slackware-current/source
Patrick J Volkerding ba4a3a1379 Wed Jan 6 22:59:38 UTC 2021
a/kernel-generic-5.10.5-x86_64-1.txz:  Upgraded.
a/kernel-huge-5.10.5-x86_64-1.txz:  Upgraded.
a/kernel-modules-5.10.5-x86_64-1.txz:  Upgraded.
d/kernel-headers-5.10.5-x86-1.txz:  Upgraded.
d/meson-0.56.1-x86_64-1.txz:  Upgraded.
k/kernel-source-5.10.5-noarch-1.txz:  Upgraded.
  We'll turn off the silent stream feature as there's a known deadlock bug that
  remains in 5.10.5. Perhaps we'll restore it once that's patched... but we
  made it this far without the feature so I'll probably wait for a case to be
  made for it. Thanks to Petri Kaukasoina.
  Also build the intelfb module. This doesn't have anything to do with the
  lockups occurring on Intel systems, but we might as well provide the module.
  It remains blacklisted by default.
   FB_INTEL n -> m
   SND_HDA_INTEL_HDMI_SILENT_STREAM y -> n
  +FB_INTEL_DEBUG n
  +FB_INTEL_I2C y
l/imagemagick-7.0.10_56-x86_64-1.txz:  Upgraded.
x/ibus-table-1.12.3-x86_64-1.txz:  Upgraded.
xap/mozilla-firefox-78.6.1esr-x86_64-1.txz:  Upgraded.
  This release contains a security fix:
  A malicious peer could have modified a COOKIE-ECHO chunk in a SCTP packet
  in a way that potentially resulted in a use-after-free. We presume that with
  enough effort it could have been exploited to run arbitrary code.
  For more information, see:
    https://www.mozilla.org/en-US/firefox/78.6.1/releasenotes/
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044
  (* Security fix *)
isolinux/initrd.img:  Rebuilt.
kernels/*:  Upgraded.
usb-and-pxe-installers/usbboot.img:  Rebuilt.
2021-01-07 08:59:48 +01:00
..
a Tue Jan 5 22:42:46 UTC 2021 2021-01-06 08:59:50 +01:00
ap Tue Jan 5 00:27:10 UTC 2021 2021-01-05 08:59:48 +01:00
d Tue Jan 5 00:27:10 UTC 2021 2021-01-05 08:59:48 +01:00
e Sun Nov 29 20:52:56 UTC 2020 2020-11-30 08:59:53 +01:00
f Mon May 28 19:12:29 UTC 2018 2018-05-31 23:39:35 +02:00
installer Thu Dec 31 20:42:33 UTC 2020 2021-01-01 08:59:47 +01:00
k Wed Jan 6 22:59:38 UTC 2021 2021-01-07 08:59:48 +01:00
kde Tue Jan 5 22:42:46 UTC 2021 2021-01-06 08:59:50 +01:00
l Tue Jan 5 22:42:46 UTC 2021 2021-01-06 08:59:50 +01:00
n Tue Jan 5 22:42:46 UTC 2021 2021-01-06 08:59:50 +01:00
t Sat Oct 31 01:29:37 UTC 2020 2020-10-31 08:59:53 +01:00
tcl Tue Jan 5 00:27:10 UTC 2021 2021-01-05 08:59:48 +01:00
x Tue Jan 5 22:42:46 UTC 2021 2021-01-06 08:59:50 +01:00
xap Tue Dec 29 20:34:54 UTC 2020 2020-12-30 08:59:52 +01:00
xfce Tue Jan 5 00:27:10 UTC 2021 2021-01-05 08:59:48 +01:00
y Wed Dec 30 21:56:42 UTC 2020 2020-12-31 08:59:47 +01:00
buildlist-from-changelog.sh Thu Feb 20 04:50:54 UTC 2020 2020-02-20 17:59:49 +01:00
make_world.sh Thu Nov 22 05:56:56 UTC 2018 2018-11-22 17:59:46 +01:00
README.TXT Slackware 14.0 2018-05-31 22:51:55 +02:00

This is the source used for Slackware.

To look for a particular bit of source (let's say for 'cp'), first you would
look for the full path:

fuzzy:~# which cp
/bin/cp

Then, you grep for the package it came from. Note that the leading '/'
is removed:

fuzzy:~# grep bin/cp /var/log/packages/*
/var/log/packages/cpio-2.4.2.91-i386-1:bin/cpio
/var/log/packages/fileutils-4.1-i386-2:bin/cp
/var/log/packages/gcc-2.95.3-i386-2:usr/bin/cpp
/var/log/packages/gnome-applets-1.4.0.5-i386-1:usr/bin/cpumemusage_applet


From this, you can see that 'cp' came from the fileutils-4.1-i386-2 package.
The source will be found in a corresponding subdirectory.  In this case, that
would be ./a/bin.   Don't be fooled into thinking that the _bin.tar.gz in this
directory is the package with the source code -- anything starting with '_' is
just a framework package full of empty files with the correct permissions and 
ownerships for the completed package to use.

Many of these packages now have scripts that untar, patch, and compile the
source automatically.  These are the 'SlackBuild' scripts.  Moving back to the
example above, you can figure out which package the bin/cp source came from by
examining the SlackBuild script.

Have fun!

---
Patrick J. Volkerding
volkerdi@slackware.com