Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 55410 Details for
Bug 88099
sysklogd: now with ppc64 love
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
[patch]
sysklogd-ppc64-safe.patch
sysklogd-ppc64-safe.patch (text/plain), 17.26 KB, created by
Omkhar Arasaratnam (RETIRED)
on 2005-04-05 16:49:45 UTC
(
hide
)
Description:
sysklogd-ppc64-safe.patch
Filename:
MIME Type:
Creator:
Omkhar Arasaratnam (RETIRED)
Created:
2005-04-05 16:49:45 UTC
Size:
17.26 KB
patch
obsolete
>diff -Naur sysklogd/Manifest sysklogd-new/Manifest >--- sysklogd/Manifest 2005-02-11 20:14:06.000000000 -0500 >+++ sysklogd-new/Manifest 2005-04-05 13:55:50.699900944 -0400 >@@ -1,12 +1,15 @@ >-MD5 1a269d53665b88e21d1319220739361c ChangeLog 5649 > MD5 654cb895d5e3630ec4b3364d3fafb3ea sysklogd-1.4.1-r11.ebuild 1466 >-MD5 e1376d40e02cf8026882cd4451267fed files/sysklogd-1.4.1-SO_BSDCOMPAT.patch 2523 >-MD5 ee6c8a2e9ce3c67c0704ba954826d828 files/sysklogd-1.4.1-mips.patch 449 >-MD5 e25d7b583b7e4bd8be503b89e1771e90 files/sysklogd.confd 113 >-MD5 faf75c09d1694eea615a03b8f2c9aee2 files/sysklogd.rc6 1735 >+MD5 1a269d53665b88e21d1319220739361c ChangeLog 5649 >+MD5 e849767f9cbbf8c5889306135efdcf36 sysklogd-1.4.1-r12.ebuild 1566 >+MD5 39526162728783b83aabc6754a6df208 files/syslogd-listfiles 2759 > MD5 ed1fec7ebbb4eb91447909e972f1a224 files/syslog-cron 701 > MD5 a4ca2a78eecd855928cc313d7c243819 files/syslog.conf 2332 >-MD5 39526162728783b83aabc6754a6df208 files/syslogd-listfiles 2759 >+MD5 ee6c8a2e9ce3c67c0704ba954826d828 files/sysklogd-1.4.1-mips.patch 449 >+MD5 01d7ea5644c29972a910ab27e3ab4738 files/digest-sysklogd-1.4.1-r11 65 > MD5 5d4b89ceb689887a6cbb582b875bf3e7 files/syslogd-listfiles.8 2540 > MD5 295e4c6eea23fe444002333ffff7b1dc files/sysklogd-1.4.1-2.6.headers.patch 25062 >-MD5 01d7ea5644c29972a910ab27e3ab4738 files/digest-sysklogd-1.4.1-r11 65 >+MD5 faf75c09d1694eea615a03b8f2c9aee2 files/sysklogd.rc6 1735 >+MD5 e1376d40e02cf8026882cd4451267fed files/sysklogd-1.4.1-SO_BSDCOMPAT.patch 2523 >+MD5 e25d7b583b7e4bd8be503b89e1771e90 files/sysklogd.confd 113 >+MD5 b580836f2f85b5fe1a9d819b497e4334 files/sysklogd-1.4.1-ppc64.patch 12992 >+MD5 01d7ea5644c29972a910ab27e3ab4738 files/digest-sysklogd-1.4.1-r12 65 >diff -Naur sysklogd/files/digest-sysklogd-1.4.1-r12 sysklogd-new/files/digest-sysklogd-1.4.1-r12 >--- sysklogd/files/digest-sysklogd-1.4.1-r12 1969-12-31 19:00:00.000000000 -0500 >+++ sysklogd-new/files/digest-sysklogd-1.4.1-r12 2005-04-05 13:55:50.692902008 -0400 >@@ -0,0 +1 @@ >+MD5 d214aa40beabf7bdb0c9b3c64432c774 sysklogd-1.4.1.tar.gz 81784 >diff -Naur sysklogd/files/sysklogd-1.4.1-ppc64.patch sysklogd-new/files/sysklogd-1.4.1-ppc64.patch >--- sysklogd/files/sysklogd-1.4.1-ppc64.patch 1969-12-31 19:00:00.000000000 -0500 >+++ sysklogd-new/files/sysklogd-1.4.1-ppc64.patch 2005-04-05 13:48:56.856992080 -0400 >@@ -0,0 +1,468 @@ >+diff -Naur sysklogd-1.4.1/klogd.c sysklogd-1.4.1new/klogd.c >+--- sysklogd-1.4.1/klogd.c 2001-03-11 14:40:10.000000000 -0500 >++++ sysklogd-1.4.1new/klogd.c 2002-04-17 10:49:34.000000000 -0400 >+@@ -509,8 +513,7 @@ >+ >+ >+ /* Set level of kernel console messaging.. */ >+- if ( (console_log_level != -1) >+- && (ksyslog(8, NULL, console_log_level) < 0) && \ >++ if ( (ksyslog(8, NULL, console_log_level) < 0) && \ >+ (errno == EINVAL) ) >+ { >+ /* >+@@ -887,8 +890,7 @@ >+ value = strtoul(sym_start+1, (char **) 0, 16); >+ *(line-1) = '>'; /* put back delim */ >+ >+- symbol = LookupSymbol(value, &sym); >+- if ( !symbol_lookup || symbol == (char *) 0 ) >++ if ( !symbol_lookup || (symbol = LookupSymbol(value, &sym)) == (char *)0 ) >+ { >+ parse_state = PARSING_TEXT; >+ break; >+@@ -938,7 +940,7 @@ >+ * messages into this fresh buffer. >+ */ >+ memset(log_buffer, '\0', sizeof(log_buffer)); >+- if ( (rdcnt = ksyslog(2, log_buffer, sizeof(log_buffer))) < 0 ) >++ if ( (rdcnt = ksyslog(2, log_buffer, sizeof(log_buffer)-1)) < 0 ) >+ { >+ if ( errno == EINTR ) >+ return; >+@@ -1143,8 +1145,11 @@ >+ if ( one_shot ) >+ { >+ if (symbol_lookup) { >+- InitKsyms(symfile); >+- InitMsyms(); >++ symbol_lookup = (InitKsyms(symfile) == 1); >++ symbol_lookup |= InitMsyms(); >++ if (symbol_lookup == 0) { >++ Syslog(LOG_WARNING, "cannot find any symbols, turning off symbol lookups\n"); >++ } >+ } >+ if ( (logsrc = GetKernelLogSrc()) == kernel ) >+ LogKernelLine(); >+@@ -1159,8 +1164,11 @@ >+ #endif >+ logsrc = GetKernelLogSrc(); >+ if (symbol_lookup) { >+- InitKsyms(symfile); >+- InitMsyms(); >++ symbol_lookup = (InitKsyms(symfile) == 1); >++ symbol_lookup |= InitMsyms(); >++ if (symbol_lookup == 0) { >++ Syslog(LOG_WARNING, "cannot find any symbols, turning off symbol lookups\n"); >++ } >+ } >+ >+ /* The main loop. */ >+diff -Naur sysklogd-1.4.1/ksym.c sysklogd-1.4.1new/ksym.c >+--- sysklogd-1.4.1/ksym.c 2000-09-12 17:53:31.000000000 -0400 >++++ sysklogd-1.4.1new/ksym.c 2005-04-05 12:11:33.302898272 -0400 >+@@ -112,6 +112,7 @@ >+ #include <stdlib.h> >+ #include <malloc.h> >+ #include <sys/utsname.h> >++#include <ctype.h> >+ #include "klogd.h" >+ #include "ksyms.h" >+ >+@@ -344,6 +345,7 @@ >+ if ( (sym_file = fopen(symfile, "r")) != (FILE *) 0 ) { >+ if (CheckMapVersion(symfile) == 1) >+ file = symfile; >++ fclose(sym_file); >+ } >+ if (sym_file == (FILE *) 0 || file == (char *) 0) { >+ sprintf (symfile, "%s", *mf); >+@@ -352,6 +354,7 @@ >+ if ( (sym_file = fopen(symfile, "r")) != (FILE *) 0 ) { >+ if (CheckMapVersion(symfile) == 1) >+ file = symfile; >++ fclose(sym_file); >+ } >+ } >+ >+diff -Naur sysklogd-1.4.1/ksym_mod.c sysklogd-1.4.1new/ksym_mod.c >+--- sysklogd-1.4.1/ksym_mod.c 2000-09-12 17:15:28.000000000 -0400 >++++ sysklogd-1.4.1new/ksym_mod.c 2000-12-18 11:06:06.000000000 -0500 >+@@ -93,7 +93,7 @@ >+ #include <linux/time.h> >+ #include <linux/module.h> >+ #else /* __GLIBC__ */ >+-#include <linux/module.h> >++#include "module.h" >+ extern __off64_t lseek64 __P ((int __fd, __off64_t __offset, int __whence)); >+ extern int get_kernel_syms __P ((struct kernel_sym *__table)); >+ #endif /* __GLIBC__ */ >+diff -Naur sysklogd-1.4.1/module.h sysklogd-1.4.1new/module.h >+--- sysklogd-1.4.1/module.h 1969-12-31 19:00:00.000000000 -0500 >++++ sysklogd-1.4.1new/module.h 2000-12-18 11:06:06.000000000 -0500 >+@@ -0,0 +1,62 @@ >++ >++/* Module definitions for klogd's module support */ >++struct kernel_sym >++{ >++ unsigned long value; >++ char name[60]; >++}; >++ >++struct module_symbol >++{ >++ unsigned long value; >++ const char *name; >++}; >++ >++struct module_ref >++{ >++ struct module *dep; /* "parent" pointer */ >++ struct module *ref; /* "child" pointer */ >++ struct module_ref *next_ref; >++}; >++ >++struct module_info >++{ >++ unsigned long addr; >++ unsigned long size; >++ unsigned long flags; >++ long usecount; >++}; >++ >++ >++typedef struct { volatile int counter; } atomic_t; >++ >++struct module >++{ >++ unsigned long size_of_struct; /* == sizeof(module) */ >++ struct module *next; >++ const char *name; >++ unsigned long size; >++ >++ union >++ { >++ atomic_t usecount; >++ long pad; >++ } uc; /* Needs to keep its size - so says rth */ >++ >++ unsigned long flags; /* AUTOCLEAN et al */ >++ >++ unsigned nsyms; >++ unsigned ndeps; >++ >++ struct module_symbol *syms; >++ struct module_ref *deps; >++ struct module_ref *refs; >++ int (*init)(void); >++ void (*cleanup)(void); >++ const struct exception_table_entry *ex_table_start; >++ const struct exception_table_entry *ex_table_end; >++#ifdef __alpha__ >++ unsigned long gp; >++#endif >++}; >++ >+diff -Naur sysklogd-1.4.1/sysklogd.8 sysklogd-1.4.1new/sysklogd.8 >+--- sysklogd-1.4.1/sysklogd.8 2001-03-11 14:35:51.000000000 -0500 >++++ sysklogd-1.4.1new/sysklogd.8 2001-07-09 00:17:22.000000000 -0400 >+@@ -30,6 +30,7 @@ >+ .I domainlist >+ ] >+ .RB [ " \-v " ] >++.RB [ " \-x " ] >+ .LP >+ .SH DESCRIPTION >+ .B Sysklogd >+@@ -152,6 +153,11 @@ >+ .TP >+ .B "\-v" >+ Print version and exit. >++.TP >++.B "\-x" >++Disable name lookups when receiving remote messages. >++This avoids deadlocks when the nameserver is running on >++the same machine that runs the syslog daemon. >+ .LP >+ .SH SIGNALS >+ .B Syslogd >+diff -Naur sysklogd-1.4.1/syslog_tst.c sysklogd-1.4.1new/syslog_tst.c >+--- sysklogd-1.4.1/syslog_tst.c 1997-06-02 13:21:41.000000000 -0400 >++++ sysklogd-1.4.1new/syslog_tst.c 2000-12-11 16:17:38.000000000 -0500 >+@@ -42,7 +42,7 @@ >+ if ( (nl = strrchr(bufr, '\n')) != \ >+ (char *) 0) >+ *nl = '\0'; >+- syslog(LOG_INFO, bufr); >++ syslog(LOG_INFO, "%s", bufr); >+ logged += strlen(bufr); >+ if ( logged > 1024 ) >+ { >+@@ -54,7 +54,7 @@ >+ } >+ else >+ while (argc-- > 1) >+- syslog(LOG_INFO, argv++[1]); >++ syslog(LOG_INFO, "%s", argv++[1]); >+ } >+ else >+ { >+diff -Naur sysklogd-1.4.1/syslogd.c sysklogd-1.4.1new/syslogd.c >+--- sysklogd-1.4.1/syslogd.c 2001-03-11 14:40:10.000000000 -0500 >++++ sysklogd-1.4.1new/syslogd.c 2004-08-02 18:02:35.000000000 -0400 >+@@ -637,8 +637,8 @@ >+ * in seconds after previous message is logged. After each flush, >+ * we move to the next interval until we reach the largest. >+ */ >+-int repeatinterval[] = { 30, 60 }; /* # of secs before flush */ >+-#define MAXREPEAT ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1) >++time_t repeatinterval[] = { 30, 60 }; /* # of secs before flush */ >++#define MAXREPEAT ((int) ((sizeof(repeatinterval) / sizeof(repeatinterval[0])) - 1)) >+ #define REPEATTIME(f) ((f)->f_time + repeatinterval[(f)->f_repeatcount]) >+ #define BACKOFF(f) { if (++(f)->f_repeatcount > MAXREPEAT) \ >+ (f)->f_repeatcount = MAXREPEAT; \ >+@@ -730,6 +730,7 @@ >+ int MarkInterval = 20 * 60; /* interval between marks in seconds */ >+ int MarkSeq = 0; /* mark sequence number */ >+ int NoFork = 0; /* don't fork - don't run in daemon mode */ >++int DisableDNS = 0; /* don't look up IP addresses of incoming messages */ >+ int AcceptRemote = 0; /* receive messages that come via UDP */ >+ char **StripDomains = NULL; /* these domains may be stripped before writing logs */ >+ char **LocalHosts = NULL; /* these hosts are logged with their hostname */ >+@@ -743,7 +744,7 @@ >+ char **crunch_list(char *list); >+ int usage(void); >+ void untty(void); >+-void printchopped(const char *hname, char *msg, int len, int fd); >++void printchopped(const char *hname, char *msg, size_t len, int fd); >+ void printline(const char *hname, char *msg); >+ void printsys(char *msg); >+ void logmsg(int pri, char *msg, const char *from, int flags); >+@@ -786,7 +787,7 @@ >+ int len, num_fds; >+ #else /* __GLIBC__ */ >+ #ifndef TESTING >+- size_t len; >++ socklen_t len; >+ #endif >+ int num_fds; >+ #endif /* __GLIBC__ */ >+@@ -829,7 +830,7 @@ >+ funix[i] = -1; >+ } >+ >+- while ((ch = getopt(argc, argv, "a:dhf:l:m:np:rs:v")) != EOF) >++ while ((ch = getopt(argc, argv, "a:dhf:l:m:np:rs:vx")) != EOF) >+ switch((char)ch) { >+ case 'a': >+ if (nfunix < MAXFUNIX) >+@@ -877,6 +878,9 @@ >+ case 'v': >+ printf("syslogd %s.%s\n", VERSION, PATCHLEVEL); >+ exit (0); >++ case 'x': >++ DisableDNS = 1; >++ break; >+ case '?': >+ default: >+ usage(); >+@@ -890,11 +894,11 @@ >+ dprintf("Checking pidfile.\n"); >+ if (!check_pid(PidFile)) >+ { >++ signal (SIGTERM, doexit); >+ if (fork()) { >+ /* >+ * Parent process >+ */ >+- signal (SIGTERM, doexit); >+ sleep(300); >+ /* >+ * Not reached unless something major went wrong. 5 >+@@ -906,6 +910,7 @@ >+ */ >+ exit(1); >+ } >++ signal (SIGTERM, SIG_DFL); >+ num_fds = getdtablesize(); >+ for (i= 0; i < num_fds; i++) >+ (void) close(i); >+@@ -1074,9 +1079,9 @@ >+ (fd_set *) NULL, (struct timeval *) NULL); >+ if ( restart ) >+ { >++ restart = 0; >+ dprintf("\nReceived SIGHUP, reloading syslogd.\n"); >+ init(); >+- restart = 0; >+ continue; >+ } >+ if (nfds == 0) { >+@@ -1145,8 +1150,7 @@ >+ dprintf("INET socket error: %d = %s.\n", \ >+ errno, strerror(errno)); >+ logerror("recvfrom inet"); >+- /* should be harmless now that we set >+- * BSDCOMPAT on the socket */ >++ /* should be harmless */ >+ sleep(10); >+ } >+ } >+@@ -1174,7 +1178,7 @@ >+ >+ int usage() >+ { >+- fprintf(stderr, "usage: syslogd [-drvh] [-l hostlist] [-m markinterval] [-n] [-p path]\n" \ >++ fprintf(stderr, "usage: syslogd [-drvxh] [-l hostlist] [-m markinterval] [-n] [-p path]\n" \ >+ " [-s domainlist] [-f conffile]\n"); >+ exit(1); >+ } >+@@ -1232,15 +1236,6 @@ >+ close(fd); >+ return -1; >+ } >+- /* We need to enable BSD compatibility. Otherwise an attacker >+- * could flood our log files by sending us tons of ICMP errors. >+- */ >+- if (setsockopt(fd, SOL_SOCKET, SO_BSDCOMPAT, \ >+- (char *) &on, sizeof(on)) < 0) { >+- logerror("setsockopt(BSDCOMPAT), suspending inet"); >+- close(fd); >+- return -1; >+- } >+ if (bind(fd, (struct sockaddr *) &sin, sizeof(sin)) < 0) { >+ logerror("bind, suspending inet"); >+ close(fd); >+@@ -1254,30 +1249,26 @@ >+ crunch_list(list) >+ char *list; >+ { >+- int count, i; >++ int i, m, n; >+ char *p, *q; >+ char **result = NULL; >+ >+ p = list; >+ >+ /* strip off trailing delimiters */ >+- while (p[strlen(p)-1] == LIST_DELIMITER) { >+- count--; >++ while (*p && p[strlen(p)-1] == LIST_DELIMITER) >+ p[strlen(p)-1] = '\0'; >+- } >+ /* cut off leading delimiters */ >+- while (p[0] == LIST_DELIMITER) { >+- count--; >++ while (p[0] == LIST_DELIMITER) >+ p++; >+- } >+ >+- /* count delimiters to calculate elements */ >+- for (count=i=0; p[i]; i++) >+- if (p[i] == LIST_DELIMITER) count++; >++ /* count delimiters to calculate the number of elements */ >++ for (n = i = 0; p[i]; i++) >++ if (p[i] == LIST_DELIMITER) n++; >+ >+- if ((result = (char **)malloc(sizeof(char *) * count+2)) == NULL) { >++ if ((result = (char **)malloc(sizeof(char *) * (n + 2))) == NULL) { >+ printf ("Sorry, can't get enough memory, exiting.\n"); >+- exit(0); >++ exit(1); >+ } >+ >+ /* >+@@ -1285,30 +1276,28 @@ >+ * characters are different from any delimiters, >+ * so we don't have to care about this. >+ */ >+- count = 0; >+- while ((q=strchr(p, LIST_DELIMITER))) { >+- result[count] = (char *) malloc((q - p + 1) * sizeof(char)); >+- if (result[count] == NULL) { >++ m = 0; >++ while ((q = strchr(p, LIST_DELIMITER)) && m < n) { >++ result[m] = (char *) malloc((q - p + 1) * sizeof(char)); >++ if (result[m] == NULL) { >+ printf ("Sorry, can't get enough memory, exiting.\n"); >+- exit(0); >++ exit(1); >+ } >+- strncpy(result[count], p, q - p); >+- result[count][q - p] = '\0'; >++ memcpy(result[m], p, q - p); >++ result[m][q - p] = '\0'; >+ p = q; p++; >+- count++; >++ m++; >+ } >+- if ((result[count] = \ >+- (char *)malloc(sizeof(char) * strlen(p) + 1)) == NULL) { >++ if ((result[m] = strdup(p)) == NULL) { >+ printf ("Sorry, can't get enough memory, exiting.\n"); >+- exit(0); >++ exit(1); >+ } >+- strcpy(result[count],p); >+- result[++count] = NULL; >++ result[++m] = NULL; >+ >+ #if 0 >+- count=0; >+- while (result[count]) >+- dprintf ("#%d: %s\n", count, StripDomains[count++]); >++ m = 0; >++ while (result[m]) >++ dprintf ("#%d: %s\n", m, result[m++]); >+ #endif >+ return result; >+ } >+@@ -1346,7 +1335,7 @@ >+ void printchopped(hname, msg, len, fd) >+ const char *hname; >+ char *msg; >+- int len; >++ size_t len; >+ int fd; >+ { >+ auto int ptlngth; >+@@ -1446,6 +1435,7 @@ >+ while ((c = *p++) && q < &line[sizeof(line) - 4]) { >+ if (c == '\n') >+ *q++ = ' '; >++#if 0 >+ else if (c < 040) { >+ *q++ = '^'; >+ *q++ = c ^ 0100; >+@@ -1454,7 +1444,9 @@ >+ *q++ = '0' + ((c & 0300) >> 6); >+ *q++ = '0' + ((c & 0070) >> 3); >+ *q++ = '0' + (c & 0007); >+- } else >++ } >++#endif >++ else >+ *q++ = c; >+ } >+ *q = '\0'; >+@@ -1929,7 +1921,7 @@ >+ /* is this slot used? */ >+ if (ut.ut_name[0] == '\0') >+ continue; >+- if (ut.ut_type == LOGIN_PROCESS) >++ if (ut.ut_type != USER_PROCESS) >+ continue; >+ if (!(strcmp (ut.ut_name,"LOGIN"))) /* paranoia */ >+ continue; >+@@ -2013,7 +2005,10 @@ >+ dprintf("Malformed from address.\n"); >+ return ("???"); >+ } >+- hp = gethostbyaddr((char *) &f->sin_addr, sizeof(struct in_addr), \ >++ if (DisableDNS) >++ hp = 0; >++ else >++ hp = gethostbyaddr((char *) &f->sin_addr, sizeof(struct in_addr), \ >+ f->sin_family); >+ if (hp == 0) { >+ dprintf("Host name for your address (%s) unknown.\n", >diff -Naur sysklogd/sysklogd-1.4.1-r12.ebuild sysklogd-new/sysklogd-1.4.1-r12.ebuild >--- sysklogd/sysklogd-1.4.1-r12.ebuild 1969-12-31 19:00:00.000000000 -0500 >+++ sysklogd-new/sysklogd-1.4.1-r12.ebuild 2005-04-05 13:45:09.880889912 -0400 >@@ -0,0 +1,60 @@ >+# Copyright 1999-2005 Gentoo Foundation >+# Distributed under the terms of the GNU General Public License v2 >+# $Header: /var/cvsroot/gentoo-x86/app-admin/sysklogd/sysklogd-1.4.1-r11.ebuild,v 1.4 2005/01/01 11:29:42 eradicator Exp $ >+ >+inherit eutils >+ >+DESCRIPTION="Standard log daemons" >+HOMEPAGE="http://www.infodrom.org/projects/sysklogd/" >+SRC_URI="ftp://metalab.unc.edu/pub/Linux/system/daemons/${P}.tar.gz" >+ >+LICENSE="BSD" >+SLOT="0" >+KEYWORDS="alpha amd64 hppa ia64 mips ppc ppc64 s390 x86 sparc" >+IUSE="" >+ >+DEPEND="virtual/libc" >+RDEPEND="dev-lang/perl >+ sys-apps/debianutils" >+PROVIDE="virtual/logger" >+ >+src_unpack() { >+ unpack ${A} >+ >+ cd ${S} >+ sed -i "s:-O3:${CFLAGS} -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE:" Makefile >+ >+ # Handle SO_BSDCOMPAT being depricated in 2.5+ kernels. >+ if [ "${ARCH}" = "ppc64" ] >+ then >+ cd ${S} >+ epatch ${FILESDIR}/${PN}-1.4.1-ppc64.patch >+ else >+ cd ${S}; epatch ${FILESDIR}/${P}-SO_BSDCOMPAT.patch >+ cd ${S}; epatch ${FILESDIR}/${P}-2.6.headers.patch >+ fi >+ if [ "${ARCH}" = "mips" ] >+ then >+ cd ${S} >+ epatch ${FILESDIR}/${PN}-1.4.1-mips.patch >+ fi >+} >+ >+src_compile() { >+ emake LDFLAGS="" || die >+} >+ >+src_install() { >+ dosbin syslogd klogd ${FILESDIR}/syslogd-listfiles >+ doman *.[1-9] ${FILESDIR}/syslogd-listfiles.8 >+ exeinto /etc/cron.daily >+ newexe ${FILESDIR}/syslog-cron syslog.cron >+ dodoc ANNOUNCE CHANGES MANIFEST NEWS README.1st README.linux >+ dodoc ${FILESDIR}/syslog.conf >+ insinto /etc >+ doins ${FILESDIR}/syslog.conf >+ exeinto /etc/init.d >+ newexe ${FILESDIR}/sysklogd.rc6 sysklogd >+ insinto /etc/conf.d >+ newins ${FILESDIR}/sysklogd.confd sysklogd >+}
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 88099
:
55410
|
55665
|
55666
|
68076
|
68077