# Copyright 1999-2005 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 # $Header: /var/cvsroot/gentoo-x86/sys-kernel/gentoo-sources/gentoo-sources-2.4.20-r31.ebuild,v 1.1 2005/01/08 21:29:55 plasmaroo Exp $ IUSE="aavm crypt evms2 usagi" # OKV=original kernel version, KV=patched kernel version. They can be the same. # Kernel ebuilds using the kernel.eclass can remove any patch that you # do not want to apply by simply setting the KERNEL_EXCLUDE shell # variable to the string you want to exclude (for instance # KERNEL_EXCLUDE="evms" would not patch any patches whose names match # *evms*). Kernels are only tested in the default configuration, but # this may be useful if you know that a particular patch is causing a # conflict with a patch you personally want to apply, or some other # similar situation. ETYPE="sources" inherit kernel eutils gcc OKV="`echo ${PV}|sed -e 's:^\([0-9]\+\.[0-9]\+\.[0-9]\+\).*:\1:'`" EXTRAVERSION="-${PN/-*/}" [ ! "${PR}" == "r0" ] && EXTRAVERSION="${EXTRAVERSION}-${PR}" KV="${OKV}${EXTRAVERSION}" S=${WORKDIR}/linux-${KV} # Documentation on the patches contained in this kernel will be installed # to /usr/share/doc/gentoo-sources-${PV}/patches.txt.gz DESCRIPTION="Full sources for the Gentoo Kernel." SRC_URI="mirror://kernel/linux/kernel/v2.4/linux-${OKV}.tar.bz2 http://dev.gentoo.org/~plasmaroo/patches/kernel/gentoo-sources/patches-${KV/31/28}.tar.bz2 http://dev.gentoo.org/~plasmaroo/patches/kernel/misc/security/${P}-CAN-2004-0415.patch http://dev.gentoo.org/~plasmaroo/patches/kernel/misc/security/${P}-CAN-2004-0814.2.patch" HOMEPAGE="http://www.gentoo.org/ http://www.kernel.org/" LICENSE="GPL-2" KEYWORDS="x86 -ppc -sparc -alpha -hppa -mips" SLOT="${KV}" src_unpack() { unpack ${A} mv linux-${OKV} linux-${KV} || die "Error moving kernel source tree to linux-${KV}" cd ${WORKDIR}/${KV/r31/r28} # This is the *ratified* aavm USE flag, enables aavm support in this kernel if ! use aavm; then einfo "Setting up kernel for rmap support(default)." for file in *.aavm ;do einfo "Dropping ${file}..." rm -f ${file} done else einfo "Setting up kernel for aavm support." for file in *.rmap ;do einfo "Dropping ${file}..." rm -f ${file} done fi # If the compiler isn't gcc>3.1 drop the gcc>=3.1 patches if [[ "`gcc-major-version`" == "3" ]]; then einfo "Enabling gcc > 3.1 processor optimizations..." einfo "To use them, choose the processor families labelled with (gcc>31)" einfo "in \"Processor type and features -> Processor Family\"" else einfo "Your compiler is not gcc3, dropping patches..." for file in *gcc3*;do einfo "Dropping ${file}..." rm -f ${file} done fi # This is the *ratified* evms2 USE flag, enables evms2 support if ! use evms2; then einfo "Setting up kernel for EVMS 1.2.1 support (default)..." for file in 2* ;do einfo "Dropping ${file}..." rm -f ${file} done else einfo "Setting up kernel for EVMS 2.0.1 support..." ewarn "This is very beta. Please read the 'evms2' doc provided with this kernel." ewarn "It is the install doc from the evms 2.0.1 tarball." for file in 1* ;do einfo "Dropping ${file}..." rm -f ${file} done fi # This is the crypt USE flag, keeps {USAGI/superfreeswan/patch-int/loop-jari} if ! use crypt; then einfo "No Cryptographic support, dropping patches..." for file in 6* 8* ;do einfo "Dropping ${file}..." rm -f ${file} done rm 991_fix_cryptoOrder else einfo "Cryptographic patches will be applied." fi # This is the usagi USE flag, keeps USAGI, drops {superfreeswan/patch-int/loop-jari} # Using USAGI will also cause you to drop all iptables ipv6 patches if ! use usagi; then einfo "Keeping {superfreeswan/patch-int/loop-jari} patches, dropping USAGI" for file in 6* ;do einfo "Dropping ${file}..." rm -f ${file} done else einfo "Keeping USAGI patch, dropping {superfreeswan/patch-int/loop-jari}" for file in *.ipv6 8* ;do einfo "Dropping ${file}..." rm -f ${file} done fi kernel_exclude ./addpatches . ${WORKDIR}/linux-${KV} || die "Could not add patches!" kernel_universal_unpack || die "Could not unpack!" epatch ${FILESDIR}/security.patch1 epatch ${FILESDIR}/security.patch2 epatch ${FILESDIR}/security.patch3 epatch ${FILESDIR}/security.patch4 epatch ${FILESDIR}/do_brk_fix.patch || die "Failed to apply do_brk() fix!" epatch ${FILESDIR}/${P}-munmap.patch || die "Failed to apply munmap patch!" epatch ${FILESDIR}/${P}-rtc_fix.patch || die "Failed to apply RTC fix!" epatch ${FILESDIR}/${PN}-2.4.CAN-2003-0643.patch || die "Failed to add the CAN-2003-0643 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2003-0985.patch || die "Failed to apply mremap() fix!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0001.patch || die "Failed to apply AMD64 ptrace patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0010.patch || die "Failed to add the CAN-2004-0010 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0109.patch || die "Failed to add the CAN-2004-0109 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0177.patch || die "Failed to add the CAN-2004-0177 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0178.patch || die "Failed to add the CAN-2004-0178 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0181.patch || die "Failed to add the CAN-2004-0181 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0394.patch || die "Failed to add the CAN-2004-0394 patch!" epatch ${DISTDIR}/${P}-CAN-2004-0415.patch || die "Failed to add the CAN-2004-0415 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0427.patch || die "Failed to add the CAN-2004-0427 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0495.patch || die "Failed to add the CAN-2004-0495 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0497.patch || die "Failed to add the CAN-2004-0497 patch!" epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0535.patch || die "Failed to add the CAN-2004-0535 patch!" epatch ${FILESDIR}/${P}-CAN-2004-0685.patch || die "Failed to add the CAN-2004-0685 patch!" epatch ${DISTDIR}/${P}-CAN-2004-0814.2.patch || die "Failed to add the CAN-2004-0814 patch!" epatch ${FILESDIR}/${PN}-2.4.I2C_Limits.patch || die "Failed to patch the I2C i2cdev_ioctl() kmalloc() bug!" epatch ${FILESDIR}/${PN}-2.4.FPULockup-53804.patch || die "Failed to apply FPU-lockup patch!" epatch ${FILESDIR}/${PN}-2.4.cmdlineLeak.patch || die "Failed to apply the /proc/cmdline patch!" epatch ${FILESDIR}/${PN}-2.4.XDRWrapFix.patch || die "Failed to apply the kNFSd XDR patch!" epatch ${FILESDIR}/${PN}-2.4.binfmt_elf.patch || die "Failed to apply the binfmt_elf patch!" epatch ${FILESDIR}/${P}-smbfs.patch || die "Failed to apply the SMBFS patch!" epatch ${FILESDIR}/${PN}-2.4.AF_UNIX.patch || die "Failed to apply the AF_UNIX patch!" epatch ${FILESDIR}/${PN}-2.4.binfmt_a.out.patch || die "Failed to apply the binfmt_a.out patch!" epatch ${FILESDIR}/${PN}-2.4.vma.patch || die "Failed to apply the VMA patch!" epatch ${FILESDIR}/${PN}-2.4.22-CAN-2004-1016.patch || die "Failed to apply the CAN-2004-1016 patch!" epatch ${FILESDIR}/${P}-CAN-2004-1056.patch || die "Failed to apply the CAN-2004-1056 patch!" epatch ${FILESDIR}/${PN}-2.4.77094.patch || die "Failed to apply bug #77094 patch!" epatch ${FILESDIR}/${PN}-2.4.brk-locked.patch || die "Failed to apply do_brk_locked() patch!" } pkg_postinst() { kernel_pkg_postinst ewarn "There is no xfs support in this kernel." ewarn "If you need xfs support, emerge xfs-sources." echo ewarn "If iptables/netfilter behaves abnormally, such as 'Invalid Argument'," ewarn "you will need to re-emerge iptables to restore proper functionality." echo einfo "This set contains the ptrace patch as part of grsecurity." echo einfo "If there are issues with it, read the docs and associated help provided." einfo "Next you should check http://forums.gentoo.org/ for assistance." echo einfo "Otherwise check http://bugs.gentoo.org/ for an existing bug." einfo "Only create a new bug if you have not found one that matches your issue." einfo "It is best to do an advanced search to increase search yield." echo einfo "Please assign bugs to x86-kernel@gentoo.org" echo einfo "Please read the ChangeLog and associated docs for more information." echo }