slackware-current/patches/source/old-linux-5.15.145/kernel-source.SlackBuild
Patrick J Volkerding e53c2323e1 Wed Jun 5 19:06:36 UTC 2024
patches/packages/ca-certificates-20240604-noarch-1_slack15.0.txz:  Upgraded.
  This update provides the latest CA certificates to check for the
  authenticity of SSL connections.
patches/packages/kernel-firmware-20240604_22643bb-noarch-1.txz:  Upgraded.
  Updated to the latest kernel firmware.
patches/packages/linux-5.15.160/*:  Upgraded.
  These updates fix various bugs and security issues.
  Be sure to upgrade your initrd after upgrading the kernel packages.
  If you use lilo to boot your machine, be sure lilo.conf points to the correct
  kernel and initrd and run lilo as root to update the bootloader.
  If you use elilo to boot your machine, you should run eliloconfig to copy the
  kernel and initrd to the EFI System Partition.
  For more information, see:
    Fixed in 5.15.147:
    https://www.cve.org/CVERecord?id=CVE-2023-52340
    https://www.cve.org/CVERecord?id=CVE-2023-6040
    https://www.cve.org/CVERecord?id=CVE-2024-0646
    Fixed in 5.15.148:
    https://www.cve.org/CVERecord?id=CVE-2023-46838
    https://www.cve.org/CVERecord?id=CVE-2023-52436
    https://www.cve.org/CVERecord?id=CVE-2023-52438
    https://www.cve.org/CVERecord?id=CVE-2023-52439
    https://www.cve.org/CVERecord?id=CVE-2023-52443
    https://www.cve.org/CVERecord?id=CVE-2023-52444
    https://www.cve.org/CVERecord?id=CVE-2023-52445
    https://www.cve.org/CVERecord?id=CVE-2023-52448
    https://www.cve.org/CVERecord?id=CVE-2023-52449
    https://www.cve.org/CVERecord?id=CVE-2023-52451
    https://www.cve.org/CVERecord?id=CVE-2023-52454
    https://www.cve.org/CVERecord?id=CVE-2023-52456
    https://www.cve.org/CVERecord?id=CVE-2023-52458
    https://www.cve.org/CVERecord?id=CVE-2023-52463
    https://www.cve.org/CVERecord?id=CVE-2023-52464
    https://www.cve.org/CVERecord?id=CVE-2023-52467
    https://www.cve.org/CVERecord?id=CVE-2023-52469
    https://www.cve.org/CVERecord?id=CVE-2023-52470
    https://www.cve.org/CVERecord?id=CVE-2023-52609
    https://www.cve.org/CVERecord?id=CVE-2023-52610
    https://www.cve.org/CVERecord?id=CVE-2023-52612
    https://www.cve.org/CVERecord?id=CVE-2023-6356
    https://www.cve.org/CVERecord?id=CVE-2023-6536
    https://www.cve.org/CVERecord?id=CVE-2023-6915
    https://www.cve.org/CVERecord?id=CVE-2024-1085
    https://www.cve.org/CVERecord?id=CVE-2024-24860
    https://www.cve.org/CVERecord?id=CVE-2024-26586
    https://www.cve.org/CVERecord?id=CVE-2024-26589
    https://www.cve.org/CVERecord?id=CVE-2024-26591
    https://www.cve.org/CVERecord?id=CVE-2024-26597
    https://www.cve.org/CVERecord?id=CVE-2024-26598
    https://www.cve.org/CVERecord?id=CVE-2024-26631
    https://www.cve.org/CVERecord?id=CVE-2024-26633
    Fixed in 5.15.149:
    https://www.cve.org/CVERecord?id=CVE-2023-52429
    https://www.cve.org/CVERecord?id=CVE-2023-52435
    https://www.cve.org/CVERecord?id=CVE-2023-52486
    https://www.cve.org/CVERecord?id=CVE-2023-52489
    https://www.cve.org/CVERecord?id=CVE-2023-52491
    https://www.cve.org/CVERecord?id=CVE-2023-52492
    https://www.cve.org/CVERecord?id=CVE-2023-52493
    https://www.cve.org/CVERecord?id=CVE-2023-52494
    https://www.cve.org/CVERecord?id=CVE-2023-52498
    https://www.cve.org/CVERecord?id=CVE-2023-52583
    https://www.cve.org/CVERecord?id=CVE-2023-52587
    https://www.cve.org/CVERecord?id=CVE-2023-52588
    https://www.cve.org/CVERecord?id=CVE-2023-52594
    https://www.cve.org/CVERecord?id=CVE-2023-52595
    https://www.cve.org/CVERecord?id=CVE-2023-52597
    https://www.cve.org/CVERecord?id=CVE-2023-52598
    https://www.cve.org/CVERecord?id=CVE-2023-52599
    https://www.cve.org/CVERecord?id=CVE-2023-52600
    https://www.cve.org/CVERecord?id=CVE-2023-52601
    https://www.cve.org/CVERecord?id=CVE-2023-52602
    https://www.cve.org/CVERecord?id=CVE-2023-52603
    https://www.cve.org/CVERecord?id=CVE-2023-52604
    https://www.cve.org/CVERecord?id=CVE-2023-52606
    https://www.cve.org/CVERecord?id=CVE-2023-52607
    https://www.cve.org/CVERecord?id=CVE-2023-52608
    https://www.cve.org/CVERecord?id=CVE-2023-52614
    https://www.cve.org/CVERecord?id=CVE-2023-52615
    https://www.cve.org/CVERecord?id=CVE-2023-52616
    https://www.cve.org/CVERecord?id=CVE-2023-52617
    https://www.cve.org/CVERecord?id=CVE-2023-52618
    https://www.cve.org/CVERecord?id=CVE-2023-52619
    https://www.cve.org/CVERecord?id=CVE-2023-52622
    https://www.cve.org/CVERecord?id=CVE-2023-52623
    https://www.cve.org/CVERecord?id=CVE-2023-52627
    https://www.cve.org/CVERecord?id=CVE-2023-52630
    https://www.cve.org/CVERecord?id=CVE-2023-52631
    https://www.cve.org/CVERecord?id=CVE-2023-52633
    https://www.cve.org/CVERecord?id=CVE-2023-52635
    https://www.cve.org/CVERecord?id=CVE-2023-52637
    https://www.cve.org/CVERecord?id=CVE-2023-52638
    https://www.cve.org/CVERecord?id=CVE-2024-0340
    https://www.cve.org/CVERecord?id=CVE-2024-1086
    https://www.cve.org/CVERecord?id=CVE-2024-1151
    https://www.cve.org/CVERecord?id=CVE-2024-23849
    https://www.cve.org/CVERecord?id=CVE-2024-23850
    https://www.cve.org/CVERecord?id=CVE-2024-23851
    https://www.cve.org/CVERecord?id=CVE-2024-26592
    https://www.cve.org/CVERecord?id=CVE-2024-26593
    https://www.cve.org/CVERecord?id=CVE-2024-26594
    https://www.cve.org/CVERecord?id=CVE-2024-26600
    https://www.cve.org/CVERecord?id=CVE-2024-26602
    https://www.cve.org/CVERecord?id=CVE-2024-26606
    https://www.cve.org/CVERecord?id=CVE-2024-26608
    https://www.cve.org/CVERecord?id=CVE-2024-26610
    https://www.cve.org/CVERecord?id=CVE-2024-26614
    https://www.cve.org/CVERecord?id=CVE-2024-26615
    https://www.cve.org/CVERecord?id=CVE-2024-26625
    https://www.cve.org/CVERecord?id=CVE-2024-26627
    https://www.cve.org/CVERecord?id=CVE-2024-26635
    https://www.cve.org/CVERecord?id=CVE-2024-26636
    https://www.cve.org/CVERecord?id=CVE-2024-26640
    https://www.cve.org/CVERecord?id=CVE-2024-26641
    https://www.cve.org/CVERecord?id=CVE-2024-26644
    https://www.cve.org/CVERecord?id=CVE-2024-26645
    https://www.cve.org/CVERecord?id=CVE-2024-26660
    https://www.cve.org/CVERecord?id=CVE-2024-26663
    https://www.cve.org/CVERecord?id=CVE-2024-26664
    https://www.cve.org/CVERecord?id=CVE-2024-26665
    https://www.cve.org/CVERecord?id=CVE-2024-26668
    https://www.cve.org/CVERecord?id=CVE-2024-26671
    https://www.cve.org/CVERecord?id=CVE-2024-26673
    https://www.cve.org/CVERecord?id=CVE-2024-26675
    https://www.cve.org/CVERecord?id=CVE-2024-26676
    https://www.cve.org/CVERecord?id=CVE-2024-26679
    https://www.cve.org/CVERecord?id=CVE-2024-26684
    https://www.cve.org/CVERecord?id=CVE-2024-26685
    https://www.cve.org/CVERecord?id=CVE-2024-26689
    https://www.cve.org/CVERecord?id=CVE-2024-26696
    https://www.cve.org/CVERecord?id=CVE-2024-26697
    https://www.cve.org/CVERecord?id=CVE-2024-26698
    https://www.cve.org/CVERecord?id=CVE-2024-26702
    https://www.cve.org/CVERecord?id=CVE-2024-26704
    https://www.cve.org/CVERecord?id=CVE-2024-26707
    https://www.cve.org/CVERecord?id=CVE-2024-26712
    https://www.cve.org/CVERecord?id=CVE-2024-26715
    https://www.cve.org/CVERecord?id=CVE-2024-26717
    https://www.cve.org/CVERecord?id=CVE-2024-26720
    https://www.cve.org/CVERecord?id=CVE-2024-26727
    https://www.cve.org/CVERecord?id=CVE-2024-26808
    Fixed in 5.15.150:
    https://www.cve.org/CVERecord?id=CVE-2023-52434
    https://www.cve.org/CVERecord?id=CVE-2023-52497
    https://www.cve.org/CVERecord?id=CVE-2023-52640
    https://www.cve.org/CVERecord?id=CVE-2023-52641
    https://www.cve.org/CVERecord?id=CVE-2024-0565
    https://www.cve.org/CVERecord?id=CVE-2024-26601
    https://www.cve.org/CVERecord?id=CVE-2024-26603
    https://www.cve.org/CVERecord?id=CVE-2024-26733
    https://www.cve.org/CVERecord?id=CVE-2024-26735
    https://www.cve.org/CVERecord?id=CVE-2024-26736
    https://www.cve.org/CVERecord?id=CVE-2024-26737
    https://www.cve.org/CVERecord?id=CVE-2024-26743
    https://www.cve.org/CVERecord?id=CVE-2024-26744
    https://www.cve.org/CVERecord?id=CVE-2024-26747
    https://www.cve.org/CVERecord?id=CVE-2024-26748
    https://www.cve.org/CVERecord?id=CVE-2024-26749
    https://www.cve.org/CVERecord?id=CVE-2024-26751
    https://www.cve.org/CVERecord?id=CVE-2024-26752
    https://www.cve.org/CVERecord?id=CVE-2024-26754
    https://www.cve.org/CVERecord?id=CVE-2024-26763
    https://www.cve.org/CVERecord?id=CVE-2024-26764
    https://www.cve.org/CVERecord?id=CVE-2024-26766
    https://www.cve.org/CVERecord?id=CVE-2024-26769
    https://www.cve.org/CVERecord?id=CVE-2024-26771
    https://www.cve.org/CVERecord?id=CVE-2024-26772
    https://www.cve.org/CVERecord?id=CVE-2024-26773
    https://www.cve.org/CVERecord?id=CVE-2024-26774
    https://www.cve.org/CVERecord?id=CVE-2024-26776
    https://www.cve.org/CVERecord?id=CVE-2024-26777
    https://www.cve.org/CVERecord?id=CVE-2024-26778
    https://www.cve.org/CVERecord?id=CVE-2024-26779
    Fixed in 5.15.151:
    https://www.cve.org/CVERecord?id=CVE-2023-52620
    https://www.cve.org/CVERecord?id=CVE-2024-0841
    https://www.cve.org/CVERecord?id=CVE-2024-26622
    https://www.cve.org/CVERecord?id=CVE-2024-26688
    https://www.cve.org/CVERecord?id=CVE-2024-26782
    https://www.cve.org/CVERecord?id=CVE-2024-26788
    https://www.cve.org/CVERecord?id=CVE-2024-26790
    https://www.cve.org/CVERecord?id=CVE-2024-26791
    https://www.cve.org/CVERecord?id=CVE-2024-26793
    https://www.cve.org/CVERecord?id=CVE-2024-26795
    https://www.cve.org/CVERecord?id=CVE-2024-26798
    https://www.cve.org/CVERecord?id=CVE-2024-26801
    https://www.cve.org/CVERecord?id=CVE-2024-26802
    https://www.cve.org/CVERecord?id=CVE-2024-26803
    https://www.cve.org/CVERecord?id=CVE-2024-26804
    https://www.cve.org/CVERecord?id=CVE-2024-26805
    Fixed in 5.15.152:
    https://www.cve.org/CVERecord?id=CVE-2024-26659
    https://www.cve.org/CVERecord?id=CVE-2024-26787
    Fixed in 5.15.153:
    https://www.cve.org/CVERecord?id=CVE-2023-52447
    https://www.cve.org/CVERecord?id=CVE-2023-6270
    https://www.cve.org/CVERecord?id=CVE-2023-7042
    https://www.cve.org/CVERecord?id=CVE-2024-22099
    https://www.cve.org/CVERecord?id=CVE-2024-26651
    https://www.cve.org/CVERecord?id=CVE-2024-26809
  (* Security fix *)
2024-06-06 13:30:38 +02:00

194 lines
8.7 KiB
Bash
Executable file

#!/bin/sh
# Copyright 2018, 2020, 2021 Patrick J. Volkerding, Sebeka, Minnesota, USA
# All rights reserved.
#
# Redistribution and use of this script, with or without modification, is
# permitted provided that the following conditions are met:
#
# 1. Redistributions of this script must retain the above copyright
# notice, this list of conditions and the following disclaimer.
#
# THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
# WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
# MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
# EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
# PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
# OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
# OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
# ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
cd $(dirname $0) ; CWD=$(pwd)
PKGNAM=${PKGNAM:-kernel-source}
BUILD=${BUILD:-1}
NUMJOBS=${NUMJOBS:-" -j$(expr $(nproc) + 1) "}
TMP=${TMP:-/tmp}
PKG=$TMP/package-$PKGNAM
# If CONFIG_PREEMPT=y and CONFIG_PREEMPT_DYNAMIC=y, then set a default preempt
# mode (none, voluntary, or full):
CONFIG_PREEMPT_DEFAULT_MODE=${CONFIG_PREEMPT_DEFAULT_MODE:-voluntary}
# If a $VERSION is not passed to this script, use the newest linux-*.tar.xz
# found in this directory:
VERSION=${VERSION:-$(/bin/ls -t linux-*.tar.?z | head -n 1 | rev | cut -f 3- -d . | cut -f 1 -d - | rev)}
if ! /bin/ls linux-*.tar.?z 1> /dev/null 2> /dev/null ; then
echo "Error: kernel source not found. (/bin/ls linux-*.tar.?z)"
fi
# Automatically determine the architecture we're building on:
if [ -z "$ARCH" ]; then
case "$(uname -m)" in
# Use uname -m for all archs:
*) ARCH=$(uname -m) ;;
esac
fi
# Kernel extraversion, such as "-smp" on 32-bit. There's usually no need to set
# this unless you're using something unusual. We use it to find which .config
# file to use, but we'll then use whatever CONFIG_LOCALVERSION is set to
# inside the .config.
LOCALVERSION=${LOCALVERSION:-""}
# If KERNEL_CONFIG (name of kernel .config file in ./kernel-configs to use)
# has not been passed to this script, then we will select one. We will prefer
# to use a generic, SMP-supporting .config with a version number exactly
# matching the kernel sources. But if there's no exact version match, we will
# start with the newest .config we can find that's of the appropriate type.
if [ -z "${KERNEL_CONFIG}" ]; then # figure out the best matching .config
if [ "$ARCH" = "x86_64" ]; then
CONFIG_SUFFIX=".x64"
fi
if [ -z "${LOCALVERSION}" ]; then
if echo $ARCH | grep -q -E "i?86$" ; then
# Default to SMP extraversion on 32-bit:
LOCALVERSION="-smp"
fi
fi
if [ -r "$CWD/kernel-configs/config-generic${LOCALVERSION}-${VERSION}$LOCALVERSION${CONFIG_SUFFIX}" ]; then
# Exact match!
KERNEL_CONFIG="config-generic${LOCALVERSION}-${VERSION}${LOCALVERSION}${CONFIG_SUFFIX}"
else # no exact match, so find newest with the same name:
FIND_MATCH="$(/bin/ls -t $CWD/kernel-configs/config-generic${LOCALVERSION}-*${LOCALVERSION}${CONFIG_SUFFIX} 2> /dev/null | head -n 1)"
if [ -r "${FIND_MATCH}" ]; then
KERNEL_CONFIG="$(basename ${FIND_MATCH})"
unset FIND_MATCH
else
echo "Error: no matching .config file could be found for this kernel. Tried:"
echo " $CWD/kernel-configs/config-generic${LOCALVERSION}-${VERSION}${LOCALVERSION}${CONFIG_SUFFIX} (not found)"
exit 1
fi
fi
else # We were given a name to use:
if [ ! -r "$CWD/kernel-configs/${KERNEL_CONFIG}" ]; then
echo "Error: specified kernel .config $CWD/kernel-configs/${KERNEL_CONFIG} was not found."
exit 1
fi
fi
# Set LOCALVERSION to the value found inside the .config:
LOCALVERSION="$(cat $CWD/kernel-configs/${KERNEL_CONFIG} | grep CONFIG_LOCALVERSION= | cut -f 2 -d = | tr -d \")"
# If the variable PRINT_PACKAGE_NAME is set, then this script will report what
# the name of the created package would be, and then exit. This information
# could be useful to other scripts.
if [ ! -z "${PRINT_PACKAGE_NAME}" ]; then
# We will have to extract and patch the kernel sources to find out the kernel version:
TEMPDIR=$(mktemp -d)
cd $TEMPDIR
tar xf $CWD/linux-${VERSION}.tar.?z || exit 1
cd linux*
if [ -d $CWD/patches-${VERSION} ]; then
zcat $CWD/patches-${VERSION}/*.gz | patch -p1 --backup --suffix=.orig 1> /dev/null 2> /dev/null || exit 1
fi
PACKAGE_VERSION=$(grep "^VERSION = " Makefile | rev | cut -f 1 -d ' ' | rev).$(grep "^PATCHLEVEL = " Makefile | rev | cut -f 1 -d ' ' | rev).$(grep "^SUBLEVEL = " Makefile | rev | cut -f 1 -d ' ' | rev)$(grep "^EXTRAVERSION = " Makefile | rev | cut -f 1 -d ' ' | rev)
cd $CWD
rm -rf $TEMPDIR
echo "kernel-source-$(echo ${PACKAGE_VERSION} | tr - _)$(echo ${LOCALVERSION} | tr - _)-noarch-$BUILD.txz"
exit 0
fi
echo "Using kernel config: $CWD/kernel-configs/${KERNEL_CONFIG}"
rm -rf $PKG
mkdir -p $TMP $PKG
mkdir -p $PKG/usr/src
echo "Untarring $CWD/linux-${VERSION}.tar.?z in $PKG/usr/src..."
( cd $PKG/usr/src
tar xf $CWD/linux-${VERSION}.tar.?z || exit 1
echo "Making /usr/src/linux symlink..."
ln -sf linux-* linux
cd linux-*
if [ -d $CWD/patches-${VERSION} ]; then
echo "Applying kernel patches in $CWD/patches-${VERSION} and copying patches to $PKG/usr/src/linux-${VERSION}..."
zcat $CWD/patches-${VERSION}/*.gz | patch -p1 --verbose --backup --suffix=.orig || exit 1
cp -a $CWD/patches-${VERSION}/*.gz .
fi
echo "Copying $CWD/kernel-configs/${KERNEL_CONFIG} to .config..."
cp -a $CWD/kernel-configs/${KERNEL_CONFIG} .config
echo "Fixing permissions/ownership..."
chown -R root:root .
find . \
\( -perm 777 -o -perm 775 -o -perm 711 -o -perm 555 -o -perm 511 \) \
-exec chmod 755 {} \+ -o \
\( -perm 666 -o -perm 664 -o -perm 600 -o -perm 444 -o -perm 440 -o -perm 400 \) \
-exec chmod 644 {} \+
) || exit 1
# Kernel is now ready to configure. We will also build this kernel so that
# the installed kernel source package is fully configured, and building an
# out-of-tree module (such as the NVIDIA driver) won't require the user
# to build the kernel sources first.
( cd $PKG/usr/src/linux-${VERSION}
echo "Making oldconfig..."
make oldconfig
if [ ! -r $CWD/kernel-configs/config-generic${LOCALVERSION}-${VERSION}${LOCALVERSION}${CONFIG_SUFFIX} ]; then
echo "Saving new .config as: $CWD/kernel-configs/config-generic${LOCALVERSION}-${VERSION}${LOCALVERSION}${CONFIG_SUFFIX}"
cp -a .config $CWD/kernel-configs/config-generic${LOCALVERSION}-${VERSION}${LOCALVERSION}${CONFIG_SUFFIX}
fi
# If CONFIG_PREEMPT=y and CONFIG_PREEMPT_DYNAMIC=y, then set a default preempt
# mode (none, voluntary, or full):
if grep -wq CONFIG_PREEMPT=y .config ; then
if grep -wq CONFIG_PREEMPT_DYNAMIC=y .config ; then
# Sanity check:
if ! echo $CONFIG_PREEMPT_DEFAULT_MODE | grep -wq -e none -e voluntary -e full ; then
echo "ERROR: Invalid mode for CONFIG_PREEMPT_DEFAULT_MODE: $CONFIG_PREEMPT_DEFAULT_MODE"
exit 1
fi
echo "Setting default PREEMPT mode: $CONFIG_PREEMPT_DEFAULT_MODE"
sed -i "s/^int preempt_dynamic_mode = preempt_dynamic_full;$/int preempt_dynamic_mode = preempt_dynamic_$CONFIG_PREEMPT_DEFAULT_MODE;/g" kernel/sched/core.c
fi
fi
echo "Building kernel and modules (needed before clean for building NVIDIA to work)..."
make ${NUMJOBS} || exit 1
make ${NUMJOBS} modules || exit 1
echo "Cleaning up..."
make clean
# Make sure header files aren't missing...
make prepare
# Don't package the kernel in the sources:
find . -name "*Image" -exec rm "{}" \+
# No need for these:
rm -f .config.old .version
find . -name "*.cmd" -exec rm -f "{}" \+
rm .*.d
# Still some dotfiles laying around... probably fine though
) || exit 1
cd $PKG/usr/src/linux-${VERSION}
# Use the version number found in the Makefile in the package name. This is not
# always the same as the version in the source tarball's filename. For example,
# linux-4.14.tar.xz will have 4.14.0 as the version in the Makefile:
PACKAGE_VERSION=$(grep "^VERSION = " Makefile | rev | cut -f 1 -d ' ' | rev).$(grep "^PATCHLEVEL = " Makefile | rev | cut -f 1 -d ' ' | rev).$(grep "^SUBLEVEL = " Makefile | rev | cut -f 1 -d ' ' | rev)$(grep "^EXTRAVERSION = " Makefile | rev | cut -f 1 -d ' ' | rev)
mkdir $PKG/install
cat $CWD/slack-desc/slack-desc.kernel-source > $PKG/install/slack-desc
# Make the package:
cd $PKG
/sbin/makepkg -l y -c n $TMP/kernel-source-$(echo ${PACKAGE_VERSION} | tr - _)$(echo ${LOCALVERSION} | tr - _)-noarch-$BUILD.txz