diff options
author | Patrick J Volkerding <volkerdi@slackware.com> | 2022-05-09 21:33:25 +0000 |
---|---|---|
committer | Eric Hameleers <alien@slackware.com> | 2022-05-10 13:30:03 +0200 |
commit | 3c08cf6792eda8b7caf0d00f330bf289a5501341 (patch) | |
tree | efedef3a81162366f1c637efbef7b1174c44d115 | |
parent | 2971d8428504e8fa761d9f92273abaa1357a97ee (diff) | |
download | current-20220509213325_15.0.tar.gz |
Mon May 9 21:33:25 UTC 202220220509213325_15.0
patches/packages/linux-5.15.38/*: Upgraded.
These updates fix various bugs and security issues.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 5.15.27:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
Fixed in 5.15.28:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
Fixed in 5.15.29:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
Fixed in 5.15.32:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
Fixed in 5.15.33:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
Fixed in 5.15.34:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
Fixed in 5.15.35:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
Fixed in 5.15.37:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
(* Security fix *)
22 files changed, 825 insertions, 37 deletions
diff --git a/CHANGES_AND_HINTS.TXT b/CHANGES_AND_HINTS.TXT index 0e7ff1a2..adcc637b 100644 --- a/CHANGES_AND_HINTS.TXT +++ b/CHANGES_AND_HINTS.TXT @@ -1,6 +1,6 @@ -This file documents the instructions for upgrading to Slackware -current, the
+This file documents the instructions for upgrading to Slackware 15.0, the
packages added, removed, renamed, and/or split during the development cycle
-from Slackware 14.2 through -current, and some potential "gotchas" that users
+from Slackware 14.2 through 15.0, and some potential "gotchas" that users
can avoid by arming themselves with a little knowledge.
diff --git a/ChangeLog.rss b/ChangeLog.rss index 3c9b2199..e1ee1742 100644 --- a/ChangeLog.rss +++ b/ChangeLog.rss @@ -11,10 +11,74 @@ <description>Tracking Slackware development in git.</description> <language>en-us</language> <id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id> - <pubDate>Wed, 4 May 2022 21:24:57 GMT</pubDate> - <lastBuildDate>Thu, 5 May 2022 11:29:53 GMT</lastBuildDate> + <pubDate>Mon, 9 May 2022 21:33:25 GMT</pubDate> + <lastBuildDate>Tue, 10 May 2022 11:29:52 GMT</lastBuildDate> <generator>maintain_current_git.sh v 1.17</generator> <item> + <title>Mon, 9 May 2022 21:33:25 GMT</title> + <pubDate>Mon, 9 May 2022 21:33:25 GMT</pubDate> + <link>https://git.slackware.nl/current/tag/?h=20220509213325</link> + <guid isPermaLink="false">20220509213325</guid> + <description> + <![CDATA[<pre> +patches/packages/linux-5.15.38/*: Upgraded. + These updates fix various bugs and security issues. + Be sure to upgrade your initrd after upgrading the kernel packages. + If you use lilo to boot your machine, be sure lilo.conf points to the correct + kernel and initrd and run lilo as root to update the bootloader. + If you use elilo to boot your machine, you should run eliloconfig to copy the + kernel and initrd to the EFI System Partition. + For more information, see: + Fixed in 5.15.27: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494 + Fixed in 5.15.28: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042 + Fixed in 5.15.29: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854 + Fixed in 5.15.32: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356 + Fixed in 5.15.33: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516 + Fixed in 5.15.34: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582 + Fixed in 5.15.35: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205 + Fixed in 5.15.37: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222 + (* Security fix *) + </pre>]]> + </description> + </item> + <item> <title>Wed, 4 May 2022 21:24:57 GMT</title> <pubDate>Wed, 4 May 2022 21:24:57 GMT</pubDate> <link>https://git.slackware.nl/current/tag/?h=20220504212457</link> diff --git a/ChangeLog.txt b/ChangeLog.txt index 2c842235..43bec4a6 100644 --- a/ChangeLog.txt +++ b/ChangeLog.txt @@ -1,3 +1,59 @@ +Mon May 9 21:33:25 UTC 2022 +patches/packages/linux-5.15.38/*: Upgraded. + These updates fix various bugs and security issues. + Be sure to upgrade your initrd after upgrading the kernel packages. + If you use lilo to boot your machine, be sure lilo.conf points to the correct + kernel and initrd and run lilo as root to update the bootloader. + If you use elilo to boot your machine, you should run eliloconfig to copy the + kernel and initrd to the EFI System Partition. + For more information, see: + Fixed in 5.15.27: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494 + Fixed in 5.15.28: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042 + Fixed in 5.15.29: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854 + Fixed in 5.15.32: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356 + Fixed in 5.15.33: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516 + Fixed in 5.15.34: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582 + Fixed in 5.15.35: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205 + Fixed in 5.15.37: + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500 + https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222 + (* Security fix *) ++--------------------------+ Wed May 4 21:24:57 UTC 2022 patches/packages/mozilla-thunderbird-91.9.0-x86_64-1_slack15.0.txz: Upgraded. This release contains security fixes and improvements. diff --git a/FILELIST.TXT b/FILELIST.TXT index 0d7bd9e3..02e390aa 100644 --- a/FILELIST.TXT +++ b/FILELIST.TXT @@ -1,20 +1,20 @@ -Wed May 4 21:29:28 UTC 2022 +Mon May 9 21:37:29 UTC 2022 Here is the file list for this directory. If you are using a mirror site and find missing or extra files in the disk subdirectories, please have the archive administrator refresh the mirror. -drwxr-xr-x 12 root root 4096 2022-05-04 21:24 . +drwxr-xr-x 12 root root 4096 2022-05-09 21:33 . -rw-r--r-- 1 root root 5767 2022-02-02 22:44 ./ANNOUNCE.15.0 -rw-r--r-- 1 root root 16609 2022-03-30 19:03 ./CHANGES_AND_HINTS.TXT --rw-r--r-- 1 root root 1136954 2022-05-02 20:09 ./CHECKSUMS.md5 --rw-r--r-- 1 root root 163 2022-05-02 20:09 ./CHECKSUMS.md5.asc +-rw-r--r-- 1 root root 1136946 2022-05-04 21:29 ./CHECKSUMS.md5 +-rw-r--r-- 1 root root 163 2022-05-04 21:29 ./CHECKSUMS.md5.asc -rw-r--r-- 1 root root 17976 1994-06-10 02:28 ./COPYING -rw-r--r-- 1 root root 35147 2007-06-30 04:21 ./COPYING3 -rw-r--r-- 1 root root 19573 2016-06-23 20:08 ./COPYRIGHT.TXT -rw-r--r-- 1 root root 616 2006-10-02 04:37 ./CRYPTO_NOTICE.TXT --rw-r--r-- 1 root root 1892060 2022-05-04 21:24 ./ChangeLog.txt +-rw-r--r-- 1 root root 1895211 2022-05-09 21:33 ./ChangeLog.txt drwxr-xr-x 3 root root 4096 2013-03-20 22:17 ./EFI drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT -rw-r--r-- 1 root root 1187840 2021-06-15 19:16 ./EFI/BOOT/bootx64.efi @@ -25,7 +25,7 @@ drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT -rwxr-xr-x 1 root root 2504 2019-07-05 18:54 ./EFI/BOOT/make-grub.sh -rw-r--r-- 1 root root 10722 2013-09-21 19:02 ./EFI/BOOT/osdetect.cfg -rw-r--r-- 1 root root 1273 2013-08-12 21:08 ./EFI/BOOT/tools.cfg --rw-r--r-- 1 root root 1484026 2022-05-02 20:09 ./FILELIST.TXT +-rw-r--r-- 1 root root 1484018 2022-05-04 21:29 ./FILELIST.TXT -rw-r--r-- 1 root root 1572 2012-08-29 18:27 ./GPG-KEY -rw-r--r-- 1 root root 864745 2022-02-02 08:25 ./PACKAGES.TXT -rw-r--r-- 1 root root 8034 2022-02-02 03:36 ./README.TXT @@ -737,13 +737,13 @@ drwxr-xr-x 2 root root 4096 2008-05-07 05:21 ./pasture/source/php/pear -rwxr-xr-x 1 root root 9448 2018-05-16 22:38 ./pasture/source/php/php.SlackBuild -rw-r--r-- 1 root root 775 2017-07-07 19:25 ./pasture/source/php/php.ini-development.diff.gz -rw-r--r-- 1 root root 830 2005-12-09 05:18 ./pasture/source/php/slack-desc -drwxr-xr-x 4 root root 4096 2022-05-04 21:29 ./patches --rw-r--r-- 1 root root 34342 2022-05-04 21:29 ./patches/CHECKSUMS.md5 --rw-r--r-- 1 root root 163 2022-05-04 21:29 ./patches/CHECKSUMS.md5.asc --rw-r--r-- 1 root root 45957 2022-05-04 21:29 ./patches/FILE_LIST --rw-r--r-- 1 root root 11380360 2022-05-04 21:29 ./patches/MANIFEST.bz2 --rw-r--r-- 1 root root 25507 2022-05-04 21:29 ./patches/PACKAGES.TXT -drwxr-xr-x 3 root root 12288 2022-05-04 21:29 ./patches/packages +drwxr-xr-x 4 root root 4096 2022-05-09 21:37 ./patches +-rw-r--r-- 1 root root 34342 2022-05-09 21:37 ./patches/CHECKSUMS.md5 +-rw-r--r-- 1 root root 163 2022-05-09 21:37 ./patches/CHECKSUMS.md5.asc +-rw-r--r-- 1 root root 45957 2022-05-09 21:37 ./patches/FILE_LIST +-rw-r--r-- 1 root root 11355989 2022-05-09 21:37 ./patches/MANIFEST.bz2 +-rw-r--r-- 1 root root 25507 2022-05-09 21:37 ./patches/PACKAGES.TXT +drwxr-xr-x 3 root root 12288 2022-05-09 21:31 ./patches/packages -rw-r--r-- 1 root root 327 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txt -rw-r--r-- 1 root root 10716 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz -rw-r--r-- 1 root root 163 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz.asc @@ -798,22 +798,22 @@ drwxr-xr-x 3 root root 12288 2022-05-04 21:29 ./patches/packages -rw-r--r-- 1 root root 219 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txt -rw-r--r-- 1 root root 375568 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz -rw-r--r-- 1 root root 163 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz.asc -drwxr-xr-x 2 root root 4096 2022-03-09 04:17 ./patches/packages/linux-5.15.27 --rw-r--r-- 1 root root 624 2022-03-09 00:47 ./patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txt --rw-r--r-- 1 root root 8211832 2022-03-09 00:47 ./patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-03-09 00:47 ./patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txz.asc --rw-r--r-- 1 root root 332 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txt --rw-r--r-- 1 root root 1078476 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txz --rw-r--r-- 1 root root 163 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txz.asc --rw-r--r-- 1 root root 636 2022-03-09 00:44 ./patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txt --rw-r--r-- 1 root root 12151252 2022-03-09 00:44 ./patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-03-09 00:44 ./patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txz.asc --rw-r--r-- 1 root root 567 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txt --rw-r--r-- 1 root root 50251840 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txz --rw-r--r-- 1 root root 163 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txz.asc --rw-r--r-- 1 root root 317 2022-03-09 00:40 ./patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txt --rw-r--r-- 1 root root 122960152 2022-03-09 00:40 ./patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txz --rw-r--r-- 1 root root 163 2022-03-09 00:40 ./patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txz.asc +drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15.38 +-rw-r--r-- 1 root root 624 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt +-rw-r--r-- 1 root root 8218112 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz.asc +-rw-r--r-- 1 root root 332 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt +-rw-r--r-- 1 root root 1078936 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz +-rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz.asc +-rw-r--r-- 1 root root 636 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt +-rw-r--r-- 1 root root 12157884 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz.asc +-rw-r--r-- 1 root root 567 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt +-rw-r--r-- 1 root root 50239932 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz +-rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz.asc +-rw-r--r-- 1 root root 317 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt +-rw-r--r-- 1 root root 123035916 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz +-rw-r--r-- 1 root root 163 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz.asc -rw-r--r-- 1 root root 369 2022-02-21 03:37 ./patches/packages/mariadb-10.5.15-x86_64-2_slack15.0.txt -rw-r--r-- 1 root root 29262352 2022-02-21 03:37 ./patches/packages/mariadb-10.5.15-x86_64-2_slack15.0.txz -rw-r--r-- 1 root root 163 2022-02-21 03:37 ./patches/packages/mariadb-10.5.15-x86_64-2_slack15.0.txz.asc diff --git a/README_LVM.TXT b/README_LVM.TXT index 93aa4e42..85b894a9 100644 --- a/README_LVM.TXT +++ b/README_LVM.TXT @@ -103,9 +103,9 @@ We are going to 'chroot' into our fresh installation: Next, while we are in the chroot, create the initrd with LVM support -
in the example command line I assume that the root filesystem is 'ext4',
we used the LV '/dev/myvg/root' as the root device, and are running the
-Slackware 14.2 default kernel '4.4.14':
+Slackware 15.0 default kernel '5.15.19':
- # mkinitrd -c -k 4.4.14 -m ext4 -f ext4 -r /dev/myvg/root -L
+ # mkinitrd -c -k 5.15.19 -m ext4 -f ext4 -r /dev/myvg/root -L
The resulting initrd image will be written to the file '/boot/initrd.gz'
by default. We still need to tell lilo about this initrd, so open the
@@ -117,7 +117,7 @@ filename added by 'liloconfig' is '/boot/vmlinuz' which is a symbolic link to the huge SMP kernel. Remember that we need a 'generic' kernel with the initrd.
The end result should look somewhat like this:
- image = /boot/vmlinuz-generic-4.4.14
+ image = /boot/vmlinuz-generic-5.15.19
initrd = /boot/initrd.gz
root = /dev/myvg/root
label = linux
diff --git a/patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txt b/patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt index 975a5ba6..975a5ba6 100644 --- a/patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txt +++ b/patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt diff --git a/patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txt b/patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt index 27b46a0e..27b46a0e 100644 --- a/patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txt +++ b/patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt diff --git a/patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txt b/patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt index 2d617061..2d617061 100644 --- a/patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txt +++ b/patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt diff --git a/patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txt b/patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt index 9a944104..9a944104 100644 --- a/patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txt +++ b/patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt diff --git a/patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txt b/patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt index eb2b0a30..eb2b0a30 100644 --- a/patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txt +++ b/patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt diff --git a/recompress.sh b/recompress.sh index 5c28f066..27dc6f9c 100755 --- a/recompress.sh +++ b/recompress.sh @@ -1161,6 +1161,7 @@ gzip ./source/x/ibus/doinst.sh gzip ./source/x/ibus/emoji-test.txt gzip ./source/x/xcm/xcm.udev.rules.diff gzip ./source/x/libva/doinst.sh +gzip ./testing/source/bind/doinst.sh gzip ./patches/source/bluez/bluez-5.51-obexd_without_systemd-1.patch gzip ./patches/source/bluez/doinst.sh gzip ./patches/source/mozilla-thunderbird/autoconf/autoconf-2.13-consolidated_fixes-1.patch diff --git a/testing/source/bind/3link.sh b/testing/source/bind/3link.sh new file mode 100644 index 00000000..ec8ba4d1 --- /dev/null +++ b/testing/source/bind/3link.sh @@ -0,0 +1,136 @@ +rm -f lwres_addr_parse.3 +ln -sf lwres_resutil.3 lwres_addr_parse.3 +rm -f lwres_buffer_add.3 +ln -sf lwres_buffer.3 lwres_buffer_add.3 +rm -f lwres_buffer_back.3 +ln -sf lwres_buffer.3 lwres_buffer_back.3 +rm -f lwres_buffer_clear.3 +ln -sf lwres_buffer.3 lwres_buffer_clear.3 +rm -f lwres_buffer_first.3 +ln -sf lwres_buffer.3 lwres_buffer_first.3 +rm -f lwres_buffer_forward.3 +ln -sf lwres_buffer.3 lwres_buffer_forward.3 +rm -f lwres_buffer_getmem.3 +ln -sf lwres_buffer.3 lwres_buffer_getmem.3 +rm -f lwres_buffer_getuint16.3 +ln -sf lwres_buffer.3 lwres_buffer_getuint16.3 +rm -f lwres_buffer_getuint32.3 +ln -sf lwres_buffer.3 lwres_buffer_getuint32.3 +rm -f lwres_buffer_getuint8.3 +ln -sf lwres_buffer.3 lwres_buffer_getuint8.3 +rm -f lwres_buffer_init.3 +ln -sf lwres_buffer.3 lwres_buffer_init.3 +rm -f lwres_buffer_invalidate.3 +ln -sf lwres_buffer.3 lwres_buffer_invalidate.3 +rm -f lwres_buffer_putmem.3 +ln -sf lwres_buffer.3 lwres_buffer_putmem.3 +rm -f lwres_buffer_putuint16.3 +ln -sf lwres_buffer.3 lwres_buffer_putuint16.3 +rm -f lwres_buffer_putuint32.3 +ln -sf lwres_buffer.3 lwres_buffer_putuint32.3 +rm -f lwres_buffer_putuint8.3 +ln -sf lwres_buffer.3 lwres_buffer_putuint8.3 +rm -f lwres_buffer_subtract.3 +ln -sf lwres_buffer.3 lwres_buffer_subtract.3 +rm -f lwres_conf_clear.3 +ln -sf lwres_config.3 lwres_conf_clear.3 +rm -f lwres_conf_get.3 +ln -sf lwres_config.3 lwres_conf_get.3 +rm -f lwres_conf_init.3 +ln -sf lwres_config.3 lwres_conf_init.3 +rm -f lwres_conf_parse.3 +ln -sf lwres_config.3 lwres_conf_parse.3 +rm -f lwres_conf_print.3 +ln -sf lwres_config.3 lwres_conf_print.3 +rm -f lwres_context_allocmem.3 +ln -sf lwres_context.3 lwres_context_allocmem.3 +rm -f lwres_context_create.3 +ln -sf lwres_context.3 lwres_context_create.3 +rm -f lwres_context_destroy.3 +ln -sf lwres_context.3 lwres_context_destroy.3 +rm -f lwres_context_freemem.3 +ln -sf lwres_context.3 lwres_context_freemem.3 +rm -f lwres_context_initserial.3 +ln -sf lwres_context.3 lwres_context_initserial.3 +rm -f lwres_context_nextserial.3 +ln -sf lwres_context.3 lwres_context_nextserial.3 +rm -f lwres_context_sendrecv.3 +ln -sf lwres_context.3 lwres_context_sendrecv.3 +rm -f lwres_endhostent.3 +ln -sf lwres_gethostent.3 lwres_endhostent.3 +rm -f lwres_endhostent_r.3 +ln -sf lwres_gethostent.3 lwres_endhostent_r.3 +rm -f lwres_freeaddrinfo.3 +ln -sf lwres_getaddrinfo.3 lwres_freeaddrinfo.3 +rm -f lwres_freehostent.3 +ln -sf lwres_getipnode.3 lwres_freehostent.3 +rm -f lwres_gabnrequest_free.3 +ln -sf lwres_gabn.3 lwres_gabnrequest_free.3 +rm -f lwres_gabnrequest_parse.3 +ln -sf lwres_gabn.3 lwres_gabnrequest_parse.3 +rm -f lwres_gabnrequest_render.3 +ln -sf lwres_gabn.3 lwres_gabnrequest_render.3 +rm -f lwres_gabnresponse_free.3 +ln -sf lwres_gabn.3 lwres_gabnresponse_free.3 +rm -f lwres_gabnresponse_parse.3 +ln -sf lwres_gabn.3 lwres_gabnresponse_parse.3 +rm -f lwres_gabnresponse_render.3 +ln -sf lwres_gabn.3 lwres_gabnresponse_render.3 +rm -f lwres_getaddrsbyname.3 +ln -sf lwres_resutil.3 lwres_getaddrsbyname.3 +rm -f lwres_gethostbyaddr.3 +ln -sf lwres_gethostent.3 lwres_gethostbyaddr.3 +rm -f lwres_gethostbyaddr_r.3 +ln -sf lwres_gethostent.3 lwres_gethostbyaddr_r.3 +rm -f lwres_gethostbyname.3 +ln -sf lwres_gethostent.3 lwres_gethostbyname.3 +rm -f lwres_gethostbyname2.3 +ln -sf lwres_gethostent.3 lwres_gethostbyname2.3 +rm -f lwres_gethostbyname_r.3 +ln -sf lwres_gethostent.3 lwres_gethostbyname_r.3 +rm -f lwres_gethostent_r.3 +ln -sf lwres_gethostent.3 lwres_gethostent_r.3 +rm -f lwres_getipnodebyaddr.3 +ln -sf lwres_getipnode.3 lwres_getipnodebyaddr.3 +rm -f lwres_getipnodebyname.3 +ln -sf lwres_getipnode.3 lwres_getipnodebyname.3 +rm -f lwres_getnamebyaddr.3 +ln -sf lwres_resutil.3 lwres_getnamebyaddr.3 +rm -f lwres_gnbarequest_free.3 +ln -sf lwres_gnba.3 lwres_gnbarequest_free.3 +rm -f lwres_gnbarequest_parse.3 +ln -sf lwres_gnba.3 lwres_gnbarequest_parse.3 +rm -f lwres_gnbarequest_render.3 +ln -sf lwres_gnba.3 lwres_gnbarequest_render.3 +rm -f lwres_gnbaresponse_free.3 +ln -sf lwres_gnba.3 lwres_gnbaresponse_free.3 +rm -f lwres_gnbaresponse_parse.3 +ln -sf lwres_gnba.3 lwres_gnbaresponse_parse.3 +rm -f lwres_gnbaresponse_render.3 +ln -sf lwres_gnba.3 lwres_gnbaresponse_render.3 +rm -f lwres_herror.3 +ln -sf lwres_hstrerror.3 lwres_herror.3 +rm -f lwres_lwpacket_parseheader.3 +ln -sf lwres_packet.3 lwres_lwpacket_parseheader.3 +rm -f lwres_lwpacket_renderheader.3 +ln -sf lwres_packet.3 lwres_lwpacket_renderheader.3 +rm -f lwres_net_ntop.3 +ln -sf lwres_inetntop.3 lwres_net_ntop.3 +rm -f lwres_nooprequest_free.3 +ln -sf lwres_noop.3 lwres_nooprequest_free.3 +rm -f lwres_nooprequest_parse.3 +ln -sf lwres_noop.3 lwres_nooprequest_parse.3 +rm -f lwres_nooprequest_render.3 +ln -sf lwres_noop.3 lwres_nooprequest_render.3 +rm -f lwres_noopresponse_free.3 +ln -sf lwres_noop.3 lwres_noopresponse_free.3 +rm -f lwres_noopresponse_parse.3 +ln -sf lwres_noop.3 lwres_noopresponse_parse.3 +rm -f lwres_noopresponse_render.3 +ln -sf lwres_noop.3 lwres_noopresponse_render.3 +rm -f lwres_sethostent.3 +ln -sf lwres_gethostent.3 lwres_sethostent.3 +rm -f lwres_sethostent_r.3 +ln -sf lwres_gethostent.3 lwres_sethostent_r.3 +rm -f lwres_string_parse.3 +ln -sf lwres_resutil.3 lwres_string_parse.3 diff --git a/testing/source/bind/bind.SlackBuild b/testing/source/bind/bind.SlackBuild new file mode 100755 index 00000000..7884f183 --- /dev/null +++ b/testing/source/bind/bind.SlackBuild @@ -0,0 +1,180 @@ +#!/bin/bash + +# Copyright 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2018, 2019, 2020, 2021 Patrick J. Volkerding, Sebeka, MN, USA +# All rights reserved. +# +# Redistribution and use of this script, with or without modification, is +# permitted provided that the following conditions are met: +# +# 1. Redistributions of this script must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# +# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED +# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF +# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO +# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, +# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; +# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, +# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR +# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF +# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +cd $(dirname $0) ; CWD=$(pwd) + +PKGNAM=bind +VERSION=${VERSION:-$(echo ${PKGNAM}-[0-9]*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)} +BUILD=${BUILD:-1_slack15.0} + +# Automatically determine the architecture we're building on: +if [ -z "$ARCH" ]; then + case "$( uname -m )" in + i?86) export ARCH=i586 ;; + arm*) export ARCH=arm ;; + # Unless $ARCH is already set, use uname -m for all other archs: + *) export ARCH=$( uname -m ) ;; + esac +fi + +# If the variable PRINT_PACKAGE_NAME is set, then this script will report what +# the name of the created package would be, and then exit. This information +# could be useful to other scripts. +if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then + echo "$PKGNAM-$(echo $VERSION | tr - _)-$ARCH-$BUILD.txz" + exit 0 +fi + +NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "} + +TMP=${TMP:-/tmp} +PKG=$TMP/package-${PKGNAM} +rm -rf $PKG +mkdir -p $TMP $PKG/etc/default + +if [ "$ARCH" = "i586" ]; then + SLKCFLAGS="-O2 -march=i586 -mtune=i686" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "s390" ]; then + SLKCFLAGS="-O2" + LIBDIRSUFFIX="" +elif [ "$ARCH" = "x86_64" ]; then + SLKCFLAGS="-O2 -fPIC" + LIBDIRSUFFIX="64" +fi + +cd $TMP +rm -rf ${PKGNAM}-${VERSION} +tar xvf $CWD/${PKGNAM}-$VERSION.tar.?z || exit 1 +cd ${PKGNAM}-$VERSION || exit 1 + +# Make sure ownerships and permissions are sane: +chown -R root:root . +find . \ + \( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \ + -exec chmod 755 {} \+ -o \ + \( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \ + -exec chmod 644 {} \+ + +# Detect krb5: +if ls /lib*/libgssapi_krb5* 1> /dev/null 2> /dev/null ; then + GSSAPI=" --with-gssapi " +else + GSSAPI=" " +fi + +# Configure: +CFLAGS="$SLKCFLAGS" \ +./configure \ + --prefix=/usr \ + --libdir=/usr/lib${LIBDIRSUFFIX} \ + --sysconfdir=/etc \ + --localstatedir=/var \ + --with-libtool \ + --with-libidn2 \ + --with-python=/usr/bin/python3 \ + --mandir=/usr/man \ + --enable-shared \ + --disable-static \ + --with-openssl=/usr \ + $GSSAPI \ + --build=$ARCH-slackware-linux || exit 1 + +# Build and install: +make $NUMJOBS || make || exit 1 +make install DESTDIR=$PKG || exit 1 + +# Don't ship .la files: +rm -f $PKG/{,usr/}lib${LIBDIRSUFFIX}/*.la + +# These probably were not supposed to be installed: +find . -name .deps -exec rm -rf "{}" \; +find . -name .libs -exec rm -rf "{}" \; + +# We like symlinks. +( cd $PKG/usr/sbin + ln -sf named lwresd +) + +# We like a lot of symlinks. +if [ -d $PKG/usr/man/man3 ]; then + ( cd $PKG/usr/man/man3 + sh $CWD/3link.sh + ) +fi + +# Install init script: +mkdir -p $PKG/etc/rc.d +cp -a $CWD/rc.bind $PKG/etc/rc.d/rc.bind.new +chmod 644 $PKG/etc/rc.d/rc.bind.new + +# Install default options file for named: +cat $CWD/default.named > $PKG/etc/default/named.new + +# Fix library perms: +chmod 755 $PKG/usr/lib${LIBDIRSUFFIX}/* + +# Strip binaries: +find $PKG | xargs file | grep -e "executable" -e "shared object" | grep ELF \ + | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null + +# Compress manual pages: +find $PKG/usr/man -type f -exec gzip -9 {} \+ +for i in $( find $PKG/usr/man -type l ) ; do + ln -s $( readlink $i ).gz $i.gz + rm $i +done + +# Add a documentation directory: +mkdir -p $PKG/usr/doc/${PKGNAM}-$VERSION +cp -a \ + CHANGES COPYRIGHT FAQ* README* \ + doc/arm doc/misc \ + $PKG/usr/doc/${PKGNAM}-$VERSION + +# This one should have the correct perms of the config file: +if [ -r $PKG/usr/doc/${PKGNAM}-$VERSION/misc/rndc.conf-sample ]; then + chmod 644 $PKG/usr/doc/${PKGNAM}-$VERSION/misc/rndc.conf-sample +fi + +# One format of this is plenty. Especially get rid of the bloated PDF. +( cd $PKG/usr/doc/bind-$VERSION/arm + rm -f Makefile* *.pdf *.xml README.SGML latex-fixup.pl +) + +# Add sample config files for a simple caching nameserver: +mkdir -p $PKG/var/named/caching-example +cat $CWD/caching-example/named.conf > $PKG/etc/named.conf.new +cat $CWD/caching-example/localhost.zone > $PKG/var/named/caching-example/localhost.zone +cat $CWD/caching-example/named.local > $PKG/var/named/caching-example/named.local +cat $CWD/caching-example/named.root > $PKG/var/named/caching-example/named.root +# This name is deprecated, but having it here doesn't hurt in case +# an old configuration file wants it: +cat $CWD/caching-example/named.root > $PKG/var/named/caching-example/named.ca + +mkdir -p $PKG/install +zcat $CWD/doinst.sh.gz > $PKG/install/doinst.sh +cat $CWD/slack-desc > $PKG/install/slack-desc + +cd $PKG +/sbin/makepkg -l y -c n $TMP/${PKGNAM}-$(echo $VERSION | tr - _)-$ARCH-$BUILD.txz + diff --git a/testing/source/bind/caching-example/localhost.zone b/testing/source/bind/caching-example/localhost.zone new file mode 100644 index 00000000..c47baf5f --- /dev/null +++ b/testing/source/bind/caching-example/localhost.zone @@ -0,0 +1,11 @@ +$TTL 86400 +$ORIGIN localhost. +@ 1D IN SOA @ root ( + 42 ; serial (d. adams) + 3H ; refresh + 15M ; retry + 1W ; expiry + 1D ) ; minimum + + 1D IN NS @ + 1D IN A 127.0.0.1 diff --git a/testing/source/bind/caching-example/named.conf b/testing/source/bind/caching-example/named.conf new file mode 100644 index 00000000..a8ee2795 --- /dev/null +++ b/testing/source/bind/caching-example/named.conf @@ -0,0 +1,31 @@ +options { + directory "/var/named"; + /* + * If there is a firewall between you and nameservers you want + * to talk to, you might need to uncomment the query-source + * directive below. Previous versions of BIND always asked + * questions using port 53, but BIND 8.1 uses an unprivileged + * port by default. + */ + // query-source address * port 53; +}; + +// +// a caching only nameserver config +// +zone "." IN { + type hint; + file "caching-example/named.root"; +}; + +zone "localhost" IN { + type master; + file "caching-example/localhost.zone"; + allow-update { none; }; +}; + +zone "0.0.127.in-addr.arpa" IN { + type master; + file "caching-example/named.local"; + allow-update { none; }; +}; diff --git a/testing/source/bind/caching-example/named.local b/testing/source/bind/caching-example/named.local new file mode 100644 index 00000000..8f40bcf3 --- /dev/null +++ b/testing/source/bind/caching-example/named.local @@ -0,0 +1,10 @@ +$TTL 86400 +@ IN SOA localhost. root.localhost. ( + 2011032500 ; Serial + 28800 ; Refresh + 14400 ; Retry + 3600000 ; Expire + 86400 ) ; Minimum + IN NS localhost. + +1 IN PTR localhost. diff --git a/testing/source/bind/caching-example/named.root b/testing/source/bind/caching-example/named.root new file mode 100644 index 00000000..dba9ed9e --- /dev/null +++ b/testing/source/bind/caching-example/named.root @@ -0,0 +1,92 @@ +; This file holds the information on root name servers needed to +; initialize cache of Internet domain name servers +; (e.g. reference this file in the "cache . <file>" +; configuration file of BIND domain name servers). +; +; This file is made available by InterNIC +; under anonymous FTP as +; file /domain/named.cache +; on server FTP.INTERNIC.NET +; -OR- RS.INTERNIC.NET +; +; last update: July 30, 2019 +; related version of root zone: 2019073000 +; +; FORMERLY NS.INTERNIC.NET +; +. 3600000 NS A.ROOT-SERVERS.NET. +A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 +A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:ba3e::2:30 +; +; FORMERLY NS1.ISI.EDU +; +. 3600000 NS B.ROOT-SERVERS.NET. +B.ROOT-SERVERS.NET. 3600000 A 199.9.14.201 +B.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:200::b +; +; FORMERLY C.PSI.NET +; +. 3600000 NS C.ROOT-SERVERS.NET. +C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12 +C.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2::c +; +; FORMERLY TERP.UMD.EDU +; +. 3600000 NS D.ROOT-SERVERS.NET. +D.ROOT-SERVERS.NET. 3600000 A 199.7.91.13 +D.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2d::d +; +; FORMERLY NS.NASA.GOV +; +. 3600000 NS E.ROOT-SERVERS.NET. +E.ROOT-SERVERS.NET. 3600000 A 192.203.230.10 +E.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:a8::e +; +; FORMERLY NS.ISC.ORG +; +. 3600000 NS F.ROOT-SERVERS.NET. +F.ROOT-SERVERS.NET. 3600000 A 192.5.5.241 +F.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2f::f +; +; FORMERLY NS.NIC.DDN.MIL +; +. 3600000 NS G.ROOT-SERVERS.NET. +G.ROOT-SERVERS.NET. 3600000 A 192.112.36.4 +G.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:12::d0d +; +; FORMERLY AOS.ARL.ARMY.MIL +; +. 3600000 NS H.ROOT-SERVERS.NET. +H.ROOT-SERVERS.NET. 3600000 A 198.97.190.53 +H.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:1::53 +; +; FORMERLY NIC.NORDU.NET +; +. 3600000 NS I.ROOT-SERVERS.NET. +I.ROOT-SERVERS.NET. 3600000 A 192.36.148.17 +I.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fe::53 +; +; OPERATED BY VERISIGN, INC. +; +. 3600000 NS J.ROOT-SERVERS.NET. +J.ROOT-SERVERS.NET. 3600000 A 192.58.128.30 +J.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:c27::2:30 +; +; OPERATED BY RIPE NCC +; +. 3600000 NS K.ROOT-SERVERS.NET. +K.ROOT-SERVERS.NET. 3600000 A 193.0.14.129 +K.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fd::1 +; +; OPERATED BY ICANN +; +. 3600000 NS L.ROOT-SERVERS.NET. +L.ROOT-SERVERS.NET. 3600000 A 199.7.83.42 +L.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:9f::42 +; +; OPERATED BY WIDE +; +. 3600000 NS M.ROOT-SERVERS.NET. +M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33 +M.ROOT-SERVERS.NET. 3600000 AAAA 2001:dc3::35 +; End of file
\ No newline at end of file diff --git a/testing/source/bind/default.named b/testing/source/bind/default.named new file mode 100644 index 00000000..50e18664 --- /dev/null +++ b/testing/source/bind/default.named @@ -0,0 +1,12 @@ +# User to run named as: +NAMED_USER=named + +# Group to use for chowning named related files and directories. +# By default, named will also run as the primary group of $NAMED_USER, +# which will usually be the same as what's listed below, but not +# necessarily if something other than the default of "named" is used. +NAMED_GROUP=named + +# Options to run named with. At least -u $NAMED_USER is required, but +# additional options may be added if needed. +NAMED_OPTIONS="-u $NAMED_USER" diff --git a/testing/source/bind/doinst.sh b/testing/source/bind/doinst.sh new file mode 100644 index 00000000..0e90be64 --- /dev/null +++ b/testing/source/bind/doinst.sh @@ -0,0 +1,38 @@ +#!/bin/sh +config() { + NEW="$1" + OLD="`dirname $NEW`/`basename $NEW .new`" + # If there's no config file by that name, mv it over: + if [ ! -r $OLD ]; then + mv $NEW $OLD + elif [ "`cat $OLD | md5sum`" = "`cat $NEW | md5sum`" ]; then # toss the redundant copy + rm $NEW + fi + # Otherwise, we leave the .new copy for the admin to consider... +} + +# Keep same perms on rc.bind.new: +if [ -e etc/rc.d/rc.bind ]; then + cp -a etc/rc.d/rc.bind etc/rc.d/rc.bind.new.incoming + cat etc/rc.d/rc.bind.new > etc/rc.d/rc.bind.new.incoming + mv etc/rc.d/rc.bind.new.incoming etc/rc.d/rc.bind.new +fi + +config etc/default/named.new +config etc/named.conf.new +config etc/rc.d/rc.bind.new + +# Add a /var/named if it doesn't exist: +if [ ! -d var/named ]; then + mkdir -p var/named + chmod 755 var/named +fi + +# Generate /etc/rndc.key if there's none there, +# and there's also no /etc/rndc.conf (the other +# way to set this up). +if [ ! -r etc/rndc.key -a ! -r /etc/rndc.conf ]; then + chroot . /sbin/ldconfig + chroot . /usr/sbin/rndc-confgen -a 2> /dev/null + chroot . /bin/chown named:named /etc/rndc.key 2> /dev/null +fi diff --git a/testing/source/bind/rc.bind b/testing/source/bind/rc.bind new file mode 100644 index 00000000..169db812 --- /dev/null +++ b/testing/source/bind/rc.bind @@ -0,0 +1,136 @@ +#!/bin/sh +# Start/stop/restart the BIND name server daemon (named). + +# Start BIND. By default this will run with user "named". If you'd like to +# change this or other options, see: /etc/default/named + +# You might also consider running BIND in a "chroot jail", +# a discussion of which may be found in +# /usr/doc/Linux-HOWTOs/Chroot-BIND-HOWTO. + +# One last note: rndc has a lot of other nice features that it is not +# within the scope of this start/stop/restart script to support. +# For more details, see "man rndc" or just type "rndc" to see the options. + +# Load command defaults: +if [ -f /etc/default/named ] ; then . /etc/default/named ; fi +if [ -f /etc/default/rndc ] ; then . /etc/default/rndc ; fi + +# In case /etc/default/named was missing, provide fallbacks: +if [ -z "$NAMED_USER" ]; then + NAMED_USER="named" +fi +if [ -z "$NAMED_GROUP" ]; then + NAMED_GROUP="named" +fi +if [ -z "$NAMED_OPTIONS" ]; then + NAMED_OPTIONS="-u $NAMED_USER" +fi + +# Sanity check. If /usr/sbin/named is missing then it +# doesn't make much sense to try to run this script: +if [ ! -x /usr/sbin/named ]; then + echo "/etc/rc.d/rc.bind: no /usr/sbin/named found (or not executable); cannot start." + exit 1 +fi + +# Start BIND. As many times as you like. ;-) +# Seriously, don't run "rc.bind start" if BIND is already +# running or you'll get more than one copy running. +bind_start() { + # Make sure /var/run/named exists: + mkdir -p /var/run/named + # Make sure that /var/run/named has correct ownership: + chown -R ${NAMED_USER}:${NAMED_GROUP} /var/run/named + # Make sure that /var/named has correct ownership: + chown -R ${NAMED_USER}:${NAMED_GROUP} /var/named + if [ -r /etc/rndc.key ]; then + # Make sure that /etc/rndc.key has correct ownership: + chown ${NAMED_USER}:${NAMED_GROUP} /etc/rndc.key + fi + # Start named: + if [ -x /usr/sbin/named ]; then + echo "Starting BIND: /usr/sbin/named $NAMED_OPTIONS" + /usr/sbin/named $NAMED_OPTIONS + sleep 1 + fi + # Make sure that named started: + if ! ps axc | grep -q named ; then + echo "WARNING: named did not start." + echo "Attempting to start named again: /usr/sbin/named $NAMED_OPTIONS" + /usr/sbin/named $NAMED_OPTIONS + sleep 1 + if ps axc | grep -q named ; then + echo "SUCCESS: named started." + else + echo "FAILED: Sorry, a second attempt to start named has also failed." + echo "There may be a configuration error that needs fixing. Good luck!" + fi + fi +} + +# Stop all running copies of BIND (/usr/sbin/named): +bind_stop() { + # If you've set up rndc, we can use this to make shutting down BIND faster. + # If you have /etc/rndc.conf, or you have /etc/rndc.key, or $RNDC_OPTIONS is + # not empty, we'll try it. + if [ -r /etc/rndc.conf -o -r /etc/rndc.key -o ! -z "$RNDC_OPTIONS" ]; then + if [ -z "$RNDC_OPTIONS" ]; then + echo "Stopping BIND: /usr/sbin/rndc stop" + else + echo "Stopping BIND: /usr/sbin/rndc $RNDC_OPTIONS stop" + fi + /usr/sbin/rndc $RNDC_OPTIONS stop + # Wait for up to $TIMEOUT seconds before moving on to try killall: + TIMEOUT=${TIMEOUT:-10} + while [ "$TIMEOUT" -gt "0" ]; do + # Exit the timeout loop if there are no named processes: + if ! ps axco command | grep -q -e "^named$"; then + break + fi + sleep 1 + TIMEOUT=$(expr $TIMEOUT - 1) + done + fi + # Kill named processes if there are any running: + if ps axco command | grep -q -e "^named$"; then + echo "Stopping all named processes in this namespace: /bin/killall -SIGTERM --ns \$\$ named" + /bin/killall -SIGTERM --ns $$ named 2> /dev/null + fi +} + +# Reload BIND: +bind_reload() { + /usr/sbin/rndc $RNDC_OPTIONS reload +} + +# Restart BIND: +bind_restart() { + bind_stop + bind_start +} + +# Get BIND status: +bind_status() { + /usr/sbin/rndc $RNDC_OPTIONS status +} + +case "$1" in +'start') + bind_start + ;; +'stop') + bind_stop + ;; +'reload') + bind_reload + ;; +'restart') + bind_restart + ;; +'status') + bind_status + ;; +*) + echo "usage $0 start|stop|reload|restart|status" +esac diff --git a/testing/source/bind/slack-desc b/testing/source/bind/slack-desc new file mode 100644 index 00000000..b4fcc825 --- /dev/null +++ b/testing/source/bind/slack-desc @@ -0,0 +1,19 @@ +# HOW TO EDIT THIS FILE: +# The "handy ruler" below makes it easier to edit a package description. Line +# up the first '|' above the ':' following the base package name, and the '|' +# on the right side marks the last column you can put a character in. You must +# make exactly 11 lines for the formatting to be correct. It's also +# customary to leave one space after the ':'. + + |-----handy-ruler------------------------------------------------------| +bind: bind (DNS server and utilities) +bind: +bind: The named daemon and support utilities such as dig, host, and +bind: nslookup. Sample configuration files for running a simple caching +bind: nameserver are included. Documentation for advanced name server +bind: setup can be found in /usr/doc/bind-9.x.x/. +bind: +bind: +bind: +bind: +bind: diff --git a/usb-and-pxe-installers/usbimg2disk.sh b/usb-and-pxe-installers/usbimg2disk.sh index fe130f67..74b0f3cb 100644 --- a/usb-and-pxe-installers/usbimg2disk.sh +++ b/usb-and-pxe-installers/usbimg2disk.sh @@ -218,6 +218,8 @@ if [ -n "$REPODIR" ]; then # This also takes care of stripping a trailing '/', which is required # for the rsync command to work as intended: REPOSROOT="$(cd $(dirname $REPODIR); pwd)/$(basename $REPODIR)" + # Use this to set the space requirement: + MININSFREE=$(expr $(du -s ${REPOSROOT}/slackware* | cut -f 1) / 1024) fi fi @@ -237,7 +239,7 @@ else fi # Prepare the environment: -MININSFREE=2200 # minimum in MB required for a Slackware tree +MININSFREE=${MININSFREE:-3134} # minimum in MB required for a Slackware tree UNATTENDED=${UNATTENDED:-0} # unattended means: never ask questions. REFORMAT=${REFORMAT:-0} # do not try to reformat by default LOGFILE=${LOGFILE:-/dev/null} # silence by default |