slackware-current/slackware64/k/maketag.ez

47 lines
1.1 KiB
Text
Raw Normal View History

#!/bin/sh
TMP=/var/log/setup/tmp
if [ ! -d $TMP ]; then
mkdir -p $TMP
fi
add() {
for package in $* ; do
echo "$package: ADD" >> $TMP/SeTnewtag
done
}
skip() {
for package in $* ; do
echo "$package: SKP" >> $TMP/SeTnewtag
done
}
#item ####description ###on off ###
cat /dev/null > $TMP/SeTnewtag
dialog --title "SELECTING SOFTWARE FROM SERIES K (Linux kernel source)" \
--checklist "Please confirm the packages you wish to install \
from series K. Use the UP/DOWN keys to scroll through the list, and \
the SPACE key to deselect any items you don't want to install. \
Press ENTER when you are \
done." 11 70 1 \
Wed Jan 6 22:59:38 UTC 2021 a/kernel-generic-5.10.5-x86_64-1.txz: Upgraded. a/kernel-huge-5.10.5-x86_64-1.txz: Upgraded. a/kernel-modules-5.10.5-x86_64-1.txz: Upgraded. d/kernel-headers-5.10.5-x86-1.txz: Upgraded. d/meson-0.56.1-x86_64-1.txz: Upgraded. k/kernel-source-5.10.5-noarch-1.txz: Upgraded. We'll turn off the silent stream feature as there's a known deadlock bug that remains in 5.10.5. Perhaps we'll restore it once that's patched... but we made it this far without the feature so I'll probably wait for a case to be made for it. Thanks to Petri Kaukasoina. Also build the intelfb module. This doesn't have anything to do with the lockups occurring on Intel systems, but we might as well provide the module. It remains blacklisted by default. FB_INTEL n -> m SND_HDA_INTEL_HDMI_SILENT_STREAM y -> n +FB_INTEL_DEBUG n +FB_INTEL_I2C y l/imagemagick-7.0.10_56-x86_64-1.txz: Upgraded. x/ibus-table-1.12.3-x86_64-1.txz: Upgraded. xap/mozilla-firefox-78.6.1esr-x86_64-1.txz: Upgraded. This release contains a security fix: A malicious peer could have modified a COOKIE-ECHO chunk in a SCTP packet in a way that potentially resulted in a use-after-free. We presume that with enough effort it could have been exploited to run arbitrary code. For more information, see: https://www.mozilla.org/en-US/firefox/78.6.1/releasenotes/ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044 (* Security fix *) isolinux/initrd.img: Rebuilt. kernels/*: Upgraded. usb-and-pxe-installers/usbboot.img: Rebuilt.
2021-01-06 23:59:38 +01:00
"kernel-source" "Linux 5.10.5 kernel source" "on" \
2> $TMP/SeTpkgs
if [ $? = 1 -o $? = 255 ]; then
rm -f $TMP/SeTpkgs
> $TMP/SeTnewtag
for pkg in \
kernel-source \
; do
echo "$pkg: SKP" >> $TMP/SeTnewtag
done
exit
fi
cat /dev/null > $TMP/SeTnewtag
for PACKAGE in \
kernel-source \
; do
if grep "\(^\| \)$PACKAGE\( \|$\)" $TMP/SeTpkgs 1> /dev/null 2> /dev/null ; then
echo "$PACKAGE: ADD" >> $TMP/SeTnewtag
else
echo "$PACKAGE: SKP" >> $TMP/SeTnewtag
fi
done
rm -f $TMP/SeTpkgs