From patchwork Mon Apr 22 16:48:00 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: =?utf-8?q?Peter_M=C3=BCller?= X-Patchwork-Id: 7755 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4VNWRD1xLCz3wkf for ; Mon, 22 Apr 2024 16:48:40 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4VNWRB4C4Qz199; Mon, 22 Apr 2024 16:48:38 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4VNWRB2sSqz32v9; Mon, 22 Apr 2024 16:48:38 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) client-signature ECDSA (secp384r1)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4VNWR746wYz32t8 for ; Mon, 22 Apr 2024 16:48:35 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1)) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4VNWR53T97z12p for ; Mon, 22 Apr 2024 16:48:32 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1713804514; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=x17uzd1YoOB94bfRDl+AV+UZ9QWOzsiRHkX0FiMJ9BM=; b=W5wvNCfrd2FgXzG+nFVgGt+okSA30aP2RJfB+lEKVeYPqpOmLxyBh+jWuHkYHi+kP4AjDK 47yqyEN1ScrM92Aw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1713804514; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=x17uzd1YoOB94bfRDl+AV+UZ9QWOzsiRHkX0FiMJ9BM=; b=UIBCPbXerem2LCEWU3di6DrWodH7aWJtKIfXONFCQ1qP7AAOd+uwXlQLncxJHc1VgmdxIg QUwYFmbHKwZVGYYTNhxbtFpUAjF+YSKP2icSgQkOelqyep8jAp5R4sUudUeZKZ6L7kb6Cl 5iuEu0A3UH8EpGg/7EnaXfoBqLDrszyurQF44pmJyQGgWSr82daXPDKr5FFc5BCLTG49XL D0SpO3z2yVZQhmNRP07h5QOHUwoLK5egUoDZSidsmOVlDRRwRZBqnI/aptCyZ44m3q3Mpu O2DVrGNBYYjSNEzOwQktN4KxA/3mOvNNvCBAhV1cnO/h2yOo8NFBldVhwAOjZA== Message-ID: <87c3cfc6-41c6-4d56-9815-488a77b59fb0@ipfire.org> Date: Mon, 22 Apr 2024 16:48:00 +0000 MIME-Version: 1.0 To: "IPFire: Development" From: =?utf-8?q?Peter_M=C3=BCller?= Subject: [PATCH] kmod: Update to 32 Message-ID-Hash: F3HHU552GVB5RNTSCI6OJDEI27QFAOEC X-Message-ID-Hash: F3HHU552GVB5RNTSCI6OJDEI27QFAOEC X-MailFrom: peter.mueller@ipfire.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.8 Precedence: list List-Id: IPFire development talk Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: Changelog according to the tarball's NEWS file: - Improvements - Use any hash algo known by kernel/openssl instead of keep needing to update the mapping - Teach kmod to load modprobe.d/depmod.d configuration from ${prefix}/lib and allow it to be overriden during build with --with-distconfdir=DIR - Make kernel modules directory configurable. This allows distro to make kmod use only files from /usr regardless of having a compat symlink in place. - Install kmod.pc containing the features selected at build time. - Install all tools and symlinks by default. Previously kmod relied on distro packaging to set up the symlinks in place like modprobe, depmod, lsmod, etc. Now those symlinks are created by kmod itself and they are always placed in $bindir. - Bug Fixes - Fix warnings due to -Walloc-size - Others - Drop python bindings. Those were not update in ages and not compatible with latest python releases. - Cleanup test infra, dropping what was not used anymore - Drop experimental tools `kmod insert` / `kmod remove`. Building those was protected by a configure option never set by distros. They also didn't gain enough traction to replace the older interfaces via modprobe/insmod/rmmod. Signed-off-by: Peter Müller Reviewed-by: Adolf Belka --- config/rootfiles/common/kmod | 2 +- lfs/kmod | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/config/rootfiles/common/kmod b/config/rootfiles/common/kmod index 1a0432169..ed30ab10d 100644 --- a/config/rootfiles/common/kmod +++ b/config/rootfiles/common/kmod @@ -9,6 +9,6 @@ sbin/rmmod #usr/lib/libkmod.la #usr/lib/libkmod.so usr/lib/libkmod.so.2 -usr/lib/libkmod.so.2.4.1 +usr/lib/libkmod.so.2.4.2 #usr/lib/pkgconfig/libkmod.pc #usr/share/bash-completion/completions/kmod diff --git a/lfs/kmod b/lfs/kmod index 643573d33..2719083e5 100644 --- a/lfs/kmod +++ b/lfs/kmod @@ -24,7 +24,7 @@ include Config -VER = 31 +VER = 32 THISAPP = kmod-$(VER) DL_FILE = $(THISAPP).tar.xz @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 0dc8572da570315cf0aadd87fa7e83d0f88dea91c8566749e6f3004f9a6df916dce337ca99ea5929d41f45b408c1e3effa50f9d24615d7fa28688150a5ce91cf +$(DL_FILE)_BLAKE2 = 5b5dac4639406549b23bb1da44bedd86a42885304ef4c7c67344dc8fd70b9e0ca3f83d033c6b80f6e00371d7188e205f4b68fadc56a9ddbf9d6a9d28e9b1e9a4 install : $(TARGET)