Mon May 9 21:33:25 UTC 2022

patches/packages/linux-5.15.38/*:  Upgraded.
  These updates fix various bugs and security issues.
  Be sure to upgrade your initrd after upgrading the kernel packages.
  If you use lilo to boot your machine, be sure lilo.conf points to the correct
  kernel and initrd and run lilo as root to update the bootloader.
  If you use elilo to boot your machine, you should run eliloconfig to copy the
  kernel and initrd to the EFI System Partition.
  For more information, see:
    Fixed in 5.15.27:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
    Fixed in 5.15.28:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
    Fixed in 5.15.29:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
    Fixed in 5.15.32:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
    Fixed in 5.15.33:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
    Fixed in 5.15.34:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
    Fixed in 5.15.35:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
    Fixed in 5.15.37:
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
  (* Security fix *)
This commit is contained in:
Patrick J Volkerding 2022-05-09 21:33:25 +00:00 committed by Eric Hameleers
parent 2971d84285
commit 3c08cf6792
22 changed files with 825 additions and 37 deletions

View file

@ -1,6 +1,6 @@
This file documents the instructions for upgrading to Slackware -current, the
This file documents the instructions for upgrading to Slackware 15.0, the
packages added, removed, renamed, and/or split during the development cycle
from Slackware 14.2 through -current, and some potential "gotchas" that users
from Slackware 14.2 through 15.0, and some potential "gotchas" that users
can avoid by arming themselves with a little knowledge.

View file

@ -11,9 +11,73 @@
<description>Tracking Slackware development in git.</description>
<language>en-us</language>
<id xmlns="http://www.w3.org/2005/Atom">urn:uuid:c964f45e-6732-11e8-bbe5-107b4450212f</id>
<pubDate>Wed, 4 May 2022 21:24:57 GMT</pubDate>
<lastBuildDate>Thu, 5 May 2022 11:29:53 GMT</lastBuildDate>
<pubDate>Mon, 9 May 2022 21:33:25 GMT</pubDate>
<lastBuildDate>Tue, 10 May 2022 11:29:52 GMT</lastBuildDate>
<generator>maintain_current_git.sh v 1.17</generator>
<item>
<title>Mon, 9 May 2022 21:33:25 GMT</title>
<pubDate>Mon, 9 May 2022 21:33:25 GMT</pubDate>
<link>https://git.slackware.nl/current/tag/?h=20220509213325</link>
<guid isPermaLink="false">20220509213325</guid>
<description>
<![CDATA[<pre>
patches/packages/linux-5.15.38/*: Upgraded.
These updates fix various bugs and security issues.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 5.15.27:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
Fixed in 5.15.28:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
Fixed in 5.15.29:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
Fixed in 5.15.32:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
Fixed in 5.15.33:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
Fixed in 5.15.34:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
Fixed in 5.15.35:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
Fixed in 5.15.37:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
(* Security fix *)
</pre>]]>
</description>
</item>
<item>
<title>Wed, 4 May 2022 21:24:57 GMT</title>
<pubDate>Wed, 4 May 2022 21:24:57 GMT</pubDate>

View file

@ -1,3 +1,59 @@
Mon May 9 21:33:25 UTC 2022
patches/packages/linux-5.15.38/*: Upgraded.
These updates fix various bugs and security issues.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 5.15.27:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0742
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0494
Fixed in 5.15.28:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23038
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23039
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23036
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23037
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23041
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23040
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23042
Fixed in 5.15.29:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1199
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27666
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1011
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0995
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0854
Fixed in 5.15.32:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1015
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26490
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1048
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1016
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28356
Fixed in 5.15.33:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28390
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0168
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1158
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1353
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1198
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28389
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28388
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1516
Fixed in 5.15.34:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1263
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29582
Fixed in 5.15.35:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1204
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1205
Fixed in 5.15.37:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0500
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23222
(* Security fix *)
+--------------------------+
Wed May 4 21:24:57 UTC 2022
patches/packages/mozilla-thunderbird-91.9.0-x86_64-1_slack15.0.txz: Upgraded.
This release contains security fixes and improvements.

View file

@ -1,20 +1,20 @@
Wed May 4 21:29:28 UTC 2022
Mon May 9 21:37:29 UTC 2022
Here is the file list for this directory. If you are using a
mirror site and find missing or extra files in the disk
subdirectories, please have the archive administrator refresh
the mirror.
drwxr-xr-x 12 root root 4096 2022-05-04 21:24 .
drwxr-xr-x 12 root root 4096 2022-05-09 21:33 .
-rw-r--r-- 1 root root 5767 2022-02-02 22:44 ./ANNOUNCE.15.0
-rw-r--r-- 1 root root 16609 2022-03-30 19:03 ./CHANGES_AND_HINTS.TXT
-rw-r--r-- 1 root root 1136954 2022-05-02 20:09 ./CHECKSUMS.md5
-rw-r--r-- 1 root root 163 2022-05-02 20:09 ./CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 1136946 2022-05-04 21:29 ./CHECKSUMS.md5
-rw-r--r-- 1 root root 163 2022-05-04 21:29 ./CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 17976 1994-06-10 02:28 ./COPYING
-rw-r--r-- 1 root root 35147 2007-06-30 04:21 ./COPYING3
-rw-r--r-- 1 root root 19573 2016-06-23 20:08 ./COPYRIGHT.TXT
-rw-r--r-- 1 root root 616 2006-10-02 04:37 ./CRYPTO_NOTICE.TXT
-rw-r--r-- 1 root root 1892060 2022-05-04 21:24 ./ChangeLog.txt
-rw-r--r-- 1 root root 1895211 2022-05-09 21:33 ./ChangeLog.txt
drwxr-xr-x 3 root root 4096 2013-03-20 22:17 ./EFI
drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT
-rw-r--r-- 1 root root 1187840 2021-06-15 19:16 ./EFI/BOOT/bootx64.efi
@ -25,7 +25,7 @@ drwxr-xr-x 2 root root 4096 2022-02-02 08:21 ./EFI/BOOT
-rwxr-xr-x 1 root root 2504 2019-07-05 18:54 ./EFI/BOOT/make-grub.sh
-rw-r--r-- 1 root root 10722 2013-09-21 19:02 ./EFI/BOOT/osdetect.cfg
-rw-r--r-- 1 root root 1273 2013-08-12 21:08 ./EFI/BOOT/tools.cfg
-rw-r--r-- 1 root root 1484026 2022-05-02 20:09 ./FILELIST.TXT
-rw-r--r-- 1 root root 1484018 2022-05-04 21:29 ./FILELIST.TXT
-rw-r--r-- 1 root root 1572 2012-08-29 18:27 ./GPG-KEY
-rw-r--r-- 1 root root 864745 2022-02-02 08:25 ./PACKAGES.TXT
-rw-r--r-- 1 root root 8034 2022-02-02 03:36 ./README.TXT
@ -737,13 +737,13 @@ drwxr-xr-x 2 root root 4096 2008-05-07 05:21 ./pasture/source/php/pear
-rwxr-xr-x 1 root root 9448 2018-05-16 22:38 ./pasture/source/php/php.SlackBuild
-rw-r--r-- 1 root root 775 2017-07-07 19:25 ./pasture/source/php/php.ini-development.diff.gz
-rw-r--r-- 1 root root 830 2005-12-09 05:18 ./pasture/source/php/slack-desc
drwxr-xr-x 4 root root 4096 2022-05-04 21:29 ./patches
-rw-r--r-- 1 root root 34342 2022-05-04 21:29 ./patches/CHECKSUMS.md5
-rw-r--r-- 1 root root 163 2022-05-04 21:29 ./patches/CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 45957 2022-05-04 21:29 ./patches/FILE_LIST
-rw-r--r-- 1 root root 11380360 2022-05-04 21:29 ./patches/MANIFEST.bz2
-rw-r--r-- 1 root root 25507 2022-05-04 21:29 ./patches/PACKAGES.TXT
drwxr-xr-x 3 root root 12288 2022-05-04 21:29 ./patches/packages
drwxr-xr-x 4 root root 4096 2022-05-09 21:37 ./patches
-rw-r--r-- 1 root root 34342 2022-05-09 21:37 ./patches/CHECKSUMS.md5
-rw-r--r-- 1 root root 163 2022-05-09 21:37 ./patches/CHECKSUMS.md5.asc
-rw-r--r-- 1 root root 45957 2022-05-09 21:37 ./patches/FILE_LIST
-rw-r--r-- 1 root root 11355989 2022-05-09 21:37 ./patches/MANIFEST.bz2
-rw-r--r-- 1 root root 25507 2022-05-09 21:37 ./patches/PACKAGES.TXT
drwxr-xr-x 3 root root 12288 2022-05-09 21:31 ./patches/packages
-rw-r--r-- 1 root root 327 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txt
-rw-r--r-- 1 root root 10716 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-02-15 05:07 ./patches/packages/aaa_base-15.0-x86_64-4_slack15.0.txz.asc
@ -798,22 +798,22 @@ drwxr-xr-x 3 root root 12288 2022-05-04 21:29 ./patches/packages
-rw-r--r-- 1 root root 219 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txt
-rw-r--r-- 1 root root 375568 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-03-01 04:56 ./patches/packages/libxslt-1.1.35-x86_64-1_slack15.0.txz.asc
drwxr-xr-x 2 root root 4096 2022-03-09 04:17 ./patches/packages/linux-5.15.27
-rw-r--r-- 1 root root 624 2022-03-09 00:47 ./patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txt
-rw-r--r-- 1 root root 8211832 2022-03-09 00:47 ./patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-03-09 00:47 ./patches/packages/linux-5.15.27/kernel-generic-5.15.27-x86_64-1.txz.asc
-rw-r--r-- 1 root root 332 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txt
-rw-r--r-- 1 root root 1078476 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txz
-rw-r--r-- 1 root root 163 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-headers-5.15.27-x86-1.txz.asc
-rw-r--r-- 1 root root 636 2022-03-09 00:44 ./patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txt
-rw-r--r-- 1 root root 12151252 2022-03-09 00:44 ./patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-03-09 00:44 ./patches/packages/linux-5.15.27/kernel-huge-5.15.27-x86_64-1.txz.asc
-rw-r--r-- 1 root root 567 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txt
-rw-r--r-- 1 root root 50251840 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-03-09 01:08 ./patches/packages/linux-5.15.27/kernel-modules-5.15.27-x86_64-1.txz.asc
-rw-r--r-- 1 root root 317 2022-03-09 00:40 ./patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txt
-rw-r--r-- 1 root root 122960152 2022-03-09 00:40 ./patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txz
-rw-r--r-- 1 root root 163 2022-03-09 00:40 ./patches/packages/linux-5.15.27/kernel-source-5.15.27-noarch-1.txz.asc
drwxr-xr-x 2 root root 4096 2022-05-09 21:37 ./patches/packages/linux-5.15.38
-rw-r--r-- 1 root root 624 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txt
-rw-r--r-- 1 root root 8218112 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-05-09 21:06 ./patches/packages/linux-5.15.38/kernel-generic-5.15.38-x86_64-1.txz.asc
-rw-r--r-- 1 root root 332 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txt
-rw-r--r-- 1 root root 1078936 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz
-rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-headers-5.15.38-x86-1.txz.asc
-rw-r--r-- 1 root root 636 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txt
-rw-r--r-- 1 root root 12157884 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-05-09 21:03 ./patches/packages/linux-5.15.38/kernel-huge-5.15.38-x86_64-1.txz.asc
-rw-r--r-- 1 root root 567 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txt
-rw-r--r-- 1 root root 50239932 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz
-rw-r--r-- 1 root root 163 2022-05-09 21:27 ./patches/packages/linux-5.15.38/kernel-modules-5.15.38-x86_64-1.txz.asc
-rw-r--r-- 1 root root 317 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txt
-rw-r--r-- 1 root root 123035916 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz
-rw-r--r-- 1 root root 163 2022-05-09 20:58 ./patches/packages/linux-5.15.38/kernel-source-5.15.38-noarch-1.txz.asc
-rw-r--r-- 1 root root 369 2022-02-21 03:37 ./patches/packages/mariadb-10.5.15-x86_64-2_slack15.0.txt
-rw-r--r-- 1 root root 29262352 2022-02-21 03:37 ./patches/packages/mariadb-10.5.15-x86_64-2_slack15.0.txz
-rw-r--r-- 1 root root 163 2022-02-21 03:37 ./patches/packages/mariadb-10.5.15-x86_64-2_slack15.0.txz.asc

View file

@ -103,9 +103,9 @@ We are going to 'chroot' into our fresh installation:
Next, while we are in the chroot, create the initrd with LVM support -
in the example command line I assume that the root filesystem is 'ext4',
we used the LV '/dev/myvg/root' as the root device, and are running the
Slackware 14.2 default kernel '4.4.14':
Slackware 15.0 default kernel '5.15.19':
# mkinitrd -c -k 4.4.14 -m ext4 -f ext4 -r /dev/myvg/root -L
# mkinitrd -c -k 5.15.19 -m ext4 -f ext4 -r /dev/myvg/root -L
The resulting initrd image will be written to the file '/boot/initrd.gz'
by default. We still need to tell lilo about this initrd, so open the
@ -117,7 +117,7 @@ filename added by 'liloconfig' is '/boot/vmlinuz' which is a symbolic link to
the huge SMP kernel. Remember that we need a 'generic' kernel with the initrd.
The end result should look somewhat like this:
image = /boot/vmlinuz-generic-4.4.14
image = /boot/vmlinuz-generic-5.15.19
initrd = /boot/initrd.gz
root = /dev/myvg/root
label = linux

View file

@ -1161,6 +1161,7 @@ gzip ./source/x/ibus/doinst.sh
gzip ./source/x/ibus/emoji-test.txt
gzip ./source/x/xcm/xcm.udev.rules.diff
gzip ./source/x/libva/doinst.sh
gzip ./testing/source/bind/doinst.sh
gzip ./patches/source/bluez/bluez-5.51-obexd_without_systemd-1.patch
gzip ./patches/source/bluez/doinst.sh
gzip ./patches/source/mozilla-thunderbird/autoconf/autoconf-2.13-consolidated_fixes-1.patch

View file

@ -0,0 +1,136 @@
rm -f lwres_addr_parse.3
ln -sf lwres_resutil.3 lwres_addr_parse.3
rm -f lwres_buffer_add.3
ln -sf lwres_buffer.3 lwres_buffer_add.3
rm -f lwres_buffer_back.3
ln -sf lwres_buffer.3 lwres_buffer_back.3
rm -f lwres_buffer_clear.3
ln -sf lwres_buffer.3 lwres_buffer_clear.3
rm -f lwres_buffer_first.3
ln -sf lwres_buffer.3 lwres_buffer_first.3
rm -f lwres_buffer_forward.3
ln -sf lwres_buffer.3 lwres_buffer_forward.3
rm -f lwres_buffer_getmem.3
ln -sf lwres_buffer.3 lwres_buffer_getmem.3
rm -f lwres_buffer_getuint16.3
ln -sf lwres_buffer.3 lwres_buffer_getuint16.3
rm -f lwres_buffer_getuint32.3
ln -sf lwres_buffer.3 lwres_buffer_getuint32.3
rm -f lwres_buffer_getuint8.3
ln -sf lwres_buffer.3 lwres_buffer_getuint8.3
rm -f lwres_buffer_init.3
ln -sf lwres_buffer.3 lwres_buffer_init.3
rm -f lwres_buffer_invalidate.3
ln -sf lwres_buffer.3 lwres_buffer_invalidate.3
rm -f lwres_buffer_putmem.3
ln -sf lwres_buffer.3 lwres_buffer_putmem.3
rm -f lwres_buffer_putuint16.3
ln -sf lwres_buffer.3 lwres_buffer_putuint16.3
rm -f lwres_buffer_putuint32.3
ln -sf lwres_buffer.3 lwres_buffer_putuint32.3
rm -f lwres_buffer_putuint8.3
ln -sf lwres_buffer.3 lwres_buffer_putuint8.3
rm -f lwres_buffer_subtract.3
ln -sf lwres_buffer.3 lwres_buffer_subtract.3
rm -f lwres_conf_clear.3
ln -sf lwres_config.3 lwres_conf_clear.3
rm -f lwres_conf_get.3
ln -sf lwres_config.3 lwres_conf_get.3
rm -f lwres_conf_init.3
ln -sf lwres_config.3 lwres_conf_init.3
rm -f lwres_conf_parse.3
ln -sf lwres_config.3 lwres_conf_parse.3
rm -f lwres_conf_print.3
ln -sf lwres_config.3 lwres_conf_print.3
rm -f lwres_context_allocmem.3
ln -sf lwres_context.3 lwres_context_allocmem.3
rm -f lwres_context_create.3
ln -sf lwres_context.3 lwres_context_create.3
rm -f lwres_context_destroy.3
ln -sf lwres_context.3 lwres_context_destroy.3
rm -f lwres_context_freemem.3
ln -sf lwres_context.3 lwres_context_freemem.3
rm -f lwres_context_initserial.3
ln -sf lwres_context.3 lwres_context_initserial.3
rm -f lwres_context_nextserial.3
ln -sf lwres_context.3 lwres_context_nextserial.3
rm -f lwres_context_sendrecv.3
ln -sf lwres_context.3 lwres_context_sendrecv.3
rm -f lwres_endhostent.3
ln -sf lwres_gethostent.3 lwres_endhostent.3
rm -f lwres_endhostent_r.3
ln -sf lwres_gethostent.3 lwres_endhostent_r.3
rm -f lwres_freeaddrinfo.3
ln -sf lwres_getaddrinfo.3 lwres_freeaddrinfo.3
rm -f lwres_freehostent.3
ln -sf lwres_getipnode.3 lwres_freehostent.3
rm -f lwres_gabnrequest_free.3
ln -sf lwres_gabn.3 lwres_gabnrequest_free.3
rm -f lwres_gabnrequest_parse.3
ln -sf lwres_gabn.3 lwres_gabnrequest_parse.3
rm -f lwres_gabnrequest_render.3
ln -sf lwres_gabn.3 lwres_gabnrequest_render.3
rm -f lwres_gabnresponse_free.3
ln -sf lwres_gabn.3 lwres_gabnresponse_free.3
rm -f lwres_gabnresponse_parse.3
ln -sf lwres_gabn.3 lwres_gabnresponse_parse.3
rm -f lwres_gabnresponse_render.3
ln -sf lwres_gabn.3 lwres_gabnresponse_render.3
rm -f lwres_getaddrsbyname.3
ln -sf lwres_resutil.3 lwres_getaddrsbyname.3
rm -f lwres_gethostbyaddr.3
ln -sf lwres_gethostent.3 lwres_gethostbyaddr.3
rm -f lwres_gethostbyaddr_r.3
ln -sf lwres_gethostent.3 lwres_gethostbyaddr_r.3
rm -f lwres_gethostbyname.3
ln -sf lwres_gethostent.3 lwres_gethostbyname.3
rm -f lwres_gethostbyname2.3
ln -sf lwres_gethostent.3 lwres_gethostbyname2.3
rm -f lwres_gethostbyname_r.3
ln -sf lwres_gethostent.3 lwres_gethostbyname_r.3
rm -f lwres_gethostent_r.3
ln -sf lwres_gethostent.3 lwres_gethostent_r.3
rm -f lwres_getipnodebyaddr.3
ln -sf lwres_getipnode.3 lwres_getipnodebyaddr.3
rm -f lwres_getipnodebyname.3
ln -sf lwres_getipnode.3 lwres_getipnodebyname.3
rm -f lwres_getnamebyaddr.3
ln -sf lwres_resutil.3 lwres_getnamebyaddr.3
rm -f lwres_gnbarequest_free.3
ln -sf lwres_gnba.3 lwres_gnbarequest_free.3
rm -f lwres_gnbarequest_parse.3
ln -sf lwres_gnba.3 lwres_gnbarequest_parse.3
rm -f lwres_gnbarequest_render.3
ln -sf lwres_gnba.3 lwres_gnbarequest_render.3
rm -f lwres_gnbaresponse_free.3
ln -sf lwres_gnba.3 lwres_gnbaresponse_free.3
rm -f lwres_gnbaresponse_parse.3
ln -sf lwres_gnba.3 lwres_gnbaresponse_parse.3
rm -f lwres_gnbaresponse_render.3
ln -sf lwres_gnba.3 lwres_gnbaresponse_render.3
rm -f lwres_herror.3
ln -sf lwres_hstrerror.3 lwres_herror.3
rm -f lwres_lwpacket_parseheader.3
ln -sf lwres_packet.3 lwres_lwpacket_parseheader.3
rm -f lwres_lwpacket_renderheader.3
ln -sf lwres_packet.3 lwres_lwpacket_renderheader.3
rm -f lwres_net_ntop.3
ln -sf lwres_inetntop.3 lwres_net_ntop.3
rm -f lwres_nooprequest_free.3
ln -sf lwres_noop.3 lwres_nooprequest_free.3
rm -f lwres_nooprequest_parse.3
ln -sf lwres_noop.3 lwres_nooprequest_parse.3
rm -f lwres_nooprequest_render.3
ln -sf lwres_noop.3 lwres_nooprequest_render.3
rm -f lwres_noopresponse_free.3
ln -sf lwres_noop.3 lwres_noopresponse_free.3
rm -f lwres_noopresponse_parse.3
ln -sf lwres_noop.3 lwres_noopresponse_parse.3
rm -f lwres_noopresponse_render.3
ln -sf lwres_noop.3 lwres_noopresponse_render.3
rm -f lwres_sethostent.3
ln -sf lwres_gethostent.3 lwres_sethostent.3
rm -f lwres_sethostent_r.3
ln -sf lwres_gethostent.3 lwres_sethostent_r.3
rm -f lwres_string_parse.3
ln -sf lwres_resutil.3 lwres_string_parse.3

View file

@ -0,0 +1,180 @@
#!/bin/bash
# Copyright 2006, 2007, 2008, 2009, 2010, 2011, 2012, 2013, 2014, 2015, 2016, 2018, 2019, 2020, 2021 Patrick J. Volkerding, Sebeka, MN, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=bind
VERSION=${VERSION:-$(echo ${PKGNAM}-[0-9]*.tar.?z | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
BUILD=${BUILD:-1_slack15.0}
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then
case "$( uname -m )" in
i?86) export ARCH=i586 ;;
arm*) export ARCH=arm ;;
# Unless $ARCH is already set, use uname -m for all other archs:
*) export ARCH=$( uname -m ) ;;
esac
fi
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
echo "$PKGNAM-$(echo $VERSION | tr - _)-$ARCH-$BUILD.txz"
exit 0
fi
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
TMP=${TMP:-/tmp}
PKG=$TMP/package-${PKGNAM}
rm -rf $PKG
mkdir -p $TMP $PKG/etc/default
if [ "$ARCH" = "i586" ]; then
SLKCFLAGS="-O2 -march=i586 -mtune=i686"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "s390" ]; then
SLKCFLAGS="-O2"
LIBDIRSUFFIX=""
elif [ "$ARCH" = "x86_64" ]; then
SLKCFLAGS="-O2 -fPIC"
LIBDIRSUFFIX="64"
fi
cd $TMP
rm -rf ${PKGNAM}-${VERSION}
tar xvf $CWD/${PKGNAM}-$VERSION.tar.?z || exit 1
cd ${PKGNAM}-$VERSION || exit 1
# Make sure ownerships and permissions are sane:
chown -R root:root .
find . \
\( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \
-exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
# Detect krb5:
if ls /lib*/libgssapi_krb5* 1> /dev/null 2> /dev/null ; then
GSSAPI=" --with-gssapi "
else
GSSAPI=" "
fi
# Configure:
CFLAGS="$SLKCFLAGS" \
./configure \
--prefix=/usr \
--libdir=/usr/lib${LIBDIRSUFFIX} \
--sysconfdir=/etc \
--localstatedir=/var \
--with-libtool \
--with-libidn2 \
--with-python=/usr/bin/python3 \
--mandir=/usr/man \
--enable-shared \
--disable-static \
--with-openssl=/usr \
$GSSAPI \
--build=$ARCH-slackware-linux || exit 1
# Build and install:
make $NUMJOBS || make || exit 1
make install DESTDIR=$PKG || exit 1
# Don't ship .la files:
rm -f $PKG/{,usr/}lib${LIBDIRSUFFIX}/*.la
# These probably were not supposed to be installed:
find . -name .deps -exec rm -rf "{}" \;
find . -name .libs -exec rm -rf "{}" \;
# We like symlinks.
( cd $PKG/usr/sbin
ln -sf named lwresd
)
# We like a lot of symlinks.
if [ -d $PKG/usr/man/man3 ]; then
( cd $PKG/usr/man/man3
sh $CWD/3link.sh
)
fi
# Install init script:
mkdir -p $PKG/etc/rc.d
cp -a $CWD/rc.bind $PKG/etc/rc.d/rc.bind.new
chmod 644 $PKG/etc/rc.d/rc.bind.new
# Install default options file for named:
cat $CWD/default.named > $PKG/etc/default/named.new
# Fix library perms:
chmod 755 $PKG/usr/lib${LIBDIRSUFFIX}/*
# Strip binaries:
find $PKG | xargs file | grep -e "executable" -e "shared object" | grep ELF \
| cut -f 1 -d : | xargs strip --strip-unneeded 2> /dev/null
# Compress manual pages:
find $PKG/usr/man -type f -exec gzip -9 {} \+
for i in $( find $PKG/usr/man -type l ) ; do
ln -s $( readlink $i ).gz $i.gz
rm $i
done
# Add a documentation directory:
mkdir -p $PKG/usr/doc/${PKGNAM}-$VERSION
cp -a \
CHANGES COPYRIGHT FAQ* README* \
doc/arm doc/misc \
$PKG/usr/doc/${PKGNAM}-$VERSION
# This one should have the correct perms of the config file:
if [ -r $PKG/usr/doc/${PKGNAM}-$VERSION/misc/rndc.conf-sample ]; then
chmod 644 $PKG/usr/doc/${PKGNAM}-$VERSION/misc/rndc.conf-sample
fi
# One format of this is plenty. Especially get rid of the bloated PDF.
( cd $PKG/usr/doc/bind-$VERSION/arm
rm -f Makefile* *.pdf *.xml README.SGML latex-fixup.pl
)
# Add sample config files for a simple caching nameserver:
mkdir -p $PKG/var/named/caching-example
cat $CWD/caching-example/named.conf > $PKG/etc/named.conf.new
cat $CWD/caching-example/localhost.zone > $PKG/var/named/caching-example/localhost.zone
cat $CWD/caching-example/named.local > $PKG/var/named/caching-example/named.local
cat $CWD/caching-example/named.root > $PKG/var/named/caching-example/named.root
# This name is deprecated, but having it here doesn't hurt in case
# an old configuration file wants it:
cat $CWD/caching-example/named.root > $PKG/var/named/caching-example/named.ca
mkdir -p $PKG/install
zcat $CWD/doinst.sh.gz > $PKG/install/doinst.sh
cat $CWD/slack-desc > $PKG/install/slack-desc
cd $PKG
/sbin/makepkg -l y -c n $TMP/${PKGNAM}-$(echo $VERSION | tr - _)-$ARCH-$BUILD.txz

View file

@ -0,0 +1,11 @@
$TTL 86400
$ORIGIN localhost.
@ 1D IN SOA @ root (
42 ; serial (d. adams)
3H ; refresh
15M ; retry
1W ; expiry
1D ) ; minimum
1D IN NS @
1D IN A 127.0.0.1

View file

@ -0,0 +1,31 @@
options {
directory "/var/named";
/*
* If there is a firewall between you and nameservers you want
* to talk to, you might need to uncomment the query-source
* directive below. Previous versions of BIND always asked
* questions using port 53, but BIND 8.1 uses an unprivileged
* port by default.
*/
// query-source address * port 53;
};
//
// a caching only nameserver config
//
zone "." IN {
type hint;
file "caching-example/named.root";
};
zone "localhost" IN {
type master;
file "caching-example/localhost.zone";
allow-update { none; };
};
zone "0.0.127.in-addr.arpa" IN {
type master;
file "caching-example/named.local";
allow-update { none; };
};

View file

@ -0,0 +1,10 @@
$TTL 86400
@ IN SOA localhost. root.localhost. (
2011032500 ; Serial
28800 ; Refresh
14400 ; Retry
3600000 ; Expire
86400 ) ; Minimum
IN NS localhost.
1 IN PTR localhost.

View file

@ -0,0 +1,92 @@
; This file holds the information on root name servers needed to
; initialize cache of Internet domain name servers
; (e.g. reference this file in the "cache . <file>"
; configuration file of BIND domain name servers).
;
; This file is made available by InterNIC
; under anonymous FTP as
; file /domain/named.cache
; on server FTP.INTERNIC.NET
; -OR- RS.INTERNIC.NET
;
; last update: July 30, 2019
; related version of root zone: 2019073000
;
; FORMERLY NS.INTERNIC.NET
;
. 3600000 NS A.ROOT-SERVERS.NET.
A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4
A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:ba3e::2:30
;
; FORMERLY NS1.ISI.EDU
;
. 3600000 NS B.ROOT-SERVERS.NET.
B.ROOT-SERVERS.NET. 3600000 A 199.9.14.201
B.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:200::b
;
; FORMERLY C.PSI.NET
;
. 3600000 NS C.ROOT-SERVERS.NET.
C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12
C.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2::c
;
; FORMERLY TERP.UMD.EDU
;
. 3600000 NS D.ROOT-SERVERS.NET.
D.ROOT-SERVERS.NET. 3600000 A 199.7.91.13
D.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2d::d
;
; FORMERLY NS.NASA.GOV
;
. 3600000 NS E.ROOT-SERVERS.NET.
E.ROOT-SERVERS.NET. 3600000 A 192.203.230.10
E.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:a8::e
;
; FORMERLY NS.ISC.ORG
;
. 3600000 NS F.ROOT-SERVERS.NET.
F.ROOT-SERVERS.NET. 3600000 A 192.5.5.241
F.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:2f::f
;
; FORMERLY NS.NIC.DDN.MIL
;
. 3600000 NS G.ROOT-SERVERS.NET.
G.ROOT-SERVERS.NET. 3600000 A 192.112.36.4
G.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:12::d0d
;
; FORMERLY AOS.ARL.ARMY.MIL
;
. 3600000 NS H.ROOT-SERVERS.NET.
H.ROOT-SERVERS.NET. 3600000 A 198.97.190.53
H.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:1::53
;
; FORMERLY NIC.NORDU.NET
;
. 3600000 NS I.ROOT-SERVERS.NET.
I.ROOT-SERVERS.NET. 3600000 A 192.36.148.17
I.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fe::53
;
; OPERATED BY VERISIGN, INC.
;
. 3600000 NS J.ROOT-SERVERS.NET.
J.ROOT-SERVERS.NET. 3600000 A 192.58.128.30
J.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:c27::2:30
;
; OPERATED BY RIPE NCC
;
. 3600000 NS K.ROOT-SERVERS.NET.
K.ROOT-SERVERS.NET. 3600000 A 193.0.14.129
K.ROOT-SERVERS.NET. 3600000 AAAA 2001:7fd::1
;
; OPERATED BY ICANN
;
. 3600000 NS L.ROOT-SERVERS.NET.
L.ROOT-SERVERS.NET. 3600000 A 199.7.83.42
L.ROOT-SERVERS.NET. 3600000 AAAA 2001:500:9f::42
;
; OPERATED BY WIDE
;
. 3600000 NS M.ROOT-SERVERS.NET.
M.ROOT-SERVERS.NET. 3600000 A 202.12.27.33
M.ROOT-SERVERS.NET. 3600000 AAAA 2001:dc3::35
; End of file

View file

@ -0,0 +1,12 @@
# User to run named as:
NAMED_USER=named
# Group to use for chowning named related files and directories.
# By default, named will also run as the primary group of $NAMED_USER,
# which will usually be the same as what's listed below, but not
# necessarily if something other than the default of "named" is used.
NAMED_GROUP=named
# Options to run named with. At least -u $NAMED_USER is required, but
# additional options may be added if needed.
NAMED_OPTIONS="-u $NAMED_USER"

View file

@ -0,0 +1,38 @@
#!/bin/sh
config() {
NEW="$1"
OLD="`dirname $NEW`/`basename $NEW .new`"
# If there's no config file by that name, mv it over:
if [ ! -r $OLD ]; then
mv $NEW $OLD
elif [ "`cat $OLD | md5sum`" = "`cat $NEW | md5sum`" ]; then # toss the redundant copy
rm $NEW
fi
# Otherwise, we leave the .new copy for the admin to consider...
}
# Keep same perms on rc.bind.new:
if [ -e etc/rc.d/rc.bind ]; then
cp -a etc/rc.d/rc.bind etc/rc.d/rc.bind.new.incoming
cat etc/rc.d/rc.bind.new > etc/rc.d/rc.bind.new.incoming
mv etc/rc.d/rc.bind.new.incoming etc/rc.d/rc.bind.new
fi
config etc/default/named.new
config etc/named.conf.new
config etc/rc.d/rc.bind.new
# Add a /var/named if it doesn't exist:
if [ ! -d var/named ]; then
mkdir -p var/named
chmod 755 var/named
fi
# Generate /etc/rndc.key if there's none there,
# and there's also no /etc/rndc.conf (the other
# way to set this up).
if [ ! -r etc/rndc.key -a ! -r /etc/rndc.conf ]; then
chroot . /sbin/ldconfig
chroot . /usr/sbin/rndc-confgen -a 2> /dev/null
chroot . /bin/chown named:named /etc/rndc.key 2> /dev/null
fi

136
testing/source/bind/rc.bind Normal file
View file

@ -0,0 +1,136 @@
#!/bin/sh
# Start/stop/restart the BIND name server daemon (named).
# Start BIND. By default this will run with user "named". If you'd like to
# change this or other options, see: /etc/default/named
# You might also consider running BIND in a "chroot jail",
# a discussion of which may be found in
# /usr/doc/Linux-HOWTOs/Chroot-BIND-HOWTO.
# One last note: rndc has a lot of other nice features that it is not
# within the scope of this start/stop/restart script to support.
# For more details, see "man rndc" or just type "rndc" to see the options.
# Load command defaults:
if [ -f /etc/default/named ] ; then . /etc/default/named ; fi
if [ -f /etc/default/rndc ] ; then . /etc/default/rndc ; fi
# In case /etc/default/named was missing, provide fallbacks:
if [ -z "$NAMED_USER" ]; then
NAMED_USER="named"
fi
if [ -z "$NAMED_GROUP" ]; then
NAMED_GROUP="named"
fi
if [ -z "$NAMED_OPTIONS" ]; then
NAMED_OPTIONS="-u $NAMED_USER"
fi
# Sanity check. If /usr/sbin/named is missing then it
# doesn't make much sense to try to run this script:
if [ ! -x /usr/sbin/named ]; then
echo "/etc/rc.d/rc.bind: no /usr/sbin/named found (or not executable); cannot start."
exit 1
fi
# Start BIND. As many times as you like. ;-)
# Seriously, don't run "rc.bind start" if BIND is already
# running or you'll get more than one copy running.
bind_start() {
# Make sure /var/run/named exists:
mkdir -p /var/run/named
# Make sure that /var/run/named has correct ownership:
chown -R ${NAMED_USER}:${NAMED_GROUP} /var/run/named
# Make sure that /var/named has correct ownership:
chown -R ${NAMED_USER}:${NAMED_GROUP} /var/named
if [ -r /etc/rndc.key ]; then
# Make sure that /etc/rndc.key has correct ownership:
chown ${NAMED_USER}:${NAMED_GROUP} /etc/rndc.key
fi
# Start named:
if [ -x /usr/sbin/named ]; then
echo "Starting BIND: /usr/sbin/named $NAMED_OPTIONS"
/usr/sbin/named $NAMED_OPTIONS
sleep 1
fi
# Make sure that named started:
if ! ps axc | grep -q named ; then
echo "WARNING: named did not start."
echo "Attempting to start named again: /usr/sbin/named $NAMED_OPTIONS"
/usr/sbin/named $NAMED_OPTIONS
sleep 1
if ps axc | grep -q named ; then
echo "SUCCESS: named started."
else
echo "FAILED: Sorry, a second attempt to start named has also failed."
echo "There may be a configuration error that needs fixing. Good luck!"
fi
fi
}
# Stop all running copies of BIND (/usr/sbin/named):
bind_stop() {
# If you've set up rndc, we can use this to make shutting down BIND faster.
# If you have /etc/rndc.conf, or you have /etc/rndc.key, or $RNDC_OPTIONS is
# not empty, we'll try it.
if [ -r /etc/rndc.conf -o -r /etc/rndc.key -o ! -z "$RNDC_OPTIONS" ]; then
if [ -z "$RNDC_OPTIONS" ]; then
echo "Stopping BIND: /usr/sbin/rndc stop"
else
echo "Stopping BIND: /usr/sbin/rndc $RNDC_OPTIONS stop"
fi
/usr/sbin/rndc $RNDC_OPTIONS stop
# Wait for up to $TIMEOUT seconds before moving on to try killall:
TIMEOUT=${TIMEOUT:-10}
while [ "$TIMEOUT" -gt "0" ]; do
# Exit the timeout loop if there are no named processes:
if ! ps axco command | grep -q -e "^named$"; then
break
fi
sleep 1
TIMEOUT=$(expr $TIMEOUT - 1)
done
fi
# Kill named processes if there are any running:
if ps axco command | grep -q -e "^named$"; then
echo "Stopping all named processes in this namespace: /bin/killall -SIGTERM --ns \$\$ named"
/bin/killall -SIGTERM --ns $$ named 2> /dev/null
fi
}
# Reload BIND:
bind_reload() {
/usr/sbin/rndc $RNDC_OPTIONS reload
}
# Restart BIND:
bind_restart() {
bind_stop
bind_start
}
# Get BIND status:
bind_status() {
/usr/sbin/rndc $RNDC_OPTIONS status
}
case "$1" in
'start')
bind_start
;;
'stop')
bind_stop
;;
'reload')
bind_reload
;;
'restart')
bind_restart
;;
'status')
bind_status
;;
*)
echo "usage $0 start|stop|reload|restart|status"
esac

View file

@ -0,0 +1,19 @@
# HOW TO EDIT THIS FILE:
# The "handy ruler" below makes it easier to edit a package description. Line
# up the first '|' above the ':' following the base package name, and the '|'
# on the right side marks the last column you can put a character in. You must
# make exactly 11 lines for the formatting to be correct. It's also
# customary to leave one space after the ':'.
|-----handy-ruler------------------------------------------------------|
bind: bind (DNS server and utilities)
bind:
bind: The named daemon and support utilities such as dig, host, and
bind: nslookup. Sample configuration files for running a simple caching
bind: nameserver are included. Documentation for advanced name server
bind: setup can be found in /usr/doc/bind-9.x.x/.
bind:
bind:
bind:
bind:
bind:

View file

@ -218,6 +218,8 @@ if [ -n "$REPODIR" ]; then
# This also takes care of stripping a trailing '/', which is required
# for the rsync command to work as intended:
REPOSROOT="$(cd $(dirname $REPODIR); pwd)/$(basename $REPODIR)"
# Use this to set the space requirement:
MININSFREE=$(expr $(du -s ${REPOSROOT}/slackware* | cut -f 1) / 1024)
fi
fi
@ -237,7 +239,7 @@ else
fi
# Prepare the environment:
MININSFREE=2200 # minimum in MB required for a Slackware tree
MININSFREE=${MININSFREE:-3134} # minimum in MB required for a Slackware tree
UNATTENDED=${UNATTENDED:-0} # unattended means: never ask questions.
REFORMAT=${REFORMAT:-0} # do not try to reformat by default
LOGFILE=${LOGFILE:-/dev/null} # silence by default