From 3b6e9c1c7ad1e07e9411ce8dbd498aa35fdc8cc6 Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Nov 04 2021 04:10:54 +0000 Subject: import kmod-kvdo-8.1.0.316-4.el9_b --- diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..e041f66 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +SOURCES/kvdo-3f9bde5.tar.gz diff --git a/.kmod-kvdo.metadata b/.kmod-kvdo.metadata new file mode 100644 index 0000000..cea9291 --- /dev/null +++ b/.kmod-kvdo.metadata @@ -0,0 +1 @@ +dafa5a7585041bd1391b4ef92194146abc2cf2a3 SOURCES/kvdo-3f9bde5.tar.gz diff --git a/SPECS/kmod-kvdo.spec b/SPECS/kmod-kvdo.spec new file mode 100644 index 0000000..dbc50f4 --- /dev/null +++ b/SPECS/kmod-kvdo.spec @@ -0,0 +1,183 @@ +%global commit 3f9bde55d3d6bd6083af31a11eb2ac066904f581 +%global gittag 8.1.0.316 +%global shortcommit %(c=%{commit}; echo ${c:0:7}) +%define spec_release 4 + +%define kmod_name kvdo +%define kmod_driver_version %{gittag} +%define kmod_rpm_release %{spec_release} +%define kmod_kernel_version 5.14.0-1.1.5.1.el9 +%define kmod_headers_version %(rpm -qa kernel-devel | sed 's/^kernel-devel-//') +%define kmod_kbuild_dir . +%define kmod_devel_package 0 + +Source0: https://github.com/dm-vdo/%{kmod_name}/archive/%{commit}/%{kmod_name}-%{shortcommit}.tar.gz + +%define findpat %( echo "%""P" ) + +Name: kmod-kvdo +Version: %{kmod_driver_version} +Release: %{kmod_rpm_release}%{?dist} +Summary: Kernel Modules for Virtual Data Optimizer +License: GPLv2+ +URL: http://github.com/dm-vdo/kvdo +BuildRoot: %(mktemp -ud %{_tmppath}/%{name}-%{version}-%{release}-XXXXXX) +BuildRequires: elfutils-libelf-devel +BuildRequires: glibc +BuildRequires: kernel-devel >= %{kmod_kernel_version} + +# Disable the kernel-debug requirement for now + +BuildRequires: libuuid-devel +BuildRequires: redhat-rpm-config +ExcludeArch: i686 +ExcludeArch: ppc +ExcludeArch: ppc64 +ExcludeArch: s390 + +%global kernel_source() /usr/src/kernels/%{kmod_headers_version} + +%global _use_internal_dependency_generator 0 +Provides: kernel-modules = %{kmod_kernel_version}.%{_target_cpu} +Provides: kmod-%{kmod_name} = %{?epoch:%{epoch}:}%{version}-%{release} +Requires(post): %{_sbindir}/weak-modules +Requires(postun): %{_sbindir}/weak-modules +Requires: kernel >= %{kmod_kernel_version} +Requires: kernel-core-uname-r >= %{kmod_kernel_version} + +%description +Virtual Data Optimizer (VDO) is a device mapper target that delivers +block-level deduplication, compression, and thin provisioning. + +This package provides the kernel modules for VDO. + +%pre +# During the install, check whether kvdo or uds is loaded. A warning here +# indicates that a previous install was not completely removed. This message +# is purely informational to the user. +for module in kvdo uds; do + if grep -q "^${module}" /proc/modules; then + if [ "${module}" == "kvdo" ]; then + echo "WARNING: Found ${module} module previously loaded (Version: $(cat /sys/kvdo/version 2>/dev/null || echo Unknown)). A reboot is recommended before attempting to use the newly installed module." + else + echo "WARNING: Found ${module} module previously loaded. A reboot is recommended before attempting to use the newly installed module." + fi + fi +done + +%post +modules=( $(find /lib/modules/%{kmod_headers_version}/extra/kmod-%{kmod_name} | grep '\.ko$') ) +printf '%s\n' "${modules[@]}" >> /var/lib/rpm-kmod-posttrans-weak-modules-add + +%pretrans -p +posix.unlink("/var/lib/rpm-kmod-posttrans-weak-modules-add") + +%posttrans +if [ -f "/var/lib/rpm-kmod-posttrans-weak-modules-add" ]; then + modules=( $(cat /var/lib/rpm-kmod-posttrans-weak-modules-add) ) + rm -rf /var/lib/rpm-kmod-posttrans-weak-modules-add + printf '%s\n' "${modules[@]}" | %{_sbindir}/weak-modules --dracut=/usr/bin/dracut --add-modules +fi + +%preun +rpm -ql kmod-kvdo-%{kmod_driver_version}-%{kmod_rpm_release}%{?dist}.$(arch) | grep '\.ko$' > /var/run/rpm-kmod-%{kmod_name}-modules +# Check whether kvdo or uds is loaded, and if so attempt to remove it. A +# failure to unload means there is still something using the module. To make +# sure the user is aware, we print a warning with recommended instructions. +for module in kvdo uds; do + if grep -q "^${module}" /proc/modules; then + warnMessage="WARNING: ${module} in use. Changes will take effect after a reboot." + modprobe -r ${module} 2>/dev/null || echo ${warnMessage} && /usr/bin/true + fi +done + +%postun +modules=( $(cat /var/run/rpm-kmod-%{kmod_name}-modules) ) +rm /var/run/rpm-kmod-%{kmod_name}-modules +printf '%s\n' "${modules[@]}" | %{_sbindir}/weak-modules --dracut=/usr/bin/dracut --remove-modules + +%files +%defattr(644,root,root,755) +/lib/modules/%{kmod_headers_version} +/etc/depmod.d/%{kmod_name}.conf +/usr/share/doc/kmod-%{kmod_name}/greylist.txt + +%prep +%setup -n %{kmod_name}-%{commit} +%{nil} +set -- * +mkdir source +mv "$@" source/ +mkdir obj + +%build +rm -rf obj +cp -r source obj +make -C %{kernel_source} M=$PWD/obj/%{kmod_kbuild_dir} V=1 \ + NOSTDINC_FLAGS="-I $PWD/obj/include -I $PWD/obj/include/uapi" +# mark modules executable so that strip-to-file can strip them +find obj/%{kmod_kbuild_dir} -name "*.ko" -type f -exec chmod u+x '{}' + + +whitelist="/lib/modules/kabi-current/kabi_whitelist_%{_target_cpu}" + +for modules in $( find obj/%{kmod_kbuild_dir} -name "*.ko" -type f -printf "%{findpat}\n" | sed 's|\.ko$||' | sort -u ) ; do + # update depmod.conf + module_weak_path=$(echo $modules | sed 's/[\/]*[^\/]*$//') + if [ -z "$module_weak_path" ]; then + module_weak_path=%{name} + else + module_weak_path=%{name}/$module_weak_path + fi + echo "override $(echo $modules | sed 's/.*\///') $(echo %{kmod_headers_version} | sed 's/\.[^\.]*$//').* weak-updates/$module_weak_path" >> source/depmod.conf + + # update greylist + nm -u obj/%{kmod_kbuild_dir}/$modules.ko | sed 's/.*U //' | sed 's/^\.//' | sort -u | while read -r symbol; do + grep -q "^\s*$symbol\$" $whitelist || echo "$symbol" >> source/greylist + done +done +sort -u source/greylist | uniq > source/greylist.txt + +%install +export INSTALL_MOD_PATH=$RPM_BUILD_ROOT +export INSTALL_MOD_DIR=extra/%{name} +make -C %{kernel_source} modules_install V=1 \ + M=$PWD/obj/%{kmod_kbuild_dir} +# Cleanup unnecessary kernel-generated module dependency files. +find $INSTALL_MOD_PATH/lib/modules -iname 'modules.*' -exec rm {} \; + +install -m 644 -D source/depmod.conf $RPM_BUILD_ROOT/etc/depmod.d/%{kmod_name}.conf +install -m 644 -D source/greylist.txt $RPM_BUILD_ROOT/usr/share/doc/kmod-%{kmod_name}/greylist.txt + +%clean +rm -rf $RPM_BUILD_ROOT + +%changelog +* Wed Sep 08 2021 - Andy Walsh - 8.1.0.316-3 +- Rebuilt for latest kernel. +- Related: rhbz#1997635 + +* Wed Sep 08 2021 - Andy Walsh - 8.1.0.316-3 +- Rebuilt for latest kernel. +- Related: rhbz#1997635 + +* Mon Aug 09 2021 - Andy Walsh - 8.1.0.316-2 +- Rebased to upstream candidate. +- Resolves: rhbz#1955374 + +* Mon Aug 09 2021 Mohan Boddu - 8.1.0.316-1.1 +- Rebuilt for IMA sigs, glibc 2.34, aarch64 flags + Related: rhbz#1991688 + +* Sat Aug 07 2021 - Andy Walsh - 8.1.0.316-1 +- Rebased to upstream candidate. +- Resolves: rhbz#1955374 + +* Thu Jul 29 2021 - Andy Walsh - 8.1.0.264-1 +- Rebased to upstream candidate. +- Related: rhbz#1955374 +- Fixed GCC implicit-fallthrough errors when building for latest kernel +- Resolves: rhbz#1984814 + +* Tue May 04 2021 - Andy Walsh - 8.1.0.4-1 +- Initial build for EL9 +- Related: rhbz#1955374