forked from gentoo/gentoo
-
Notifications
You must be signed in to change notification settings - Fork 0
/
linux-mod-r1.eclass
1252 lines (1124 loc) · 44.9 KB
/
linux-mod-r1.eclass
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
# Copyright 2023 Gentoo Authors
# Distributed under the terms of the GNU General Public License v2
# @ECLASS: linux-mod-r1.eclass
# @MAINTAINER:
# Ionen Wolkens <[email protected]>
# Gentoo Kernel project <[email protected]>
# @AUTHOR:
# Ionen Wolkens <[email protected]>
# @SUPPORTED_EAPIS: 8
# @PROVIDES: linux-info
# @BLURB: Functions for installing out-of-tree Linux kernel modules
# @DESCRIPTION:
# See the linux-mod-r1_src_compile function documentation for in-depth
# usage, and see the example further down for a quick overview.
#
# @SUBSECTION linux-mod -> linux-mod-r1 migration notes
# 0. Define a src_compile if missing, local variables below go there.
# 1. MODULE_NAMES="name(libdir:srcdir:objdir)"
# BUILD_TARGETS="target"
# -> local modlist=( name=libdir:srcdir:objdir:target(s) )
# - try without :target first, it is now almost always unnecessary
# - srcdir defaults to the current directory, and note that paths
# can be relative to that (should typically *not* pass ${S})
# 2. BUILD_PARAMS and/or BUILD_FIXES
# -> local modargs=( VAR="${KV_OUT_DIR}" ... )
# - CC/LD and similar are unneeded, always passed (V=1 too)
# - eval (aka eval "${BUILD_PARAMS}") is /not/ used for this anymore
# 3. s/linux-mod_/linux-mod-r1/g
# 4. _preinst+_postrm can be dropped, keep linux-mod-r1_pkg_postinst
# 5. linux-mod-r1_src_install now runs einstalldocs, adjust as needed
# 6. if *not* using linux-mod-r1_src_compile/install, then refer to
# the eclass' 2nd example and ensure using modules_post_process
# 7. If any, clang<->gcc switching custom workarounds can be dropped
# 8. See MODULES_KERNEL_MAX/_MIN if had or need kernel version checks.
#
# Not an exhaustive list, verify that no installed files are missing
# after. Look for "command not found" errors in the build log too.
#
# Revision bumps are not strictly needed to migrate unless want to
# keep the old as fallback for regressions, kernel upgrades or the
# new IUSE=+strip will typically cause rebuilds either way.
#
# @EXAMPLE:
#
# If source directory S had a layout such as:
# - Makefile (builds a gentoo.ko in current directory)
# - gamepad/Makefile (want to install to kernel/drivers/hid)
# - gamepad/obj/ (the built gamepad.ko ends up here)
#
# ...and the Makefile uses the NIH_SOURCE variable to find where the
# kernel build directory is (aka KV_OUT_DIR, see linux-info.eclass)
#
# then:
#
# @CODE
# CONFIG_CHECK="INPUT_FF_MEMLESS" # gamepad needs it to rumble
# MODULES_KERNEL_MIN=5.4 # needs features introduced in 5.4
#
# src_compile() {
# local modlist=(
# gentoo
# gamepad=kernel/drivers/hid:gamepad:gamepad/obj
# )
# local modargs=( NIH_SOURCE="${KV_OUT_DIR}" )
#
# linux-mod-r1_src_compile
# }
# @CODE
#
# Alternatively, if using the package's build system directly is
# more convenient, a typical example could be:
#
# @CODE
# src_compile() {
# MODULES_MAKEARGS+=(
# NIH_KDIR="${KV_OUT_DIR}"
# NIH_KSRC="${KV_DIR}"
# )
#
# emake "${MODULES_MAKEARGS[@]}"
# }
#
# src_install() {
# emake "${MODULES_MAKEARGS[@]}" DESTDIR="${ED}" install
# modules_post_process # strip->sign->compress
#
# einstalldocs
# }
# @CODE
#
# Some extra make variables may be of interest:
# - INSTALL_MOD_PATH: sometime used as DESTDIR
# - INSTALL_MOD_DIR: equivalent to linux_moduleinto
#
# MODULES_MAKEARGS is set by the eclass to handle toolchain and,
# when installing, also attempts to disable automatic stripping,
# compression, signing, and depmod to let the eclass handle it.
#
# linux_domodule can alternatively be used to install a single module.
#
# (remember to ensure that linux-mod-r1_pkg_postinst is ran for depmod)
case ${EAPI} in
8) ;;
*) die "${ECLASS}: EAPI ${EAPI:-0} not supported" ;;
esac
if [[ ! ${_LINUX_MOD_R1_ECLASS} ]]; then
_LINUX_MOD_R1_ECLASS=1
inherit edo linux-info multiprocessing toolchain-funcs
IUSE="dist-kernel modules-sign +strip ${MODULES_OPTIONAL_IUSE}"
RDEPEND="
sys-apps/kmod[tools]
dist-kernel? ( virtual/dist-kernel:= )
"
DEPEND="
virtual/linux-sources
"
BDEPEND="
sys-apps/kmod[tools]
modules-sign? (
dev-libs/openssl
virtual/pkgconfig
)
"
IDEPEND="
sys-apps/kmod[tools]
"
if [[ -n ${MODULES_OPTIONAL_IUSE} ]]; then
: "${MODULES_OPTIONAL_IUSE#+}? ( | )"
RDEPEND=${_/|/${RDEPEND}} DEPEND=${_/|/${DEPEND}} \
BDEPEND=${_/|/${BDEPEND}} IDEPEND=${_/|/${IDEPEND}}
fi
# @ECLASS_VARIABLE: KERNEL_CHOST
# @USER_VARIABLE
# @DEFAULT_UNSET
# @DESCRIPTION:
# Can be set to the CHOST value to use when selecting the toolchain
# for building kernel modules. This is similar to setting the kernel
# build system's CROSS_COMPILE variable minus the trailing dash.
#
# If this does not auto-select the desired toolchain, finer control
# can be achieved by setting the not directly documented (but valid)
# variables:
#
# KERNEL_{CC,CXX,LD,AR,NM,OBJCOPY,OBJDUMP,READELF,STRIP}
#
# If in doubt, do not set any of this.
#
# Default if unset: auto-detection, typically same as the current CHOST
# @ECLASS_VARIABLE: MODULES_EXTRA_EMAKE
# @USER_VARIABLE
# @DEFAULT_UNSET
# @DESCRIPTION:
# Extra arguments to pass to emake when building modules.
# Can contain arguments with quoted spaces, e.g.
# @CODE
# ..._EMAKE="KCFLAGS='-fzomg-optimize -fsuper-strict-aliasing' ..."
# @CODE
# @ECLASS_VARIABLE: MODULES_I_WANT_FULL_CONTROL
# @USER_VARIABLE
# @DEFAULT_UNSET
# @DESCRIPTION:
# When set to a non-empty value, disables passing most of the eclass'
# toolchain defaults to emake when building modules. Basic eclass
# requirements, ebuilds' modargs, and users' MODULES_EXTRA_EMAKE are
# still used.
#
# Primarily intended for expert users with modified kernel Makefiles
# that want the Makefile's values to be used by default.
#
# May want to look at KERNEL_CHOST before considering this.
# @ECLASS_VARIABLE: MODULES_SIGN_HASH
# @USER_VARIABLE
# @DEFAULT_UNSET
# @DESCRIPTION:
# Used with USE=modules-sign. Can be set to hash algorithm to use
# during signature generation.
#
# Rather than set this, it is recommended to select using the kernel's
# configuration to ensure proper support (e.g. CONFIG_MODULE_SIG_SHA256),
# and then it will be auto-detected here.
#
# Valid values: sha512,sha384,sha256,sha224,sha1
#
# Default if unset: kernel CONFIG_MODULE_SIG_HASH's value
# @ECLASS_VARIABLE: MODULES_SIGN_KEY
# @USER_VARIABLE
# @DEFAULT_UNSET
# @DESCRIPTION:
# Used with USE=modules-sign. Can be set to the path of the private
# key in PEM format to use, or a PKCS#11 URI.
#
# If path is relative (e.g. "certs/name.pem"), it is assumed to be
# relative to the kernel build directory being used.
#
# If the key requires a passphrase or PIN, the used kernel sign-file
# utility recognizes the KBUILD_SIGN_PIN environment variable. Be
# warned that the package manager may store this value in binary
# packages, database files, temporary files, and possibly logs. This
# eclass unsets the variable after use to mitigate the issue (notably
# for shared binary packages), but use this with care.
#
# Default if unset: kernel CONFIG_MODULE_SIG_KEY's value which itself
# defaults to certs/signing_key.pem
# @ECLASS_VARIABLE: MODULES_SIGN_CERT
# @USER_VARIABLE
# @DESCRIPTION:
# Used with USE=modules-sign. Can be set to the path of the X.509
# public key certificate to use.
#
# If path is relative (e.g. "certs/name.x509"), it is assumed to be
# relative to the kernel build directory being used.
: "${MODULES_SIGN_CERT:=certs/signing_key.x509}"
# @ECLASS_VARIABLE: MODULES_KERNEL_MAX
# @DEFAULT_UNSET
# @DESCRIPTION:
# If set to a kernel version (format: 1, 1.2, or 1.2.3), will print a
# warning if the used version is greater than (ver_test -gt) to this
# value using the same amount of version components (i.e. MAX=1.2
# allows 1.2.3, but MAX=1.2.2 does not).
#
# This should *only* be used for modules that are known to break
# frequently on kernel upgrades. If setting this to a non-LTS kernel,
# then should also take care to test and update this value regularly
# with new major kernel releases not to let the warning become stale
# and ignored by users.
#
# Not fatal to allow users to try or self-patch easily, but the (large)
# warning is difficult to miss. If need a fatal check for more serious
# issues (e.g. runtime filesystem corruption), please do it manually.
#
# This is intended to reduce the amount of bug reports for recurring
# expected issues that can be easily mitigated by using LTS kernels
# and waiting for new releases.
#
# If used, must be set before linux-mod-r1_pkg_setup is called.
# @ECLASS_VARIABLE: MODULES_KERNEL_MIN
# @DEFAULT_UNSET
# @DESCRIPTION:
# If set to a kernel version (format: 1, 1.2, or 1.2.3), will abort if
# the used version is less than (ver_test -lt) this value.
#
# Should only be used if known broken, or if upstream recommends a sane
# minimum. Not particularly necessary for kernels that are no longer
# in the tree.
#
# If used, must be set before linux-mod-r1_pkg_setup is called.
# @ECLASS_VARIABLE: MODULES_OPTIONAL_IUSE
# @PRE_INHERIT
# @DEFAULT_UNSET
# @DESCRIPTION:
# May contain a single flag to be added to IUSE optionally prefixed
# with a + sign to enable it by default. Doing so makes *all* of
# linux-mod-r1's functions and dependencies a no-op unless the flag
# is enabled. This includes phases, e.g. linux-mod-r1_pkg_setup will
# not process CONFIG_CHECK unless the flag is set.
#
# The typical recommended value is "+modules" (global IUSE).
#
# Note that modules being optional can be useful even if user space
# tools require them (e.g. installing in a chroot or prefix when the
# modules are loaded on the host, saves setting up linux sources).
# However, if tools are non-trivial to build, it may be preferable
# to split into two packages than use this variable due to requiring
# rebuilds every kernel upgrades.
# @ECLASS_VARIABLE: MODULES_MAKEARGS
# @OUTPUT_VARIABLE
# @DESCRIPTION:
# Will be set after linux-mod-r1_pkg_setup has been called. Contains
# arguments that should be passed to emake when building or installing
# modules.
#
# Modifying this variable is acceptable (e.g. to append kernel source
# arguments) but, if using linux-mod-r1_src_compile, setting modargs
# is the intended method seen as cleaner and less error-prone.
# @FUNCTION: linux-mod-r1_pkg_setup
# @DESCRIPTION:
# Required before using other functions from this eclass, and will:
# 1. run linux-info_pkg_setup (see linux-info.eclass)
# -> implies processing CONFIG_CHECK, and providing KV_ variables
# (MODULES and TRIM_UNUSED_KSYMS are always checked)
# 2. prepare toolchain to match the kernel
# -> sets KERNEL_{CHOST,CC,CXX,LD,AR,NM,OBJCOPY,OBJDUMP,READELF,STRIP}
# -> also sets MODULES_MAKEARGS array with, e.g. CC="${KERNEL_CC}"
# (normally these should not be used directly, for custom builds)
# 3. perform various sanity checks to fail early on issues
linux-mod-r1_pkg_setup() {
debug-print-function ${FUNCNAME[0]} "${@}"
[[ ${MERGE_TYPE} != binary ]] || return 0
_MODULES_GLOBAL[ran:pkg_setup]=1
_modules_check_function ${#} 0 0 || return 0
_modules_check_migration
_modules_prepare_kernel
_modules_prepare_sign
_modules_prepare_toolchain
_modules_set_makeargs
_modules_sanity_gccplugins
}
# @FUNCTION: linux-mod-r1_src_compile
# @DESCRIPTION:
# Builds modules, see the eclass' example for a quick overview.
# Uses the variables modlist and modargs as described below:
#
# * local modlist=( ... ) - list of modules to build, set as:
#
# module-name=install-dir:source-dir:build-dir:make-target
#
# > module-name: Resulting name, aka <module-name>.ko (required).
#
# > install-dir: Kernel modules sub-directory to install the module
# to (/lib/modules/version/<install-dir>/name.ko). Will be used when
# run linux-mod-r1_src_install. May want to consider the values of
# INSTALL_MOD_DIR(Makefile) or DEST_MODULE_LOCATION(dkms.conf) if it
# exists, but it can be anything.
# -> Default: extra
#
# Warning: Changing this location may leave stale modules until a
# kernel upgrade as the package manager does not typically delete
# old modules and only does overwrite on rebuilds.
#
# > source-dir: Directory containing the Makefile to build the module.
# Path can be relative to the current directory or absolute.
# -> Default: current directory
#
# > build-dir: Directory that will hold the built module-name.ko.
# -> Default: same as source-dir's value
#
# > make-target: Almost always unneeded but, if defaults are not right,
# then can specify the Makefile's target(s) to build the module/extras.
# Multiple targets can be used with spaces, e.g. :"first second".
# -> Default: specially tries modules, module, <name>.ko, default,
# all, empty target, and runs the first found usable
#
# Missing elements results in defaults being used, e.g. this is valid:
# modlist=( name1 name2=:source name3=install::build )
#
# * local modargs=( ... ) - extra arguments to pass to emake
#
# Makefile should notably be inspected for which variable it uses
# to find the kernel's build directory then, e.g. KDIR="${KV_OUT_DIR}"
# as appropriate. Note that typically want to pass KV_OUT_DIR(build)
# rather than KV_DIR(sources) if not both. This allows users to do
# out-of-source kernel builds and still build modules.
#
# Passing common toolchain variables such as CC or LD is not needed
# here as they are passed by default.
#
# ---
#
# Allowed to be called multiple times with a different modlist if need
# different make arguments per modules or intermediate steps -- albeit,
# if atypical, may want to build manually (see eclass' example).
linux-mod-r1_src_compile() {
debug-print-function ${FUNCNAME[0]} "${@}"
_modules_check_function ${#} 0 0 || return 0
[[ ${modlist@a} == *a* && ${#modlist[@]} -gt 0 ]] ||
die "${FUNCNAME[0]} was called without a 'modlist' array"
# run this again to verify built files access with src_compile's user
_modules_sanity_kernelbuilt
local -a emakeargs=( "${MODULES_MAKEARGS[@]}" )
[[ ${modargs@a} == *a* ]] && emakeargs+=( "${modargs[@]}" )
local -A built=()
local build mod name target
for mod in "${modlist[@]}"; do
# note modlist was not made an associative array ([name]=) to preserve
# ordering, but is still using = to improve readability
name=${mod%%=*}
[[ -n ${name} && ${name} != *:* ]] || die "invalid mod entry '${mod}'"
# 0:install-dir 1:source-dir 2:build-dir 3:make-target(s)
mod=${mod#"${name}"}
IFS=: read -ra mod <<<"${mod#=}"
[[ ${#mod[@]} -le 4 ]] || die "too many ':' in ${name}'s modlist"
[[ ${mod[1]:=${PWD}} != /* ]] && mod[1]=${PWD}/${mod[1]}
[[ ${mod[2]:=${mod[1]}} != /* ]] && mod[2]=${PWD}/${mod[2]}
_MODULES_INSTALL[${mod[2]}/${name}.ko]=${mod[0]:-extra}
pushd "${mod[1]}" >/dev/null || die
if [[ -z ${mod[3]} ]]; then
# guess between commonly used targets if none given, fallback to
# an empty target without trying to see the error output
for target in module{s,} "${name}".ko default all; do
nonfatal emake "${emakeargs[@]}" -q "${target}" &>/dev/null
if [[ ${?} -eq 1 ]]; then
mod[3]=${target}
break
fi
done
fi
# sometime modules are all from same source dir and built all at once,
# make will not rebuild either way but can skip the unnecessary noise
build=
for target in ${mod[3]:-&}; do
if ! has "${target}" ${built[${mod[1]}]}; then
build=1
built[${mod[1]}]+=" ${target} "
fi
done
if [[ ${build} ]]; then
einfo "Building ${name} module in ${mod[1]} ..."
# allow word splitting for rare cases of multiple targets
emake "${emakeargs[@]}" ${mod[3]}
else
einfo "Building ${name} module in ${mod[1]} ... already done."
fi
popd >/dev/null || die
done
}
# @FUNCTION: linux-mod-r1_src_install
# @DESCRIPTION:
# Installs modules built by linux-mod-r1_src_compile using
# linux_domodule, then runs modules_post_process and einstalldocs.
linux-mod-r1_src_install() {
debug-print-function ${FUNCNAME[0]} "${@}"
_modules_check_function ${#} 0 0 || return 0
(( ${#_MODULES_INSTALL[@]} )) ||
die "${FUNCNAME[0]} was called without running linux-mod-r1_src_compile"
(
for mod in "${!_MODULES_INSTALL[@]}"; do
linux_moduleinto "${_MODULES_INSTALL[${mod}]}"
linux_domodule "${mod}"
done
)
modules_post_process
einstalldocs
}
# @FUNCTION: linux-mod-r1_pkg_postinst
# @DESCRIPTION:
# Updates module dependencies using depmod.
linux-mod-r1_pkg_postinst() {
debug-print-function ${FUNCNAME[0]} "${@}"
_modules_check_function ${#} 0 0 || return 0
_modules_update_depmod
# post_process ensures modules were installed and that the eclass' USE
# are likely not no-ops (unfortunately postinst itself may be missed)
[[ -v _MODULES_GLOBAL[ran:post_process] ]] ||
eqawarn "QA Notice: neither linux-mod-r1_src_install nor modules_post_process were used"
}
# @FUNCTION: linux_domodule
# @USAGE: <module>...
# @DESCRIPTION:
# Installs Linux modules (.ko files).
#
# See also linux_moduleinto.
linux_domodule() {
debug-print-function ${FUNCNAME[0]} "${@}"
_modules_check_function ${#} 1 '' "<module>..." || return 0
(
# linux-mod-r0 formerly supported INSTALL_MOD_PATH (bug #642240), but
# this been judged messy to integrate consistently as not everything
# uses this function and build systems sometime mix it with DESTDIR
# (try ROOT if need to install somewhere else instead)
insinto "/lib/modules/${KV_FULL}/${_MODULES_GLOBAL[moduleinto]:-extra}"
doins "${@}"
)
}
# @FUNCTION: linux_moduleinto
# @USAGE: <install-dir>
# @DESCRIPTION:
# Directory to install modules into when calling linux_domodule.
# Relative to kernel modules path as in:
# ${ED}/lib/modules/${KV_FULL}/<install-dir>
#
# Can contain subdirectories, e.g. kernel/fs.
#
# If not called, defaults to "extra". On the kernel build system,
# this is like setting INSTALL_MOD_DIR which has the same default
# for external modules.
linux_moduleinto() {
debug-print-function ${FUNCNAME[0]} "${@}"
_modules_check_function ${#} 1 1 "<install-dir>" || return 0
_MODULES_GLOBAL[moduleinto]=${1}
}
# @FUNCTION: modules_post_process
# @USAGE: [<path>]
# @DESCRIPTION:
# Strip, sign, verify, and compress all .ko modules found under
# <path>. Should typically *not* be called directly as it will
# be run by linux-mod-r1_src_install. This is intended for use
# when modules were installed some other way.
#
# <path> should exist under ${ED}.
# Defaults to /lib/modules/${KV_FULL}.
#
# Filenames may change due to compression, so any operations on
# these should be performed prior.
#
# Warning: This will abort if no modules are found, which can happen
# if modules were unexpectedly pre-compressed possibly due to using
# make install without passing MODULES_MAKEARGS to disable it.
modules_post_process() {
debug-print-function ${FUNCNAME[0]} "${@}"
_modules_check_function ${#} 0 1 '[<path>]' || return 0
[[ ${EBUILD_PHASE} == install ]] ||
die "${FUNCNAME[0]} can only be called in the src_install phase"
local path=${ED}${1-/lib/modules/${KV_FULL}}
local -a mods
[[ -d ${path} ]] && mapfile -td '' mods < <(
find "${path}" -type f -name '*.ko' -print0 || die
)
(( ${#mods[@]} )) ||
die "${FUNCNAME[0]} was called with no installed modules under ${path}"
# TODO?: find way for sane use with dracut (its 90kernel-modules-extra
# parses depmod.d files directly and assumes should include its modules
# which can lead to unnecessarily increased size or stale modules)
# _modules_process_depmod.d "${mods[@]#"${path}/"}"
_modules_process_strip "${mods[@]}"
_modules_process_sign "${mods[@]}"
_modules_sanity_modversion "${mods[@]}" # after strip/sign in case broke it
_modules_process_compress "${mods[@]}"
_MODULES_GLOBAL[ran:post_process]=1
}
# @ECLASS_VARIABLE: _MODULES_GLOBAL
# @INTERNAL
# @DESCRIPTION:
# General use associative array to avoid defining separate globals.
declare -gA _MODULES_GLOBAL=()
# @ECLASS_VARIABLE: _MODULES_INSTALL
# @INTERNAL
# @DESCRIPTION:
# List of modules from linux-mod-r1_src_compile to be installed.
declare -gA _MODULES_INSTALL=()
# @FUNCTION: _modules_check_function
# @USAGE: [<args-count> <args-min> <args-max> [<usage-string>]]
# @RETURN: 0 or 1 if caller should do nothing
# @INTERNAL
# @DESCRIPTION:
# Checks for MODULES_OPTIONAL_IUSE, and aborts if amount of arguments
# does not add up or if it was called before linux-mod-r1_pkg_setup.
_modules_check_function() {
[[ -z ${MODULES_OPTIONAL_IUSE} ]] ||
use "${MODULES_OPTIONAL_IUSE#+}" || return 1
[[ ${#} == 0 || ${1} -ge ${2} && ( ! ${3} || ${1} -le ${3} ) ]] ||
die "Usage: ${FUNCNAME[1]} ${4-(no arguments)}"
[[ -v _MODULES_GLOBAL[ran:pkg_setup] ]] ||
die "${FUNCNAME[1]} was called without running linux-mod-r1_pkg_setup"
}
# @FUNCTION: _modules_check_migration
# @INTERNAL
# @DESCRIPTION:
# Aborts if see obsolete variables from the linux-mod-r0 eclass being
# used, likely due to an incomplete migration. This function should
# eventually be removed after linux-mod-r0 is @DEAD not to fail for
# nothing if users happen to have these in their environment given the
# naming for some is a bit generic.
_modules_check_migration() {
_modules_check_var() {
[[ -z ${!1} ]] ||
die "${1} is obsolete, see ${2} in linux-mod-r1 eclass docs"
}
# the 'I' on this one is notably sneaky and could silently be ignored
_modules_check_var MODULES_OPTIONAL_USE MODULES_OPTIONAL_IUSE
_modules_check_var MODULES_OPTIONAL_USE_IUSE_DEFAULT MODULES_OPTIONAL_IUSE
_modules_check_var BUILD_PARAMS modargs
_modules_check_var BUILD_TARGETS modlist
_modules_check_var MODULE_NAMES modlist
[[ -z ${!MODULESD_*} ]] ||
die "MODULESD_* variables are no longer supported, replace by handcrafted .conf files if needed"
# Ignored variables:
# - BUILD_FIXES: seen in some ebuilds but was undocumented and linux-info
# still sets it preventing from blocking it entirely
# - ECONF_PARAMS: documented but was a no-op in linux-mod too
}
# @FUNCTION: _modules_prepare_kernel
# @INTERNAL
# @DESCRIPTION:
# Handles linux-info bits to provide usable sources, KV_ variables,
# and CONFIG_CHECK use.
_modules_prepare_kernel() {
get_version
# linux-info allows skipping checks if SKIP_KERNEL_CHECK is set and
# then require_configured_kernel will not abort, but no sources means
# 100% failure for building modules and so just abort now (the proper
# way to allow skipping sources here is MODULES_OPTIONAL_IUSE)
[[ -n ${KV_FULL} ]] ||
die "kernel sources are required to build kernel modules"
require_configured_kernel
_modules_sanity_kernelbuilt
_modules_sanity_kernelversion
# note: modules-specific check_modules_supported could probably be
# removed from linux-info in the future as this is a sufficient check
local CONFIG_CHECK="${CONFIG_CHECK} MODULES"
# kernel will not typically know about symbols we use (bug #591832),
# but stay non-fatal if kernel has an exception list set (bug #759238)
# note: possible to bypass either way with CHECKCONFIG_DONOTHING=1
if [[ $(linux_chkconfig_string UNUSED_KSYMS_WHITELIST) == \"+(?)\" ]]; then
CONFIG_CHECK+=" ~!TRIM_UNUSED_KSYMS"
else
CONFIG_CHECK+=" !TRIM_UNUSED_KSYMS"
fi
linux-info_pkg_setup
}
# @FUNCTION: _modules_prepare_sign
# @INTERNAL
# @DESCRIPTION:
# Determines arguments to pass to sign-file (hash/keys), and performs
# basic sanity checks to abort early if signing does not look possible.
_modules_prepare_sign() {
use modules-sign || return 0
_modules_sign_die() {
eerror "USE=modules-sign requires additional configuration, please see the"
eerror "kernel[1] documentation and the linux-mod-r1 eclass[2] user variables."
eerror "[1] https://www.kernel.org/doc/html/v${KV_MAJOR}.${KV_MINOR}/admin-guide/module-signing.html"
eerror "[2] https://devmanual.gentoo.org/eclass-reference/linux-mod-r1.eclass/index.html"
die "USE=modules-sign is set but ${*}"
}
linux_chkconfig_present MODULE_SIG ||
_modules_sign_die "CONFIG_MODULE_SIG is not set in the kernel"
if [[ -z ${MODULES_SIGN_HASH} ]]; then
: "$(linux_chkconfig_string MODULE_SIG_HASH)"
MODULES_SIGN_HASH=${_//\"}
[[ -n ${MODULES_SIGN_HASH} ]] ||
_modules_sign_die "CONFIG_MODULE_SIG_HASH is not set in the kernel"
fi
if [[ -z ${MODULES_SIGN_KEY} ]]; then
: "$(linux_chkconfig_string MODULE_SIG_KEY)"
MODULES_SIGN_KEY=${_//\"}
[[ -n ${MODULES_SIGN_KEY} ]] ||
_modules_sign_die "CONFIG_MODULE_SIG_KEY is not set in the kernel"
fi
[[ ${MODULES_SIGN_KEY} != @(/|pkcs11:)* ]] &&
MODULES_SIGN_KEY=${KV_OUT_DIR}/${MODULES_SIGN_KEY}
[[ ${MODULES_SIGN_CERT} != /* ]] &&
MODULES_SIGN_CERT=${KV_OUT_DIR}/${MODULES_SIGN_CERT}
# assumes users know what they are doing if using a pkcs11 URI
[[ ${MODULES_SIGN_KEY} == pkcs11:* || -f ${MODULES_SIGN_KEY} ]] ||
_modules_sign_die "the private key '${MODULES_SIGN_KEY}' was not found"
[[ -f ${MODULES_SIGN_CERT} ]] ||
_modules_sign_die "the public key certificate '${MODULES_SIGN_CERT}' was not found"
}
# @FUNCTION: _modules_prepare_toolchain
# @INTERNAL
# @DESCRIPTION:
# Sets KERNEL_{CC,CXX,LD,AR,NM,OBJCOPY,OBJDUMP,READELF,STRIP} based on
# the kernel configuration and KERNEL_CHOST (also set if missing) that
# *should* be usable to build modules.
#
# Tries to match compiler type (gcc or clang), and major version. Will
# inform if matching was not possible likely due to the compiler being
# uninstalled. Users can set KERNEL_ variables themselves to override.
#
# These variables are normally manipulated by the kernel's LLVM=1 with
# the exception of CXX that is included anyway given *some* out-of-tree
# modules use it, e.g. nvidia-drivers[kernel-open].
_modules_prepare_toolchain() {
# note that the kernel adds -m32/-m64/-m elf_x86_64/etc... for, e.g.
# toolchains defaulting to x32, but may need automagic here if need
# a different toolchain such as sys-devel/kgcc64
[[ -z ${KERNEL_CHOST} ]] && linux_chkconfig_present 64BIT &&
case ${CHOST} in
# matching kernel-build.eclass, see for details
hppa2.0-*) KERNEL_CHOST=${CHOST/2.0/64};;
esac
# recognizing KERNEL_CHOST given CROSS_COMPILE seems too generic here,
# but should rarely be necessary unless different userland and kernel
: "${KERNEL_CHOST:=${CHOST}}"
einfo "Preparing ${KERNEL_CHOST} toolchain for kernel modules (override with KERNEL_CHOST) ..."
_modules_tc_best() {
[[ -z ${!1} ]] && read -r ${1} < <(type -P -- "${@:2}")
}
local gccv clangv tool
if linux_chkconfig_present CC_IS_GCC; then
gccv=$(linux_chkconfig_string GCC_VERSION)
gccv=${gccv::2} # major version, will break on gcc-100...
# chost-gcc-ver > chost-gcc > gcc-ver > gcc
_modules_tc_best KERNEL_CC {"${KERNEL_CHOST}-",}gcc{"-${gccv}",}
_modules_tc_best KERNEL_CXX {"${KERNEL_CHOST}-",}g++{"-${gccv}",}
# unknown what was used exactly here, but prefer non-llvm with gcc
for tool in AR NM OBJCOPY OBJDUMP READELF STRIP; do
_modules_tc_best KERNEL_${tool} \
{"${KERNEL_CHOST}-",}{gcc-,}${tool,,}
done
elif linux_chkconfig_present CC_IS_CLANG; then
clangv=$(linux_chkconfig_string CLANG_VERSION)
clangv=${clangv::2}
# like gcc, but try directories to get same version on all tools
# (not using get_llvm_prefix to avoid conflicts with ebuilds using
# llvm slots for non-modules reasons, e.g. sets llvm_check_deps)
_modules_tc_best KERNEL_CC \
{"${BROOT}/usr/lib/llvm/${clangv}/bin/",}{"${KERNEL_CHOST}-",}clang{"-${clangv}",}
_modules_tc_best KERNEL_CXX \
{"${BROOT}/usr/lib/llvm/${clangv}/bin/",}{"${KERNEL_CHOST}-",}clang++{"-${clangv}",}
for tool in AR NM OBJCOPY OBJDUMP READELF STRIP; do
_modules_tc_best KERNEL_${tool} \
{"${BROOT}/usr/lib/llvm/${clangv}/bin/",}{"${KERNEL_CHOST}-",}{llvm-,}${tool,,}
done
fi
if linux_chkconfig_present LD_IS_BFD; then
_modules_tc_best KERNEL_LD {"${KERNEL_CHOST}-",}ld.bfd
elif linux_chkconfig_present LD_IS_LLD; then
# also match with clang if it was used
_modules_tc_best KERNEL_LD \
{${clangv+"${BROOT}/usr/lib/llvm/${clangv}/bin/"},}{"${KERNEL_CHOST}-",}ld.lld
fi
# if any variables are still empty, fallback to normal defaults
local CHOST=${KERNEL_CHOST}
: "${KERNEL_CC:=$(tc-getCC)}"
: "${KERNEL_CXX:=$(tc-getCXX)}"
: "${KERNEL_LD:=$(tc-getLD)}"
: "${KERNEL_AR:=$(tc-getAR)}"
: "${KERNEL_NM:=$(tc-getNM)}"
: "${KERNEL_OBJCOPY:=$(tc-getOBJCOPY)}"
: "${KERNEL_OBJDUMP:=$(tc-getOBJDUMP)}"
: "${KERNEL_READELF:=$(tc-getREADELF)}"
: "${KERNEL_STRIP:=$(tc-getSTRIP)}"
# for toolchain-funcs, uses CPP > CC but set both not to make assumptions
local CC=${KERNEL_CC} CPP="${KERNEL_CC} -E" LD=${KERNEL_LD}
# show results, skip line wrap to avoid standing out too much
einfo "Toolchain picked for kernel modules (override with KERNEL_CC, _LD, ...):"\
"'${KERNEL_CC}' '${KERNEL_CXX}' '${KERNEL_LD}' '${KERNEL_AR}'"\
"'${KERNEL_NM}' '${KERNEL_OBJCOPY}' '${KERNEL_OBJDUMP}'"\
"'${KERNEL_READELF}' '${KERNEL_STRIP}'"
# hack: kernel adds --thinlto-cache-dir to KBUILD_LDFLAGS with ThinLTO
# resulting in sandbox violations and we cannot safely override that
# variable, using *both* {LDFLAGS_MODULE,ldflags-y}=--thinlto-cache-dir=
# can work but raises concerns about breaking packages that may use these
if linux_chkconfig_present LTO_CLANG_THIN && tc-ld-is-lld; then
KERNEL_LD=${T}/linux-mod-r1_ld.lld
printf '#!/usr/bin/env sh\nexec %s "${@}" --thinlto-cache-dir=\n' \
"${LD}" > "${KERNEL_LD}" || die
chmod +x -- "${KERNEL_LD}" || die
fi
# warn if final picked CC type or major version is mismatching, arguably
# should be fatal but not forcing given it is not *always* an issue
local warn
if [[ -v gccv ]]; then
if ! tc-is-gcc; then
warn="gcc-${gccv} but\n '${KERNEL_CC}' is not gcc"
elif [[ $(gcc-major-version) -ne "${gccv}" ]]; then
warn="gcc-${gccv} but\n '${KERNEL_CC}' is gcc-$(gcc-major-version)"
fi
elif [[ -v clangv ]]; then
if ! tc-is-clang; then
warn="clang-${clangv} but\n '${KERNEL_CC}' is not clang"
elif [[ $(clang-major-version) -ne "${clangv}" ]]; then
warn="clang-${clangv} but\n '${KERNEL_CC}' is clang-$(clang-major-version)"
fi
fi
if [[ -v warn ]]; then
ewarn
ewarn "Warning: kernel ${KV_FULL} is built with ${warn}"
ewarn "This *could* result in build issues or other incompatibilities."
ewarn "It is recommended to either \`make clean\` and rebuild the kernel"
ewarn "with the current toolchain (for distribution kernels, re-installing"
ewarn "will do the same), or set the KERNEL_CC variable to point to the"
ewarn "same compiler. Note that when it is available, auto-selection is"
ewarn "attempted making the latter rarely needed."
ewarn
fi
}
# @FUNCTION: _modules_process_compress
# @USAGE: <module>...
# @INTERNAL
# @DESCRIPTION:
# If enabled in the kernel configuration, this compresses the given
# modules using the same format.
_modules_process_compress() {
local -a compress
if linux_chkconfig_present MODULE_COMPRESS_XZ; then
compress=(xz -qT"$(makeopts_jobs)" --memlimit-compress=50%)
elif linux_chkconfig_present MODULE_COMPRESS_GZIP; then
if type -P pigz &>/dev/null; then
compress=(pigz -p"$(makeopts_jobs)")
else
compress=(gzip)
fi
elif linux_chkconfig_present MODULE_COMPRESS_ZSTD; then
compress=(zstd -qT"$(makeopts_jobs)" --rm)
fi
if [[ -v compress ]]; then
# could fail, assumes have commands that were needed for the kernel
einfo "Compressing modules (matching the kernel configuration) ..."
edob "${compress[@]}" -- "${@}"
fi
}
# @FUNCTION: _modules_process_depmod.d
# @USAGE: <relative-module-path>...
# @INTERNAL
# @DESCRIPTION:
# Generate a depmod.d file to ensure priority if duplicate modules
# exist, such as stale modules in different directories, or to
# override the kernel's own modules.
_modules_process_depmod.d() {
(
[[ ${SLOT%/*} == 0 ]] && slot= || slot=-${SLOT%/*}
insinto /lib/depmod.d
newins - ${PN}${slot}.conf < <(
echo "# Automatically generated by linux-mod-r1.eclass for ${CATEGORY}/${PN}"
for mod; do
[[ ${mod} =~ ^(.+)/(.+).ko$ ]] &&
echo "override ${BASH_REMATCH[2]} ${KV_FULL} ${BASH_REMATCH[1]}"
done
)
)
}
# @FUNCTION: _modules_process_sign
# @USAGE: <module>...
# @INTERNAL
# @DESCRIPTION:
# Cryptographically signs the given modules when USE=modules-sign is
# enabled.
_modules_process_sign() {
use modules-sign || return 0
# scripts/sign-file used to be a perl script but is now written in C,
# and it could either be missing or broken given it links with openssl
# (no subslot rebuilds on kernel sources), trivial to compile regardless
local sign=
if [[ -f ${KV_DIR}/scripts/sign-file.c ]]; then
sign=${T}/linux-mod-r1_sign-file
(
# unfortunately using the kernel's Makefile is inconvenient (no
# simple build target for this), may need revisiting on changes
einfo "Compiling sign-file ..."
tc-export_build_env
nonfatal edob $(tc-getBUILD_CC) ${BUILD_CFLAGS} ${BUILD_CPPFLAGS} \
$($(tc-getBUILD_PKG_CONFIG) --cflags libcrypto) \
${BUILD_LDFLAGS} -o "${sign}" "${KV_DIR}"/scripts/sign-file.c \
$($(tc-getBUILD_PKG_CONFIG) --libs libcrypto || echo -lcrypto)
) || {
einfo "Trying fallback ..."
sign=
}
fi
if [[ -z ${sign} ]]; then
if [[ -x ${KV_OUT_DIR}/scripts/sign-file ]]; then
sign=${KV_OUT_DIR}/scripts/sign-file # try if built
elif [[ -x ${KV_DIR}/scripts/sign-file ]]; then
sign=${KV_DIR}/scripts/sign-file # old kernel (<linux-4.4)
else
die "USE=modules-sign is set but '${KV_DIR}/scripts/sign-file.c' is not usable"
fi
fi
einfo "Signing modules ..."
# good odds the private key has limited access, and with the kernel's
# automated method it is likely to be -rw------- root:root (but is
# rarely an issue given src_install *normally* runs as root)
[[ ${MODULES_SIGN_KEY} == pkcs11:* || -r ${MODULES_SIGN_KEY} ]] ||
die "USE=modules-sign is set but lacking read access to the signing key at '${MODULES_SIGN_KEY}'"
local mod
for mod; do
edob "${sign}" "${MODULES_SIGN_HASH}" "${MODULES_SIGN_KEY}" \
"${MODULES_SIGN_CERT}" "${mod}"
done
# unset to at least be out of the environment file in, e.g. shared binpkgs
unset KBUILD_SIGN_PIN
}
# @FUNCTION: _modules_process_strip
# @USAGE: <module>...
# @INTERNAL
# @DESCRIPTION:
# Strips the given modules of unneeded symbols when USE=strip is
# enabled, and informs the package manager not to regardless.
_modules_process_strip() {
# letting the package manager handle this complicates scenarios
# where we want to either compress the pre-stripped module, or
# sign the module without its signature becoming invalid on merge
dostrip -x "${@#"${ED}"}"
if use strip; then
einfo "Stripping modules ..."
edob "${KERNEL_STRIP}" --strip-unneeded -- "${@}"
fi
}
# @FUNCTION: _modules_sanity_gccplugins
# @INTERNAL
# @DESCRIPTION:
# Performs a basic build test to detect GCC plugins mismatch issues
# and, if so, aborts with explanation given it often confuses users.
#
# Using mismatching gcc can sometime work to build modules, but if
# GCC plugins are enabled it will almost always be an error.
#
# Note: may need occasional review to ensure the test still works by:
# enabling a GCC plugin in the kernel, building with older GCC,
# then building a module by setting KERNEL_CC=gcc-<major-version+1>.
_modules_sanity_gccplugins() {
linux_chkconfig_present GCC_PLUGINS || return 0
local tmp=${T}/linux-mod-r1_gccplugins
mkdir -p -- "${tmp}" || die
echo "obj-m += test.o" > "${tmp}"/Kbuild || die
:> "${tmp}"/test.c || die
# always fails, but interested in the stderr messages
local output=$(
cd -- "${KV_OUT_DIR}" && # fwiw skip non-POSIX -C in eclasses
LC_ALL=C nonfatal emake "${MODULES_MAKEARGS[@]}" M="${tmp}" \
2>&1 >/dev/null
)
if [[ ${output} == *"error: incompatible gcc/plugin version"* ]]; then
eerror "GCC_PLUGINS is enabled in the kernel and plugin version mismatch issues"
eerror "have been detected. Please \`make clean\` and rebuild the kernel using"
eerror "the current version of GCC (or re-install for distribution kernels)."
die "kernel ${KV_FULL} needs to be rebuilt"
fi
}
# @FUNCTION: _modules_sanity_kernelbuilt
# @INTERNAL
# @DESCRIPTION:
# Checks if the kernel seems fully built by having a Module.symvers
# that is also readable, abort otherwise.
#
# About readability, occasionally users build their kernel as root with
# umask 0077 and then the package manager's user cannot read built files
# leaving them confused.
#