1 |
robbat2 10/05/02 08:48:16 |
2 |
|
3 |
Modified: kernel-2.eclass |
4 |
Log: |
5 |
Bug #318095: Improve K_SECURITY_UNSUPPORTED messages for deblobbing. Based a patch by Ulrich Müller <ulm@g.o>. |
6 |
|
7 |
Revision Changes Path |
8 |
1.232 eclass/kernel-2.eclass |
9 |
|
10 |
file : http://sources.gentoo.org/viewcvs.py/gentoo-x86/eclass/kernel-2.eclass?rev=1.232&view=markup |
11 |
plain: http://sources.gentoo.org/viewcvs.py/gentoo-x86/eclass/kernel-2.eclass?rev=1.232&content-type=text/plain |
12 |
diff : http://sources.gentoo.org/viewcvs.py/gentoo-x86/eclass/kernel-2.eclass?r1=1.231&r2=1.232 |
13 |
|
14 |
Index: kernel-2.eclass |
15 |
=================================================================== |
16 |
RCS file: /var/cvsroot/gentoo-x86/eclass/kernel-2.eclass,v |
17 |
retrieving revision 1.231 |
18 |
retrieving revision 1.232 |
19 |
diff -p -w -b -B -u -u -r1.231 -r1.232 |
20 |
--- kernel-2.eclass 26 Apr 2010 08:05:10 -0000 1.231 |
21 |
+++ kernel-2.eclass 2 May 2010 08:48:16 -0000 1.232 |
22 |
@@ -1,6 +1,6 @@ |
23 |
# Copyright 1999-2009 Gentoo Foundation |
24 |
# Distributed under the terms of the GNU General Public License v2 |
25 |
-# $Header: /var/cvsroot/gentoo-x86/eclass/kernel-2.eclass,v 1.231 2010/04/26 08:05:10 robbat2 Exp $ |
26 |
+# $Header: /var/cvsroot/gentoo-x86/eclass/kernel-2.eclass,v 1.232 2010/05/02 08:48:16 robbat2 Exp $ |
27 |
|
28 |
# Description: kernel.eclass rewrite for a clean base regarding the 2.6 |
29 |
# series of kernel with back-compatibility for 2.4 |
30 |
@@ -669,7 +669,7 @@ postinst_sources() { |
31 |
# if we're using a deblobbed kernel, it's not supported |
32 |
[[ $K_DEBLOB_AVAILABLE == 1 ]] && \ |
33 |
use deblob && \ |
34 |
- K_SECURITY_UNSUPPORTED=1 |
35 |
+ K_SECURITY_UNSUPPORTED=deblob |
36 |
|
37 |
# if we are to forcably symlink, delete it if it already exists first. |
38 |
if [[ ${K_SYMLINK} > 0 ]]; then |
39 |
@@ -714,9 +714,14 @@ postinst_sources() { |
40 |
fi |
41 |
|
42 |
# optionally display security unsupported message |
43 |
- if [[ -n ${K_SECURITY_UNSUPPORTED} ]]; then |
44 |
- echo |
45 |
+ # Start with why |
46 |
+ if [[ ${K_SECURITY_UNSUPPORTED} = deblob ]]; then |
47 |
+ ewarn "Deblobbed kernels are UNSUPPORTED by Gentoo Security" |
48 |
+ elif [[ -n ${K_SECURITY_UNSUPPORTED} ]]; then |
49 |
ewarn "${PN} is UNSUPPORTED by Gentoo Security." |
50 |
+ fi |
51 |
+ # And now the general message. |
52 |
+ if [[ -n ${K_SECURITY_UNSUPPORTED} ]]; then |
53 |
ewarn "This means that it is likely to be vulnerable to recent security issues." |
54 |
ewarn "For specific information on why this kernel is unsupported, please read:" |
55 |
ewarn "http://www.gentoo.org/proj/en/security/kernel.xml" |