SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Thu Jun 11 21:17:43 UTC 2020
patches/packages/linux-4.4.227/*: Upgraded.
These updates fix various bugs and security issues, including a mitigation
for SRBDS (Special Register Buffer Data Sampling). SRBDS is an MDS-like
speculative side channel that can leak bits from the random number generator
(RNG) across cores and threads.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 4.4.218:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11608
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942
Fixed in 4.4.219:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11494
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565
Fixed in 4.4.220:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826
Fixed in 4.4.221:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19319
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12464
Fixed in 4.4.222:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751
Fixed in 4.4.224:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770
Fixed in 4.4.225:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9517
Fixed in 4.4.226:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732
Fixed in 4.4.227:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543
(* Security fix *)
+--------------------------+
Now that we have got the newest 4.4 kernel again in 14.2, could we please have an updated kernel-firmware package too?
The current one is already more then 6 months old (kernel-firmware-20191108_f1100dd-noarch) and doesn't have the newest ligations for the recent hardware security problems.
It's my first kernel update since I installed Slackware a few weeks ago
How can I tell if the boot is by initrd, grub, ou elilo?
When I type:
Code:
#grub-install -v
grub-install (GRUB) 2.00
But I have inside /boot/ the /initrd-tree folder
Inside /boot/efi/EFI/Slackware I have files like elilo.conf
If you didn't do anything out of the ordinary and just followed the stock install, you have elilo and no initrd. It *should* be as simple as running eliloconfig, which will copy the correct kernel to the EFI partition and make sure your elilo.conf is updated properly.
I was afraid to upgrade the kernel (it was 4.4.14)
Follow the instructions I downloaded all kernel files from x86_64 and ran upgradepkg for all of them, and then with the advice of bassmadrigal, I typed eliloconfig.
Reboot the computer, it worked fine: only a message:
Quote:
depmod: WARNING: could not open /lib/modules/4.4.14/modules.order: No such file or directory
depmod: WARNING: could not open /lib/modules/4.4.14/modules.builtin: No such file or directory
Should I worry about, or I could let go these messages, since my computer is working fine now with the fresh 4.4.227 kernel?
That means that it is running a 4.4.14 kernel and not your newer one. If you run uname -r, it will likely say 4.4.14.
It's hard to know what's wrong without knowing how your system is setup. Ultimately, eliloconfig will take the kernel that is symlinked to /boot/vmlinuz and copy that to the EFI partition.
Can you provide the output of the following:
Code:
ls -l /boot
However, with you stating you ran upgradepkg on the kernel packages and you still managed to boot a 4.4.14 kernel, I'm guessing you're actually using legacy booting, not EFI booting. This should be able to be checked by seeing if the /sys/firmware/efi/ directory exists.
Last edited by bassmadrigal; 06-12-2020 at 10:53 PM.
Reason: monospaced the wrong thing
That means that it is running a 4.4.14 kernel and not your newer one. If you run uname -r, it will likely say 4.4.14.
It's hard to know what's wrong without knowing how your system is setup. Ultimately, eliloconfig will take the kernel that is symlinked to /boot/vmlinuz and copy that to the EFI partition.
Can you provide the output of the following:
Code:
ls -l /boot
However, with you stating you ran upgradepkg on the kernel packages and you still managed to boot a 4.4.14 kernel, I'm guessing you're actually using legacy booting, not EFI booting. This should be able to be checked by seeing if the /sys/firmware/efi/ directory exists.
Something you may have built previously might be trying to run a depmod on the older kernel, and maybe that's where your error is coming from.
Based on your /boot/ and uname -r output, it seems like you had a successful upgrade to 4.4.227 and maybe the error message won't be a big deal. If you do have any 3rd-party packages that include kernel modules (virtualbox, nvidia drivers, etc), they may be the cause and would likely just require a rebuild.
Should I worry about, or I could let go these messages, since my computer is working fine now with the fresh 4.4.227 kernel?
As bassmadrigal stated that error may be related to third party applications. I've seen similar errors when I've done a kernel upgrade that related to virtualbox. Re-installing virtualbox solved the issue for me.
I made a reboot in the computer: No more Warning Messages
The problem now is Virtualbox: In full screen mode doesn't show anything, no matter what VM (linux or Windows) I was running (and before it worked fine). In Windowed mode works fine though
I am using version 6.1.8 (downloaded from Virtualbox website), I uninstalled and installed again but the problem continues. I already run the command:
Probably yes. VB always lags behind as regards to kernel updates.
VB 6.1.10 should have been updated for Linux kernel version 5.7 support, but it probably is best to use a 5.6.x one or even the latest 5.4 long term stable release.
Distribution: Slackware64-current with "True Multilib" and KDE4Town.
Posts: 9,163
Rep:
Quote:
Originally Posted by ehartman
Probably yes. VB always lags behind as regards to kernel updates.
VB 6.1.10 should have been updated for Linux kernel version 5.7 support, but it probably is best to use a 5.6.x one or even the latest 5.4 long term stable release.
VirtualBox was updated 05 June 2020, and does work with the 5.7 kernel.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.