forked from openSUSE/kernel-source
-
Notifications
You must be signed in to change notification settings - Fork 0
/
README
338 lines (248 loc) · 12.1 KB
/
README
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
Kernel Repository Guidelines
============================
Table Of Contents
=================
Getting Started
Patch Headers
Before You Commit -- Things To Check
Config Option Changes
Committing and Log Messages
What Is The Kernel ABI?
Kernel ABI Changes
Embargoed Patches
Related Information
Getting Started
===============
Make sure you have a decent git version (1.5.x should work) and quilt
installed.
Introduce yourself if you haven't done so already:
$ git config --global user.name "Your Name"
$ git config --global user.email your@email
If you ommit the --global option, the setting will only apply to this
clone.
Set up some git hooks and helpers:
$ ./scripts/install-git-hooks
To hack on the kernel sources:
$ ./scripts/sequence-patch.sh --quilt
$ cd tmp/linux-$version-$branch
$ quilt new patches.fixes/fix-foo-and-bar
$ quilt edit some/file.c
$ ./refresh_patch.sh
$ quilt header -e # see next chapter
Refer to quilt documentation for details. When you are done, add the new
patch to an appropriate place in the series.conf file and run
./scripts/log to commit it. Patches should be named such that they
consist of alphanumeric characters, '-', and '.'. Typically, patches are
named by filtering the Subject of the patch to a lower-case, dash-separated
form like the one in the example above.
To build rpm packages:
$ ./scripts/tar-up.sh
This creates a source package in the kernel-source directory. Use
$ ./scripts/osc_wrapper [kernel-source/kernel-$flavor.spec]
to build a kernel package locally, or
$ ./scripts/osc_wrapper upload [--ibs]
to have all flavors and architectures built by the Open Build Service.
The --ibs option uses the SUSE internal instance.
Patch Headers
=============
Each patch must have a RFC822-style header that at a minimum describes
what the patch does, who wrote it, and who inside SUSE/Novell we'll
"blame" about problems with the patch. The rules for patch headers are:
* Each patch must have a From: tag that identifies the author of the
patch.
* Each patch must have a Subject: tag that briefly describes what
the patch does. A brief summary is it could show up in a change
log makes the most sense in most cases.
* Unless the author identified in the From: tag has a @suse.de,
@suse.com, @suse.cz, or @novell.com address, the patch must include
a Signed-off-by:, Acked-by: or Reviewed-by: header which identifies the
person in one of these domains who feels responsible for the patch
inside the company.
* The patch must include a Patch-mainline: tag that identifies where
the patch came from (for backports from mainline), or when it is
expected to be added to mainline. The format is one of:
For backports from mainline:
Patch-mainline: <upstream version, ex. "v3.5-rc1">
Git-commit: <git hash>
If the commit is from a maintainer repository or some other
repository that isn't Linus's:
Patch-mainline: Queued in subsystem maintainer repository
Git-repo: <url>
Git-commit: <git hash>
If the patch is not upstream, depending on the situation:
Patch-mainline: Submitted, <timestamp - destination>
Patch-mainline: Not yet, <reason>
Patch-mainline: Never, <reason>
* The patch should include a References: tag that identifies the
Bugzilla bug number, FATE entry, etc. where the patch is discussed.
Please prefix bugzilla.novell.com bug numbers with bnc# and fate
feature numbers with fate#. Have a look at
http://en.opensuse.org/openSUSE:Packaging_Patches_guidelines#Current_set_of_abbreviations
for a full list of abbreviations.
* The patch header may (and often, should) include a more extensive
description of what the patch does, why, and how. The idea is to
allow others to quickly identify what each patch is about, and to
give enough information for reviewing.
More details about valid patch headers can be found in
scripts/patch-tag-template. The helper script scripts/patch-tag can be
used for managing these tags. Documentation for patch-tag can be found
at the top of the script itself.
Example usage of scripts/patch-tag-template:
$ cp scripts/patch-tag-template ~/.patchtag
Edit ~/.patchtag with any default values you want
$ patch-tag -e file.diff
Example patch header:
| Date: Fri, Sep 26 2008 15:20:10 +1000
| From: Peter Leckie <[email protected]>
| References: SGI:PV986789 bnc#482148
| Subject: Clean up dquot pincount code
| Patch-mainline: 2.6.28
|
| Clean up dquot pincount code.
|
| This is a code cleanup and optimization that removes a per mount point
| spinlock from the quota code and cleans up the code.
|
| The patch changes the pincount from being an int protected by a spinlock
| to an atomic_t allowing the pincount to be manipulated without holding
| the spinlock.
|
| This cleanup also protects against random wakup's of both the aild and
| xfssyncd by reevaluating the pincount after been woken. Two latter patches
| will address the Spurious wakeups.
|
| Signed-off-by: Peter Leckie <[email protected]>
| Acked-by: Jan Kara <[email protected]>
Before You Commit -- Things To Check
====================================
Make sure that all patches still apply after your changes. One way of
doing this is using scripts/sequence-patch.sh:
$ export SCRATCH_AREA=/var/tmp/scratch
$ scripts/sequence-patch.sh
Please test-compile the kernel or even test-build kernel packages,
depending on the impact of your changes. Use scripts/tar-up.sh for
creating an Autobuild source directory.
The kernel source tree that scripts/sequence-patch.sh creates can be
test compiled as follows:
$ cp config/i386/default $SCRATCH_AREA/linux-2.6.18
$ cd $SCRATCH_AREA/linux-2.6.18
$ make oldconfig
$ make
Config Option Changes
=====================
We are building kernel packages for various architectures and
configurations from the same sources. Each such kernel has its own
configuration file in config/$ARCH/$FLAVOR. There are checks in place
that abort the kernel build when those configuration files are missing
config options.
When adding patches that add kernel config options, please also update
all config files as follows:
$ scripts/sequence-patch.sh
$ cd /var/tmp/scratch/linux-2.6.16
$ patches/scripts/run_oldconfig.sh
Committing and Log Messages
===========================
Any commit which affects the kernel package (rather than internals of the
repository such as helper scripts) should be documented in
kernel-source.changes. The log entry must include the timestamp
(`date`), email address of the committer, and a change summary, and
should include the names of the affected files, as in the following
example:
| -------------------------------------------------------------------
| Wed Dec 1 18:29:44 CET 2004 - [email protected]
|
| - patches.fixes/serialize-dgram-read.diff: Serialize dgram read
| using semaphore just like stream (#48427).
|
There is a simple helper script for creating changelog entries in this
format (/work/src/bin/vc).
An advanced script (scripts/log) for creating changelog entries from
patch headers, and then automatically committing the change, exists as
well. This script extracts Subject: and References: headers from added
or modified patches and generates a changelog entry proposal that the
user can further modify. This approach works well for new or removed
patches. When modifying existing patches, it usually is necessary to
modify the generated changelog entry by hand. (scripts/log requires the
vc helper script either in the PATH, or in /work/src/bin/).
What Is The Kernel ABI?
=======================
All symbols that the kernel exports for use by modules, and all symbols
that modules export for use by other modules, are associated with a
so-called modversion, which is a checksum of the type of the symbol
(including all sub-types involved). Symbols that a module imports are
associated with the identical checksum.
When a module is loaded, the kernel makes sure that the checksums of the
exported symbols match the checksums of the imported symbols.
The kernel exports a large number of symbols (in the range of 5000). We
could Provide and Require all those symbols as RPM package dependencies,
so that then those dependencies would make sure that all packages
containing kernel modules would have a matching kernel installed.
RPM does not easily handle such large amounts of dependencies though,
and so instead of modeling dependencies based on individual symbols, we
compute distinct classes of symbols, and we create one "kernel(...)"
RPM dependency per class.
Modifying, adding, or removing kernel exports will also change the
kernel(...) symbols.
Kernel ABI Changes
==================
During kernel builds, two things related to the kernel ABI happen:
* If a reference symvers file (/boot/symvers-* in kernel-$FLAVOR
packages) for the particular architecture and flavor is available, we
check how severe the ABI changes are compared to this reference.
These reference files are located in kabi/$ARCH/symvers-$FLAVOR. Too
severe changes will abort the build. See rpm/kernel-binary.spec.in
and scripts/kabi-checks (SLES9 - SLES10) or rpm/symsets.pl (SLES11)
for details.
* We want to avoid losing kernel(...) symbols when additional symbols
are added, but all previous symbols are still available: in this
case, all modules will continue to load into the new kernel just
fine.
If a reference symsets file (/boot/symsets-* in kernel-$FLAVOR
packages) for the particular architecture and flavor is available, we
check which of the symbol sets in the reference file can still be
exported, even though symbols have meanwhile been added. We also
export the kernel(...) symbols from reference symset files.
To update the reference files, use scripts/update-symvers:
$ ./scripts/update-symvers kernel-default-2.6.27.25-0.1.1.x86_64.rpm \
kernel-default-2.6.27.25-0.1.1.i586.rpm ...
It is also possible to update only a subset of the symbols, e.g.:
$ ./scripts/update-symvers --filter=fs/xfs ...
In either case, ask the branch owner and kernel packager for permission
before touching the kabi files.
Ignoring Kernel ABI Changes
---------------------------
Sometimes we want to tolerate particular kernel ABI changes (and not
abort the builds). At the same time, we do not want to update the
reference symvers and symsets files, because we still want to monitor the
relative changes, and we want to continue preserving all symbol sets
which are still compatible.
Particular kernel can be marked so that kernel ABI changes are ignored.
This is done by creating kabi/$ARCH/ignore-$FLAVOR files (e.g.,
kabi/x86_64/ignore-xen, kabi/s390/ignore-default). The kernel ABI checks
will still be produced, but the build will not be aborted. The file
contents d not matter.
All kernel ABI changes in all kernel packages can be ignored by creating
a file called IGNORE-KABI-BADNESS in the kernel-source/ sub-directory of
the repository that scripts/tar-up.sh creates. (This may be necessary
for PTF kernels occasionally.)
Embargoed Patches
=================
At certain times during development, the kernel may include "embargoed"
patches, i.e., patches that must not be mad available to parties outside
of SUSE/Novell before an agreed-upon time. Such patches usually have a
date of publication that has been coordinated among linux distributors,
etc. Such patches must not be committed to the usual branches, because
these are pushed to a public mirror, but instead to a branch named with
an _EMBARGO suffix, e.g. SLE11_BRANCH_EMBARGO. The KOTD scripts will
testbuild such branches, but won't publish them. Once the fix becomes
public, the branch needs to be merged back info the "mainline" branch,
e.g.:
$ git checkout SLE11_BRANCH
$ git merge SLE11_BRANCH_EMBARGO
Related Information
===================
Internal:
https://wiki.innerweb.novell.com/index.php/SUSE/Labs_Publications/Kernel_Building.html
https://wiki.innerweb.novell.com/index.php/SUSE/Labs_Publications/kernel_patches_rules
Public:
TBD