cherry picked from commit 5b8641a5fdc112c19e78ca2954878712e328d403)
----
- hw/xfree86/common/xf86Xinput.c | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/hw/xfree86/common/xf86Xinput.c b/hw/xfree86/common/xf86Xinput.c
-index b939fb7..ca2be5c 100644
---- a/hw/xfree86/common/xf86Xinput.c
-+++ b/hw/xfree86/common/xf86Xinput.c
-@@ -116,7 +116,7 @@ _X_EXPORT void
- xf86ProcessCommonOptions(LocalDevicePtr local,
- pointer list)
- {
-- if (xf86SetBoolOption(list, "AlwaysCore", 0) ||
-+ if (!xf86SetBoolOption(list, "AlwaysCore", 1) ||
- !xf86SetBoolOption(list, "SendCoreEvents", 1) ||
- !xf86SetBoolOption(list, "CorePointer", 1) ||
- !xf86SetBoolOption(list, "CoreKeyboard", 1)) {
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0034-Ignore-not-just-block-SIGALRM-around-Popen-Pcl.patch b/x11-base/xorg-server/files/1.4.0.90/0034-Ignore-not-just-block-SIGALRM-around-Popen-Pcl.patch
deleted file mode 100644
index da020faa9bf0..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0034-Ignore-not-just-block-SIGALRM-around-Popen-Pcl.patch
+++ /dev/null
@@ -1,58 +0,0 @@
-From 6a5066c2e9e872d4ef85ec70745c34d93580177e Mon Sep 17 00:00:00 2001
-From: Adam Jackson <ajax@benzedrine.nwnk.net>
-Date: Tue, 11 Sep 2007 11:37:06 -0400
-Subject: [PATCH] Ignore - not just block - SIGALRM around Popen()/Pclose().
-
-Because our "popen" implementation uses stdio, and because nobody's stdio
-library is capable of surviving signals, we need to make absolutely sure
-that we hide the SIGALRM from the smart scheduler. Otherwise, when you
-open a menu in openoffice, and it recompiles XKB to deal with the
-accelerators, and you popen xkbcomp because we suck, then the scheduler
-will tell you you're taking forever doing something stupid, and the
-wait() code will get confused, and input will hang and your CPU usage
-slams to 100%. Down, not across.
----
- os/utils.c | 8 ++++++++
- 1 files changed, 8 insertions(+), 0 deletions(-)
-
-diff --git a/os/utils.c b/os/utils.c
-index 3bb7dbe..afcaae4 100644
---- a/os/utils.c
-+++ b/os/utils.c
-@@ -1720,6 +1720,8 @@ static struct pid {
- int pid;
- } *pidlist;
-
-+static sighandler_t old_alarm = NULL; /* XXX horrible awful hack */
-+
- pointer
- Popen(char *command, char *type)
- {
-@@ -1741,11 +1743,15 @@ Popen(char *command, char *type)
- return NULL;
- }
-
-+ /* Ignore the smart scheduler while this is going on */
-+ old_alarm = signal(SIGALRM, SIG_IGN);
-+
- switch (pid = fork()) {
- case -1: /* error */
- close(pdes[0]);
- close(pdes[1]);
- xfree(cur);
-+ signal(SIGALRM, old_alarm);
- return NULL;
- case 0: /* child */
- if (setgid(getgid()) == -1)
-@@ -1921,6 +1927,8 @@ Pclose(pointer iop)
- /* allow EINTR again */
- OsReleaseSignals ();
-
-+ signal(SIGALRM, old_alarm);
-+
- return pid == -1 ? -1 : pstat;
- }
-
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0035-Fix-build-on-FreeBSD-after-Popen-changes.patch b/x11-base/xorg-server/files/1.4.0.90/0035-Fix-build-on-FreeBSD-after-Popen-changes.patch
deleted file mode 100644
index 9436d951964b..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0035-Fix-build-on-FreeBSD-after-Popen-changes.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-From a02b989c68864a7388553fb96e4fbaf91f941c4a Mon Sep 17 00:00:00 2001
-From: Eric Anholt <eric@anholt.net>
-Date: Wed, 12 Sep 2007 13:23:13 +0000
-Subject: [PATCH] Fix build on FreeBSD after Popen changes.
-
----
- os/utils.c | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/os/utils.c b/os/utils.c
-index afcaae4..144098b 100644
---- a/os/utils.c
-+++ b/os/utils.c
-@@ -1720,7 +1720,7 @@ static struct pid {
- int pid;
- } *pidlist;
-
--static sighandler_t old_alarm = NULL; /* XXX horrible awful hack */
-+void (*old_alarm)(int) = NULL; /* XXX horrible awful hack */
-
- pointer
- Popen(char *command, char *type)
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0036-So-like-checking-return-codes-of-system-calls-sig.patch b/x11-base/xorg-server/files/1.4.0.90/0036-So-like-checking-return-codes-of-system-calls-sig.patch
deleted file mode 100644
index 72379f3c2c91..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0036-So-like-checking-return-codes-of-system-calls-sig.patch
+++ /dev/null
@@ -1,83 +0,0 @@
-From 0fab9843c7b553bb59d57e68d9c3ea2d754bf809 Mon Sep 17 00:00:00 2001
-From: Ben Byer <bbyer@bbyer.apple.com>
-Date: Fri, 21 Sep 2007 17:07:36 -0700
-Subject: [PATCH] So, like, checking return codes of system calls (signal, etc) is good.
- Also, only restore an old signal handler if one was actually set
- (prevents the server from dying on OS X).
-
----
- os/utils.c | 24 ++++++++++++++++++++----
- 1 files changed, 20 insertions(+), 4 deletions(-)
-
-diff --git a/os/utils.c b/os/utils.c
-index 144098b..36c8dfe 100644
---- a/os/utils.c
-+++ b/os/utils.c
-@@ -285,7 +285,8 @@ OsSignal(sig, handler)
- sigaddset(&act.sa_mask, sig);
- act.sa_flags = 0;
- act.sa_handler = handler;
-- sigaction(sig, &act, &oact);
-+ if (sigaction(sig, &act, &oact))
-+ perror("sigaction");
- return oact.sa_handler;
- #endif
- }
-@@ -1684,6 +1685,10 @@ System(char *command)
-
- #ifdef SIGCHLD
- csig = signal(SIGCHLD, SIG_DFL);
-+ if (csig == SIG_ERR) {
-+ perror("signal");
-+ return -1;
-+ }
- #endif
-
- #ifdef DEBUG
-@@ -1708,7 +1713,10 @@ System(char *command)
- }
-
- #ifdef SIGCHLD
-- signal(SIGCHLD, csig);
-+ if (signal(SIGCHLD, csig) == SIG_ERR) {
-+ perror("signal");
-+ return -1;
-+ }
- #endif
-
- return p == -1 ? -1 : status;
-@@ -1745,13 +1753,18 @@ Popen(char *command, char *type)
-
- /* Ignore the smart scheduler while this is going on */
- old_alarm = signal(SIGALRM, SIG_IGN);
-+ if (old_alarm == SIG_ERR) {
-+ perror("signal");
-+ return NULL;
-+ }
-
- switch (pid = fork()) {
- case -1: /* error */
- close(pdes[0]);
- close(pdes[1]);
- xfree(cur);
-- signal(SIGALRM, old_alarm);
-+ if (signal(SIGALRM, old_alarm) == SIG_ERR)
-+ perror("signal");
- return NULL;
- case 0: /* child */
- if (setgid(getgid()) == -1)
-@@ -1927,7 +1940,10 @@ Pclose(pointer iop)
- /* allow EINTR again */
- OsReleaseSignals ();
-
-- signal(SIGALRM, old_alarm);
-+ if (old_alarm && signal(SIGALRM, old_alarm) == SIG_ERR) {
-+ perror("signal");
-+ return -1;
-+ }
-
- return pid == -1 ? -1 : pstat;
- }
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0037-Check-for-sys-sdt.h-as-well-when-determining-to-en.patch b/x11-base/xorg-server/files/1.4.0.90/0037-Check-for-sys-sdt.h-as-well-when-determining-to-en.patch
deleted file mode 100644
index bac9999a9428..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0037-Check-for-sys-sdt.h-as-well-when-determining-to-en.patch
+++ /dev/null
@@ -1,39 +0,0 @@
-From b95befdfd2c9bcb6b0cd896f2b8dfaaeb129dbff Mon Sep 17 00:00:00 2001
-From: Alan Coopersmith <alan.coopersmith@sun.com>
-Date: Fri, 7 Dec 2007 17:28:37 -0800
-Subject: [PATCH] Check for <sys/sdt.h> as well when determining to enable dtrace probes
-
-Avoids auto-detecting dtrace is present on systems with the ISDN trace tool
-named dtrace installed, but not the dynamic tracing facility named dtrace
----
- configure.ac | 7 +++++++
- 1 files changed, 7 insertions(+), 0 deletions(-)
-
-diff --git a/configure.ac b/configure.ac
-index 4841d26..c73f4a7 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -66,6 +66,8 @@ AC_SYS_LARGEFILE
- XORG_PROG_RAWCPP
-
- dnl Check for dtrace program (needed to build Xserver dtrace probes)
-+dnl Also checks for <sys/sdt.h>, since some Linux distros have an
-+dnl ISDN trace program named dtrace
- AC_ARG_WITH(dtrace, AS_HELP_STRING([--with-dtrace=PATH],
- [Enable dtrace probes (default: enabled if dtrace found)]),
- [WDTRACE=$withval], [WDTRACE=auto])
-@@ -76,6 +78,11 @@ if test "x$WDTRACE" = "xyes" -o "x$WDTRACE" = "xauto" ; then
- AC_MSG_FAILURE([dtrace requested but not found])
- fi
- WDTRACE="no"
-+ else
-+ AC_CHECK_HEADER(sys/sdt.h, [HAS_SDT_H="yes"], [HAS_SDT_H="no"])
-+ if test "x$WDTRACE" = "xauto" -a "x$HAS_SDT_H" = "xno" ; then
-+ WDTRACE="no"
-+ fi
- fi
- fi
- if test "x$WDTRACE" != "xno" ; then
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0038-dix-Always-add-valuator-information-if-present.patch b/x11-base/xorg-server/files/1.4.0.90/0038-dix-Always-add-valuator-information-if-present.patch
deleted file mode 100644
index 76f0dd8c6641..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0038-dix-Always-add-valuator-information-if-present.patch
+++ /dev/null
@@ -1,47 +0,0 @@
-From 7fa7031cfa9145f55881b87bc39f6e2c8a49ff76 Mon Sep 17 00:00:00 2001
-From: =?utf-8?q?Magnus=20Vigerl=C3=B6f?= <Magnus.Vigerlof@ipbo.se>
-Date: Sat, 2 Feb 2008 22:44:31 +0100
-Subject: [PATCH] dix: Always add valuator information if present
-
-Send valuator information for all event types, not only for
-MotionEvents and absolute button events.
-(cherry picked from commit 12e532403210c15a25200ef448bfe9701735ab20)
----
- dix/getevents.c | 7 ++-----
- 1 files changed, 2 insertions(+), 5 deletions(-)
-
-diff --git a/dix/getevents.c b/dix/getevents.c
-index b7ba69b..36c1bcf 100644
---- a/dix/getevents.c
-+++ b/dix/getevents.c
-@@ -523,9 +523,6 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- int num_events = 0, final_valuator = 0;
- CARD32 ms = 0;
- deviceKeyButtonPointer *kbp = NULL;
-- /* Thanks to a broken lib, we _always_ have to chase DeviceMotionNotifies
-- * with DeviceValuators. */
-- Bool sendValuators = (type == MotionNotify || flags & POINTER_ABSOLUTE);
- DeviceIntPtr cp = inputInfo.pointer;
- int x = 0, y = 0;
- Bool coreOnly = (pDev == inputInfo.pointer);
-@@ -551,7 +548,7 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- return 0;
-
- /* Do we need to send a DeviceValuator event? */
-- if (!coreOnly && sendValuators) {
-+ if (!coreOnly && num_valuators) {
- if ((((num_valuators - 1) / 6) + 1) > MAX_VALUATOR_EVENTS)
- num_valuators = MAX_VALUATOR_EVENTS * 6;
- num_events += ((num_valuators - 1) / 6) + 1;
-@@ -682,7 +679,7 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- kbp->root_y = y;
-
- events++;
-- if (sendValuators) {
-+ if (num_valuators) {
- kbp->deviceid |= MORE_EVENTS;
- clipValuators(pDev, first_valuator, num_valuators, valuators);
- events = getValuatorEvents(events, pDev, first_valuator,
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0039-Bug-10324-dix-Allow-arbitrary-value-ranges-in-Ge.patch b/x11-base/xorg-server/files/1.4.0.90/0039-Bug-10324-dix-Allow-arbitrary-value-ranges-in-Ge.patch
deleted file mode 100644
index 7bcedb804e64..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0039-Bug-10324-dix-Allow-arbitrary-value-ranges-in-Ge.patch
+++ /dev/null
@@ -1,40 +0,0 @@
-From 1d79ba8193e9584370ffaaa8dffb4db604125dea Mon Sep 17 00:00:00 2001
-From: =?utf-8?q?Magnus=20Vigerl=C3=B6f?= <Magnus.Vigerlof@ipbo.se>
-Date: Sat, 2 Feb 2008 22:45:31 +0100
-Subject: [PATCH] Bug # 10324: dix: Allow arbitrary value ranges in GetPointerEvents
-
-Don't use a possitive value as a marker for if a max-value
-is defined on the valuators. Use the existence of a valid
-value range instead. This will also make it possible to
-define arbitrary start and end-values for min and max as
-long as min < max.
-(cherry picked from commit f04c0838699f1a733735838e74cfbb1677b15dc4)
----
- dix/getevents.c | 11 +++++++----
- 1 files changed, 7 insertions(+), 4 deletions(-)
-
-diff --git a/dix/getevents.c b/dix/getevents.c
-index 36c1bcf..8595eaf 100644
---- a/dix/getevents.c
-+++ b/dix/getevents.c
-@@ -306,10 +306,13 @@ clipAxis(DeviceIntPtr pDev, int axisNum, int *val)
- {
- AxisInfoPtr axes = pDev->valuator->axes + axisNum;
-
-- if (*val < axes->min_value)
-- *val = axes->min_value;
-- if (axes->max_value >= 0 && *val > axes->max_value)
-- *val = axes->max_value;
-+ /* No clipping if the value-range <= 0 */
-+ if(axes->min_value < axes->min_value) {
-+ if (*val < axes->min_value)
-+ *val = axes->min_value;
-+ if (*val > axes->max_value)
-+ *val = axes->max_value;
-+ }
- }
-
- /**
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0040-Bug-10324-dix-Add-scaling-of-X-and-Y-on-the-repo.patch b/x11-base/xorg-server/files/1.4.0.90/0040-Bug-10324-dix-Add-scaling-of-X-and-Y-on-the-repo.patch
deleted file mode 100644
index 560aad1f7957..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0040-Bug-10324-dix-Add-scaling-of-X-and-Y-on-the-repo.patch
+++ /dev/null
@@ -1,173 +0,0 @@
-From b51ca35a7578b64190f663dc825d7fb551b92e73 Mon Sep 17 00:00:00 2001
-From: =?utf-8?q?Magnus=20Vigerl=C3=B6f?= <Magnus.Vigerlof@ipbo.se>
-Date: Sat, 2 Feb 2008 22:57:32 +0100
-Subject: [PATCH] Bug # 10324: dix: Add scaling of X and Y on the reported pointer-events
-
-Restore the rescaling code for x and y axis when generating
-motion events.
-(cherry picked from commit d9e23c4ff1607a62164b34717ef9afd352ce2b94)
----
- dix/getevents.c | 97 +++++++++++++++++++++++++++++++++++++++++++------------
- 1 files changed, 76 insertions(+), 21 deletions(-)
-
-diff --git a/dix/getevents.c b/dix/getevents.c
-index 8595eaf..e0bc326 100644
---- a/dix/getevents.c
-+++ b/dix/getevents.c
-@@ -529,6 +529,7 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- DeviceIntPtr cp = inputInfo.pointer;
- int x = 0, y = 0;
- Bool coreOnly = (pDev == inputInfo.pointer);
-+ ScreenPtr scr = miPointerGetScreen(pDev);
-
- /* Sanity checks. */
- if (type != MotionNotify && type != ButtonPress && type != ButtonRelease)
-@@ -572,20 +573,39 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- x = valuators[0];
- }
- else {
-- if (pDev->coreEvents)
-- x = cp->valuator->lastx;
-- else
-- x = pDev->valuator->lastx;
-+ /* If we're sending core events but didn't provide a value,
-+ * translate the core value (but use the device coord if
-+ * it translates to the same coord to preserve sub-pixel
-+ * coord information). If we're not sending core events use
-+ * whatever value we have */
-+ x = pDev->valuator->lastx;
-+ if(pDev->coreEvents) {
-+ int min = pDev->valuator->axes[0].min_value;
-+ int max = pDev->valuator->axes[0].max_value;
-+ if(min < max) {
-+ if((int)((float)(x-min)*scr->width/(max-min+1)) != cp->valuator->lastx)
-+ x = (int)((float)(cp->valuator->lastx)*(max-min+1)/scr->width)+min;
-+ }
-+ else
-+ x = cp->valuator->lastx;
-+ }
- }
-
- if (first_valuator <= 1 && num_valuators >= (2 - first_valuator)) {
- y = valuators[1 - first_valuator];
- }
- else {
-- if (pDev->coreEvents)
-- y = cp->valuator->lasty;
-- else
-- y = pDev->valuator->lasty;
-+ y = pDev->valuator->lasty;
-+ if(pDev->coreEvents) {
-+ int min = pDev->valuator->axes[1].min_value;
-+ int max = pDev->valuator->axes[1].max_value;
-+ if(min < max) {
-+ if((int)((float)(y-min)*scr->height/(max-min+1)) != cp->valuator->lasty)
-+ y = (int)((float)(cp->valuator->lasty)*(max-min+1)/scr->height)+min;
-+ }
-+ else
-+ y = cp->valuator->lasty;
-+ }
- }
- }
- else {
-@@ -594,15 +614,35 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- valuators);
-
- if (pDev->coreEvents) {
-- if (first_valuator == 0 && num_valuators >= 1)
-- x = cp->valuator->lastx + valuators[0];
-+ /* Get and convert the core pointer coordinate space into
-+ * device coordinates. Use the device coords if it translates
-+ * into the same position as the core to preserve relative sub-
-+ * pixel movements from the device. */
-+ int min = pDev->valuator->axes[0].min_value;
-+ int max = pDev->valuator->axes[0].max_value;
-+ if(min < max) {
-+ x = pDev->valuator->lastx;
-+ if((int)((float)(x-min)*scr->width/(max-min+1)) != cp->valuator->lastx)
-+ x = (int)((float)(cp->valuator->lastx)*(max-min+1)/scr->width)+min;
-+ }
- else
- x = cp->valuator->lastx;
-
-- if (first_valuator <= 1 && num_valuators >= (2 - first_valuator))
-- y = cp->valuator->lasty + valuators[1 - first_valuator];
-+ min = pDev->valuator->axes[1].min_value;
-+ max = pDev->valuator->axes[1].max_value;
-+ if(min < max) {
-+ y = pDev->valuator->lasty;
-+ if((int)((float)(y-min)*scr->height/(max-min+1)) != cp->valuator->lasty)
-+ y = (int)((float)(cp->valuator->lasty)*(max-min+1)/scr->height)+min;
-+ }
- else
- y = cp->valuator->lasty;
-+
-+ /* Add relative movement */
-+ if (first_valuator == 0 && num_valuators >= 1)
-+ x += valuators[0];
-+ if (first_valuator <= 1 && num_valuators >= (2 - first_valuator))
-+ y += valuators[1 - first_valuator];
- }
- else {
- if (first_valuator == 0 && num_valuators >= 1)
-@@ -621,11 +661,6 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- clipAxis(pDev, 0, &x);
- clipAxis(pDev, 1, &y);
-
-- /* This takes care of crossing screens for us, as well as clipping
-- * to the current screen. Right now, we only have one history buffer,
-- * so we don't set this for both the device and core.*/
-- miPointerSetPosition(pDev, &x, &y, ms);
--
- /* Drop x and y back into the valuators list, if they were originally
- * present. */
- if (first_valuator == 0 && num_valuators >= 1)
-@@ -635,12 +670,32 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
-
- updateMotionHistory(pDev, ms, first_valuator, num_valuators, valuators);
-
-+ pDev->valuator->lastx = x;
-+ pDev->valuator->lasty = y;
-+ /* Convert the dev coord back to screen coord if we're
-+ * sending core events */
-+ if (pDev->coreEvents) {
-+ int min = pDev->valuator->axes[0].min_value;
-+ int max = pDev->valuator->axes[0].max_value;
-+ if(min < max)
-+ x = (int)((float)(x-min)*scr->width/(max-min+1));
-+ cp->valuator->lastx = x;
-+ min = pDev->valuator->axes[1].min_value;
-+ max = pDev->valuator->axes[1].max_value;
-+ if(min < max)
-+ y = (int)((float)(y-min)*scr->height/(max-min+1));
-+ cp->valuator->lasty = y;
-+ }
-+
-+ /* This takes care of crossing screens for us, as well as clipping
-+ * to the current screen. Right now, we only have one history buffer,
-+ * so we don't set this for both the device and core.*/
-+ miPointerSetPosition(pDev, &x, &y, ms);
-+
- if (pDev->coreEvents) {
- cp->valuator->lastx = x;
- cp->valuator->lasty = y;
- }
-- pDev->valuator->lastx = x;
-- pDev->valuator->lasty = y;
-
- /* for some reason inputInfo.pointer does not have coreEvents set */
- if (coreOnly || pDev->coreEvents) {
-@@ -678,8 +733,8 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- kbp->detail = pDev->button->map[buttons];
- }
-
-- kbp->root_x = x;
-- kbp->root_y = y;
-+ kbp->root_x = pDev->valuator->lastx;
-+ kbp->root_y = pDev->valuator->lasty;
-
- events++;
- if (num_valuators) {
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0041-dix-Skip-call-to-clipAxis-for-relative-core-events.patch b/x11-base/xorg-server/files/1.4.0.90/0041-dix-Skip-call-to-clipAxis-for-relative-core-events.patch
deleted file mode 100644
index b9e56ce3733c..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0041-dix-Skip-call-to-clipAxis-for-relative-core-events.patch
+++ /dev/null
@@ -1,93 +0,0 @@
-From a68d0ef4a65bcd52c52ba54e6925082a9145fad3 Mon Sep 17 00:00:00 2001
-From: =?utf-8?q?Magnus=20Vigerl=C3=B6f?= <Magnus.Vigerlof@ipbo.se>
-Date: Sat, 2 Feb 2008 23:03:51 +0100
-Subject: [PATCH] dix: Skip call to clipAxis for relative core-events
-
-Relative events that generates both core and extention
-events will have its axis cliped and screen changed by
-miPointerSetPosition when the events are processed. For
-absolute and non core-generating relative events the
-axis must be clipped if we shouldn't end up completely
-outside the defined ranges (if any).
-(cherry picked from commit a0284d577aabea8406b72dd63773e341430ebe56)
----
- dix/getevents.c | 44 +++++++++++++++++++++++++++++++++-----------
- 1 files changed, 33 insertions(+), 11 deletions(-)
-
-diff --git a/dix/getevents.c b/dix/getevents.c
-index e0bc326..c33371b 100644
---- a/dix/getevents.c
-+++ b/dix/getevents.c
-@@ -607,6 +607,10 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- y = cp->valuator->lasty;
- }
- }
-+
-+ /* Clip both x and y to the defined limits (usually co-ord space limit). */
-+ clipAxis(pDev, 0, &x);
-+ clipAxis(pDev, 1, &y);
- }
- else {
- if (flags & POINTER_ACCELERATE)
-@@ -645,22 +649,22 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- y += valuators[1 - first_valuator];
- }
- else {
-+ x = pDev->valuator->lastx;
-+ y = pDev->valuator->lasty;
- if (first_valuator == 0 && num_valuators >= 1)
-- x = pDev->valuator->lastx + valuators[0];
-- else
-- x = pDev->valuator->lastx;
--
-+ x += valuators[0];
- if (first_valuator <= 1 && num_valuators >= (2 - first_valuator))
-- y = pDev->valuator->lasty + valuators[1 - first_valuator];
-- else
-- y = pDev->valuator->lasty;
-+ y += valuators[1 - first_valuator];
-+
-+ if(!coreOnly) {
-+ /* Since we're not sending core-events we must clip both x and y
-+ * to the defined limits so we don't run outside the box. */
-+ clipAxis(pDev, 0, &x);
-+ clipAxis(pDev, 1, &y);
-+ }
- }
- }
-
-- /* Clip both x and y to the defined limits (usually co-ord space limit). */
-- clipAxis(pDev, 0, &x);
-- clipAxis(pDev, 1, &y);
--
- /* Drop x and y back into the valuators list, if they were originally
- * present. */
- if (first_valuator == 0 && num_valuators >= 1)
-@@ -693,6 +697,24 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- miPointerSetPosition(pDev, &x, &y, ms);
-
- if (pDev->coreEvents) {
-+ /* miPointerSetPosition may have changed screen */
-+ scr = miPointerGetScreen(pDev);
-+ if(x != cp->valuator->lastx) {
-+ int min = pDev->valuator->axes[0].min_value;
-+ int max = pDev->valuator->axes[0].max_value;
-+ cp->valuator->lastx = pDev->valuator->lastx = x;
-+ if(min < max)
-+ pDev->valuator->lastx = (int)((float)(x)*(max-min+1)/scr->width)+min;
-+ }
-+ if(y != cp->valuator->lasty) {
-+ int min = pDev->valuator->axes[1].min_value;
-+ int max = pDev->valuator->axes[1].max_value;
-+ cp->valuator->lasty = pDev->valuator->lasty = y;
-+ if(min < max)
-+ pDev->valuator->lasty = (int)((float)(y)*(max-min+1)/scr->height)+min;
-+ }
-+ }
-+ else if (coreOnly) {
- cp->valuator->lastx = x;
- cp->valuator->lasty = y;
- }
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0042-dix-Move-motion-history-update-until-after-screen-c.patch b/x11-base/xorg-server/files/1.4.0.90/0042-dix-Move-motion-history-update-until-after-screen-c.patch
deleted file mode 100644
index 766c9f2fe42d..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0042-dix-Move-motion-history-update-until-after-screen-c.patch
+++ /dev/null
@@ -1,51 +0,0 @@
-From b1145a6b428db2037c79ffb36116e7183f30829f Mon Sep 17 00:00:00 2001
-From: =?utf-8?q?Magnus=20Vigerl=C3=B6f?= <Magnus.Vigerlof@ipbo.se>
-Date: Sat, 2 Feb 2008 23:04:46 +0100
-Subject: [PATCH] dix: Move motion history update until after screen crossing and clipping
-
-Cross screen and clip the coordinates before updating the motion history
-so that it will have the same contents as the events that are reported.
-(cherry picked from commit a56ef7aaa4b6ac13c8181f68fc7dad3ca89e6973)
----
- dix/getevents.c | 18 +++++++++---------
- 1 files changed, 9 insertions(+), 9 deletions(-)
-
-diff --git a/dix/getevents.c b/dix/getevents.c
-index c33371b..d0fe2db 100644
---- a/dix/getevents.c
-+++ b/dix/getevents.c
-@@ -665,15 +665,6 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- }
- }
-
-- /* Drop x and y back into the valuators list, if they were originally
-- * present. */
-- if (first_valuator == 0 && num_valuators >= 1)
-- valuators[0] = x;
-- if (first_valuator <= 1 && num_valuators >= (2 - first_valuator))
-- valuators[1 - first_valuator] = y;
--
-- updateMotionHistory(pDev, ms, first_valuator, num_valuators, valuators);
--
- pDev->valuator->lastx = x;
- pDev->valuator->lasty = y;
- /* Convert the dev coord back to screen coord if we're
-@@ -719,6 +710,15 @@ GetPointerEvents(xEvent *events, DeviceIntPtr pDev, int type, int buttons,
- cp->valuator->lasty = y;
- }
-
-+ /* Drop x and y back into the valuators list, if they were originally
-+ * present. */
-+ if (first_valuator == 0 && num_valuators >= 1)
-+ valuators[0] = pDev->valuator->lastx;
-+ if (first_valuator <= 1 && num_valuators >= (2 - first_valuator))
-+ valuators[1 - first_valuator] = pDev->valuator->lasty;
-+
-+ updateMotionHistory(pDev, ms, first_valuator, num_valuators, valuators);
-+
- /* for some reason inputInfo.pointer does not have coreEvents set */
- if (coreOnly || pDev->coreEvents) {
- events->u.u.type = type;
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0043-XKB-Actually-explain-keymap-failures.patch b/x11-base/xorg-server/files/1.4.0.90/0043-XKB-Actually-explain-keymap-failures.patch
deleted file mode 100644
index 14ac3f9d448b..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0043-XKB-Actually-explain-keymap-failures.patch
+++ /dev/null
@@ -1,145 +0,0 @@
-From 104048501f37b139d4113562ef1711978cc76018 Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Wed, 7 May 2008 23:11:31 +0300
-Subject: [PATCH] XKB: Actually explain keymap failures
-
-When something went wrong building a keymap, try to explain to the user
-what it actually was, instead of the dreaded 'Failed to load XKB keymap'
-catch-all.
-(cherry picked from commit cf20df39cc78203d17b99223908af388ecbf7d0e)
-
-Conflicts:
- xkb/ddxLoad.c
----
- xkb/ddxLoad.c | 69 ++++++++++++++++++++++++++++-----------------------------
- 1 files changed, 34 insertions(+), 35 deletions(-)
-
-diff --git a/xkb/ddxLoad.c b/xkb/ddxLoad.c
-index d79ae7a..ea9c3ff 100644
---- a/xkb/ddxLoad.c
-+++ b/xkb/ddxLoad.c
-@@ -385,24 +385,20 @@ char tmpname[PATH_MAX];
- xfree (buf);
- return True;
- }
--#ifdef DEBUG
- else
-- ErrorF("Error compiling keymap (%s)\n",keymap);
--#endif
-+ LogMessage(X_ERROR, "Error compiling keymap (%s)\n", keymap);
- #ifdef WIN32
- /* remove the temporary file */
- unlink(tmpname);
- #endif
- }
--#ifdef DEBUG
- else {
- #ifndef WIN32
-- ErrorF("Could not invoke keymap compiler\n");
-+ LogMessage(X_ERROR, "XKB: Could not invoke xkbcomp\n");
- #else
-- ErrorF("Could not open file %s\n", tmpname);
-+ LogMessage(X_ERROR, "Could not open file %s\n", tmpname);
- #endif
- }
--#endif
- if (nameRtrn)
- nameRtrn[0]= '\0';
- if (buf != NULL)
-@@ -477,17 +473,14 @@ unsigned missing;
- return 0;
- }
- else if (!XkbDDXCompileNamedKeymap(xkb,names,nameRtrn,nameRtrnLen)) {
--#ifdef NOISY
-- ErrorF("Couldn't compile keymap file\n");
--#endif
-+ LogMessage(X_ERROR, "Couldn't compile keymap file %s\n",
-+ names->keymap);
- return 0;
- }
- }
- else if (!XkbDDXCompileKeymapByNames(xkb,names,want,need,
-- nameRtrn,nameRtrnLen)){
--#ifdef NOISY
-- ErrorF("Couldn't compile keymap file\n");
--#endif
-+ nameRtrn,nameRtrnLen)){
-+ LogMessage(X_ERROR, "XKB: Couldn't compile keymap\n");
- return 0;
- }
- file= XkbDDXOpenConfigFile(nameRtrn,fileName,PATH_MAX);
-@@ -502,11 +495,9 @@ unsigned missing;
- (void) unlink (fileName);
- return 0;
- }
--#ifdef DEBUG
-- else if (xkbDebugFlags) {
-- ErrorF("Loaded %s, defined=0x%x\n",fileName,finfoRtrn->defined);
-+ else {
-+ DebugF("XKB: Loaded %s, defined=0x%x\n",fileName,finfoRtrn->defined);
- }
--#endif
- fclose(file);
- (void) unlink (fileName);
- return (need|want)&(~missing);
-@@ -525,32 +516,40 @@ XkbRF_RulesPtr rules;
-
- if (!rules_name)
- return False;
-- if (XkbBaseDirectory==NULL) {
-- if (strlen(rules_name)+7 > PATH_MAX)
-- return False;
-- sprintf(buf,"rules/%s",rules_name);
-- }
-- else {
-- if (strlen(XkbBaseDirectory)+strlen(rules_name)+8 > PATH_MAX)
-- return False;
-- sprintf(buf,"%s/rules/%s",XkbBaseDirectory,rules_name);
-+
-+ if (strlen(XkbBaseDirectory) + strlen(rules_name) + 8 > PATH_MAX) {
-+ LogMessage(X_ERROR, "XKB: Rules name is too long\n");
-+ return False;
- }
-- if ((file= fopen(buf,"r"))==NULL)
-+ sprintf(buf,"%s/rules/%s", XkbBaseDirectory, rules_name);
-+
-+ file = fopen(buf, "r");
-+ if (!file) {
-+ LogMessage(X_ERROR, "XKB: Couldn't open rules file %s\n", file);
- return False;
-- if ((rules= XkbRF_Create(0,0))==NULL) {
-+ }
-+
-+ rules = XkbRF_Create(0, 0);
-+ if (!rules) {
-+ LogMessage(X_ERROR, "XKB: Couldn't create rules struct\n");
- fclose(file);
- return False;
- }
-- if (!XkbRF_LoadRules(file,rules)) {
-+
-+ if (!XkbRF_LoadRules(file, rules)) {
-+ LogMessage(X_ERROR, "XKB: Couldn't parse rules file %s\n", rules_name);
- fclose(file);
- XkbRF_Free(rules,True);
- return False;
- }
-- bzero((char *)names,sizeof(XkbComponentNamesRec));
-- complete= XkbRF_GetComponents(rules,defs,names);
-+
-+ memset(names, 0, sizeof(*names));
-+ complete = XkbRF_GetComponents(rules,defs,names);
- fclose(file);
-- XkbRF_Free(rules,True);
-- return complete;
--}
-+ XkbRF_Free(rules, True);
-
-+ if (!complete)
-+ LogMessage(X_ERROR, "XKB: Rules returned no components\n");
-
-+ return complete;
-+}
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0044-kdrive-allow-disabling-Composite.patch b/x11-base/xorg-server/files/1.4.0.90/0044-kdrive-allow-disabling-Composite.patch
deleted file mode 100644
index b81bf80d0149..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0044-kdrive-allow-disabling-Composite.patch
+++ /dev/null
@@ -1,33 +0,0 @@
-From 3f8ba890762513edc7eddbbbd4bb26f908540c8d Mon Sep 17 00:00:00 2001
-From: Julien Cristau <jcristau@debian.org>
-Date: Sun, 11 May 2008 23:17:27 +0200
-Subject: [PATCH] kdrive: allow disabling Composite
-
-KdInitOutput() used to enable Composite when it was disabled by default,
-but now this hack prevents ``-extension Composite'' from working.
-Remove it, as Composite is enabled by default anyway.
-(cherry picked from commit 9dfb525f6c91acab5d1a65765a046bf9ee2aa082)
----
- hw/kdrive/src/kdrive.c | 6 ------
- 1 files changed, 0 insertions(+), 6 deletions(-)
-
-diff --git a/hw/kdrive/src/kdrive.c b/hw/kdrive/src/kdrive.c
-index 2bb7b53..cd4ea7d 100644
---- a/hw/kdrive/src/kdrive.c
-+++ b/hw/kdrive/src/kdrive.c
-@@ -1387,12 +1387,6 @@ KdInitOutput (ScreenInfo *pScreenInfo,
- KdCardInfo *card;
- KdScreenInfo *screen;
-
--#ifdef COMPOSITE
-- /* kind of a hack: we want Composite enabled, but it's disabled per
-- * default. */
-- noCompositeExtension = FALSE;
--#endif
--
- if (!kdCardInfo)
- {
- InitCard (0);
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0045-When-XKB-fails-to-open-rules-file-log-the-file-name.patch b/x11-base/xorg-server/files/1.4.0.90/0045-When-XKB-fails-to-open-rules-file-log-the-file-name.patch
deleted file mode 100644
index 37e99ebcd33a..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0045-When-XKB-fails-to-open-rules-file-log-the-file-name.patch
+++ /dev/null
@@ -1,26 +0,0 @@
-From d0554a57489e272233bcb38cb453f2c0bc0b1729 Mon Sep 17 00:00:00 2001
-From: Alan Coopersmith <alan.coopersmith@sun.com>
-Date: Tue, 13 May 2008 16:39:30 -0700
-Subject: [PATCH] When XKB fails to open rules file, log the file name, not the NULL file pointer
- (cherry picked from commit 7cdc19b29d93bf15cecfd6b69e269fab2501bca0)
-
----
- xkb/ddxLoad.c | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/xkb/ddxLoad.c b/xkb/ddxLoad.c
-index ea9c3ff..eb03cde 100644
---- a/xkb/ddxLoad.c
-+++ b/xkb/ddxLoad.c
-@@ -525,7 +525,7 @@ XkbRF_RulesPtr rules;
-
- file = fopen(buf, "r");
- if (!file) {
-- LogMessage(X_ERROR, "XKB: Couldn't open rules file %s\n", file);
-+ LogMessage(X_ERROR, "XKB: Couldn't open rules file %s\n", buf);
- return False;
- }
-
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0046-dmx-fix-build-by-adding-New-Delete-InputDeviceRequ.patch b/x11-base/xorg-server/files/1.4.0.90/0046-dmx-fix-build-by-adding-New-Delete-InputDeviceRequ.patch
deleted file mode 100644
index 2f9e037513c9..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0046-dmx-fix-build-by-adding-New-Delete-InputDeviceRequ.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-From 71f0711f40d825de3f1a7a09de78c6181fb3a521 Mon Sep 17 00:00:00 2001
-From: Donnie Berkholz <dberkholz@gentoo.org>
-Date: Thu, 8 May 2008 00:04:36 -0700
-Subject: [PATCH] dmx: fix build by adding {New,Delete}InputDeviceRequest.
-
----
- hw/dmx/dmxinput.c | 11 +++++++++++
- 1 files changed, 11 insertions(+), 0 deletions(-)
-
-diff --git a/hw/dmx/dmxinput.c b/hw/dmx/dmxinput.c
-index d644b5d..83f8a4a 100644
---- a/hw/dmx/dmxinput.c
-+++ b/hw/dmx/dmxinput.c
-@@ -105,3 +105,14 @@ void dmxUpdateWindowInfo(DMXUpdateType type, WindowPtr pWindow)
- if (!dmxInput->detached && dmxInput->updateWindowInfo)
- dmxInput->updateWindowInfo(dmxInput, type, pWindow);
- }
-+
-+int
-+NewInputDeviceRequest (InputOption *options, DeviceIntPtr *pdev)
-+{
-+ return BadRequest;
-+}
-+
-+void
-+DeleteInputDeviceRequest(DeviceIntPtr pDev)
-+{
-+}
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0047-dmx-link-in-XSERVER_LIBS.patch b/x11-base/xorg-server/files/1.4.0.90/0047-dmx-link-in-XSERVER_LIBS.patch
deleted file mode 100644
index 052fc2a88519..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0047-dmx-link-in-XSERVER_LIBS.patch
+++ /dev/null
@@ -1,24 +0,0 @@
-From 6c5c1c5c9819fe9a5f2e2a6995017e414662d6cf Mon Sep 17 00:00:00 2001
-From: Donnie Berkholz <dberkholz@gentoo.org>
-Date: Thu, 8 May 2008 00:05:00 -0700
-Subject: [PATCH] dmx: link in XSERVER_LIBS.
-
----
- hw/dmx/Makefile.am | 1 +
- 1 files changed, 1 insertions(+), 0 deletions(-)
-
-diff --git a/hw/dmx/Makefile.am b/hw/dmx/Makefile.am
-index 002ea11..15dc281 100644
---- a/hw/dmx/Makefile.am
-+++ b/hw/dmx/Makefile.am
-@@ -87,6 +87,7 @@ Xdmx_LDADD = $(XORG_CORE_LIBS) \
- $(GLX_LIBS) \
- input/libdmxinput.a \
- config/libdmxconfig.a \
-+ @XSERVER_LIBS@ \
- @DMXMODULES_LIBS@
-
- # Man page
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0048-xephyr-fix-linking-by-adding-pixman-and-using-XSERV.patch b/x11-base/xorg-server/files/1.4.0.90/0048-xephyr-fix-linking-by-adding-pixman-and-using-XSERV.patch
deleted file mode 100644
index 23c3dafa1767..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0048-xephyr-fix-linking-by-adding-pixman-and-using-XSERV.patch
+++ /dev/null
@@ -1,38 +0,0 @@
-From 9df3886354152250983171825daeb93a6a845369 Mon Sep 17 00:00:00 2001
-From: Donnie Berkholz <dberkholz@gentoo.org>
-Date: Thu, 8 May 2008 00:06:16 -0700
-Subject: [PATCH] xephyr: fix linking by adding pixman and using XSERVER_LIBS.
-
----
- configure.ac | 2 +-
- hw/kdrive/ephyr/Makefile.am | 1 +
- 2 files changed, 2 insertions(+), 1 deletions(-)
-
-diff --git a/configure.ac b/configure.ac
-index c73f4a7..6145aa2 100644
---- a/configure.ac
-+++ b/configure.ac
-@@ -1814,7 +1814,7 @@ if test "$KDRIVE" = yes; then
- XSDL_INCS="`sdl-config --cflags` $XSERVER_CFLAGS"
- fi
-
-- PKG_CHECK_MODULES(XEPHYR, x11 xext xfont xau xdmcp, [xephyr="yes"], [xephyr="no"])
-+ PKG_CHECK_MODULES(XEPHYR, x11 xext xfont xau xdmcp $PIXMAN, [xephyr="yes"], [xephyr="no"])
- if test "x$XEPHYR" = xauto; then
- XEPHYR=$xephyr
- fi
-diff --git a/hw/kdrive/ephyr/Makefile.am b/hw/kdrive/ephyr/Makefile.am
-index cc3019f..1738d0f 100644
---- a/hw/kdrive/ephyr/Makefile.am
-+++ b/hw/kdrive/ephyr/Makefile.am
-@@ -28,6 +28,7 @@ Xephyr_LDADD = \
- libxephyr-hostx.a \
- ../../../exa/libexa.la \
- @KDRIVE_LIBS@ \
-+ @XSERVER_LIBS@ \
- @XEPHYR_LIBS@
-
- Xephyr_DEPENDENCIES = \
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0049-xprint-fix-build-by-adding-New-Delete-InputDeviceR.patch b/x11-base/xorg-server/files/1.4.0.90/0049-xprint-fix-build-by-adding-New-Delete-InputDeviceR.patch
deleted file mode 100644
index a70727c1e2bc..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0049-xprint-fix-build-by-adding-New-Delete-InputDeviceR.patch
+++ /dev/null
@@ -1,34 +0,0 @@
-From 1022c7774b0a92946e87c61aa79b076a6ffe95ff Mon Sep 17 00:00:00 2001
-From: Donnie Berkholz <dberkholz@gentoo.org>
-Date: Thu, 8 May 2008 00:07:57 -0700
-Subject: [PATCH] xprint: fix build by adding {New,Delete}InputDeviceRequest.
-
----
- hw/xprint/ddxInit.c | 11 +++++++++++
- 1 files changed, 11 insertions(+), 0 deletions(-)
-
-diff --git a/hw/xprint/ddxInit.c b/hw/xprint/ddxInit.c
-index a465c4c..1e7652e 100644
---- a/hw/xprint/ddxInit.c
-+++ b/hw/xprint/ddxInit.c
-@@ -310,6 +310,17 @@ ChangeDeviceControl (
- return BadMatch;
- }
-
-+int
-+NewInputDeviceRequest(InputOption *options, DeviceIntPtr *pdev)
-+{
-+ return BadValue;
-+}
-+
-+void
-+DeleteInputDeviceRequest(DeviceIntPtr dev)
-+{
-+}
-+
- void
- OpenInputDevice (
- DeviceIntPtr dev,
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0050-xprint-fix-linking-by-including-XSERVER_LIBS.patch b/x11-base/xorg-server/files/1.4.0.90/0050-xprint-fix-linking-by-including-XSERVER_LIBS.patch
deleted file mode 100644
index d31bedb23c6b..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0050-xprint-fix-linking-by-including-XSERVER_LIBS.patch
+++ /dev/null
@@ -1,25 +0,0 @@
-From 9db5401d69f1fab8db4bdd166536a25e4516e231 Mon Sep 17 00:00:00 2001
-From: Donnie Berkholz <dberkholz@gentoo.org>
-Date: Thu, 8 May 2008 00:08:12 -0700
-Subject: [PATCH] xprint: fix linking by including XSERVER_LIBS.
-
----
- hw/xprint/Makefile.am | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/hw/xprint/Makefile.am b/hw/xprint/Makefile.am
-index f834966..2269544 100644
---- a/hw/xprint/Makefile.am
-+++ b/hw/xprint/Makefile.am
-@@ -12,7 +12,7 @@ Xprt_LDFLAGS = -L$(top_srcdir)
- Xprt_LDADD = @XPRINT_LIBS@ ps/libps.la raster/libraster.la \
- pcl/libpcl.la pcl-mono/libpcl.la $(top_builddir)/fb/libfb.la \
- $(top_builddir)/render/librender.la $(top_builddir)/mi/libmi.la \
-- $(top_builddir)/Xext/libXext.la @FREETYPE_LIBS@
-+ $(top_builddir)/Xext/libXext.la @FREETYPE_LIBS@ @XSERVER_LIBS@
-
- miinitext-wrapper.c:
- echo "#include \"$(top_srcdir)/mi/miinitext.c\"" >> $@
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0051-Fix-RandR-1.2-driver-interface-conversion-of-two-col.patch b/x11-base/xorg-server/files/1.4.0.90/0051-Fix-RandR-1.2-driver-interface-conversion-of-two-col.patch
deleted file mode 100644
index 6c9b60bdc99a..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0051-Fix-RandR-1.2-driver-interface-conversion-of-two-col.patch
+++ /dev/null
@@ -1,31 +0,0 @@
-From 2621380cf680941a0423d64d827fb3513545ebf5 Mon Sep 17 00:00:00 2001
-From: =?utf-8?q?Michel=20D=C3=A4nzer?= <michel@tungstengraphics.com>
-Date: Thu, 20 Mar 2008 09:18:29 -0400
-Subject: [PATCH] Fix RandR 1.2 driver interface conversion of two colour cursors to ARGB
-
-This patch (and not setting HARDWARE_CURSOR_BIT_ORDER_MSBFIRST on big endian
-platforms) fixes it for me with the radeon driver and doesn't break intel.
-
-Correct patch this time :)
-(cherry picked from commit da973e962d09854b571320dee7dd9569060bc39e)
----
- hw/xfree86/modes/xf86Cursors.c | 3 ++-
- 1 files changed, 2 insertions(+), 1 deletions(-)
-
-diff --git a/hw/xfree86/modes/xf86Cursors.c b/hw/xfree86/modes/xf86Cursors.c
-index b510164..a7616e0 100644
---- a/hw/xfree86/modes/xf86Cursors.c
-+++ b/hw/xfree86/modes/xf86Cursors.c
-@@ -137,7 +137,8 @@ cursor_bitpos (int flags, int x, Bool mask)
- mask = !mask;
- if (flags & HARDWARE_CURSOR_NIBBLE_SWAPPED)
- x = (x & ~3) | (3 - (x & 3));
-- if (flags & HARDWARE_CURSOR_BIT_ORDER_MSBFIRST)
-+ if (((flags & HARDWARE_CURSOR_BIT_ORDER_MSBFIRST) == 0) ==
-+ (X_BYTE_ORDER == X_BIG_ENDIAN))
- x = (x & ~7) | (7 - (x & 7));
- if (flags & HARDWARE_CURSOR_SOURCE_MASK_INTERLEAVE_1)
- x = (x << 1) + mask;
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0052-Fix-overly-restrictive-integer-overflow-check-in-EXA.patch b/x11-base/xorg-server/files/1.4.0.90/0052-Fix-overly-restrictive-integer-overflow-check-in-EXA.patch
deleted file mode 100644
index 0a7561f295f4..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0052-Fix-overly-restrictive-integer-overflow-check-in-EXA.patch
+++ /dev/null
@@ -1,28 +0,0 @@
-From 458b487723a7beb792857c920e9be22c2ce4625d Mon Sep 17 00:00:00 2001
-From: Eric Anholt <eric@anholt.net>
-Date: Fri, 17 Aug 2007 12:14:16 -0700
-Subject: [PATCH] Fix overly-restrictive integer overflow check in EXA pixmap creation.
-
-The result was that at 32bpp, pixmaps of width 8192 or greater couldn't be
-created, due to treating a pitch value as a width.
-(cherry picked from commit bc2d516f16d94c805b4dfa8e5b9eef40ff0cbe98)
----
- exa/exa.c | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/exa/exa.c b/exa/exa.c
-index aa42b92..b2faf2f 100644
---- a/exa/exa.c
-+++ b/exa/exa.c
-@@ -253,7 +253,7 @@ exaCreatePixmap(ScreenPtr pScreen, int w, int h, int depth)
- pExaScr->info->pixmapPitchAlign);
- pExaPixmap->fb_size = pExaPixmap->fb_pitch * h;
-
-- if (pExaPixmap->fb_pitch > 32767) {
-+ if (pExaPixmap->fb_pitch > 131071) {
- fbDestroyPixmap(pPixmap);
- return NULL;
- }
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0053-Fix-hal-shutdown-crash.patch b/x11-base/xorg-server/files/1.4.0.90/0053-Fix-hal-shutdown-crash.patch
deleted file mode 100644
index 4d24c51c3a04..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0053-Fix-hal-shutdown-crash.patch
+++ /dev/null
@@ -1,44 +0,0 @@
-From d5a7badd6a0ea4ecbe76f0205aa53b42f7cd90dc Mon Sep 17 00:00:00 2001
-From: Adam Jackson <ajax@redhat.com>
-Date: Mon, 5 May 2008 14:37:07 -0400
-Subject: [PATCH] Fix hal shutdown crash.
-
-Removing the device invalidates its ->next pointer. Copy it aside before
-destroying the device.
-(cherry picked from commit f52f6c5c7efc281f9ac204fbaa4f71383df7463d)
----
- config/hal.c | 8 +++++---
- 1 files changed, 5 insertions(+), 3 deletions(-)
-
-diff --git a/config/hal.c b/config/hal.c
-index 16f16ec..bdf7d6c 100644
---- a/config/hal.c
-+++ b/config/hal.c
-@@ -63,7 +63,7 @@ remove_device(DeviceIntPtr dev)
- static void
- device_removed(LibHalContext *ctx, const char *udi)
- {
-- DeviceIntPtr dev;
-+ DeviceIntPtr dev, next;
- char *value;
-
- value = xalloc(strlen(udi) + 5); /* "hal:" + NULL */
-@@ -71,11 +71,13 @@ device_removed(LibHalContext *ctx, const char *udi)
- return;
- sprintf(value, "hal:%s", udi);
-
-- for (dev = inputInfo.devices; dev; dev = dev->next) {
-+ for (dev = inputInfo.devices; dev; dev = next) {
-+ next = dev->next;
- if (dev->config_info && strcmp(dev->config_info, value) == 0)
- remove_device(dev);
- }
-- for (dev = inputInfo.off_devices; dev; dev = dev->next) {
-+ for (dev = inputInfo.off_devices; dev; dev = next) {
-+ next = dev->next;
- if (dev->config_info && strcmp(dev->config_info, value) == 0)
- remove_device(dev);
- }
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0054-Bump-DEFAULT_DPI-to-96.patch b/x11-base/xorg-server/files/1.4.0.90/0054-Bump-DEFAULT_DPI-to-96.patch
deleted file mode 100644
index 776521146874..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0054-Bump-DEFAULT_DPI-to-96.patch
+++ /dev/null
@@ -1,27 +0,0 @@
-From a08f848d4cd4c8c6e055a1182542d053a0a32c6b Mon Sep 17 00:00:00 2001
-From: Adam Jackson <ajax@aspartame.nwnk.net>
-Date: Sun, 18 Nov 2007 11:57:01 -0500
-Subject: [PATCH] Bump DEFAULT_DPI to 96.
-
-75 is just nonsense.
-(cherry picked from commit db9ae863536fff80b5463d99e71dc47ae587980d)
----
- hw/xfree86/common/xf86Priv.h | 2 +-
- 1 files changed, 1 insertions(+), 1 deletions(-)
-
-diff --git a/hw/xfree86/common/xf86Priv.h b/hw/xfree86/common/xf86Priv.h
-index b6fbd3a..5a3cba3 100644
---- a/hw/xfree86/common/xf86Priv.h
-+++ b/hw/xfree86/common/xf86Priv.h
-@@ -119,7 +119,7 @@ extern RootWinPropPtr *xf86RegisteredPropertiesTable;
- #define DEFAULT_LOG_VERBOSE 3
- #endif
- #ifndef DEFAULT_DPI
--#define DEFAULT_DPI 75
-+#define DEFAULT_DPI 96
- #endif
-
- #define DEFAULT_UNRESOLVED TRUE
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0055-Bug-13962-Re-arm-the-DPMS-timer-when-re-enabling-D.patch b/x11-base/xorg-server/files/1.4.0.90/0055-Bug-13962-Re-arm-the-DPMS-timer-when-re-enabling-D.patch
deleted file mode 100644
index 5c468a8733a5..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0055-Bug-13962-Re-arm-the-DPMS-timer-when-re-enabling-D.patch
+++ /dev/null
@@ -1,35 +0,0 @@
-From 33a9ee9ba0ab44548afafa965bbd0a715cb1509c Mon Sep 17 00:00:00 2001
-From: Adam Jackson <ajax@redhat.com>
-Date: Mon, 24 Mar 2008 12:22:19 -0400
-Subject: [PATCH] Bug #13962: Re-arm the DPMS timer when re-enabling DPMS.
- (cherry picked from commit 536f2ff5382aaaace3b55481e15366bb15d87801)
-
----
- Xext/dpms.c | 7 +++++--
- 1 files changed, 5 insertions(+), 2 deletions(-)
-
-diff --git a/Xext/dpms.c b/Xext/dpms.c
-index aced406..0557523 100644
---- a/Xext/dpms.c
-+++ b/Xext/dpms.c
-@@ -200,12 +200,15 @@ static int
- ProcDPMSEnable(client)
- register ClientPtr client;
- {
-- /* REQUEST(xDPMSEnableReq); */
-+ Bool was_enabled = DPMSEnabled;
-
- REQUEST_SIZE_MATCH(xDPMSEnableReq);
-
-- if (DPMSCapableFlag)
-+ if (DPMSCapableFlag) {
- DPMSEnabled = TRUE;
-+ if (!was_enabled)
-+ SetScreenSaverTimer();
-+ }
-
- return(client->noClientException);
- }
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0056-Prevent-the-wm-command-line-option-from-causing-a-S.patch b/x11-base/xorg-server/files/1.4.0.90/0056-Prevent-the-wm-command-line-option-from-causing-a-S.patch
deleted file mode 100644
index 8b47563d461b..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0056-Prevent-the-wm-command-line-option-from-causing-a-S.patch
+++ /dev/null
@@ -1,47 +0,0 @@
-From 2989f1071648770b5bbbfd80979f04d949f3dc57 Mon Sep 17 00:00:00 2001
-From: Daniel Stone <daniel@fooishbar.org>
-Date: Fri, 16 May 2008 19:49:05 +0300
-Subject: [PATCH] Prevent the -wm command line option from causing a SEGV
-MIME-Version: 1.0
-Content-Type: text/plain; charset=utf-8
-Content-Transfer-Encoding: 8bit
-
-The -wm (when mapped) option for the BackingStore support has been
-causing the server to dereference a NULL pointer.
-
-This has probably been the case since backing store has been
-implemented on top of Composite.
-
-It looks like (some of?) Composite didn’t expect its WIndowPtr
-argument to be the root window.
-
-In Composite’s compCheckRedirect() function we now avoid calling
-compAllocPixmap() and compFreePixmap() when the pWin pointer’s
-parent member is NULL, as is it the case with a server’s root window.
-
-This addresses:
-
-https://bugs.freedesktop.org/show_bug.cgi?id=15878
-(cherry picked from commit 04211c3532ca078420e3745a5eac3d9de120bc32)
----
- composite/compwindow.c | 4 ++--
- 1 files changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/composite/compwindow.c b/composite/compwindow.c
-index 33192ad..65f77cf 100644
---- a/composite/compwindow.c
-+++ b/composite/compwindow.c
-@@ -146,8 +146,8 @@ compCheckRedirect (WindowPtr pWin)
- Bool should;
-
- should = pWin->realized && (pWin->drawable.class != InputOnly) &&
-- (cw != NULL);
--
-+ (cw != NULL) && (pWin->parent != NULL);
-+
- /* Never redirect the overlay window */
- if (cs->pOverlayWin != NULL) {
- if (pWin == cs->pOverlayWin) {
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0057-EXA-Skip-empty-glyphs.-cherry-picked-from-commit-c.patch b/x11-base/xorg-server/files/1.4.0.90/0057-EXA-Skip-empty-glyphs.-cherry-picked-from-commit-c.patch
deleted file mode 100644
index 92a2eb610b70..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0057-EXA-Skip-empty-glyphs.-cherry-picked-from-commit-c.patch
+++ /dev/null
@@ -1,24 +0,0 @@
-From 22b1a9dd0f68e3307cdcf3e6f8fcaeda34acd483 Mon Sep 17 00:00:00 2001
-From: =?utf-8?q?Michel=20D=C3=A4nzer?= <michel@tungstengraphics.com>
-Date: Thu, 18 Oct 2007 17:44:48 +0200
-Subject: [PATCH] EXA: Skip empty glyphs. (cherry picked from commit ce50bfd3369686cfecee5a138bd84ef1107a249d)
-
----
- exa/exa_render.c | 1 +
- 1 files changed, 1 insertions(+), 0 deletions(-)
-
-diff --git a/exa/exa_render.c b/exa/exa_render.c
-index 2dd3fc1..ad1c02b 100644
---- a/exa/exa_render.c
-+++ b/exa/exa_render.c
-@@ -1184,6 +1184,7 @@ exaGlyphs (CARD8 op,
- y1 = y - glyph->info.y;
-
- if (x1 >= pCmpDrw->width || y1 >= pCmpDrw->height ||
-+ glyph->info.width == 0 || glyph->info.height == 0 ||
- (x1 + glyph->info.width) <= 0 || (y1 + glyph->info.height) <= 0)
- goto nextglyph;
-
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0058-xf86-Add-AutoConfig-driver-for-PCI-ID-1022-2081-to.patch b/x11-base/xorg-server/files/1.4.0.90/0058-xf86-Add-AutoConfig-driver-for-PCI-ID-1022-2081-to.patch
deleted file mode 100644
index 94ee0fa271ff..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0058-xf86-Add-AutoConfig-driver-for-PCI-ID-1022-2081-to.patch
+++ /dev/null
@@ -1,39 +0,0 @@
-From 4e5cf76ecaa6b20f825738b07c257f4929e4652a Mon Sep 17 00:00:00 2001
-From: Mart Raudsepp <mart.raudsepp@artecdesign.ee>
-Date: Fri, 16 May 2008 20:06:31 +0300
-Subject: [PATCH] xf86: Add AutoConfig driver for PCI ID 1022:2081 to 'amd'
-
-(cherry picked from commit ab9b0b36ac8ac72fc48c0abd91a83de49a18313c)
-(cherry picked from commit 4fa89fbe18c929e0d36305ab47e7e17841309ffd)
-... and backported to 1.4 (back to no new devprivates and "amd" driver name)
----
- hw/xfree86/common/xf86AutoConfig.c | 9 +++++++--
- 1 files changed, 7 insertions(+), 2 deletions(-)
-
-diff --git a/hw/xfree86/common/xf86AutoConfig.c b/hw/xfree86/common/xf86AutoConfig.c
-index 4f6a98a..703d156 100644
---- a/hw/xfree86/common/xf86AutoConfig.c
-+++ b/hw/xfree86/common/xf86AutoConfig.c
-@@ -160,12 +160,17 @@ videoPtrToDriverName(pciVideoPtr info)
- {
- /*
- * things not handled yet:
-- * amd/cyrix/nsc
-- * xgi
-+ * cyrix/nsc. should be merged into geode anyway.
-+ * xgi.
- */
-
- switch (info->vendor)
- {
-+ case 0x1022:
-+ if (info->chipType == 0x2081)
-+ return "amd";
-+ else
-+ return NULL;
- case 0x1142: return "apm";
- case 0xedd8: return "ark";
- case 0x1a03: return "ast";
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/files/1.4.0.90/0059-xkb-when-copying-the-keymap-make-sure-the-structs.patch b/x11-base/xorg-server/files/1.4.0.90/0059-xkb-when-copying-the-keymap-make-sure-the-structs.patch
deleted file mode 100644
index 2c04964973c3..000000000000
--- a/x11-base/xorg-server/files/1.4.0.90/0059-xkb-when-copying-the-keymap-make-sure-the-structs.patch
+++ /dev/null
@@ -1,121 +0,0 @@
-From ddcca23a81abf5215f906a7ad097f1ed088ed92b Mon Sep 17 00:00:00 2001
-From: Peter Hutterer <peter@cs.unisa.edu.au>
-Date: Thu, 7 Feb 2008 15:48:04 +1030
-Subject: [PATCH] xkb: when copying the keymap, make sure the structs default to 0/NULL.
-
-It actually does help if a pointer is NULL rather than pointing to nirvana
-when you're trying to free it lateron. Who would have thought?
-(cherry picked from commit 7a97ca667405a42d008265c3a870210cc1da97dd)
-(cherry picked from commit 0b0a09797302ac2171db5df20fc5110aafc8efbb)
----
- xkb/xkbUtils.c | 23 +++++++++++++++--------
- 1 files changed, 15 insertions(+), 8 deletions(-)
-
-diff --git a/xkb/xkbUtils.c b/xkb/xkbUtils.c
-index e90df0d..ce4df4c 100644
---- a/xkb/xkbUtils.c
-+++ b/xkb/xkbUtils.c
-@@ -1707,9 +1707,8 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- else {
- if (dst->geom->sz_shapes) {
- xfree(dst->geom->shapes);
-- dst->geom->shapes = NULL;
- }
--
-+ dst->geom->shapes = NULL;
- dst->geom->num_shapes = 0;
- dst->geom->sz_shapes = 0;
- }
-@@ -1758,6 +1757,7 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- }
-
- dst->geom->num_sections = 0;
-+ dst->geom->sections = NULL;
- }
-
- if (src->geom->num_sections) {
-@@ -1769,6 +1769,7 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- tmp = xalloc(src->geom->num_sections * sizeof(XkbSectionRec));
- if (!tmp)
- return FALSE;
-+ memset(tmp, 0, src->geom->num_sections * sizeof(XkbSectionRec));
- dst->geom->sections = tmp;
- dst->geom->num_sections = src->geom->num_sections;
-
-@@ -1804,6 +1805,10 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- return FALSE;
- dsection->doodads = tmp;
- }
-+ else {
-+ dsection->doodads = NULL;
-+ }
-+
- for (k = 0,
- sdoodad = ssection->doodads,
- ddoodad = dsection->doodads;
-@@ -1831,9 +1836,9 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- else {
- if (dst->geom->sz_sections) {
- xfree(dst->geom->sections);
-- dst->geom->sections = NULL;
- }
-
-+ dst->geom->sections = NULL;
- dst->geom->num_sections = 0;
- dst->geom->sz_sections = 0;
- }
-@@ -1862,6 +1867,8 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- }
- }
- }
-+ dst->geom->num_doodads = 0;
-+ dst->geom->doodads = NULL;
- }
-
- if (src->geom->num_doodads) {
-@@ -1874,7 +1881,7 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- sizeof(XkbDoodadRec));
- if (!tmp)
- return FALSE;
-- bzero(tmp, src->geom->num_doodads * sizeof(XkbDoodadRec));
-+ memset(tmp, 0, src->geom->num_doodads * sizeof(XkbDoodadRec));
- dst->geom->doodads = tmp;
-
- dst->geom->sz_doodads = src->geom->num_doodads;
-@@ -1903,9 +1910,9 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- else {
- if (dst->geom->sz_doodads) {
- xfree(dst->geom->doodads);
-- dst->geom->doodads = NULL;
- }
-
-+ dst->geom->doodads = NULL;
- dst->geom->num_doodads = 0;
- dst->geom->sz_doodads = 0;
- }
-@@ -1933,10 +1940,10 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- dst->geom->num_key_aliases = dst->geom->sz_key_aliases;
- }
- else {
-- if (dst->geom->sz_key_aliases && dst->geom->key_aliases) {
-+ if (dst->geom->key_aliases) {
- xfree(dst->geom->key_aliases);
-- dst->geom->key_aliases = NULL;
- }
-+ dst->geom->key_aliases = NULL;
- dst->geom->num_key_aliases = 0;
- dst->geom->sz_key_aliases = 0;
- }
-@@ -1967,8 +1974,8 @@ XkbCopyKeymap(XkbDescPtr src, XkbDescPtr dst, Bool sendNotifies)
- else {
- if (dst->geom->label_font) {
- xfree(dst->geom->label_font);
-- dst->geom->label_font = NULL;
- }
-+ dst->geom->label_font = NULL;
- dst->geom->label_color = NULL;
- dst->geom->base_color = NULL;
- }
---
-1.5.5.1
-
diff --git a/x11-base/xorg-server/xorg-server-1.4.0.90-r4.ebuild b/x11-base/xorg-server/xorg-server-1.4.0.90-r4.ebuild
deleted file mode 100644
index 02db9feb8822..000000000000
--- a/x11-base/xorg-server/xorg-server-1.4.0.90-r4.ebuild
+++ /dev/null
@@ -1,576 +0,0 @@
-# Copyright 1999-2008 Gentoo Foundation
-# Distributed under the terms of the GNU General Public License v2
-# $Header: /var/cvsroot/gentoo-x86/x11-base/xorg-server/xorg-server-1.4.0.90-r4.ebuild,v 1.5 2008/05/21 17:22:00 dberkholz Exp $
-
-# Must be before x-modular eclass is inherited
-SNAPSHOT="yes"
-
-inherit x-modular multilib
-
-OPENGL_DIR="xorg-x11"
-
-MESA_PN="Mesa"
-MESA_PV="7.0.2"
-MESA_P="${MESA_PN}-${MESA_PV}"
-MESA_SRC_P="${MESA_PN}Lib-${MESA_PV}"
-
-SRC_URI="${SRC_URI}
- mirror://sourceforge/mesa3d/${MESA_SRC_P}.tar.bz2
- http://xorg.freedesktop.org/releases/individual/xserver/${P}.tar.bz2"
-DESCRIPTION="X.Org X servers"
-KEYWORDS=""
-IUSE_INPUT_DEVICES="
- input_devices_acecad
- input_devices_aiptek
- input_devices_calcomp
- input_devices_citron
- input_devices_digitaledge
- input_devices_dmc
- input_devices_dynapro
- input_devices_elo2300
- input_devices_elographics
- input_devices_evdev
- input_devices_fpit
- input_devices_hyperpen
- input_devices_jamstudio
- input_devices_joystick
- input_devices_keyboard
- input_devices_magellan
- input_devices_microtouch
- input_devices_mouse
- input_devices_mutouch
- input_devices_palmax
- input_devices_penmount
- input_devices_spaceorb
- input_devices_summa
- input_devices_tek4957
- input_devices_ur98
- input_devices_vmmouse
- input_devices_void
-
- input_devices_synaptics
- input_devices_wacom"
-IUSE_VIDEO_CARDS="
- video_cards_apm
- video_cards_ark
- video_cards_chips
- video_cards_cirrus
- video_cards_cyrix
- video_cards_dummy
- video_cards_epson
- video_cards_fbdev
- video_cards_geode
- video_cards_glint
- video_cards_i128
- video_cards_i740
- video_cards_i810
- video_cards_impact
- video_cards_imstt
- video_cards_mach64
- video_cards_mga
- video_cards_neomagic
- video_cards_newport
- video_cards_nsc
- video_cards_nv
- video_cards_r128
- video_cards_radeon
- video_cards_rendition
- video_cards_s3
- video_cards_s3virge
- video_cards_savage
- video_cards_siliconmotion
- video_cards_sis
- video_cards_sisusb
- video_cards_sunbw2
- video_cards_suncg14
- video_cards_suncg3
- video_cards_suncg6
- video_cards_sunffb
- video_cards_sunleo
- video_cards_suntcx
- video_cards_tdfx
- video_cards_tga
- video_cards_trident
- video_cards_tseng
- video_cards_v4l
- video_cards_vermilion
- video_cards_vesa
- video_cards_vga
- video_cards_via
- video_cards_vmware
- video_cards_voodoo
- video_cards_xgi
- video_cards_fglrx
- video_cards_nvidia"
-IUSE_SERVERS="dmx kdrive xorg"
-IUSE="${IUSE_VIDEO_CARDS}
- ${IUSE_INPUT_DEVICES}
- ${IUSE_SERVERS}
- 3dfx
- dri hal ipv6 minimal nptl sdl xprint"
-RDEPEND="hal? ( sys-apps/hal )
- >=x11-libs/libXfont-1.3.1
- >=x11-libs/xtrans-1.0.4
- >=x11-libs/libXau-1.0.3
- >=x11-libs/libXext-1.0.2
- >=x11-libs/libX11-1.1.3
- >=x11-libs/libxkbfile-1.0.4
- >=x11-libs/libXdmcp-1.0.2
- >=x11-libs/libXmu-1.0.3
- >=x11-libs/libXrender-0.9.4
- >=x11-libs/libXi-1.1.3
- >=x11-libs/pixman-0.9.5
- media-libs/freetype
- >=media-libs/mesa-7.0.1
- media-fonts/font-adobe-75dpi
- media-fonts/font-misc-misc
- media-fonts/font-cursor-misc
- >=x11-misc/xbitmaps-1.0.1
- >=x11-misc/xkeyboard-config-0.9
- >=x11-apps/iceauth-1.0.2
- >=x11-apps/rgb-1.0.1
- >=x11-apps/xauth-1.0.2
- >=x11-apps/xinit-1.0.5
- app-admin/eselect-opengl
- >=x11-libs/libXaw-1.0.4
- >=x11-libs/libXpm-3.5.7
- >=x11-libs/libXxf86misc-1.0.1
- >=x11-libs/libXxf86vm-1.0.1
- dmx? ( >=x11-libs/libdmx-1.0.2
- >=x11-libs/libXfixes-4.0.3 )
- !minimal? ( >=x11-libs/libXtst-1.0.3
- >=x11-libs/libXres-1.0.3 )
- >=x11-libs/libxkbui-1.0.2
- >=x11-libs/liblbxutil-1.0.1
- kdrive? ( sdl? ( media-libs/libsdl ) )"
- # Xres is dmx-dependent, xkbui is xorgcfg-dependent
- # Xaw is dmx- and xorgcfg-dependent
- # Xpm is dmx- and xorgcfg-dependent, pulls in Xt
- # Xxf86misc and Xxf86vm are xorgcfg-dependent
- # liblbxutil is lbx- dependent
-DEPEND="${RDEPEND}
- !net-dialup/dtrace
- >=x11-proto/randrproto-1.2.1
- >=x11-proto/renderproto-0.9.3
- >=x11-proto/fixesproto-4
- >=x11-proto/damageproto-1.1
- >=x11-proto/xextproto-7.0.2
- >=x11-proto/xproto-7.0.10
- >=x11-proto/xf86dgaproto-2.0.3
- >=x11-proto/xf86miscproto-0.9.2
- >=x11-proto/xf86rushproto-1.1.2
- >=x11-proto/xf86vidmodeproto-2.2.2
- >=x11-proto/xf86bigfontproto-1.1.2
- >=x11-proto/compositeproto-0.4
- >=x11-proto/recordproto-1.13.2
- >=x11-proto/resourceproto-1.0.2
- >=x11-proto/videoproto-2.2.2
- >=x11-proto/scrnsaverproto-1.1.0
- >=x11-proto/evieext-1.0.2
- >=x11-proto/trapproto-3.4.3
- >=x11-proto/xineramaproto-1.1-r1
- >=x11-proto/fontsproto-2.0.2
- >=x11-proto/kbproto-1.0.3
- >=x11-proto/inputproto-1.4.2.1
- >=x11-proto/bigreqsproto-1.0.2
- >=x11-proto/xcmiscproto-1.1.2
- >=x11-proto/glproto-1.4.8
- dmx? ( >=x11-proto/dmxproto-2.2.2 )
- dri? ( >=x11-proto/xf86driproto-2.0.3
- >=x11-libs/libdrm-2.3 )
- xprint? ( =x11-proto/printproto-1.0.3
- >=x11-apps/mkfontdir-1.0.3
- >=x11-apps/mkfontscale-1.0.3
- >=x11-apps/xplsprinters-1.0.1 )"
-
-# Drivers
-PDEPEND="
- xorg? (
- input_devices_acecad? ( >=x11-drivers/xf86-input-acecad-1.1.0 )
- input_devices_aiptek? ( >=x11-drivers/xf86-input-aiptek-1.0.1 )
- input_devices_calcomp? ( >=x11-drivers/xf86-input-calcomp-1.1.1 )
- input_devices_citron? ( >=x11-drivers/xf86-input-citron-2.2.1 )
- input_devices_digitaledge? ( >=x11-drivers/xf86-input-digitaledge-1.1.0 )
- input_devices_dmc? ( >=x11-drivers/xf86-input-dmc-1.1.0 )
- input_devices_dynapro? ( >=x11-drivers/xf86-input-dynapro-1.1.1 )
- input_devices_elo2300? ( >=x11-drivers/xf86-input-elo2300-1.1.1 )
- input_devices_elographics? ( >=x11-drivers/xf86-input-elographics-1.1.0 )
- input_devices_evdev? ( >=x11-drivers/xf86-input-evdev-1.1.1 )
- input_devices_fpit? ( >=x11-drivers/xf86-input-fpit-1.1.0 )
- input_devices_hyperpen? ( >=x11-drivers/xf86-input-hyperpen-1.1.0 )
- input_devices_jamstudio? ( >=x11-drivers/xf86-input-jamstudio-1.1.0 )
- input_devices_joystick? ( >=x11-drivers/xf86-input-joystick-1.1.0 )
- input_devices_keyboard? ( >=x11-drivers/xf86-input-keyboard-1.2.0 )
- input_devices_magellan? ( >=x11-drivers/xf86-input-magellan-1.1.1 )
- input_devices_microtouch? ( >=x11-drivers/xf86-input-microtouch-1.1.1 )
- input_devices_mouse? ( >=x11-drivers/xf86-input-mouse-1.1.0 )
- input_devices_mutouch? ( >=x11-drivers/xf86-input-mutouch-1.1.0 )
- input_devices_palmax? ( >=x11-drivers/xf86-input-palmax-1.1.0 )
- input_devices_penmount? ( >=x11-drivers/xf86-input-penmount-1.2.1 )
- input_devices_spaceorb? ( >=x11-drivers/xf86-input-spaceorb-1.1.1 )
- input_devices_summa? ( >=x11-drivers/xf86-input-summa-1.1.0 )
- input_devices_tek4957? ( >=x11-drivers/xf86-input-tek4957-1.1.0 )
- input_devices_ur98? ( >=x11-drivers/xf86-input-ur98-1.1.0 )
- input_devices_vmmouse? ( >=x11-drivers/xf86-input-vmmouse-12.4.2 )
- input_devices_void? ( >=x11-drivers/xf86-input-void-1.1.0 )
-
- input_devices_synaptics? ( x11-drivers/synaptics )
- input_devices_wacom? ( >=x11-drivers/linuxwacom-0.7.9 )
-
- video_cards_apm? ( >=x11-drivers/xf86-video-apm-1.1.1 )
- video_cards_ark? ( >=x11-drivers/xf86-video-ark-0.6.0 )
- video_cards_chips? ( >=x11-drivers/xf86-video-chips-1.1.1 )
- video_cards_cirrus? ( >=x11-drivers/xf86-video-cirrus-1.1.0 )
- video_cards_cyrix? ( >=x11-drivers/xf86-video-cyrix-1.1.0 )
- video_cards_dummy? ( >=x11-drivers/xf86-video-dummy-0.2.0 )
- video_cards_fbdev? ( >=x11-drivers/xf86-video-fbdev-0.2.0 )
- video_cards_geode? ( >=x11-drivers/xf86-video-geode-2.7.7.0 )
- video_cards_glint? ( >=x11-drivers/xf86-video-glint-1.1.1 )
- video_cards_i128? ( >=x11-drivers/xf86-video-i128-1.2.0 )
- video_cards_i740? ( >=x11-drivers/xf86-video-i740-1.1.0 )
- video_cards_i810? ( >=x11-drivers/xf86-video-i810-1.6.0 )
- video_cards_impact? ( >=x11-drivers/xf86-video-impact-0.2.0 )
- video_cards_imstt? ( >=x11-drivers/xf86-video-imstt-1.1.0 )
- video_cards_mach64? ( >=x11-drivers/xf86-video-ati-6.6.0 )
- video_cards_mga? ( >=x11-drivers/xf86-video-mga-1.4.1 )
- video_cards_neomagic? ( >=x11-drivers/xf86-video-neomagic-1.1.1 )
- video_cards_newport? ( >=x11-drivers/xf86-video-newport-0.2.0 )
- video_cards_nsc? ( >=x11-drivers/xf86-video-nsc-2.8.1 )
- video_cards_nv? ( >=x11-drivers/xf86-video-nv-1.1.1 )
- video_cards_r128? ( >=x11-drivers/xf86-video-ati-6.6.0 )
- video_cards_radeon? ( >=x11-drivers/xf86-video-ati-6.6.0 )
- video_cards_rendition? ( >=x11-drivers/xf86-video-rendition-4.1.0 )
- video_cards_s3? ( >=x11-drivers/xf86-video-s3-0.4.1 )
- video_cards_s3virge? ( >=x11-drivers/xf86-video-s3virge-1.9.1 )
- video_cards_savage? ( >=x11-drivers/xf86-video-savage-2.1.1 )
- video_cards_siliconmotion? ( >=x11-drivers/xf86-video-siliconmotion-1.4.1 )
- video_cards_sis? ( >=x11-drivers/xf86-video-sis-0.9.1 )
- video_cards_sisusb? ( >=x11-drivers/xf86-video-sisusb-0.8.1 )
- video_cards_sunbw2? ( >=x11-drivers/xf86-video-sunbw2-1.1.0 )
- video_cards_suncg14? ( >=x11-drivers/xf86-video-suncg14-1.1.0 )
- video_cards_suncg3? ( >=x11-drivers/xf86-video-suncg3-1.1.0 )
- video_cards_suncg6? ( >=x11-drivers/xf86-video-suncg6-1.1.0 )
- video_cards_sunffb? ( >=x11-drivers/xf86-video-sunffb-1.1.0 )
- video_cards_sunleo? ( >=x11-drivers/xf86-video-sunleo-1.1.0 )
- video_cards_suntcx? ( >=x11-drivers/xf86-video-suntcx-1.1.0 )
- video_cards_tdfx? ( >=x11-drivers/xf86-video-tdfx-1.2.1 )
- video_cards_tga? ( >=x11-drivers/xf86-video-tga-1.1.0 )
- video_cards_trident? ( >=x11-drivers/xf86-video-trident-1.2.1 )
- video_cards_tseng? ( >=x11-drivers/xf86-video-tseng-1.1.0 )
- video_cards_v4l? ( >=x11-drivers/xf86-video-v4l-0.1.1 )
- video_cards_vermilion? ( >=x11-drivers/xf86-video-vermilion-1.0.0 )
- video_cards_vesa? ( >=x11-drivers/xf86-video-vesa-1.1.0 )
- video_cards_vga? ( >=x11-drivers/xf86-video-vga-4.1.0 )
- video_cards_via? ( >=x11-drivers/xf86-video-openchrome-0.2.901 )
- video_cards_vmware? ( >=x11-drivers/xf86-video-vmware-10.13.0 )
- video_cards_voodoo? ( >=x11-drivers/xf86-video-voodoo-1.1.0 )
- video_cards_xgi? ( >=x11-drivers/xf86-video-xgi-1.5.0 )
- video_cards_tdfx? ( 3dfx? ( >=media-libs/glide-v3-3.10 ) )
- video_cards_fglrx? ( >=x11-drivers/ati-drivers-8.433 )
- video_cards_nvidia? ( >=x11-drivers/nvidia-drivers-71.86.01 )
- )"
-LICENSE="${LICENSE} MIT"
-
-EPATCH_FORCE="yes"
-EPATCH_SUFFIX="patch"
-
-# Local customizations, unsuitable for upstream
-GENTOO_PATCHES=(
- "${FILESDIR}/1.3.0.0-use-proc-instead-of-sys.patch"
- "${FILESDIR}/1.4-fpic-libxf86config.patch"
- "${FILESDIR}/1.4-fix-kdrive-automake.patch"
- )
-
-# These have been sent upstream
-UPSTREAMED_PATCHES=(
- "${FILESDIR}/${PV}/"
- )
-
-PATCHES=(
- "${GENTOO_PATCHES[@]}"
- "${UPSTREAMED_PATCHES[@]}"
- )
-
-pkg_setup() {
- use minimal || ensure_a_server_is_building
-
- # SDL only available in kdrive build
- if use kdrive && use sdl; then
- conf_opts="${conf_opts} --enable-xsdl"
- else
- conf_opts="${conf_opts} --disable-xsdl"
- fi
-
- # Only Xorg and Xgl support this, and we won't build Xgl
- # until it merges to trunk
- if use xorg; then
- conf_opts="${conf_opts} --with-mesa-source=${WORKDIR}/${MESA_P}"
- fi
-
- # localstatedir is used for the log location; we need to override the default
- # from ebuild.sh
- # sysconfdir is used for the xorg.conf location; same applies
- # --enable-install-setuid needed because sparcs default off
- CONFIGURE_OPTIONS="
- $(use_enable ipv6)
- $(use_enable dmx)
- $(use_enable kdrive)
- $(use_enable !minimal xvfb)
- $(use_enable !minimal xnest)
- $(use_enable !minimal install-libxf86config)
- $(use_enable dri)
- $(use_enable xorg)
- $(use_enable xprint)
- $(use_enable nptl glx-tls)
- $(use_enable !minimal xorgcfg)
- $(use_enable hal config-dbus)
- $(use_enable hal config-hal)
- --sysconfdir=/etc/X11
- --localstatedir=/var
- --enable-install-setuid
- --with-fontdir=/usr/share/fonts
- --with-xkb-output=/var/lib/xkb
- ${conf_opts}"
-
- local diemsg="You must build xorg-server and mesa with the same nptl USE setting."
- if built_with_use media-libs/mesa nptl; then
- use nptl || die "${diemsg}"
- else
- use nptl && die "${diemsg}"
- fi
-
- # (#121394) Causes window corruption
- filter-flags -fweb
-
- # Nothing else provides new enough glxtokens.h
- ewarn "Forcing on xorg-x11 for new enough glxtokens.h..."
- OLD_IMPLEM="$(eselect opengl show)"
- eselect opengl set --impl-headers ${OPENGL_DIR}
-}
-
-src_unpack() {
- x-modular_specs_check
- x-modular_dri_check
- x-modular_unpack_source
- x-modular_patch_source
-
- # Clean up for ${PV}-clean-generated-files.patch
- pushd hw/xprint >/dev/null
- rm -f *-wrapper.c || die
- popd >/dev/null
-
- # Set up kdrive servers to build
- if use kdrive; then
- kdrive_setup
- fi
-
- # Make sure eautoreconf gets run if we need the autoconf/make
- # changes.
- if [[ ${SNAPSHOT} != "yes" ]]; then
- if use kdrive || use dmx || use xprint; then
- SNAPSHOT="yes"
- fi
- fi
-
- if use hal; then
- sed -i \
- -e "s:^\(dbusconfigdir = \).*\(dbus-1.*\):\1/etc/\2:g" \
- "${S}"/config/Makefile.am \
- || die "failed to fix DBUS config directory"
- SNAPSHOT="yes"
- fi
-
- x-modular_reconf_source
- #do not install xprint's Xsession.d files, we'll do it later
- if use xprint; then
- sed -e "s:install-data-am\: install-dist_xpcDATA:install-data-am\::g" \
- -i "${S}"/hw/xprint/etc/Xsession.d/Makefile.in \
- || die "sed of Xsession.d makefile failed"
- fi
-}
-
-src_install() {
- x-modular_src_install
-
- dynamic_libgl_install
-
- server_based_install
-
- # Install video mode files for system-config-display
- insinto /usr/share/xorg
- doins hw/xfree86/common/{extra,vesa}modes \
- || die "couldn't install extra modes"
-
- # Bug #151421 - this file is not built with USE="minimal"
- # Bug #151670 - this file is also not build if USE="-xorg"
- if ! use minimal && use xorg; then
- # Install xorg.conf.example
- insinto /etc/X11
- doins hw/xfree86/xorg.conf.example \
- || die "couldn't install xorg.conf.example"
- fi
-}
-
-pkg_postinst() {
- switch_opengl_implem
-
- # Bug #135544
- ewarn "Users of reduced blanking now need:"
- ewarn " Option \"ReducedBlanking\""
- ewarn "In the relevant Monitor section(s)."
- ewarn "Make sure your reduced blanking modelines are safe!"
-
- echo
- ewarn "You must rebuild all drivers if upgrading from xorg-server 1.3"
- ewarn "or earlier, because the ABI changed. If you cannot start X because"
- ewarn "of module version mismatch errors, this is your problem."
-
- echo
- ewarn "You can generate a list of all installed packages in the x11-drivers"
- ewarn "category using this command:"
- ewarn "emerge portage-utils; qlist -I -C x11-drivers/"
-
- ebeep 5
- epause 10
-}
-
-pkg_postrm() {
- # Get rid of module dir to ensure opengl-update works properly
- if ! has_version x11-base/xorg-server; then
- if [[ -e ${ROOT}/usr/$(get_libdir)/xorg/modules ]]; then
- rm -rf "${ROOT}"/usr/$(get_libdir)/xorg/modules
- fi
- fi
-}
-
-kdrive_setup() {
- local card real_card disable_card kdrive_fbdev kdrive_vesa
-
- einfo "Removing unused kdrive drivers ..."
-
- # Some kdrive servers require fbdev and vesa
- kdrive_fbdev="radeon neomagic sis siliconmotion"
- # Some kdrive servers require just vesa
- kdrive_vesa="chips mach64 mga nv glint r128 via"
-
- for card in ${IUSE_VIDEO_CARDS}; do
- real_card=${card#video_cards_}
-
- # Differences between VIDEO_CARDS name and kdrive server name
- real_card=${real_card/glint/pm2}
- real_card=${real_card/radeon/ati}
- real_card=${real_card/%nv/nvidia}
- real_card=${real_card/siliconmotion/smi}
- real_card=${real_card/%sis/sis300}
-
- disable_card=0
-
- # Check whether it's a valid kdrive server before we waste time
- # on the rest of this
- if ! grep -q -o "\b${real_card}\b" "${S}"/hw/kdrive/Makefile.am; then
- continue
- fi
-
- if ! use ${card}; then
- if use x86; then
- # Some kdrive servers require fbdev and vesa
- for i in ${kdrive_fbdev}; do
- if use video_cards_${i}; then
- if [[ ${real_card} = fbdev ]] \
- || [[ ${real_card} = vesa ]]; then
- continue 2 # Don't disable
- fi
- fi
- done
-
- # Some kdrive servers require just vesa
- for i in ${kdrive_vesa}; do
- if use video_cards_${i}; then
- if [[ ${real_card} = vesa ]]; then
- continue 2 # Don't disable
- fi
- fi
- done
- fi
- disable_card=1
- # Bug #150052
- # fbdev is the only VIDEO_CARDS setting that works on non-x86
- elif ! use x86 \
- && [[ ${real_card} != fbdev ]]; then
- ewarn " $real_card does not work on your architecture; disabling."
- disable_card=1
- fi
-
- if [[ $disable_card = 1 ]]; then
- ebegin " ${real_card}"
- sed -i \
- -e "s:\b${real_card}\b::g" \
- "${S}"/hw/kdrive/Makefile.am \
- || die "sed of ${real_card} failed"
- eend
- fi
-
- done
-}
-
-dynamic_libgl_install() {
- # next section is to setup the dynamic libGL stuff
- ebegin "Moving GL files for dynamic switching"
- dodir /usr/$(get_libdir)/opengl/${OPENGL_DIR}/extensions
- local x=""
- for x in "${D}"/usr/$(get_libdir)/xorg/modules/extensions/libglx*; do
- if [ -f ${x} -o -L ${x} ]; then
- mv -f ${x} "${D}"/usr/$(get_libdir)/opengl/${OPENGL_DIR}/extensions
- fi
- done
- eend 0
-}
-
-server_based_install() {
- use xprint && xprint_src_install
-
- if ! use xorg; then
- rm "${D}"/usr/share/man/man1/Xserver.1x \
- "${D}"/usr/$(get_libdir)/xserver/SecurityPolicy \
- "${D}"/usr/$(get_libdir)/pkgconfig/xorg-server.pc \
- "${D}"/usr/share/man/man1/Xserver.1x
- fi
-}
-
-switch_opengl_implem() {
- # Switch to the xorg implementation.
- # Use new opengl-update that will not reset user selected
- # OpenGL interface ...
- echo
-# eselect opengl set --use-old ${OPENGL_DIR}
- eselect opengl set ${OLD_IMPLEM}
-}
-
-xprint_src_install() {
- # RH-style init script, we provide a wrapper
- exeinto /usr/$(get_libdir)/misc
- doexe "${S}"/hw/xprint/etc/init.d/xprint
- # Install the wrapper
- newinitd "${FILESDIR}"/xprint.init xprint
- # Install profile scripts
- insinto /etc/profile.d
- doins "${S}"/hw/xprint/etc/profile.d/xprint*
- exeinto /etc/X11/xinit/xinitrc.d
- doexe "${S}"/hw/xprint/etc/Xsession.d/92xprint-xpserverlist
- # Patch profile scripts
- sed -e "s:/etc/init.*get_xpserverlist:/usr/$(get_libdir)/misc/xprint \
- get_xpserverlist:g" -i "${D}"/etc/profile.d/xprint* \
- "${D}"/etc/X11/xinit/xinitrc.d/92xprint-xpserverlist
- # Move profile scripts, we can't touch /etc/profile.d/ in Gentoo
- dodoc "${D}"/etc/profile.d/xprint*
- rm -f "${D}"/etc/profile.d/xprint*
-}
-
-ensure_a_server_is_building() {
- for server in ${IUSE_SERVERS}; do
- use ${server} && return;
- done
- eerror "You need to specify at least one server to build."
- eerror "Valid servers are: ${IUSE_SERVERS}."
- die "No servers were specified to build."
-}