LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions
User Name
Password
Linux - Distributions This forum is for Distribution specific questions.
Red Hat, Slackware, Debian, Novell, LFS, Mandriva, Ubuntu, Fedora - the list goes on and on... Note: An (*) indicates there is no official participation from that distribution here at LQ.

Notices


Reply
  Search this Thread
Old 05-26-2022, 05:04 PM   #1
fredmyra
Member
 
Registered: Dec 2019
Location: Sweden
Posts: 295

Rep: Reputation: Disabled
Must I blacklist my kernel when updating the parches in Slackware64-15.0?


I have been reading a lot of "How-to's" and threads in order to prepare myself for doing my first "grabbing" (I am not sure which verb would be correct: install? update?) of available patches for Slackware64-15.0. Which I intend to do via Slackpkg.

I am confused about some points.

In several articles there is reference to the sequence below as a good way to achieve what I am trying to do:
# slackpkg update gpg
# slackpkg update
# slackpkg upgrade-all
# slackpkgnew-config

But in many other articles I found reference to blacklisting 3rd party packages/repos and the kernel. Blacklisting of the kernel as way of keeping slackpkg from eliminating the present kernel. I think that this is to be the case when upgrading the system to a new release, but I am affraid to try applying the patches through slackpkg without blacklisting the present kernel if I don't ask here first.

If I blacklist the present kernel should I install the new kernel before applying the patches or after? Or does it not matter?

Must I take any special action regarding the aaa-base patch ? I mean like applying it before running the "uppgrade-all"?

If I install a new kernel, with a new initrd will a proper name to the new initrd guarantee that I will still have the initrd for the present kernel in case the new kernel for some reason does not boot ? Will there be 2 initrd-trees?

I am not able to answer these questions from what google provides me.

will be thankful for any tips.
 
Old 05-27-2022, 05:38 AM   #2
fredmyra
Member
 
Registered: Dec 2019
Location: Sweden
Posts: 295

Original Poster
Rep: Reputation: Disabled
Can some moderator move this thread into the proper Slackware sub-forum, and maybe correct the typo (parches -> patches) in the title? Thank you in advance.
 
Old 05-27-2022, 06:23 AM   #3
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,448
Blog Entries: 7

Rep: Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553
Must I blacklist my kernel when updating the parches in Slackware64-15.0?

Are you using EFI?
 
Old 05-27-2022, 08:37 AM   #4
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,575
Blog Entries: 19

Rep: Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453
I blacklist both generic kernel and modules but not kernel headers. Changing the headers doesn't cause any problems except possibly when you're building software locally, and it gives me a heads-up that there is a new kernel in the offing.

Upgrading the kernel in a BIOS-booting machine involves a small but finite risk that the new kernel won't work and you will then no longer have the old one to fall back on. It's not such a problem with UEFI booting because in that case you are probably using copies of the kernels on your ESP and not the original ones in /boot, which an upgrade would destroy.

But if you have upgraded the kernel modules, your rescue boot would still probably fail because it could no longer find its own modules.

Last edited by hazel; 05-27-2022 at 08:39 AM.
 
Old 05-27-2022, 09:06 AM   #5
fredmyra
Member
 
Registered: Dec 2019
Location: Sweden
Posts: 295

Original Poster
Rep: Reputation: Disabled
It is a multiboot machine on Bios mode, works well with 10 different distros of which 3 are Slackwares.

Would it be any wise to copy some stuff to another partition, just in case?

Or could I have some stuff -like old kernel, old initrd and perhaps some more on a USB-stick and put it on the right place with a live usb if it was not a multilib machine ? In case the new kernel fails me.
 
Old 05-27-2022, 09:29 AM   #6
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,575
Blog Entries: 19

Rep: Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453
Quote:
Originally Posted by fredmyra View Post
Would it be any wise to copy some stuff to another partition, just in case?
That couldn't possibly hurt!
Quote:
Or could I have some stuff -like old kernel, old initrd and perhaps some more on a USB-stick and put it on the right place with a live usb if it was not a multilib machine ? In case the new kernel fails me.
Why not use a standard rescue image like SystemRescueCD? Then you could boot from it and you'd have all the usual tools at your disposal without all the hassle. If you then keep copies of a guaranteed running kernel, modules and initrd in a safe place and use your rescue boot to copy them back and edit the bootloader, you could probably upgrade the whole lot without the risk of getting trapped. But I prefer the blacklist option -- it's simpler.
 
1 members found this post helpful.
Old 05-27-2022, 10:01 AM   #7
fredmyra
Member
 
Registered: Dec 2019
Location: Sweden
Posts: 295

Original Poster
Rep: Reputation: Disabled
Quote:
hazel wrote:
Why not use a standard rescue image like SystemRescueCD? Then you could boot from it and you'd have all the usual tools at your disposal without all the hassle. If you then keep copies of a guaranteed running kernel, modules and initrd in a safe place and use your rescue boot to copy them back and edit the bootloader, you could probably upgrade the whole lot without the risk of getting trapped. But I prefer the blacklist option -- it's simpler.
Thank you Hazel ! That was enough to reassure me to go on.

But I think I would also prefer blacklisting if I was sure that I would have a way out. I guess I have not understood the logic of the whole thing. If I understand you right then It might happen, although most unlikely, that if something went wrong I would be missing my old modules. That would be if I did not blacklist them, right? But if I blacklisted then , they would not be missing.

But my doubt is what if the new kernel fails? How do I boot then ? this is what I seem to be unable to find out from google and the likes. Will there be an initrd tree for the old kernel? there must be one for the new kernel if I install it myself (versus update/upgrade via slackpkg) at the right moment. Thus my question: can there be more than one intrd-trees in the boot folder? Or am I missinga a lot here?

I am thinking of blacklisting and copying stuff to be sure. I am still a newbie at Slackware. Reinstalling the whole thing is not much of a problem for me, but installing the 3r parties and reconfiguring the desktop to what I am used to is a daunting enterprise. Maybe I ought to search a solution for THAT! Never did it.
 
Old 05-27-2022, 10:32 AM   #8
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,575
Blog Entries: 19

Rep: Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453
It's your responsibility to ensure that whatever bootloader you use has both options on it. For example, I use elilo (I have a UEFI machine) and elilo has a configuration file called elilo.conf. Because slackpkg/installpkg doesn't upgrade this, I need to do it by hand regardless of my update policy. I never change the boot stanza in elilo.conf; I simply add a new one for the new kernel. That means that I have the old one still on the boot menu just in case. If all goes well, I comment out the stanza I no longer need.

As to the initrd tree, you only need one because it isn't used in booting. It's only used by the mkinitrd script to create your initrd. Again, it's your responsibility to ensure that you have an initrd available for every kernel you want to boot.

Last edited by hazel; 05-27-2022 at 10:35 AM.
 
1 members found this post helpful.
Old 05-27-2022, 10:32 AM   #9
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941Reputation: 3941
I normally don't care if the update process chooses to update the kernel. But, also remember that you can simply copy the kernel-image file in /boot to some name that GRUB does not care about. Or, anywhere else you please.
 
1 members found this post helpful.
Old 05-27-2022, 10:38 AM   #10
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,575
Blog Entries: 19

Rep: Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453Reputation: 4453
Quote:
Originally Posted by sundialsvcs View Post
I normally don't care if the update process chooses to update the kernel. But, also remember that you can simply copy the kernel-image file in /boot to some name that GRUB does not care about. Or, anywhere else you please.
You get that automatically with UEFI because the active boot files are on the ESP, not in /boot. You have to copy them over there by hand, but then they remain there until you delete them. They aren't touched by pkgtools.
 
1 members found this post helpful.
Old 05-27-2022, 01:07 PM   #11
fredmyra
Member
 
Registered: Dec 2019
Location: Sweden
Posts: 295

Original Poster
Rep: Reputation: Disabled
It feels like I got it now. Understanding that initrd-tree is used when producing an initrd and not when using an initrd changed my life !

I will proceed now. With crossed fingers, of course.

Thanks you all for nice and prompt support. Amazing
 
Old 05-27-2022, 01:22 PM   #12
fredmyra
Member
 
Registered: Dec 2019
Location: Sweden
Posts: 295

Original Poster
Rep: Reputation: Disabled
Marking as SOLVED.
 
Old 12-16-2023, 05:52 PM   #13
fredmyra
Member
 
Registered: Dec 2019
Location: Sweden
Posts: 295

Original Poster
Rep: Reputation: Disabled
Coming back to my old thread

I am not sure I am doing the right thing, but I thought it would be silly to start a new thread to continue this discussion which I marked as solved and forgot about it for quite a while.

But now I have just installed "slackware64-live-daw-15.0" and ran:
Code:
# slackpkg update gpg
# slackpkg update
# slackpkg upgrade-all
my original "/etc/slackpkg/blacklist" said:
Code:
kernel-generic.5.15.19
kernel-huge.5.15.19
kernel-modules.5.15.19
kernel-source.5.15.19
and

Code:
# ls /boot
README.initrd                config-generic-5.15.117.x64  initrd-tree   tuxlogo.dat
System.map                   config-generic-5.15.19.x64   initrd.gz     vmlinuz
System.map-generic-5.15.117  config-huge-5.15.117.x64     inside.bmp    vmlinuz-generic
System.map-generic-5.15.19   config-huge-5.15.19.x64      inside.dat    vmlinuz-generic-5.15.117
System.map-huge-5.15.117     elilo-ia32.efi               onlyblue.bmp  vmlinuz-generic-5.15.19
System.map-huge-5.15.19      elilo-x86_64.efi             onlyblue.dat  vmlinuz-huge
boot_message.txt             grub                         slack.bmp     vmlinuz-huge-5.15.117
config                       initrd-generic-5.15.117.gz   tuxlogo.bmp   vmlinuz-huge-5.15.19
I don't understand why linux-5.15.139 was not installed under updating/upgrading-all. I had understood (here at this thread and more recently at https://www.linuxquestions.org/quest...ht-4175709694/), that the point of blacklisting a kernel was to prevent installation of kernel by slackpkg.

linux-5.15.117 packages were not blacklisted, so I expected them to be updated to 5.15.139.

I think I am missing some point here and that I need a clue, which I will be grateful for.


Edit:My problem with kernel updating was mentioned as a side question on a more recent thread https://www.linuxquestions.org/quest...os-4175731550/which did not seem to raise as much interest as this one once did.

I did read http://docs.slackware.com/slackware:beginners_guide yet another time as suggested there, before returning here, but found no comfort there.

Last edited by fredmyra; 12-16-2023 at 06:02 PM. Reason: complement
 
Old 12-16-2023, 09:56 PM   #14
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,448
Blog Entries: 7

Rep: Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553Reputation: 2553
Which mirror are you using, and is it up to date?

I'll just point out that you seem to have dots where there should be dashes, eg:

You have: kernel-generic.5.15.19

It should be: kernel-generic-5.15.19
 
1 members found this post helpful.
Old 12-17-2023, 09:26 AM   #15
Petri Kaukasoina
Senior Member
 
Registered: Mar 2007
Posts: 1,785

Rep: Reputation: 1463Reputation: 1463Reputation: 1463Reputation: 1463Reputation: 1463Reputation: 1463Reputation: 1463Reputation: 1463Reputation: 1463Reputation: 1463
You can't put version numbers in blacklist, they won't work. Only the package name:
Code:
kernel-generic
kernel-huge
kernel-modules
kernel-source
What is the package name?
Code:
$ echo kernel-generic-5.15.19-x86_64-2.txz |sed 's/-[^-]*-[^-]*-[^-]*$//'
kernel-generic
So, you can't define blacklisted items with more precision. Less precision is possible using regular expressions, for example
Code:
kernel-.*
blacklists all these packages:
Code:
kernel-firmware
kernel-generic
kernel-huge
kernel-modules
kernel-headers
kernel-source
 
1 members found this post helpful.
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] slackpkg blacklist xorg can't seem to blacklist it khronosschoty Slackware 2 11-13-2021 02:19 AM
[SOLVED] slackpkg+ blacklist - how to blacklist third party package set? zdolar Slackware 17 06-07-2021 09:37 AM
slackpkg blacklist kde should not blacklist polkit anymore frushiyama Slackware 1 09-25-2020 05:19 AM
Updating from Slackware64-current to Slackware64 13. glore2002 Slackware 4 08-28-2009 06:50 PM
?Odd bug. modprobe.blacklist~ behaves as modprobe.blacklist arubin Slackware 1 11-05-2006 07:08 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions

All times are GMT -5. The time now is 05:29 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration