Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 219034 - [sunrise-overlay] sys-fs/aufs-20080422 ebuild
Summary: [sunrise-overlay] sys-fs/aufs-20080422 ebuild
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: New packages (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Thomas Sachau
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2008-04-23 14:35 UTC by Austen Dicken
Modified: 2008-04-24 06:21 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments
ebuild for sys-fs/aufs-20080422 (aufs-20080422.ebuild,1.98 KB, text/plain)
2008-04-23 14:38 UTC, Austen Dicken
Details
files/aufs-20080422-kernelversion.patch (aufs-20080422-kernelversion.patch,475 bytes, patch)
2008-04-23 14:41 UTC, Austen Dicken
Details | Diff
checkout of sys-fs/aufs-20080422 (aufs-20080422.tar.lzma,210.78 KB, application/octet-stream)
2008-04-23 14:42 UTC, Austen Dicken
Details
ebuild for sys-fs/aufs-20080422 (aufs-20080422.ebuild,1.82 KB, text/plain)
2008-04-23 21:52 UTC, Austen Dicken
Details
ebuild for sys-fs/aufs-20080422 (aufs-20080422.ebuild,7.79 KB, text/plain)
2008-04-24 06:20 UTC, Austen Dicken
Details
sec_perm patch required for certain kernels (aufs-20080422-sec_perm-2.6.24.patch,666 bytes, patch)
2008-04-24 06:21 UTC, Austen Dicken
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Austen Dicken 2008-04-23 14:35:52 UTC
This is an ebuild for the CVS export of aufs on April 22, 2008.  This export contains support for the 2.6.25 kernels which was not present in the previous checkouts.

I have also included a patch to the makefile that solves a sandbox violation error.

I have tested this ebuild on my own machine and it builds/installs/merges fine, and the module seems to work as expected as well.
Comment 1 Austen Dicken 2008-04-23 14:38:06 UTC
Created attachment 150710 [details]
ebuild for sys-fs/aufs-20080422

I made a slight change to the paradigm of the old ebuilds, in that I set the module install directory to "misc/" instead of "addon/fs/aufs/", as from my personal experience, "misc/" seems to be used more commonly by other external modules.
Comment 2 Austen Dicken 2008-04-23 14:41:33 UTC
Created attachment 150712 [details, diff]
files/aufs-20080422-kernelversion.patch

This patch is required to prevent several sandbox access violations.  Essentially, when upstream added support for the 2.6.25 versions of the kernel, they determined the current kernel version using "make kernelversion" in the kernel build directory.  This produces temp files in the build directory, which is outside of the sandbox.  This patch essentially replaces the call the "make kernelversion" with "uname -r", which seems to yield the same result (and is used previously in the makefile anyway).
Comment 3 Austen Dicken 2008-04-23 14:42:22 UTC
Created attachment 150714 [details]
checkout of sys-fs/aufs-20080422
Comment 4 Thomas Sachau gentoo-dev 2008-04-23 16:26:24 UTC
The sunrise overlay is about users adding and maintaining ebuilds, so if you have an updated and working version of an ebuild in the sunrise overlay, just add it.

You can find more infos at
http://overlays.gentoo.org/proj/sunrise (SunriseFaq, HowtoCommit, CodingStandards)

For other questions, join in at #gentoo-sunrise (freenode network) and ask them.

Btw: What happens with your version, if the symlink does not point to the actual kernel dir (running kernel = 2.6.24 and symlink = 2.6.25)?
Comment 5 Austen Dicken 2008-04-23 21:52:09 UTC
Created attachment 150756 [details]
ebuild for sys-fs/aufs-20080422

This ebuild uses linux-info to determine kernel version information rather than letting the aufs makefile determine it.
Comment 6 Austen Dicken 2008-04-24 06:20:34 UTC
Created attachment 150798 [details]
ebuild for sys-fs/aufs-20080422

Added some extra features through the use of USE flags, as well as a special case (sec_perm) which is required on kernels with CONFIG_SECURITY enabled, in order to export certain functions.  sec_perm is only permitted to be enabled if it is required, and it is basically used as a method by which users are forced to become aware that they will be patching their kernel by doing so.
Comment 7 Austen Dicken 2008-04-24 06:21:16 UTC
Created attachment 150802 [details, diff]
sec_perm patch required for certain kernels