From 40c49eb83f67a99e20f39c5e25b6d89388229d58 Mon Sep 17 00:00:00 2001 From: Daniele Rondina Date: Sun, 12 Apr 2026 00:39:32 +0000 Subject: [PATCH] Bump sys-kernel/debian-sources-6.19.11_p1-r400 --- sys-kernel/debian-sources/Manifest | 2 + .../debian-sources-6.19.11_p1-r400.ebuild | 428 ++++++++++++++++++ 2 files changed, 430 insertions(+) create mode 100644 sys-kernel/debian-sources/debian-sources-6.19.11_p1-r400.ebuild diff --git a/sys-kernel/debian-sources/Manifest b/sys-kernel/debian-sources/Manifest index f964313..4df8f79 100644 --- a/sys-kernel/debian-sources/Manifest +++ b/sys-kernel/debian-sources/Manifest @@ -5,6 +5,7 @@ DIST linux-6.12.63.tar.xz 148158544 BLAKE2B 8f24d8efe88f1b5e6fde5fba6833798e5b3d DIST linux-6.12.73.tar.xz 148198508 BLAKE2B 344395dff181769ee0bc782ed6a781bfa073c10f8027a4d5a73a84680742d40616646ea8aa04e6564d2f47ad330811ade7d955d570796dd0b3c3bc642c8ebd28 SHA512 d0cba5af9ae432a43b0d8fcad6244650101829b0ef633c73f08f9fe31fd7645f9ccb29194603b5284799ab0339761d813d6c45e087a8ee7442d7516ec87e2177 DIST linux-6.12.74.tar.xz 148229948 BLAKE2B 702eee7dd67c6d090d3340138c2f3ed40d5eb54b59d5d9e2706cfafe97a44ac17cdd65adbcb12a3d0871431bd19df7bc91ae72c348bc6c8d74b59cc0e1ef2308 SHA512 7a9a28345146a570720722344571a77b976f6f04c782ab31d82c3af2ed9d222a026a20c868eb2b2c086d47b4f48fed27cf69f34c94578481da1f97aa9e517cee DIST linux-6.19.10.tar.xz 156136532 BLAKE2B f91cdd0b8727ce50ba286b321e85f394ff7e2eff27cde6e6e85e8abfc627b2b069bb5679d890dd33384123c866dc3c1325ad83953a4d08d4db669150cd88cccd SHA512 11a397c54dddf02fc62b52b2571a0d13cf96450c2e67cffa759c34b9432e51dcb39871347c9cdbca36cfaf78198015d8d7a4d2c2a8d506e22b998fd2b185341b +DIST linux-6.19.11.tar.xz 156159916 BLAKE2B 7304717954b8ad9eec54071d28d2d6c9af108d2c84686cee9b401e38078d4b39810541a854e458c85349de10959d96edb2ba7e38b0e0a7ebc46949e69e7816b3 SHA512 d458fdf65f08b501978d1e274c777633b8473628fb099e2a9a8aac3a943b157fa5132a8ec026cc242f836eb2c441701b5e342f30402d10b12f6759097775de2a DIST linux-6.19.6.tar.xz 156094024 BLAKE2B 612fd1e944194c20bb2e6f9d2b309d5957db5b738bcb7b782c9c25de4c02b341fa5caa9af76d92e88628135b8334f550cc2277d63738098fde950ca05f46e89a SHA512 efbcb5c24bcf257e724387cd5caf069de6351230cbf6e15589d9c371b9a36d92ad211866dba72818b38458ced9c4a8ea4f572b49c0b0f282254f10030d456e2a DIST linux-6.19.8.tar.xz 156088352 BLAKE2B 1bb4591dd0adb2472f31adbaaa5eae03743edf6e7a970173afb1ea1c659677102832d69e6ce692deee9ee757b36cba3d63b116a5eee81a7e5226462c40ae5ca0 SHA512 30002814c4a8edc8fc57acd1bd3fb6c7de2e70ebc31cbb003e5221605bd666a7be2db21451095c5193bd3da9cf60ad726746d83ffd573b1edc1614565831263a DIST linux_6.1.159-1.debian.tar.xz 1797540 BLAKE2B 5bef79fe5366a397cbf9284b254965aa420640bba6ba830d4721daee2797025acc597978a944c6f4f12fbe174ed328cf148c55a9b56a5543006f801bfeffbb7e SHA512 b9ced5238d7e8bd907691565cc0a6729c7b1508072cfeb9db9addf77dc0d0dff5042e65e4fd757af08e01060248988a75d1f6f491f99a265e1f851125108a57a @@ -14,5 +15,6 @@ DIST linux_6.12.63-1.debian.tar.xz 1751700 BLAKE2B 5899fd8a6bc62ac9daf8dd3b63c82 DIST linux_6.12.73-1.debian.tar.xz 1768260 BLAKE2B f47552ad004096374e97f988a8ff1003cc5bd7ecc0c25ea06d467360f27a3e687d3fb14117e57161bf6932e929c25d2c5de76b4098dc677c84c552cd26a9aea7 SHA512 5a16972d3cd0ce3ba9b06707b095abc5319adba7693129366b877569662189c178f2ad9a466892d6a5db21573dbd9f71914b3ead23200923d5f4beb122fe369c DIST linux_6.12.74-2.debian.tar.xz 1783784 BLAKE2B 5d0bd6e9d1d47d29ee9b146d6ded5a2b4aaf3819599e387389429526368baffae92272a6a380e1371859c1839a1f89f72b10cadbb2041245d8d44ad00b4c610b SHA512 eb2724656beca90db4c4f7a5e095f552a14ad1be2cfc0993c6fd35e373d020d29ef7e1cb505c1a903e007767ec4da96541048e32104d25f5e2488f9f7e3d9cce DIST linux_6.19.10-1.debian.tar.xz 1479260 BLAKE2B 450be95b8665a455602b9872be79337a6e5f48cbde30ee906b7a16f1f52e4077b81331aaa4b8f72557302582620929468abdf6cbed7b4298f970ca107fac2111 SHA512 b382c19bb265331881753d8256a8770ee65c4f62b19c5be8d155220edce61ce6b6e103b42d23944509b7e1b97e94b6ad20e8441b1243988b3275d683d3fb1349 +DIST linux_6.19.11-1.debian.tar.xz 1485108 BLAKE2B 3b5f427acc13025a82e7da65ca3e3efc7889ac78b97bc50201a3ee8be68f8f7a5d39e13132dfcaee976e7060707d2f211d7accdb7b2a4c1f58f99d4802e30f1f SHA512 ffa9ad9dcdbd2579e22dda87480c30dff3c6725682db14d3549ced575d3f9ce1ac387015b63c94b0168748356f4100e2189895eb21c69f709e7b5d84189de13e DIST linux_6.19.6-2.debian.tar.xz 1478804 BLAKE2B 72c6b51992e2322776dfa9076b29f8ea5376522ddb12a5ba8703ac63b35905d5c670b2ac0e30806bb3fb99634c0deaab79cc8d4d78ffe05e10acee913bf23613 SHA512 ef76aa503799d0d5d5f470e0e988a88a81a67db514be3533d88ad7f800d98a2aed1b91688a2a6e17b888e79345038438655a86506bd3406bd6ddcadfcb1b94a6 DIST linux_6.19.8-1.debian.tar.xz 1469632 BLAKE2B 7b650caa860a1a45fe529b0e819259495155ced9e27967fb45f0a058cd303b15680364f9e3962bcc14ee5c8c4b8beedfc4ba786f657726c3faa7347894b7becc SHA512 0ba5f40b01e5fd0ed08b852b18eec4d0d5b75960b41cc6239234eb207655657a7a2f638282ee92e1aff828cbeea069994a162885e27335cc77d6616b7567142c diff --git a/sys-kernel/debian-sources/debian-sources-6.19.11_p1-r400.ebuild b/sys-kernel/debian-sources/debian-sources-6.19.11_p1-r400.ebuild new file mode 100644 index 0000000..c422aff --- /dev/null +++ b/sys-kernel/debian-sources/debian-sources-6.19.11_p1-r400.ebuild @@ -0,0 +1,428 @@ +# Distributed under the terms of the GNU General Public License v2 +# Created by MARK Devkit + +EAPI=6 + +inherit check-reqs eutils ego savedconfig + +SLOT=forky/6.19.11_p1 + +# NOTE: When updating: use the version from Debian testing (trixie) +# https://packages.debian.org/trixie/linux-source +DEB_PATCHLEVEL="1" +KERNEL_TRIPLET="6.19.11" + +# like "_p1-r1" +#VERSION_SUFFIX="_p${DEB_PATCHLEVEL}" +if [ ${PR} != "r0" ]; then + REVISION_SUFFIX+="-${PR}" +fi + +MACARONI_KTYPE="debian" +MACARONI_KSUFFIX="debian${DEB_PATCHLEVEL}-mark" +# like "-r1-debian1-mark" +EXTRAVERSION="${REVISION_SUFFIX}-${MACARONI_KSUFFIX}" +# like "6.12.38-r1" +MACARONI_KVER="${KERNEL_TRIPLET}${REVISION_SUFFIX}" +# like "6.12.38-r1-debian1-mark" +# same as ${KERNEL_TRIPLET}${EXTRAVERSION} +MOD_DIR_NAME="${KERNEL_TRIPLET}${REVISION_SUFFIX}-${MACARONI_KSUFFIX}" + +# install sources to /usr/src/$LINUX_SRCDIR +LINUX_SRCDIR=linux-${PF} +DEB_PV="${KERNEL_TRIPLET}-${DEB_PATCHLEVEL}" + +RESTRICT="binchecks strip" +LICENSE="GPL-2" +KEYWORDS="*" +IUSE="acpi-ec binary btrfs custom-cflags dracut ec2 +logo luks lvm mdadm savedconfig sshd sign-modules zfs +" + +RDEPEND="sys-apps/gawk +dracut? ( + sys-apps/whip-catalog + sys-kernel/dracut + virtual/dracut-mark +) +" +DEPEND="virtual/libelf +btrfs? ( sys-fs/btrfs-progs ) +zfs? ( sys-fs/zfs ) +luks? ( sys-fs/cryptsetup ) +lvm? ( sys-fs/lvm2 ) +mdadm? ( sys-fs/mdadm ) +" +REQUIRED_USE="binary? ( + ^^ ( dracut ) + btrfs? ( dracut ) + mdadm? ( dracut ) + luks? ( dracut ) + lvm? ( dracut ) + sshd? ( dracut ) +) +sshd? ( binary ) +" + +DESCRIPTION="Debian Sources (and optional binary kernel)" +HOMEPAGE="https://packages.debian.org/unstable/kernel/" +SRC_URI=" +https://deb.debian.org/debian/pool/main/l/linux/linux_6.19.11-1.debian.tar.xz -> linux_6.19.11-1.debian.tar.xz +https://mirrors.edge.kernel.org/pub/linux/kernel/v6.x/linux-6.19.11.tar.xz -> linux-6.19.11.tar.xz" +S="$WORKDIR/linux-${KERNEL_TRIPLET}" + + +get_patch_list() { + [[ -z "${1}" ]] && die "No patch series file specified" + local patch_series="${1}" + while read line ; do + if [[ "${line:0:1}" != "#" ]] ; then + echo "${line}" + fi + done < "${patch_series}" +} + +tweak_config() { + einfo "Setting $2=$3 in kernel config." + sed -i -e "/^$2=/d" $1 + echo "$2=$3" >> $1 +} + +setno_config() { + einfo "Setting $2*=y to n in kernel config." + sed -i -e "s/^$2\(.*\)=.*/$2\1=n/g" $1 +} + +setyes_config() { + einfo "Setting $2*=* to y in kernel config." + sed -i -e "s/^$2\(.*\)=.*/$2\1=y/g" $1 +} + +zap_config() { + einfo "Removing *$2* from kernel config." + sed -i -e "/$2/d" $1 +} + +get_vendor() { + vendor_string=$(grep vendor /proc/cpuinfo | uniq | cut -d ':' -f 2) + vendor=$([[ ${vendor_string^^} =~ (INTEL)|(AMD) ]] && echo ${BASH_REMATCH[0]}) + echo $vendor +} + +pkg_pretend() { + # Ensure we have enough disk space to compile + if use binary ; then + CHECKREQS_DISK_BUILD="6G" + check-reqs_pkg_setup + echo "binary" + fi +} + +get_certs_dir() { + # find a certificate dir in /etc/kernel/certs/ that contains signing cert for modules. + for subdir in $PF $P linux; do + certdir=/etc/kernel/certs/$subdir + if [ -d $certdir ]; then + if [ ! -e $certdir/signing_key.pem ]; then + eerror "$certdir exists but missing signing key; exiting." + exit 1 + fi + echo $certdir + return + fi + done +} + +pkg_setup() { + export REAL_ARCH="$ARCH" + unset ARCH; unset LDFLAGS #will interfere with Makefile if set + export FEATURESET="standard" +} + +src_prepare() { + default + for debpatch in $( get_patch_list "${WORKDIR}/debian/patches/series" ); do + epatch -p1 "${WORKDIR}/debian/patches/${debpatch}" + done + + # do not include debian devs certificates + rm -rf "${WORKDIR}"/debian/certs + + # remove references to debian uefi certs + sed -i -e 's|\${CURDIR}\/debian\/certs\/debian-uefi-certs\.pem||g' "${WORKDIR}"/debian/rules.gen + + sed -i -e "s:^\(EXTRAVERSION =\).*:\1 ${EXTRAVERSION}:" Makefile || die + sed -i -e 's:#export\tINSTALL_PATH:export\tINSTALL_PATH:' Makefile || die + rm -f .config >/dev/null + cp -a "${WORKDIR}"/debian "${T}" + make -s mrproper || die "make mrproper failed" + cd "${S}" || die + cp -aR "${WORKDIR}"/debian "${S}"/debian + + # patches common to all kernel versions + epatch "${FILESDIR}"/latest/ikconfig.patch || die + epatch "${FILESDIR}"/latest/mcelog.patch || die + + # patches for this particular branch + epatch "${FILESDIR}"/6.16+/more-ISA-levels-and-uarches-for-kernel-6.16+.patch || die + + if use savedconfig; then + einfo Restoring saved .config ... + restore_config .config + else + cp "${FILESDIR}"/config-extract-6.6 ./config-extract || die + chmod +x config-extract || die + fi + + # Set up arch-specific variables and this will fail if run in pkg_setup() + # since ARCH can be unset there: + if [ "${REAL_ARCH}" = x86 ]; then + export DEB_ARCH="i386" + export DEB_SUBARCH="686-pae" + export KERN_ARCH="i686" + elif [ "${REAL_ARCH}" = amd64 ]; then + export DEB_ARCH="amd64" + export DEB_SUBARCH="amd64" + export KERN_ARCH="x86_64" + else + die "Architecture '${REAL_ARCH}' not handled in ebuild" + fi + # like "debian-x86_64-6.12.38-r1-debian1-mark" + export KERN_SUFFIX="${MACARONI_KTYPE}-${KERN_ARCH}-${MACARONI_KVER}-${MACARONI_KSUFFIX}" + + if ! use savedconfig; then + ./config-extract ${DEB_ARCH} ${FEATURESET} ${DEB_SUBARCH} || die + fi + + setno_config .config CONFIG_DEBUG + if use acpi-ec; then + # most fan control tools require this + tweak_config .config CONFIG_ACPI_EC_DEBUGFS m + tweak_config .config CONFIG_DEBUG_FS y + fi + if use ec2; then + setyes_config .config CONFIG_BLK_DEV_NVME + setyes_config .config CONFIG_XEN_BLKDEV_FRONTEND + setyes_config .config CONFIG_XEN_BLKDEV_BACKEND + setyes_config .config CONFIG_IXGBEVF + fi + if use logo; then + cp "${FILESDIR}"/latest/macaroni-os_logo_clut224.ppm "$S"/drivers/video/logo/logo_linux_clut224.ppm || die + tweak_config .config CONFIG_LOGO y + ewarn "Linux kernel frame buffer boot logo is now enabled with a custom MacaroniOS pixmap." + ewarn "The new logo can be viewed at /usr/src/linux/drivers/video/logo/logo_linux_clut224.ppm" + ewarn "Remove the quiet kernel parameter (from params in /etc/boot.conf, and re-run boot-update)." + ewarn "This will ensure the custom kernel logo is displayed during boot over frame buffer." + ewarn "" + fi + if use sign-modules; then + certs_dir=$(get_certs_dir) + echo + if [ -z "$certs_dir" ]; then + eerror "No certs dir found in /etc/kernel/certs; aborting." + die + else + einfo "Using certificate directory of $certs_dir for kernel module signing." + fi + echo + # turn on options for signing modules. + # first, remove existing configs and comments: + zap_config .config CONFIG_MODULE_SIG + # now add our settings: + tweak_config .config CONFIG_MODULE_SIG y + tweak_config .config CONFIG_MODULE_SIG_FORCE n + tweak_config .config CONFIG_MODULE_SIG_ALL n + tweak_config .config CONFIG_MODULE_SIG_HASH \"sha512\" + tweak_config .config CONFIG_MODULE_SIG_KEY \"${certs_dir}/signing_key.pem\" + tweak_config .config CONFIG_SYSTEM_TRUSTED_KEYRING y + tweak_config .config CONFIG_SYSTEM_EXTRA_CERTIFICATE y + tweak_config .config CONFIG_SYSTEM_EXTRA_CERTIFICATE_SIZE 4096 + echo "CONFIG_MODULE_SIG_SHA512=y" >> .config + ewarn "This kernel will ALLOW non-signed modules to be loaded with a WARNING." + ewarn "To enable strict enforcement, YOU MUST add module.sig_enforce=1 as a kernel boot" + ewarn "parameter (to params in /etc/boot.conf, and re-run boot-update.)" + ewarn "" + else + tweak_config .config CONFIG_MODULE_SIG n + fi + if use custom-cflags; then + MARCH="$(python3 -c "import portage; print(portage.settings[\"CFLAGS\"])" | sed 's/ /\n/g' | grep "march")" + + if [ -n "$MARCH" ]; then + if [[ $MARCH =~ (native) ]] && [[ -n $(get_vendor) ]]; then + einfo "Detected -march=native on $(get_vendor)" + CONFIG_MARCH=CONFIG_MNATIVE_$(get_vendor) + else + CONFIG_MARCH="$(grep -m 1 -e "${MARCH}" -B 1 arch/x86/Makefile | sort -r | grep -m 1 -o CONFIG_\[^\)\]* )" + fi + + if [ -n "${CONFIG_MARCH}" ]; then + einfo "Optimizing kernel for ${CONFIG_MARCH}" + tweak_config .config CONFIG_GENERIC_CPU n + tweak_config .config "${CONFIG_MARCH}" y + else + ewarn "Could not find optimized settings for $MARCH, compiling generic kernel." + fi + fi + fi + # build generic CRC32C module into kernel, to defeat FL-11913 + # (cannot mount ext4 filesystem in initramfs if created with recent e2fsprogs version) + tweak_config .config CONFIG_CRYPTO_CRC32C y + + # disable module compression until the initramfs plays nicely with it + tweak_config .config CONFIG_MODULE_COMPRESS n + tweak_config .config CONFIG_MODULE_COMPRESS_XZ n + tweak_config .config CONFIG_MODULE_COMPRESS_GZIP n + tweak_config .config CONFIG_MODULE_COMPRESS_ALL n + tweak_config .config CONFIG_MODULE_COMPRESS_NONE y + + # get config into good state: + yes "" | make oldconfig >/dev/null 2>&1 || die + cp .config "${T}"/config || die + make -s mrproper || die "make mrproper failed" +} + +src_compile() { + ! use binary && return + install -d "${WORKDIR}"/build + cp "${T}"/config "${WORKDIR}"/build/.config || die "couldn't copy kernel config" + make ${MAKEOPTS} O="${WORKDIR}"/build bzImage || die "kernel build failure" + make ${MAKEOPTS} O="${WORKDIR}"/build modules || die "modules build failure" +} + +src_install() { + # copy sources into place: + dodir /usr/src + cp -a "${S}" "${D}"/usr/src/${LINUX_SRCDIR} || die + cd "${D}"/usr/src/${LINUX_SRCDIR} + # prepare for real-world use and 3rd-party module building: + make mrproper || die + cp "${T}"/config .config || die + cp -a "${T}"/debian debian || die + + # if we didn't compile a kernel, we're done. The kernel source tree is left in + # an unconfigured state - you can't compile 3rd-party modules against it yet. + use binary || return + make ${MAKEOPTS} O="${WORKDIR}"/build INSTALL_MOD_PATH="${D}" modules_install || die "modules install failure" + insinto /boot + newins ${WORKDIR}/build/arch/x86/boot/bzImage "vmlinuz-${KERN_SUFFIX}.tmp" + newins ${WORKDIR}/build/System.map "System.map-${KERN_SUFFIX}.tmp" + newins ${WORKDIR}/build/.config "config-${KERN_SUFFIX}.tmp" + make prepare || die + make scripts || die + # FL-8004: In Linux 5.10, module.lds is generated by 'modules_prepare', + # so we need to run it as well to be able to compile modules + make modules_prepare || die + + # module symlink fixup: + rm -f "${D}"/lib/modules/*/source || die + rm -f "${D}"/lib/modules/*/build || die + cd "${D}"/lib/modules + local moddir="$(ls -d [1-9]*)" + ln -s /usr/src/${LINUX_SRCDIR} "${D}"/lib/modules/${moddir}/source || die + ln -s /usr/src/${LINUX_SRCDIR} "${D}"/lib/modules/${moddir}/build || die + # Fixes FL-14 + cp "${WORKDIR}/build/System.map" "${D}/usr/src/${LINUX_SRCDIR}/" || die + cp "${WORKDIR}/build/Module.symvers" "${D}/usr/src/${LINUX_SRCDIR}/" || die + if use sign-modules; then + # TODO FIXME: check for compressed modules. + find "${D}"/lib/modules -iname *.ko -exec ${WORKDIR}/build/scripts/sign-file sha512 $certs_dir/signing_key.pem $certs_dir/signing_key.x509 {} \; || die + # install the sign-file executable for future use. + exeinto /usr/src/${LINUX_SRCDIR}/scripts + doexe ${WORKDIR}/build/scripts/sign-file + fi + # The following line associates the .tmp dir with this package, so that + # when the package is uninstalled, the modules are not removed. + # Otherwise, modules for the current running kernel might be erased! + mv "${D}"/lib/modules/${MOD_DIR_NAME}{,.tmp} +} + +pkg_postinst() { + # Ensure that /boot is mounted in this phase + ego_pkg_preinst + + # Prevent kernel and modules erasure during upgrade. + if use binary; then + # first rename the initramfs + if use savedconfig; then + if [[ -f "/boot/initramfs-${KERN_SUFFIX}" ]]; then + mv /boot/initramfs-${KERN_SUFFIX}{,.old} || die + fi + fi + # then rename everything else, and copy the new files into place + for i in {vmlinuz,System.map,config}; do + if [[ -f "/boot/$i-${KERN_SUFFIX}" ]]; then + # USE=savedconfig means the config might have changed! + # In that case, keep the old kernel around, for safety. + if use savedconfig; then + if [[ -f /boot/$i-${KERN_SUFFIX}.old ]]; then + rm /boot/$i-${KERN_SUFFIX}.old + fi + einfo "Preserving: mv /boot/$i-${KERN_SUFFIX}{,.old}" + mv /boot/$i-${KERN_SUFFIX}{,.old} || die + else + rm /boot/$i-${KERN_SUFFIX} || die + fi + fi + mv /boot/$i-${KERN_SUFFIX}{.tmp,} || die + done + if [[ -d "/lib/modules/${MOD_DIR_NAME}" ]]; then + # USE=savedconfig means the config might have changed! + # In that case, keep the old modules around, for safety. + if use savedconfig; then + if [[ -d "/lib/modules/${MOD_DIR_NAME}.old" ]]; then + rm -r /lib/modules/${MOD_DIR_NAME}.old + fi + einfo "Preserving: mv /lib/modules/${MOD_DIR_NAME}{,.old}" + mv /lib/modules/${MOD_DIR_NAME}{,.old} || die + else + rm -r /lib/modules/${MOD_DIR_NAME} || die + fi + fi + mv /lib/modules/${MOD_DIR_NAME}{.tmp,} || die + fi + + # Finally, generate a new initramfs with dracut, via whip + # NOTE: For now, the initramfs is generic. + if use binary && use dracut; then + dracut_modules_pre=" + $(use lvm && echo lvm) + $(use luks && echo crypt) + $(use mdadm && echo mdraid) + $(use btrfs && echo btrfs) + $(use sshd && echo sshd) + " + dracut_drivers_pre=" + $(use luks && echo dm-crypt) + " + DRACUT_ADD_MODULES="$(echo ${dracut_modules_pre} | xargs)" \ + DRACUT_ADD_DRIVERS="$(echo ${dracut_drivers_pre} | xargs)" \ + KVER="${KERN_ARCH}-${MACARONI_KVER}" \ + KTYPE="${MACARONI_KTYPE}" \ + KSUFFIX="${MACARONI_KSUFFIX}" \ + KMODDIR="/lib/modules/$MOD_DIR_NAME" \ + whip h initramfs.generate_with_dracut || die + fi + + if use binary && [[ -h "${ROOT}"usr/src/linux ]]; then + rm "${ROOT}"usr/src/linux || die + fi + + if use binary && [[ ! -e "${ROOT}"usr/src/linux ]]; then + ewarn "With binary use flag enabled /usr/src/linux" + ewarn "symlink automatically set to debian kernel" + ewarn "If you have external modules, don't forget to rebuild them with:" + ewarn "" + ewarn " emerge @module-rebuild" + ewarn "" + ln -sf ${LINUX_SRCDIR} "${ROOT}"usr/src/linux || die + fi + + if [ -e ${ROOT}lib/modules ]; then + depmod -a $MOD_DIR_NAME || die + fi + + # Update bootloader and unmount /boot + ego_pkg_postinst +} + +# vim: syn=ebuild noet ts=4