summaryrefslogtreecommitdiff
blob: 72572020c3a87b5c0c3441c15dee38a62d0952e5 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
# Copyright 1999-2009 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
# $Header: $

inherit eutils linux-mod

DESCRIPTION="An entirely re-designed and re-implemented Unionfs."
HOMEPAGE="http://aufs.sourceforge.net/"
SRC_URI="http://dev.gentooexperimental.org/~tommy/distfiles/${P}.tar.bz2"

LICENSE="GPL-2"
SLOT="0"
KEYWORDS="~amd64 ~x86"
IUSE="debug fuse hinotify nfs nfsexport robr sec_perm"

S="${WORKDIR}"/aufs

MODULE_NAMES="aufs(misc:${S})"

pkg_setup() {
	# kernel version check
	if kernel_is lt 2 6 16 ; then
		eerror "${PN} is being developed and tested on linux-2.6.16 and later."
		eerror "Make sure you have a proper kernel version!"
		die "Wrong kernel version"
	fi

	get_version

	# assume no kernel patches will be applied today
	APPLY_KERNEL_PATCH="n"

	# Check if sec_perm patch needs to be applied
	if kernel_is ge 2 6 24 && linux_chkconfig_present "SECURITY" ; then
		APPLY_SEC_PERM_PATCH="n"
		if ! grep -qs "EXPORT_SYMBOL(security_inode_permission);" "${KV_DIR}/security/security.c" ; then
			APPLY_SEC_PERM_PATCH="y"
			APPLY_KERNEL_PATCH="y"
		fi

		# make sure the user is allowing this to happen
		if [[ APPLY_SEC_PERM_PATCH = "y" ]] && ! use sec_perm; then
			eerror "${PN} requires that all kernels with CONFIG_SECURITY enabled >= 2.6.24"
			eerror "be patched.  Please enable USE=\"sec_perm\" to allow this patch to be"
			eerror "applied."
			die "Invalid configuration"
		fi
	# Also check to make sure they aren't enabling it when they don't need to
	else
		if use sec_perm ; then
			eerror "${PN} does not require the sec_perm patch to be applied to your kernel."
			eerror "Please disabe the sec_perm USE flag: USE=\"-sec_perm\"."
			die "Invalid configuration"
		fi
	fi

	# Check for applicability of lhash patch for NFS branch support
	# Check if lhash Patch has to be applied
	if use nfs && kernel_is ge 2 6 19 ; then
		APPLY_LHASH_PATCH="n"
		# If lhash patch is not applied
		if ! grep -qs "EXPORT_SYMBOL(__lookup_hash);" "${KV_DIR}/fs/namei.c" \
		&& ! grep -qs "struct dentry * __lookup_hash(struct qstr *name, struct dentry * base, struct nameidata *nd);" "${KV_DIR}/fs/namei.h" ; then
			APPLY_LHASH_PATCH="y"
			APPLY_KERNEL_PATCH="y"
		fi
	fi


	# If a patch has to be applied
	if [[ ${APPLY_KERNEL_PATCH} == "y" ]] ; then
		ewarn "Patching your kernel..."
		cd ${KV_DIR}

		# If the sec_perm patch has to be applied
		if [[ ${APPLY_SEC_PERM_PATCH} == "y" ]] ; then
			epatch "${FILESDIR}"/${PN}20081208-sec_perm-2.6.24.patch
		fi

		# if the lhash patch has to be applied
		if [[ ${APPLY_LHASH_PATCH} == "y" ]] ; then
			if kernel_is ge 2 6 24 ; then
				epatch "${FILESDIR}"/${PN}-lhash-2.6.24.patch
			else
				if kernel_is ge 2 6 22 ; then
					epatch "${FILESDIR}"/${PN}-lhash-2.6.22.patch
				else
					epatch "${FILESDIR}"/${PN}-lhash-2.6.19.patch
				fi
			fi
		fi
	fi

	linux-mod_pkg_setup
}

src_unpack(){
	unpack ${A}
	cd "${S}"

	# Enable hinotify in priv_def.mk
	if use hinotify && kernel_is ge 2 6 18 ; then
		echo "CONFIG_AUFS_HINOTIFY = y" >> priv_def.mk || die "setting hinotify in priv_def.mk failed!"
	fi

	# Disable SYSAUFS for kernel less than 2.6.18
	if kernel_is lt 2 6 18 ; then
		echo "CONFIG_AUFS_SYSAUFS = " >> priv_def.mk || die "unsetting sysaufs in priv_def.mk failed!"
	fi

	# Enable nfsexport in priv_def.mk
	if use nfsexport && kernel_is ge 2 6 18 ; then
		echo "CONFIG_AUFS_EXPORT = y" >> priv_def.mk || die "setting export in priv_def.mk failed!"
	fi

	# Enable lhash Patch in priv_def.mk
	if use nfs && kernel_is ge 2 6 19 ; then
		echo "CONFIG_AUFS_LHASH_PATCH = y" >> priv_def.mk || die "setting lhash in priv_def.mk failed!"
	fi

	# Enable aufs readonly-branch in priv_def.mk
	if use robr ; then
		echo "CONFIG_AUFS_ROBR = y" >> priv_def.mk || die "setting robr in priv_def.mk failed!"
	fi

	# Enable FUSE workaround for AUFS
	if use fuse ; then
		echo "CONFIG_AUFS_WORKAROUND_FUSE = y" >> priv_def.mk || die "setting workaround_fuse in priv_def.mk failed!"
	fi

	# Enable / Disable debugging
	if use debug ; then
		echo "CONFIG_AUFS_DEBUG = y" >> priv_def.mk || die "setting debug in priv_dev.mk failed!"
	else
		echo "CONFIG_AUFS_DEBUG = " >> priv_def.mk || die "setting debug in priv_dev.mk failed!"
	fi

	# Check if a vserver-kernel is installed
	if [[ -e ${KV_DIR}/include/linux/vserver ]] ; then
		einfo "vserver kernel seems to be installed"
		einfo "using vserver patch"
		echo "AUFS_DEF_CONFIG = -DVSERVER" >> priv_def.mk || die "setting vserver in priv_def.mk failed!"
	fi
}

src_compile() {
	use x86 && ARCH=i386
	use amd64 && ARCH=x86_64
	emake KDIR=${KV_DIR} SUBLEVEL=${KV_PATCH} -f local.mk || die "emake failed"
}

src_install() {
	cd util
	exeinto /sbin
	exeopts -m0500
	doexe mount.aufs umount.aufs auplink aulchown || die
	doman aufs.5 || die
	insinto /etc/default
	newins etc_default_aufs aufs || die
	linux-mod_src_install
}

pkg_postinst() {
	elog "To be able to use aufs, you have to load the kernel module by typing:"
	elog "modprobe aufs"
	elog "For further information refer to the aufs man page"

	if use sec_perm || use nfs ; then
		ewarn "Your kernel has been patched in order to export security"
		ewarn "permissions.  You will need to recompile your kernel with"
		ewarn "this new patch in order for ${PN} to function."
	fi

	linux-mod_pkg_postinst
}