Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 40460 Details for
Bug 65420
new RTLinux-Free kernel/module ebuild submission
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
rtlfree-sources ebuild
rtlfree-sources-2.4.19.2.ebuild (text/plain), 6.37 KB, created by
John (EBo) David
on 2004-09-26 10:03:58 UTC
(
hide
)
Description:
rtlfree-sources ebuild
Filename:
MIME Type:
Creator:
John (EBo) David
Created:
2004-09-26 10:03:58 UTC
Size:
6.37 KB
patch
obsolete
># Copyright 1999-2004 Gentoo Technologies, Inc. ># Distributed under the terms of the GNU General Public License v2 ># $Header: Exp $ > ># NOTE: this is hacked from sys-kernel/gentoo-sources-2.4.19-r22 > >IUSE="acpi4linux crypt xfs" > ># OKV=original kernel version, KV=patched kernel version. They can be the same. > ># Kernel ebuilds using the kernel.eclass can remove any patch that you ># do not want to apply by simply setting the KERNEL_EXCLUDE shell ># variable to the string you want to exclude (for instance ># KERNEL_EXCLUDE="evms" would not patch any patches whose names match ># *evms*). Kernels are only tested in the default configuration, but ># this may be useful if you know that a particular patch is causing a ># conflict with a patch you personally want to apply, or some other ># similar situation. > ># This kernel also has support for the local USE flag acpi4linux which ># activates the latest code from acpi.sourceforge.net instead of the ># very out of date vanilla version > >ETYPE="sources" > >inherit kernel eutils > >OKV="`echo ${PV}|sed -e 's:^\([0-9]\+\.[0-9]\+\.[0-9]\+\).*:\1:'`" >EXTRAVERSION="-${PN/-*/}" >[ ! "${PR}" == "r0" ] && EXTRAVERSION="${EXTRAVERSION}-${PR}" >KV="${OKV}${EXTRAVERSION}" > >S=${WORKDIR}/linux-${KV} > ># Documentation on the patches contained in this kernel will be installed ># to /usr/share/doc/gentoo-sources-${PV}/patches.txt.gz > >DESCRIPTION="RTLinux-Free (the freely distributed Real Time Linux). Full sources including the Gentoo patchset for the ${KV_MAJOR}.${KV_MINOR} kernel tree" > ># the patches are included... need to switch 3.2-pre2 to FSM... >SRC_URI="mirror://kernel/linux/kernel/v2.4/linux-${OKV}.tar.bz2 > http://gentoo.lostlogicx.com/patches-2.4.19-gentoo-r10.tar.bz2 > http://gd.tuwien.ac.at/opsys/linux/rtlinux/rtlinux-3.2-pre2.tar.bz2" > >LICENSE="GPL-2 FSMLabs" >KEYWORDS="x86 -ppc -sparc -amd64 -ia64" >SLOT="${KV}" > >src_unpack() { > unpack ${A} > mv linux-${OKV} linux-${KV} || die > > cd ${S} > > # apply the Real-Time Linux patches > epatch ${FILESDIR}/updated_rtlfree-2.4.19-rtl3.2-pre2.patch || die "updated_rtlfree-2.4.19-rtl3.2-pre2 patch failed!" > > # apply the Adaptec SCSI patch > epatch ${FILESDIR}/aic7xxx_db185_makefile.patch || die "aic7xxx_db185_makefile patch failed!" > > cd ${WORKDIR}/2.4.19-gentoo-r10 > > # Kill patches we aren't suppposed to use, don't worry about > # failures, if they aren't there that is a good thing! > > # This is the ratified crypt USE flag, enables IPSEC and patch-int > use crypt || rm 8* > > # This is the XFS filesystem from SGI, use at your own risk ;) > use xfs || rm *xfs* > > # This is the latest release of ACPI from > # http://www.sourceforge.net/projects/acpi > use acpi4linux || rm 70* > > cd ${S} > > kernel_src_unpack > > cd ${S} > ###epatch ${FILESDIR}/${P}-gcc33.patch || die "GCC 3.3 patch failed!" > ###epatch ${FILESDIR}/${PN}-2.4.20-cs46xx-gcc33.patch || die "GCC 3.3 patch failed!" > > ###epatch ${FILESDIR}/security.patch2 > epatch ${FILESDIR}/security.patch3 > epatch ${FILESDIR}/security.patch4 > epatch ${FILESDIR}/security.patch5 > > epatch ${FILESDIR}/lcall-DoS.patch || die "lcall-DoS patch failed" > epatch ${FILESDIR}/i810_drm.patch || die "i810_drm patch failed" > epatch ${FILESDIR}/do_brk_fix.patch || die "Failed to apply do_brk() patch!" > ###epatch ${FILESDIR}/${P}-munmap.patch || die "Failed to apply munmap patch!" > epatch ${FILESDIR}/${P}-rtc_fix.patch || die "Failed to apply the RTC fixes!" > epatch ${FILESDIR}/${PN}-2.4.CAN-2003-0643.patch || die "Failed to add the CAN-2003-0643 patch!" > epatch ${FILESDIR}/${PN}-2.4.CAN-2003-0985.patch || die "Failed to add the CAN-2003-0985 patch!" > epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0010.patch || die "Failed to add the CAN-2004-0010 patch!" > epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0109.patch || die "Failed to add the CAN-2004-0109 patch!" > use xfs && { epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0133.patch || die "Failed to add the CAN-2004-0133 patch!"; } > epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0177.patch || die "Failed to add the CAN-2004-0177 patch!" > epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0178.patch || die "Failed to add the CAN-2004-0178 patch!" > ###epatch ${FILESDIR}/${P}-CAN-2004-0181.patch || die "Failed to add the CAN-2004-0181 patch!" > epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0394.patch || die "Failed to add the CAN-2004-0394 patch!" > ###epatch ${FILESDIR}/${P}-CAN-2004-0415.patch || die "Failed to add the CAN-2004-0415 patch!" > epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0427.patch || die "Failed to add the CAN-2004-0427 patch!" > epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0495.patch || die "Failed to add the CAN-2004-0495 patch!" > epatch ${FILESDIR}/${PN}-2.4.CAN-2004-0497.patch || die "Failed to add the CAN-2004-0497 patch!" > epatch ${FILESDIR}/${PN}-2.4.FPULockup-53804.patch || die "Failed to apply FPU-lockup patch!" > epatch ${FILESDIR}/${PN}-2.4.cmdlineLeak.patch || die "Failed to apply the /proc/cmdline patch!" > > # Now unpack RTLinux-Free and place into the source kernel > cd ${WORKDIR} # ${S} > > unpack rtlinux-3.2-pre2.tar.bz2 > > mv rtlinux-3.2-pre2 ${S}/rtlfree || die "Error moving rtlfree-dev-modules source tree to linux-${PV}-rtlfree" > > cd ${S}/rtlfree > > # apply patches to the main Makefile > epatch ${FILESDIR}/${PN}-Makefile_fix.patch || die "${PN}-Makefile_fix.patch patch failed!" > > # apply the Floating-point test patch > epatch ${FILESDIR}/${PN}-floating_point_test.patch || die "${PN}-floating_point_test.patch failed!" > >} > > >pkg_postinst() { > kernel_pkg_postinst > > if [ ! -h ${ROOT}usr/src/linux ] > then > ln -sf ${ROOT}usr/src/linux-${KV} ${ROOT}usr/src/linux > fi > > if [ ! -h ${ROOT}usr/src/rtlinux ] > then > ln -sf ${ROOT}usr/src/linux-${KV}/rtlfree ${ROOT}usr/src/rtlinux > fi > ewarn "There is no xfs support in this kernel." > ewarn "If you need xfs support, emerge xfs-sources." > echo > ewarn "If iptables/netfilter behaves abnormally, such as 'Invalid Argument'," > ewarn "you will need to re-emerge iptables to restore proper functionality." > echo > einfo "This set contains the ptrace patch as part of grsecurity." > echo > einfo "If there are issues with it, read the docs and associated help provided." > einfo "Next you should check http://forums.gentoo.org/ for assistance." > echo > einfo "Otherwise check http://bugs.gentoo.org/ for an existing bug." > einfo "Only create a new bug if you have not found one that matches your issue." > einfo "It is best to do an advanced search to increase search yield." > echo > einfo "Please assign bugs to x86-kernel@gentoo.org" > echo > einfo "Please read the ChangeLog and associated docs for more information." > echo >}
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 65420
: 40460 |
40461
|
40462