blob: 158a763754d87c9533e66f977dd03ccc2779356b (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
|
# Copyright 1999-2004 Gentoo Technologies, Inc.
# Distributed under the terms of the GNU General Public License v2
# $Header: /var/cvsroot/gentoo-x86/sys-kernel/xfs-sources/xfs-sources-2.4.20-r4.ebuild,v 1.2 2004/01/04 01:22:58 scox Exp $
IUSE="build crypt"
# OKV=original kernel version, KV=patched kernel version. They can be the same.
# Kernel ebuilds using the kernel.eclass can remove any patch that you
# do not want to apply by simply setting the KERNEL_EXCLUDE shell
# variable to the string you want to exclude (for instance
# KERNEL_EXCLUDE="evms" would not patch any patches whose names match
# *evms*). Kernels are only tested in the default configuration, but
# this may be useful if you know that a particular patch is causing a
# conflict with a patch you personally want to apply, or some other
# similar situation.
ETYPE="sources"
inherit kernel
OKV=2.4.20
EXTRAVERSION=-xfs-r4
KV=${OKV}${EXTRAVERSION}
S=${WORKDIR}/linux-${KV}
# Documentation on the patches contained in this kernel will be installed
# to /usr/share/doc/xfs-sources-${PV}/patches.txt.gz
DESCRIPTION="Full sources for the XFS Specialized Gentoo Linux kernel"
SRC_URI="mirror://kernel/linux/kernel/v2.4/linux-${OKV}.tar.bz2
mirror://gentoo/patches-${KV/-r4/-r3}.tar.bz2"
KEYWORDS="x86 -ppc -sparc "
SLOT="${KV}"
src_unpack() {
unpack ${A}
mv ${WORKDIR}/${KV/-r4/-r3} ${WORKDIR}/${KV}
mv linux-${OKV} linux-${KV} || die
cd ${KV}
# Kill patches we aren't suppposed to use, don't worry about
# failures, if they aren't there that is a good thing!
# If the compiler isn't gcc3 drop the gcc3 patches
if [[ "${COMPILER}" == "gcc3" ]];then
einfo "You are using gcc3, check out the special"
einfo "processor types just for you"
else
einfo "Your compiler is not gcc3, dropping patches..."
for file in *gcc3*;do
einfo "Dropping ${file}..."
rm -f ${file}
done
fi
# This is the ratified crypt USE flag, enables IPSEC and patch-int
if [ -z "`use crypt`" ]; then
einfo "No Cryptographic support, dropping patches..."
for file in 8*;do
einfo "Dropping ${file}..."
rm -f ${file}
done
else
einfo "Cryptographic support enabled..."
fi
kernel_src_unpack
cd ${S}
epatch ${FILESDIR}/do_brk_fix.patch || die "failed to patch for do_brk vuln"
epatch ${FILESDIR}/xfs-sources-2.4.20-gcc33.patch
}
|