From 6521d15f2891fb0a632ff1365e96b147ec6a755b Mon Sep 17 00:00:00 2001 From: Peter Georg Date: Jan 06 2022 16:18:41 +0000 Subject: Initial version --- diff --git a/.gitignore b/.gitignore new file mode 100644 index 0000000..b94ef16 --- /dev/null +++ b/.gitignore @@ -0,0 +1 @@ +SOURCES/ecryptfs-5.10.tar.xz diff --git a/.kmod-ecryptfs.metadata b/.kmod-ecryptfs.metadata new file mode 100644 index 0000000..7db5b9f --- /dev/null +++ b/.kmod-ecryptfs.metadata @@ -0,0 +1 @@ +483f2ad31e8ca4f4b6bacc6474ce5149a4172c99 SOURCES/ecryptfs-5.10.tar.xz diff --git a/SPECS/kmod-ecryptfs.spec b/SPECS/kmod-ecryptfs.spec new file mode 100644 index 0000000..6c0fdf5 --- /dev/null +++ b/SPECS/kmod-ecryptfs.spec @@ -0,0 +1,131 @@ +%global pkg ecryptfs + +%global kernel_version 4.18.0-348.el8 + +%global _use_internal_dependency_generator 0 +%global __find_requires /usr/lib/rpm/redhat/find-requires +%global __find_provides /usr/lib/rpm/redhat/find-provides + +%global debug_package %{nil} + +%global __spec_install_post \ + %{?__debug_package:%{__debug_install_post}} \ + %{__arch_install_post} \ + %{__os_install_post} \ + %{__mod_compress_install_post} + +%global __mod_compress_install_post find %{buildroot}/lib/modules -type f -name \*.ko -exec xz \{\} \\; + + +Name: kmod-%{pkg} +Version: 5.10 +Release: 1%{?dist} +Summary: Encrypted filesystem that operates on the VFS layer + +License: GPLv2 +URL: https://www.kernel.org/ + +Source0: %{pkg}-%{version}.tar.xz + +ExclusiveArch: x86_64 aarch64 + +BuildRequires: elfutils-libelf-devel +BuildRequires: gcc +BuildRequires: kernel-rpm-macros +BuildRequires: kmod +BuildRequires: make +BuildRequires: redhat-rpm-config +BuildRequires: xz + +BuildRequires: kernel-abi-stablelists = %{kernel_version} +BuildRequires: kernel-devel = %{kernel_version} +BuildRequires: kernel-devel-uname-r = %{kernel_version}.%{_arch} + +Requires: kernel >= %{kernel_version} +Requires: kernel-uname-r >= %{kernel_version}.%{_arch} +Requires: kernel-modules >= %{kernel_version} +Requires: kernel-modules-uname-r >= %{kernel_version}.%{_arch} + +Provides: installonlypkg(kernel-module) +Provides: kernel-modules >= %{kernel_version}.%{_arch} + +Requires(post): %{_sbindir}/depmod +Requires(postun): %{_sbindir}/depmod + +Requires(post): %{_sbindir}/weak-modules +Requires(postun): %{_sbindir}/weak-modules + +Supplements: ecryptfs-utils +Recommends: ecryptfs-utils + + +%description +This package provides the required kernel module (ecryptfs) to mount devices +formatted with the Encrypted filesystem that operates on the VFS layer. + + +%prep +%autosetup -p1 -n %{pkg}-%{version} + + +%build +pushd src +%{__make} -C /usr/src/kernels/%{kernel_version}.%{_arch} %{?_smp_mflags} M=$PWD modules +popd + + +%install +%{__install} -D -t %{buildroot}/lib/modules/%{kernel_version}.%{_arch}/extra/fs src/%{pkg}.ko + +# Make .ko objects temporarily executable for automatic stripping +find %{buildroot}/lib/modules -type f -name \*.ko -exec chmod u+x \{\} \+ + + +%clean +%{__rm} -rf %{buildroot} + + +%post +mkdir -p %{_localstatedir}/lib/rpm-state/sig-kmods +printf '%s\n' "/lib/modules/%{kernel_version}.%{_arch}/extra/fs/%{pkg}.ko.xz" >> %{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-add + + +%preun +mkdir -p %{_localstatedir}/lib/rpm-state/sig-kmods +rpm -ql kmod-%{pkg}-%{?epoch:%{epoch}:}%{version}-%{release}.%{_arch} | grep '/lib/modules/%{kernel_version}.%{_arch}/.*\.ko\.xz$' >> %{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-remove + + +%postun +if [ -f %{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-remove ] +then + modules=( $(cat %{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-remove) ) + rm -f %{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-remove + rmdir --ignore-fail-on-non-empty %{_localstatedir}/lib/rpm-state/sig-kmods + printf '%s\n' "${modules[@]}" | %{_sbindir}/weak-modules --remove-modules +fi + + +%pretrans -p +posix.unlink("%{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-add") +posix.unlink("%{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-remove") + + +%posttrans +if [ -f %{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-add ] +then + modules=( $(cat %{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-add) ) + rm -f %{_localstatedir}/lib/rpm-state/sig-kmods/weak-modules-add + rmdir --ignore-fail-on-non-empty %{_localstatedir}/lib/rpm-state/sig-kmods + printf '%s\n' "${modules[@]}" | %{_sbindir}/weak-modules --add-modules +fi + + +%files +%defattr(644,root,root,755) +/lib/modules/%{kernel_version}.%{_arch} +%license COPYING + + +%changelog +* Thu Jan 06 2021 Peter Georg - 5.10-1 +- Initial kABI tracking kmod package (kernel >= 4.18.0-348.el8)