summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorPatrick J Volkerding <volkerdi@slackware.com>2022-05-09 21:33:25 +0000
committerEric Hameleers <alien@slackware.com>2022-05-10 13:30:03 +0200
commit3c08cf6792eda8b7caf0d00f330bf289a5501341 (patch)
treeefedef3a81162366f1c637efbef7b1174c44d115
parent2971d8428504e8fa761d9f92273abaa1357a97ee (diff)
downloadcurrent-20220509213325_15.0.tar.gz
Mon May 9 21:33:25 UTC 202220220509213325_15.0
patches/packages/linux-5.15.38/*: Upgraded. These updates fix various bugs and security issues. Be sure to upgrade your initrd after upgrading the kernel packages. If you use lilo to boot your machine, be sure lilo.conf points to the correct kernel and initrd and run lilo as root to update the bootloader. If you use elilo to boot your machine, you should run eliloconfig to copy the kernel and initrd to the EFI System Partition. For more information, see: Fixed in 5.15.27: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494 Fixed in 5.15.28: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042 Fixed in 5.15.29: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854 Fixed in 5.15.32: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356 Fixed in 5.15.33: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516 Fixed in 5.15.34: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582 Fixed in 5.15.35: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205 Fixed in 5.15.37: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222 (* Security fix *)
-rw-r--r--CHANGES_AND_HINTS.TXT4
-rw-r--r--ChangeLog.rss68
-rw-r--r--ChangeLog.txt56
-rw-r--r--FILELIST.TXT58
-rw-r--r--README_LVM.TXT6
-rw-r--r--patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt (renamed from patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txt)0
-rw-r--r--patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt (renamed from patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txt)0
-rw-r--r--patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt (renamed from patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txt)0
-rw-r--r--patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt (renamed from patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txt)0
-rw-r--r--patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt (renamed from patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txt)0
-rwxr-xr-xrecompress.sh1
-rw-r--r--testing/source/bind/3link.sh136
-rwxr-xr-xtesting/source/bind/bind.SlackBuild180
-rw-r--r--testing/source/bind/caching-example/localhost.zone11
-rw-r--r--testing/source/bind/caching-example/named.conf31
-rw-r--r--testing/source/bind/caching-example/named.local10
-rw-r--r--testing/source/bind/caching-example/named.root92
-rw-r--r--testing/source/bind/default.named12
-rw-r--r--testing/source/bind/doinst.sh38
-rw-r--r--testing/source/bind/rc.bind136
-rw-r--r--testing/source/bind/slack-desc19
-rw-r--r--usb-and-pxe-installers/usbimg2disk.sh4
22 files changed, 825 insertions, 37 deletions
diff --git a/CHANGES_AND_HINTS.TXT b/CHANGES_AND_HINTS.TXT
index 0e7ff1a2..adcc637b 100644
--- a/CHANGES_AND_HINTS.TXT
+++ b/CHANGES_AND_HINTS.TXT
@@ -1,6 +1,6 @@
-This file documents the instructions for upgrading to Slackware -current, the
+This file documents the instructions for upgrading to Slackware 15.0, the
packages added, removed, renamed, and/or split during the development cycle
-from Slackware 14.2 through -current, and some potential "gotchas" that users
+from Slackware 14.2 through 15.0, and some potential "gotchas" that users
can avoid by arming themselves with a little knowledge.
diff --git a/ChangeLog.rss b/ChangeLog.rss
index 3c9b2199..e1ee1742 100644
--- a/ChangeLog.rss
+++ b/ChangeLog.rss
@@ -11,10 +11,74 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
- <pubDate>Wed, 4 May 2022 21:24:57 GMT</pubDate>
- <lastBuildDate>Thu, 5 May 2022 11:29:53 GMT</lastBuildDate>
+ <pubDate>Mon, 9 May 2022 21:33:25 GMT</pubDate>
+ <lastBuildDate>Tue, 10 May 2022 11:29:52 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
+ <title>Mon, 9 May 2022 21:33:25 GMT</title>
+ <pubDate>Mon, 9 May 2022 21:33:25 GMT</pubDate>
+ <link>https://git.slackware.nl/current/tag/?h=20220509213325</link>
+ <guid isPermaLink="false">20220509213325</guid>
+ <description>
+ <![CDATA[<pre>
+patches/packages/linux-5.15.38/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.27:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
+ Fixed in 5.15.28:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
+ Fixed in 5.15.29:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
+ Fixed in 5.15.32:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
+ Fixed in 5.15.33:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
+ Fixed in 5.15.34:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
+ Fixed in 5.15.35:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
+ Fixed in 5.15.37:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
+ (* Security fix *)
+ </pre>]]>
+ </description>
+ </item>
+ <item>
<title>Wed, 4 May 2022 21:24:57 GMT</title>
<pubDate>Wed, 4 May 2022 21:24:57 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20220504212457</link>
diff --git a/ChangeLog.txt b/ChangeLog.txt
index 2c842235..43bec4a6 100644
--- a/ChangeLog.txt
+++ b/ChangeLog.txt
@@ -1,3 +1,59 @@
+Mon May 9 21:33:25 UTC 2022
+patches/packages/linux-5.15.38/*: Upgraded.
+ These updates fix various bugs and security issues.
+ Be sure to upgrade your initrd after upgrading the kernel packages.
+ If you use lilo to boot your machine, be sure lilo.conf points to the correct
+ kernel and initrd and run lilo as root to update the bootloader.
+ If you use elilo to boot your machine, you should run eliloconfig to copy the
+ kernel and initrd to the EFI System Partition.
+ For more information, see:
+ Fixed in 5.15.27:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
+ Fixed in 5.15.28:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
+ Fixed in 5.15.29:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
+ Fixed in 5.15.32:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
+ Fixed in 5.15.33:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
+ Fixed in 5.15.34:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
+ Fixed in 5.15.35:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
+ Fixed in 5.15.37:
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
+ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
+ (* Security fix *)
++--------------------------+
Wed May 4 21:24:57 UTC 2022
patches/packages/mozilla-thunderbird-91.9.0-x86_64-1_slack15.0.txz: Upgraded.
This release contains security fixes and improvements.
diff --git a/FILELIST.TXT b/FILELIST.TXT
index 0d7bd9e3..02e390aa 100644
--- a/FILELIST.TXT
+++ b/FILELIST.TXT
@@ -1,20 +1,20 @@
-Wed May 4 21:29:28 UTC 2022
+Mon May 9 21:37:29 UTC 2022
Here is the file list for this directory. If you are using a
mirror site and find missing or extra files in the disk
subdirectories, please have the archive administrator refresh
the mirror.
-drwxr-xr-x 12 root root 4096 2022-05-04 21:24 .
+drwxr-xr-x 12 root root 4096 2022-05-09 21:33 .
-rw-r--r-- 1 root root 5767 2022-02-02 22:44 ./ANNOUNCE.15.0
-rw-r--r-- 1 root root 16609 2022-03-30 19:03 ./CHANGES_AND_HINTS.TXT
--rw-r--r-- 1 root root 1136954 2022-05-02 20:09 ./CHECKSUMS.md5
--rw-r--r-- 1 root root 163 2022-05-02 20:09 ./CHECKSUMS.md5.asc
+-rw-r--r-- 1 root root 1136946 2022-05-04 21:29 ./CHECKSUMS.md5
+-rw-r--r-- 1 root root 163 2022-05-04 21:29 ./CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 17976 1994-06-10 02:28 ./COPYING
-rw-r--r-- 1 root root 35147 2007-06-30 04:21 ./COPYING3
-rw-r--r-- 1 root root 19573 2016-06-23 20:08 ./COPYRIGHT.TXT
-rw-r--r-- 1 root root 616 2006-10-02 04:37 ./CRYPTO_NOTICE.TXT
--rw-r--r-- 1 root root 1892060 2022-05-04 21:24 ./ChangeLog.txt
+-rw-r--r-- 1 root root 1895211 2022-05-09 21:33 ./ChangeLog.txt
drwxr-xr-x 3 root root 4096 2013-03-20 22:17 ./EFI
drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT
-rw-r--r-- 1 root root 1187840 2021-06-15 19:16 ./EFI/BOOT/bootx64.efi
@@ -25,7 +25,7 @@ drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT
-rwxr-xr-x 1 root root 2504 2019-07-05 18:54 ./EFI/BOOT/make-grub.sh
-rw-r--r-- 1 root root 10722 2013-09-21 19:02 ./EFI/BOOT/osdetect.cfg
-rw-r--r-- 1 root root 1273 2013-08-12 21:08 ./EFI/BOOT/tools.cfg
--rw-r--r-- 1 root root 1484026 2022-05-02 20:09 ./FILELIST.TXT
+-rw-r--r-- 1 root root 1484018 2022-05-04 21:29 ./FILELIST.TXT
-rw-r--r-- 1 root root 1572 2012-08-29 18:27 ./GPG-KEY
-rw-r--r-- 1 root root 864745 2022-02-02 08:25 ./PACKAGES.TXT
-rw-r--r-- 1 root root 8034 2022-02-02 03:36 ./README.TXT
@@ -737,13 +737,13 @@ drwxr-xr-x 2 root root 4096 2008-05-07 05:21 ./pasture/source/php/pear
-rwxr-xr-x 1 root root 9448 2018-05-16 22:38 ./pasture/source/php/php.SlackBuild
-rw-r--r-- 1 root root 775 2017-07-07 19:25 ./pasture/source/php/php.ini-development.diff.gz
-rw-r--r-- 1 root root 830 2005-12-09 05:18 ./pasture/source/php/slack-desc
-drwxr-xr-x 4 root root 4096 2022-05-04 21:29 ./patches
--rw-r--r-- 1 root root 34342 2022-05-04 21:29 ./patches/CHECKSUMS.md5
--rw-r--r-- 1 root root 163 2022-05-04 21:29 ./patches/CHECKSUMS.md5.asc
--rw-r--r-- 1 root root 45957 2022-05-04 21:29 ./patches/FILE_LIST
--rw-r--r-- 1 root root 11380360 2022-05-04 21:29 ./patches/MANIFEST.bz2
--rw-r--r-- 1 root root 25507 2022-05-04 21:29 ./patches/PACKAGES.TXT
-drwxr-xr-x 3 root root 12288 2022-05-04 21:29 ./patches/packages
+drwxr-xr-x 4 root root 4096 2022-05-09 21:37 ./patches
+-rw-r--r-- 1 root root 34342 2022-05-09 21:37 ./patches/CHECKSUMS.md5
+-rw-r--r-- 1 root root 163 2022-05-09 21:37 ./patches/CHECKSUMS.md5.asc
+-rw-r--r-- 1 root root 45957 2022-05-09 21:37 ./patches/FILE_LIST
+-rw-r--r-- 1 root root 11355989 2022-05-09 21:37 ./patches/MANIFEST.bz2
+-rw-r--r-- 1 root root 25507 2022-05-09 21:37 ./patches/PACKAGES.TXT
+drwxr-xr-x 3 root root 12288 2022-05-09 21:31 ./patches/packages
-rw-r--r-- 1 root root 327 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txt
-rw-r--r-- 1 root root 10716 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz.asc
@@ -798,22 +798,22 @@ drwxr-xr-x 3 root root 12288 2022-05-04 21:29 ./patches/packages
-rw-r--r-- 1 root root 219 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 375568 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz.asc
-drwxr-xr-x 2 root root 4096 2022-03-09 04:17 ./patches/packages/linux-5.15.27
--rw-r--r-- 1 root root 624 2022-03-09 00:47 ./patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txt
--rw-r--r-- 1 root root 8211832 2022-03-09 00:47 ./patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txz
--rw-r--r-- 1 root root 163 2022-03-09 00:47 ./patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txz.asc
--rw-r--r-- 1 root root 332 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txt
--rw-r--r-- 1 root root 1078476 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txz
--rw-r--r-- 1 root root 163 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txz.asc
--rw-r--r-- 1 root root 636 2022-03-09 00:44 ./patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txt
--rw-r--r-- 1 root root 12151252 2022-03-09 00:44 ./patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txz
--rw-r--r-- 1 root root 163 2022-03-09 00:44 ./patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txz.asc
--rw-r--r-- 1 root root 567 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txt
--rw-r--r-- 1 root root 50251840 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txz
--rw-r--r-- 1 root root 163 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txz.asc
--rw-r--r-- 1 root root 317 2022-03-09 00:40 ./patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txt
--rw-r--r-- 1 root root 122960152 2022-03-09 00:40 ./patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txz
--rw-r--r-- 1 root root 163 2022-03-09 00:40 ./patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txz.asc
+drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15.38
+-rw-r--r-- 1 root root 624 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt
+-rw-r--r-- 1 root root 8218112 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz.asc
+-rw-r--r-- 1 root root 332 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt
+-rw-r--r-- 1 root root 1078936 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz
+-rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz.asc
+-rw-r--r-- 1 root root 636 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt
+-rw-r--r-- 1 root root 12157884 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz.asc
+-rw-r--r-- 1 root root 567 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt
+-rw-r--r-- 1 root root 50239932 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz
+-rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz.asc
+-rw-r--r-- 1 root root 317 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt
+-rw-r--r-- 1 root root 123035916 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz
+-rw-r--r-- 1 root root 163 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz.asc
-rw-r--r-- 1 root root 369 2022-02-21 03:37 ./patches/packages/mariadb-10.5.15-x86_64-2_slack15.0.txt
-rw-r--r-- 1 root root 29262352 2022-02-21 03:37 ./patches/packages/mariadb-10.5.15-x86_64-2_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-02-21 03:37 ./patches/packages/mariadb-10.5.15-x86_64-2_slack15.0.txz.asc
diff --git a/README_LVM.TXT b/README_LVM.TXT
index 93aa4e42..85b894a9 100644
--- a/README_LVM.TXT
+++ b/README_LVM.TXT
@@ -103,9 +103,9 @@ We are going to 'chroot' into our fresh installation:
Next, while we are in the chroot, create the initrd with LVM support -
in the example command line I assume that the root filesystem is 'ext4',
we used the LV '/dev/myvg/root' as the root device, and are running the
-Slackware 14.2 default kernel '4.4.14':
+Slackware 15.0 default kernel '5.15.19':
- # mkinitrd -c -k 4.4.14 -m ext4 -f ext4 -r /dev/myvg/root -L
+ # mkinitrd -c -k 5.15.19 -m ext4 -f ext4 -r /dev/myvg/root -L
The resulting initrd image will be written to the file '/boot/initrd.gz'
by default. We still need to tell lilo about this initrd, so open the
@@ -117,7 +117,7 @@ filename added by 'liloconfig' is '/boot/vmlinuz' which is a symbolic link to
the huge SMP kernel. Remember that we need a 'generic' kernel with the initrd.
The end result should look somewhat like this:
- image = /boot/vmlinuz-generic-4.4.14
+ image = /boot/vmlinuz-generic-5.15.19
initrd = /boot/initrd.gz
root = /dev/myvg/root
label = linux
diff --git a/patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txt b/patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt
index 975a5ba6..975a5ba6 100644
--- a/patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txt
+++ b/patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt
diff --git a/patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txt b/patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt
index 27b46a0e..27b46a0e 100644
--- a/patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txt
+++ b/patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt
diff --git a/patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txt b/patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt
index 2d617061..2d617061 100644
--- a/patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txt
+++ b/patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt
diff --git a/patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txt b/patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt
index 9a944104..9a944104 100644
--- a/patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txt
+++ b/patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt
diff --git a/patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txt b/patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt
index eb2b0a30..eb2b0a30 100644
--- a/patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txt
+++ b/patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt
diff --git a/recompress.sh b/recompress.sh
index 5c28f066..27dc6f9c 100755
--- a/recompress.sh
+++ b/recompress.sh
@@ -1161,6 +1161,7 @@ gzip ./source/x/ibus/doinst.sh
gzip ./source/x/ibus/emoji-test.txt
gzip ./source/x/xcm/xcm.udev.rules.diff
gzip ./source/x/libva/doinst.sh
+gzip ./testing/source/bind/doinst.sh
gzip ./patches/source/bluez/bluez-5.51-obexd_without_systemd-1.patch
gzip ./patches/source/bluez/doinst.sh
gzip ./patches/source/mozilla-thunderbird/autoconf/autoconf-2.13-consolidated_fixes-1.patch
diff --git a/testing/source/bind/3link.sh b/testing/source/bind/3link.sh
new file mode 100644
index 00000000..ec8ba4d1
--- /dev/null
+++ b/testing/source/bind/3link.sh
@@ -0,0 +1,136 @@
+rm -f lwres_addr_parse.3
+ln -sf lwres_resutil.3 lwres_addr_parse.3
+rm -f lwres_buffer_add.3
+ln -sf lwres_buffer.3 lwres_buffer_add.3
+rm -f lwres_buffer_back.3
+ln -sf lwres_buffer.3 lwres_buffer_back.3
+rm -f lwres_buffer_clear.3
+ln -sf lwres_buffer.3 lwres_buffer_clear.3
+rm -f lwres_buffer_first.3
+ln -sf lwres_buffer.3 lwres_buffer_first.3
+rm -f lwres_buffer_forward.3
+ln -sf lwres_buffer.3 lwres_buffer_forward.3
+rm -f lwres_buffer_getmem.3
+ln -sf lwres_buffer.3 lwres_buffer_getmem.3
+rm -f lwres_buffer_getuint16.3
+ln -sf lwres_buffer.3 lwres_buffer_getuint16.3
+rm -f lwres_buffer_getuint32.3
+ln -sf lwres_buffer.3 lwres_buffer_getuint32.3
+rm -f lwres_buffer_getuint8.3
+ln -sf lwres_buffer.3 lwres_buffer_getuint8.3
+rm -f lwres_buffer_init.3
+ln -sf lwres_buffer.3 lwres_buffer_init.3
+rm -f lwres_buffer_invalidate.3
+ln -sf lwres_buffer.3 lwres_buffer_invalidate.3
+rm -f lwres_buffer_putmem.3
+ln -sf lwres_buffer.3 lwres_buffer_putmem.3
+rm -f lwres_buffer_putuint16.3
+ln -sf lwres_buffer.3 lwres_buffer_putuint16.3
+rm -f lwres_buffer_putuint32.3
+ln -sf lwres_buffer.3 lwres_buffer_putuint32.3
+rm -f lwres_buffer_putuint8.3
+ln -sf lwres_buffer.3 lwres_buffer_putuint8.3
+rm -f lwres_buffer_subtract.3
+ln -sf lwres_buffer.3 lwres_buffer_subtract.3
+rm -f lwres_conf_clear.3
+ln -sf lwres_config.3 lwres_conf_clear.3
+rm -f lwres_conf_get.3
+ln -sf lwres_config.3 lwres_conf_get.3
+rm -f lwres_conf_init.3
+ln -sf lwres_config.3 lwres_conf_init.3
+rm -f lwres_conf_parse.3
+ln -sf lwres_config.3 lwres_conf_parse.3
+rm -f lwres_conf_print.3
+ln -sf lwres_config.3 lwres_conf_print.3
+rm -f lwres_context_allocmem.3
+ln -sf lwres_context.3 lwres_context_allocmem.3
+rm -f lwres_context_create.3
+ln -sf lwres_context.3 lwres_context_create.3
+rm -f lwres_context_destroy.3
+ln -sf lwres_context.3 lwres_context_destroy.3
+rm -f lwres_context_freemem.3
+ln -sf lwres_context.3 lwres_context_freemem.3
+rm -f lwres_context_initserial.3
+ln -sf lwres_context.3 lwres_context_initserial.3
+rm -f lwres_context_nextserial.3
+ln -sf lwres_context.3 lwres_context_nextserial.3
+rm -f lwres_context_sendrecv.3
+ln -sf lwres_context.3 lwres_context_sendrecv.3
+rm -f lwres_endhostent.3
+ln -sf lwres_gethostent.3 lwres_endhostent.3
+rm -f lwres_endhostent_r.3
+ln -sf lwres_gethostent.3 lwres_endhostent_r.3
+rm -f lwres_freeaddrinfo.3
+ln -sf lwres_getaddrinfo.3 lwres_freeaddrinfo.3
+rm -f lwres_freehostent.3
+ln -sf lwres_getipnode.3 lwres_freehostent.3
+rm -f lwres_gabnrequest_free.3
+ln -sf lwres_gabn.3 lwres_gabnrequest_free.3
+rm -f lwres_gabnrequest_parse.3
+ln -sf lwres_gabn.3 lwres_gabnrequest_parse.3
+rm -f lwres_gabnrequest_render.3
+ln -sf lwres_gabn.3 lwres_gabnrequest_render.3
+rm -f lwres_gabnresponse_free.3
+ln -sf lwres_gabn.3 lwres_gabnresponse_free.3
+rm -f lwres_gabnresponse_parse.3
+ln -sf lwres_gabn.3 lwres_gabnresponse_parse.3
+rm -f lwres_gabnresponse_render.3
+ln -sf lwres_gabn.3 lwres_gabnresponse_render.3
+rm -f lwres_getaddrsbyname.3
+ln -sf lwres_resutil.3 lwres_getaddrsbyname.3
+rm -f lwres_gethostbyaddr.3
+ln -sf lwres_gethostent.3 lwres_gethostbyaddr.3
+rm -f lwres_gethostbyaddr_r.3
+ln -sf lwres_gethostent.3 lwres_gethostbyaddr_r.3
+rm -f lwres_gethostbyname.3
+ln -sf lwres_gethostent.3 lwres_gethostbyname.3
+rm -f lwres_gethostbyname2.3
+ln -sf lwres_gethostent.3 lwres_gethostbyname2.3
+rm -f lwres_gethostbyname_r.3
+ln -sf lwres_gethostent.3 lwres_gethostbyname_r.3
+rm -f lwres_gethostent_r.3
+ln -sf lwres_gethostent.3 lwres_gethostent_r.3
+rm -f lwres_getipnodebyaddr.3
+ln -sf lwres_getipnode.3 lwres_getipnodebyaddr.3
+rm -f lwres_getipnodebyname.3
+ln -sf lwres_getipnode.3 lwres_getipnodebyname.3
+rm -f lwres_getnamebyaddr.3
+ln -sf lwres_resutil.3 lwres_getnamebyaddr.3
+rm -f lwres_gnbarequest_free.3
+ln -sf lwres_gnba.3 lwres_gnbarequest_free.3
+rm -f lwres_gnbarequest_parse.3
+ln -sf lwres_gnba.3 lwres_gnbarequest_parse.3
+rm -f lwres_gnbarequest_render.3
+ln -sf lwres_gnba.3 lwres_gnbarequest_render.3
+rm -f lwres_gnbaresponse_free.3
+ln -sf lwres_gnba.3 lwres_gnbaresponse_free.3
+rm -f lwres_gnbaresponse_parse.3
+ln -sf lwres_gnba.3 lwres_gnbaresponse_parse.3
+rm -f lwres_gnbaresponse_render.3
+ln -sf lwres_gnba.3 lwres_gnbaresponse_render.3
+rm -f lwres_herror.3
+ln -sf lwres_hstrerror.3 lwres_herror.3
+rm -f lwres_lwpacket_parseheader.3
+ln -sf lwres_packet.3 lwres_lwpacket_parseheader.3
+rm -f lwres_lwpacket_renderheader.3
+ln -sf lwres_packet.3 lwres_lwpacket_renderheader.3
+rm -f lwres_net_ntop.3
+ln -sf lwres_inetntop.3 lwres_net_ntop.3
+rm -f lwres_nooprequest_free.3
+ln -sf lwres_noop.3 lwres_nooprequest_free.3
+rm -f lwres_nooprequest_parse.3
+ln -sf lwres_noop.3 lwres_nooprequest_parse.3
+rm -f lwres_nooprequest_render.3
+ln -sf lwres_noop.3 lwres_nooprequest_render.3
+rm -f lwres_noopresponse_free.3
+ln -sf lwres_noop.3 lwres_noopresponse_free.3
+rm -f lwres_noopresponse_parse.3
+ln -sf lwres_noop.3 lwres_noopresponse_parse.3
+rm -f lwres_noopresponse_render.3
+ln -sf lwres_noop.3 lwres_noopresponse_render.3
+rm -f lwres_sethostent.3
+ln -sf lwres_gethostent.3 lwres_sethostent.3
+rm -f lwres_sethostent_r.3
+ln -sf lwres_gethostent.3 lwres_sethostent_r.3
+rm -f lwres_string_parse.3
+ln -sf lwres_resutil.3 lwres_string_parse.3
diff --git a/testing/source/bind/bind.SlackBuild b/testing/source/bind/bind.SlackBuild
new file mode 100755
index 00000000..7884f183
--- /dev/null
+++ b/testing/source/bind/bind.SlackBuild
@@ -0,0 +1,180 @@
+#!/bin/bash
+
+# Copyright 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2018, 2019, 2020, 2021 Patrick J. Volkerding, Sebeka, MN, USA
+# All rights reserved.
+#
+# Redistribution and use of this script, with or without modification, is
+# permitted provided that the following conditions are met:
+#
+# 1. Redistributions of this script must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+#
+# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
+# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
+# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
+# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
+# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
+# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
+# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+cd $(dirname $0) ; CWD=$(pwd)
+
+PKGNAM=bind
+VERSION=${VERSION:-$(echo ${PKGNAM}-[0-9]*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
+BUILD=${BUILD:-1_slack15.0}
+
+# Automatically determine the architecture we're building on:
+if [ -z "$ARCH" ]; then
+ case "$( uname -m )" in
+ i?86) export ARCH=i586 ;;
+ arm*) export ARCH=arm ;;
+ # Unless $ARCH is already set, use uname -m for all other archs:
+ *) export ARCH=$( uname -m ) ;;
+ esac
+fi
+
+# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
+# the name of the created package would be, and then exit. This information
+# could be useful to other scripts.
+if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
+ echo "$PKGNAM-$(echo $VERSION | tr - _)-$ARCH-$BUILD.txz"
+ exit 0
+fi
+
+NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
+
+TMP=${TMP:-/tmp}
+PKG=$TMP/package-${PKGNAM}
+rm -rf $PKG
+mkdir -p $TMP $PKG/etc/default
+
+if [ "$ARCH" = "i586" ]; then
+ SLKCFLAGS="-O2 -march=i586 -mtune=i686"
+ LIBDIRSUFFIX=""
+elif [ "$ARCH" = "s390" ]; then
+ SLKCFLAGS="-O2"
+ LIBDIRSUFFIX=""
+elif [ "$ARCH" = "x86_64" ]; then
+ SLKCFLAGS="-O2 -fPIC"
+ LIBDIRSUFFIX="64"
+fi
+
+cd $TMP
+rm -rf ${PKGNAM}-${VERSION}
+tar xvf $CWD/${PKGNAM}-$VERSION.tar.?z || exit 1
+cd ${PKGNAM}-$VERSION || exit 1
+
+# Make sure ownerships and permissions are sane:
+chown -R root:root .
+find . \
+ \( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \
+ -exec chmod 755 {} \+ -o \
+ \( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
+ -exec chmod 644 {} \+
+
+# Detect krb5:
+if ls /lib*/libgssapi_krb5* 1> /dev/null 2> /dev/null ; then
+ GSSAPI=" --with-gssapi "
+else
+ GSSAPI=" "
+fi
+
+# Configure:
+CFLAGS="$SLKCFLAGS" \
+./configure \
+ --prefix=/usr \
+ --libdir=/usr/lib${LIBDIRSUFFIX} \
+ --sysconfdir=/etc \
+ --localstatedir=/var \
+ --with-libtool \
+ --with-libidn2 \
+ --with-python=/usr/bin/python3 \
+ --mandir=/usr/man \
+ --enable-shared \
+ --disable-static \
+ --with-openssl=/usr \
+ $GSSAPI \
+ --build=$ARCH-slackware-linux || exit 1
+
+# Build and install:
+make $NUMJOBS || make || exit 1
+make install DESTDIR=$PKG || exit 1
+
+# Don't ship .la files:
+rm -f $PKG/{,usr/}lib${LIBDIRSUFFIX}/*.la
+
+# These probably were not supposed to be installed:
+find . -name .deps -exec rm -rf "{}" \;
+find . -name .libs -exec rm -rf "{}" \;
+
+# We like symlinks.
+( cd $PKG/usr/sbin
+ ln -sf named lwresd
+)
+
+# We like a lot of symlinks.
+if [ -d $PKG/usr/man/man3 ]; then
+ ( cd $PKG/usr/man/man3
+ sh $CWD/3link.sh
+ )
+fi
+
+# Install init script:
+mkdir -p $PKG/etc/rc.d
+cp -a $CWD/rc.bind $PKG/etc/rc.d/rc.bind.new
+chmod 644 $PKG/etc/rc.d/rc.bind.new
+
+# Install default options file for named:
+cat $CWD/default.named > $PKG/etc/default/named.new
+
+# Fix library perms:
+chmod 755 $PKG/usr/lib${LIBDIRSUFFIX}/*
+
+# Strip binaries:
+find $PKG | xargs file | grep -e "executable" -e "shared object" | grep ELF \
+ | cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
+
+# Compress manual pages:
+find $PKG/usr/man -type f -exec gzip -9 {} \+
+for i in $( find $PKG/usr/man -type l ) ; do
+ ln -s $( readlink $i ).gz $i.gz
+ rm $i
+done
+
+# Add a documentation directory:
+mkdir -p $PKG/usr/doc/${PKGNAM}-$VERSION
+cp -a \
+ CHANGES COPYRIGHT FAQ* README* \
+ doc/arm doc/misc \
+ $PKG/usr/doc/${PKGNAM}-$VERSION
+
+# This one should have the correct perms of the config file:
+if [ -r $PKG/usr/doc/${PKGNAM}-$VERSION/misc/rndc.conf-sample ]; then
+ chmod 644 $PKG/usr/doc/${PKGNAM}-$VERSION/misc/rndc.conf-sample
+fi
+
+# One format of this is plenty. Especially get rid of the bloated PDF.
+( cd $PKG/usr/doc/bind-$VERSION/arm
+ rm -f Makefile* *.pdf *.xml README.SGML latex-fixup.pl
+)
+
+# Add sample config files for a simple caching nameserver:
+mkdir -p $PKG/var/named/caching-example
+cat $CWD/caching-example/named.conf > $PKG/etc/named.conf.new
+cat $CWD/caching-example/localhost.zone > $PKG/var/named/caching-example/localhost.zone
+cat $CWD/caching-example/named.local > $PKG/var/named/caching-example/named.local
+cat $CWD/caching-example/named.root > $PKG/var/named/caching-example/named.root
+# This name is deprecated, but having it here doesn't hurt in case
+# an old configuration file wants it:
+cat $CWD/caching-example/named.root > $PKG/var/named/caching-example/named.ca
+
+mkdir -p $PKG/install
+zcat $CWD/doinst.sh.gz > $PKG/install/doinst.sh
+cat $CWD/slack-desc > $PKG/install/slack-desc
+
+cd $PKG
+/sbin/makepkg -l y -c n $TMP/${PKGNAM}-$(echo $VERSION | tr - _)-$ARCH-$BUILD.txz
+
diff --git a/testing/source/bind/caching-example/localhost.zone b/testing/source/bind/caching-example/localhost.zone
new file mode 100644
index 00000000..c47baf5f
--- /dev/null
+++ b/testing/source/bind/caching-example/localhost.zone
@@ -0,0 +1,11 @@
+$TTL 86400
+$ORIGIN localhost.
+@ 1D IN SOA @ root (
+ 42 ; serial (d. adams)
+ 3H ; refresh
+ 15M ; retry
+ 1W ; expiry
+ 1D ) ; minimum
+
+ 1D IN NS @
+ 1D IN A 127.0.0.1
diff --git a/testing/source/bind/caching-example/named.conf b/testing/source/bind/caching-example/named.conf
new file mode 100644
index 00000000..a8ee2795
--- /dev/null
+++ b/testing/source/bind/caching-example/named.conf
@@ -0,0 +1,31 @@
+options {
+ directory "/var/named";
+ /*
+ * If there is a firewall between you and nameservers you want
+ * to talk to, you might need to uncomment the query-source
+ * directive below. Previous versions of BIND always asked
+ * questions using port 53, but BIND 8.1 uses an unprivileged
+ * port by default.
+ */
+ // query-source address * port 53;
+};
+
+//
+// a caching only nameserver config
+//
+zone "." IN {
+ type hint;
+ file "caching-example/named.root";
+};
+
+zone "localhost" IN {
+ type master;
+ file "caching-example/localhost.zone";
+ allow-update { none; };
+};
+
+zone "0.0.127.in-addr.arpa" IN {
+ type master;
+ file "caching-example/named.local";
+ allow-update { none; };
+};
diff --git a/testing/source/bind/caching-example/named.local b/testing/source/bind/caching-example/named.local
new file mode 100644
index 00000000..8f40bcf3
--- /dev/null
+++ b/testing/source/bind/caching-example/named.local
@@ -0,0 +1,10 @@
+$TTL 86400
+@ IN SOA localhost. root.localhost. (
+ 2011032500 ; Serial
+ 28800 ; Refresh
+ 14400 ; Retry
+ 3600000 ; Expire
+ 86400 ) ; Minimum
+ IN NS localhost.
+
+1 IN PTR localhost.
diff --git a/testing/source/bind/caching-example/named.root b/testing/source/bind/caching-example/named.root
new file mode 100644
index 00000000..dba9ed9e
--- /dev/null
+++ b/testing/source/bind/caching-example/named.root
@@ -0,0 +1,92 @@
+; This file holds the information on root name servers needed to
+; initialize cache of Internet domain name servers
+; (e.g. reference this file in the "cache . <file>"
+; configuration file of BIND domain name servers).
+;
+; This file is made available by InterNIC
+; under anonymous FTP as
+; file /domain/named.cache
+; on server FTP.INTERNIC.NET
+; -OR- RS.INTERNIC.NET
+;
+; last update: July 30, 2019
+; related version of root zone: 2019073000
+;
+; FORMERLY NS.INTERNIC.NET
+;
+. 3600000 NS A.ROOT-SERVERS.NET.
+A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4
+A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:ba3e::2:30
+;
+; FORMERLY NS1.ISI.EDU
+;
+. 3600000 NS B.ROOT-SERVERS.NET.
+B.ROOT-SERVERS.NET. 3600000 A 199.9.14.201
+B.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:200::b
+;
+; FORMERLY C.PSI.NET
+;
+. 3600000 NS C.ROOT-SERVERS.NET.
+C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12
+C.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2::c
+;
+; FORMERLY TERP.UMD.EDU
+;
+. 3600000 NS D.ROOT-SERVERS.NET.
+D.ROOT-SERVERS.NET. 3600000 A 199.7.91.13
+D.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2d::d
+;
+; FORMERLY NS.NASA.GOV
+;
+. 3600000 NS E.ROOT-SERVERS.NET.
+E.ROOT-SERVERS.NET. 3600000 A 192.203.230.10
+E.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:a8::e
+;
+; FORMERLY NS.ISC.ORG
+;
+. 3600000 NS F.ROOT-SERVERS.NET.
+F.ROOT-SERVERS.NET. 3600000 A 192.5.5.241
+F.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2f::f
+;
+; FORMERLY NS.NIC.DDN.MIL
+;
+. 3600000 NS G.ROOT-SERVERS.NET.
+G.ROOT-SERVERS.NET. 3600000 A 192.112.36.4
+G.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:12::d0d
+;
+; FORMERLY AOS.ARL.ARMY.MIL
+;
+. 3600000 NS H.ROOT-SERVERS.NET.
+H.ROOT-SERVERS.NET. 3600000 A 198.97.190.53
+H.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:1::53
+;
+; FORMERLY NIC.NORDU.NET
+;
+. 3600000 NS I.ROOT-SERVERS.NET.
+I.ROOT-SERVERS.NET. 3600000 A 192.36.148.17
+I.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fe::53
+;
+; OPERATED BY VERISIGN, INC.
+;
+. 3600000 NS J.ROOT-SERVERS.NET.
+J.ROOT-SERVERS.NET. 3600000 A 192.58.128.30
+J.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:c27::2:30
+;
+; OPERATED BY RIPE NCC
+;
+. 3600000 NS K.ROOT-SERVERS.NET.
+K.ROOT-SERVERS.NET. 3600000 A 193.0.14.129
+K.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fd::1
+;
+; OPERATED BY ICANN
+;
+. 3600000 NS L.ROOT-SERVERS.NET.
+L.ROOT-SERVERS.NET. 3600000 A 199.7.83.42
+L.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:9f::42
+;
+; OPERATED BY WIDE
+;
+. 3600000 NS M.ROOT-SERVERS.NET.
+M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33
+M.ROOT-SERVERS.NET. 3600000 AAAA 2001:dc3::35
+; End of file \ No newline at end of file
diff --git a/testing/source/bind/default.named b/testing/source/bind/default.named
new file mode 100644
index 00000000..50e18664
--- /dev/null
+++ b/testing/source/bind/default.named
@@ -0,0 +1,12 @@
+# User to run named as:
+NAMED_USER=named
+
+# Group to use for chowning named related files and directories.
+# By default, named will also run as the primary group of $NAMED_USER,
+# which will usually be the same as what's listed below, but not
+# necessarily if something other than the default of "named" is used.
+NAMED_GROUP=named
+
+# Options to run named with. At least -u $NAMED_USER is required, but
+# additional options may be added if needed.
+NAMED_OPTIONS="-u $NAMED_USER"
diff --git a/testing/source/bind/doinst.sh b/testing/source/bind/doinst.sh
new file mode 100644
index 00000000..0e90be64
--- /dev/null
+++ b/testing/source/bind/doinst.sh
@@ -0,0 +1,38 @@
+#!/bin/sh
+config() {
+ NEW="$1"
+ OLD="`dirname $NEW`/`basename $NEW .new`"
+ # If there's no config file by that name, mv it over:
+ if [ ! -r $OLD ]; then
+ mv $NEW $OLD
+ elif [ "`cat $OLD | md5sum`" = "`cat $NEW | md5sum`" ]; then # toss the redundant copy
+ rm $NEW
+ fi
+ # Otherwise, we leave the .new copy for the admin to consider...
+}
+
+# Keep same perms on rc.bind.new:
+if [ -e etc/rc.d/rc.bind ]; then
+ cp -a etc/rc.d/rc.bind etc/rc.d/rc.bind.new.incoming
+ cat etc/rc.d/rc.bind.new > etc/rc.d/rc.bind.new.incoming
+ mv etc/rc.d/rc.bind.new.incoming etc/rc.d/rc.bind.new
+fi
+
+config etc/default/named.new
+config etc/named.conf.new
+config etc/rc.d/rc.bind.new
+
+# Add a /var/named if it doesn't exist:
+if [ ! -d var/named ]; then
+ mkdir -p var/named
+ chmod 755 var/named
+fi
+
+# Generate /etc/rndc.key if there's none there,
+# and there's also no /etc/rndc.conf (the other
+# way to set this up).
+if [ ! -r etc/rndc.key -a ! -r /etc/rndc.conf ]; then
+ chroot . /sbin/ldconfig
+ chroot . /usr/sbin/rndc-confgen -a 2> /dev/null
+ chroot . /bin/chown named:named /etc/rndc.key 2> /dev/null
+fi
diff --git a/testing/source/bind/rc.bind b/testing/source/bind/rc.bind
new file mode 100644
index 00000000..169db812
--- /dev/null
+++ b/testing/source/bind/rc.bind
@@ -0,0 +1,136 @@
+#!/bin/sh
+# Start/stop/restart the BIND name server daemon (named).
+
+# Start BIND. By default this will run with user "named". If you'd like to
+# change this or other options, see: /etc/default/named
+
+# You might also consider running BIND in a "chroot jail",
+# a discussion of which may be found in
+# /usr/doc/Linux-HOWTOs/Chroot-BIND-HOWTO.
+
+# One last note: rndc has a lot of other nice features that it is not
+# within the scope of this start/stop/restart script to support.
+# For more details, see "man rndc" or just type "rndc" to see the options.
+
+# Load command defaults:
+if [ -f /etc/default/named ] ; then . /etc/default/named ; fi
+if [ -f /etc/default/rndc ] ; then . /etc/default/rndc ; fi
+
+# In case /etc/default/named was missing, provide fallbacks:
+if [ -z "$NAMED_USER" ]; then
+ NAMED_USER="named"
+fi
+if [ -z "$NAMED_GROUP" ]; then
+ NAMED_GROUP="named"
+fi
+if [ -z "$NAMED_OPTIONS" ]; then
+ NAMED_OPTIONS="-u $NAMED_USER"
+fi
+
+# Sanity check. If /usr/sbin/named is missing then it
+# doesn't make much sense to try to run this script:
+if [ ! -x /usr/sbin/named ]; then
+ echo "/etc/rc.d/rc.bind: no /usr/sbin/named found (or not executable); cannot start."
+ exit 1
+fi
+
+# Start BIND. As many times as you like. ;-)
+# Seriously, don't run "rc.bind start" if BIND is already
+# running or you'll get more than one copy running.
+bind_start() {
+ # Make sure /var/run/named exists:
+ mkdir -p /var/run/named
+ # Make sure that /var/run/named has correct ownership:
+ chown -R ${NAMED_USER}:${NAMED_GROUP} /var/run/named
+ # Make sure that /var/named has correct ownership:
+ chown -R ${NAMED_USER}:${NAMED_GROUP} /var/named
+ if [ -r /etc/rndc.key ]; then
+ # Make sure that /etc/rndc.key has correct ownership:
+ chown ${NAMED_USER}:${NAMED_GROUP} /etc/rndc.key
+ fi
+ # Start named:
+ if [ -x /usr/sbin/named ]; then
+ echo "Starting BIND: /usr/sbin/named $NAMED_OPTIONS"
+ /usr/sbin/named $NAMED_OPTIONS
+ sleep 1
+ fi
+ # Make sure that named started:
+ if ! ps axc | grep -q named ; then
+ echo "WARNING: named did not start."
+ echo "Attempting to start named again: /usr/sbin/named $NAMED_OPTIONS"
+ /usr/sbin/named $NAMED_OPTIONS
+ sleep 1
+ if ps axc | grep -q named ; then
+ echo "SUCCESS: named started."
+ else
+ echo "FAILED: Sorry, a second attempt to start named has also failed."
+ echo "There may be a configuration error that needs fixing. Good luck!"
+ fi
+ fi
+}
+
+# Stop all running copies of BIND (/usr/sbin/named):
+bind_stop() {
+ # If you've set up rndc, we can use this to make shutting down BIND faster.
+ # If you have /etc/rndc.conf, or you have /etc/rndc.key, or $RNDC_OPTIONS is
+ # not empty, we'll try it.
+ if [ -r /etc/rndc.conf -o -r /etc/rndc.key -o ! -z "$RNDC_OPTIONS" ]; then
+ if [ -z "$RNDC_OPTIONS" ]; then
+ echo "Stopping BIND: /usr/sbin/rndc stop"
+ else
+ echo "Stopping BIND: /usr/sbin/rndc $RNDC_OPTIONS stop"
+ fi
+ /usr/sbin/rndc $RNDC_OPTIONS stop
+ # Wait for up to $TIMEOUT seconds before moving on to try killall:
+ TIMEOUT=${TIMEOUT:-10}
+ while [ "$TIMEOUT" -gt "0" ]; do
+ # Exit the timeout loop if there are no named processes:
+ if ! ps axco command | grep -q -e "^named$"; then
+ break
+ fi
+ sleep 1
+ TIMEOUT=$(expr $TIMEOUT - 1)
+ done
+ fi
+ # Kill named processes if there are any running:
+ if ps axco command | grep -q -e "^named$"; then
+ echo "Stopping all named processes in this namespace: /bin/killall -SIGTERM --ns \$\$ named"
+ /bin/killall -SIGTERM --ns $$ named 2> /dev/null
+ fi
+}
+
+# Reload BIND:
+bind_reload() {
+ /usr/sbin/rndc $RNDC_OPTIONS reload
+}
+
+# Restart BIND:
+bind_restart() {
+ bind_stop
+ bind_start
+}
+
+# Get BIND status:
+bind_status() {
+ /usr/sbin/rndc $RNDC_OPTIONS status
+}
+
+case "$1" in
+'start')
+ bind_start
+ ;;
+'stop')
+ bind_stop
+ ;;
+'reload')
+ bind_reload
+ ;;
+'restart')
+ bind_restart
+ ;;
+'status')
+ bind_status
+ ;;
+*)
+ echo "usage $0 start|stop|reload|restart|status"
+esac
diff --git a/testing/source/bind/slack-desc b/testing/source/bind/slack-desc
new file mode 100644
index 00000000..b4fcc825
--- /dev/null
+++ b/testing/source/bind/slack-desc
@@ -0,0 +1,19 @@
+# HOW TO EDIT THIS FILE:
+# The "handy ruler" below makes it easier to edit a package description. Line
+# up the first '|' above the ':' following the base package name, and the '|'
+# on the right side marks the last column you can put a character in. You must
+# make exactly 11 lines for the formatting to be correct. It's also
+# customary to leave one space after the ':'.
+
+ |-----handy-ruler------------------------------------------------------|
+bind: bind (DNS server and utilities)
+bind:
+bind: The named daemon and support utilities such as dig, host, and
+bind: nslookup. Sample configuration files for running a simple caching
+bind: nameserver are included. Documentation for advanced name server
+bind: setup can be found in /usr/doc/bind-9.x.x/.
+bind:
+bind:
+bind:
+bind:
+bind:
diff --git a/usb-and-pxe-installers/usbimg2disk.sh b/usb-and-pxe-installers/usbimg2disk.sh
index fe130f67..74b0f3cb 100644
--- a/usb-and-pxe-installers/usbimg2disk.sh
+++ b/usb-and-pxe-installers/usbimg2disk.sh
@@ -218,6 +218,8 @@ if [ -n "$REPODIR" ]; then
# This also takes care of stripping a trailing '/', which is required
# for the rsync command to work as intended:
REPOSROOT="$(cd $(dirname $REPODIR); pwd)/$(basename $REPODIR)"
+ # Use this to set the space requirement:
+ MININSFREE=$(expr $(du -s ${REPOSROOT}/slackware* | cut -f 1) / 1024)
fi
fi
@@ -237,7 +239,7 @@ else
fi
# Prepare the environment:
-MININSFREE=2200 # minimum in MB required for a Slackware tree
+MININSFREE=${MININSFREE:-3134} # minimum in MB required for a Slackware tree
UNATTENDED=${UNATTENDED:-0} # unattended means: never ask questions.
REFORMAT=${REFORMAT:-0} # do not try to reformat by default
LOGFILE=${LOGFILE:-/dev/null} # silence by default