LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 12-15-2021, 01:31 PM   #9256
Daedra
Senior Member
 
Registered: Dec 2005
Location: Springfield, MO
Distribution: Slackware64-15.0
Posts: 2,699

Rep: Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381Reputation: 1381

Quote:
Originally Posted by marav View Post


https://www.linuxquestions.org/quest...9/#post6296539

edit:
We all have to keep in mind that 15.0 is almost under the tree 🎅🏽🎄
Oh you're right! I thought this was an incremental update to our current version. Not the newest one. My bad.
 
1 members found this post helpful.
Old 12-15-2021, 03:03 PM   #9257
bassmadrigal
LQ Guru
 
Registered: Nov 2003
Location: West Jordan, UT, USA
Distribution: Slackware
Posts: 8,792

Rep: Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656
Can we please enable SUNRPC_DEBUG (CONFIG_SUNRPC_DEBUG=y) in the kernel options (Under menuconfig -- File Systems -> Network File System -> RPC: Enable dprintk debugging)?

This allows people to debug NFS connections (both server and client) using the rpcdebug program. I found today that I was lacking this feature in the kernel when I tried to debug a client connection issue.

NOTE: This does also enable CONFIG_NFS_DEBUG.

I have it enabled here (for a short period of time) without any known issues.

Code:
diff --git a/.config b/.config
index 2eb22ac..560b8b6 100644
--- a/.config
+++ b/.config
@@ -9307,6 +9307,7 @@ CONFIG_NFS_V4_1_IMPLEMENTATION_ID_DOMAIN="kernel.org"
 CONFIG_NFS_V4_SECURITY_LABEL=y
 # CONFIG_NFS_USE_LEGACY_DNS is not set
 CONFIG_NFS_USE_KERNEL_DNS=y
+CONFIG_NFS_DEBUG=y
 # CONFIG_NFS_DISABLE_UDP_SUPPORT is not set
 # CONFIG_NFS_V4_2_READ_PLUS is not set
 CONFIG_NFSD=m
@@ -9332,7 +9333,7 @@ CONFIG_SUNRPC_BACKCHANNEL=y
 CONFIG_SUNRPC_SWAP=y
 CONFIG_RPCSEC_GSS_KRB5=m
 # CONFIG_SUNRPC_DISABLE_INSECURE_ENCTYPES is not set
-# CONFIG_SUNRPC_DEBUG is not set
+CONFIG_SUNRPC_DEBUG=y
 CONFIG_SUNRPC_XPRT_RDMA=m
 CONFIG_CEPH_FS=m
 CONFIG_CEPH_FSCACHE=y
 
1 members found this post helpful.
Old 12-15-2021, 03:20 PM   #9258
volkerdi
Slackware Maintainer
 
Registered: Dec 2002
Location: Minnesota
Distribution: Slackware! :-)
Posts: 2,533

Rep: Reputation: 8515Reputation: 8515Reputation: 8515Reputation: 8515Reputation: 8515Reputation: 8515Reputation: 8515Reputation: 8515Reputation: 8515Reputation: 8515Reputation: 8515
Quote:
Originally Posted by bassmadrigal View Post
Can we please enable SUNRPC_DEBUG (CONFIG_SUNRPC_DEBUG=y) in the kernel options (Under menuconfig -- File Systems -> Network File System -> RPC: Enable dprintk debugging)?
Will do.
 
2 members found this post helpful.
Old 12-15-2021, 03:34 PM   #9259
GazL
LQ Veteran
 
Registered: May 2008
Posts: 6,915

Rep: Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033
Quote:
Originally Posted by marav View Post


https://www.linuxquestions.org/quest...9/#post6296539

edit:
We all have to keep in mind that 15.0 is almost under the tree 🎅🏽🎄
The choice may be forced, unless Pat can track down some backports for those 4 security issues or is happy to live with the local privilege escalations. As is usual, the timing sucks.
 
Old 12-15-2021, 06:29 PM   #9260
JayByrd
Member
 
Registered: Aug 2021
Location: Seattle, WA
Distribution: Slackware
Posts: 302

Rep: Reputation: 310Reputation: 310Reputation: 310Reputation: 310
mkinitrd, viz ARM-ness

I started a thread a few months ago about this, but it didn't garner much attention, so I thought I'd mention it here.

Looking at the mkinitrd script, we find this:
Code:
# If $WAIT is not set, assume we need only one second
# to have all devices done
# (unless we find that value is already set in the initrd-tree):
if [ -z "$WAIT" -a -z "$(cat $SOURCE_TREE/wait-for-root)" ]; then
  WAIT=1
  # ARM devices need even more time:
  case "$( uname -m )" in
    arm*) WAIT=4;;
  esac
fi
if [ ! -z "$WAIT" ]; then
  echo $WAIT > $SOURCE_TREE/wait-for-root
fi
When extracting the skeleton initrd-tree, rootdev and rootfs are empty files (0 bytes,) but wait-for-root contains a "1". Thus, testing "-z $(cat $SOURCE_TREE/wait-for-root)" always fails, so the body of that block is never entered.

The only way I can see for the ARM-test to actually run would be to run mkinitrd once to extract the skeleton initrd-tree, manually empty/null the wait-for-root file, and then run mkinitrd again without the "-c" option.

Making wait-for-root an empty file in the skeleton tree--like rootfs, etc.--would allow mkinitrd to set the value to 1 or 4 every time it is invoked with "-c".

For myself, I went a little further and did away with the $(uname -m) test altogether as outlined in this post. (Kindly disregard the posts above and below that one.)
 
Old 12-16-2021, 12:04 AM   #9261
franzen
Member
 
Registered: Nov 2012
Distribution: slackware
Posts: 535

Rep: Reputation: 379Reputation: 379Reputation: 379Reputation: 379
Quote:
Originally Posted by GazL View Post
The choice may be forced, unless Pat can track down some backports for those 4 security issues or is happy to live with the local privilege escalations. As is usual, the timing sucks.

Do you mean those 4 CVE mentioned here? These are fixed in -current
Quote:
Wed Dec 15 04:34:02 UTC 2021
...
x/xorg-server-1.20.13-x86_64-2.txz: Rebuilt.
Fixes for multiple input validation failures in X server extensions:
render: Fix out of bounds access in SProcRenderCompositeGlyphs()
xfixes: Fix out of bounds access in *ProcXFixesCreatePointerBarrier()
Xext: Fix out of bounds access in SProcScreenSaverSuspend()
record: Fix out of bounds access in SwapCreateRegister()
For more information, see:
https://cve.mitre.org/cgi-bin/cvenam...=CVE-2021-4008
https://cve.mitre.org/cgi-bin/cvenam...=CVE-2021-4009
https://cve.mitre.org/cgi-bin/cvenam...=CVE-2021-4010
https://cve.mitre.org/cgi-bin/cvenam...=CVE-2021-4011
(* Security fix *)
...
x/xorg-server-xwayland-21.1.4-x86_64-1.txz: Upgraded.
Fixes for multiple input validation failures in X server extensions:
render: Fix out of bounds access in SProcRenderCompositeGlyphs()
xfixes: Fix out of bounds access in *ProcXFixesCreatePointerBarrier()
Xext: Fix out of bounds access in SProcScreenSaverSuspend()
record: Fix out of bounds access in SwapCreateRegister()
For more information, see:
https://cve.mitre.org/cgi-bin/cvenam...=CVE-2021-4008
https://cve.mitre.org/cgi-bin/cvenam...=CVE-2021-4009
https://cve.mitre.org/cgi-bin/cvenam...=CVE-2021-4010
https://cve.mitre.org/cgi-bin/cvenam...=CVE-2021-4011
(* Security fix *)
 
2 members found this post helpful.
Old 12-16-2021, 12:08 AM   #9262
nobodino
Senior Member
 
Registered: Jul 2010
Location: Near Bordeaux in France
Distribution: slackware, slackware from scratch, LFS, slackware [arm], linux Mint...
Posts: 1,564

Rep: Reputation: 892Reputation: 892Reputation: 892Reputation: 892Reputation: 892Reputation: 892Reputation: 892
libcaca0.99beta20

Code:
libcaca v0.99.beta20 Latest
@samhocevar samhocevar released this 19 Oct 2021
· 3 commits to main since this release
v0.99.beta20
373c88b

    IPv6 support in cacaserver
    fixed a bug from 2004 that caused PDF documentation generation to fail
    memory allocation functions are now more robust
    numerous fixes for memory leaks and invalid memory accesses:
        CVE-2021-30498
        CVE-2021-30499
        CVE-2021-3410
        CVE-2018-20546
        CVE-2018-20547
        CVE-2018-20545
        CVE-2018-20548
        CVE-2018-20549
 
Old 12-16-2021, 12:33 AM   #9263
Thom1b
Member
 
Registered: Mar 2010
Location: France
Distribution: Slackware
Posts: 486

Rep: Reputation: 339Reputation: 339Reputation: 339Reputation: 339
xorg-server-1.20.14 is released.
php 7.4.27 8.0.14 and 8.1.1 are released.
 
1 members found this post helpful.
Old 12-16-2021, 01:21 AM   #9264
marav
LQ Sage
 
Registered: Sep 2018
Location: Gironde
Distribution: Slackware
Posts: 5,409

Rep: Reputation: 4145Reputation: 4145Reputation: 4145Reputation: 4145Reputation: 4145Reputation: 4145Reputation: 4145Reputation: 4145Reputation: 4145Reputation: 4145Reputation: 4145
Firefox 91.4.1esr

https://ftp.mozilla.org/pub/firefox/....source.tar.xz

Release notes

Code:
Fixed frequent MOZILLA_PKIX_ERROR_OCSP_RESPONSE_FOR_CERT_MISSING error messages 
when trying to connect to various microsoft.com domains (bug 1745600)

Last edited by marav; 12-16-2021 at 09:00 AM.
 
Old 12-16-2021, 02:38 AM   #9265
gmgf
Senior Member
 
Registered: Jun 2012
Location: Bergerac, France
Distribution: Slackware
Posts: 2,233

Rep: Reputation: 1027Reputation: 1027Reputation: 1027Reputation: 1027Reputation: 1027Reputation: 1027Reputation: 1027Reputation: 1027
Quote:
Originally Posted by Daedra View Post
Just for info, it work fine here on current.
 
1 members found this post helpful.
Old 12-16-2021, 03:30 AM   #9266
GazL
LQ Veteran
 
Registered: May 2008
Posts: 6,915

Rep: Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033Reputation: 5033
Quote:
Originally Posted by franzen View Post
Do you mean those 4 CVE mentioned here? These are fixed in -current
Ahh, yes. Thanks franzen. I hadn't synced my mirror so I was still a day behind. Apologies for the noise.
 
Old 12-16-2021, 04:50 AM   #9267
saxa
Senior Member
 
Registered: Aug 2004
Location: Nova Gorica, Salvador
Distribution: Slackware
Posts: 1,219

Rep: Reputation: 299Reputation: 299Reputation: 299
vala-0.54.5
https://download.gnome.org/sources/v...-0.54.5.tar.xz
 
Old 12-16-2021, 10:43 AM   #9268
alex2grad
LQ Newbie
 
Registered: Dec 2021
Posts: 5

Rep: Reputation: Disabled
OpenSSL 1.1.1m

14-Dec-2021 OpenSSL 1.1.1m is now available, including bug fixes
 
3 members found this post helpful.
Old 12-16-2021, 07:28 PM   #9269
Lockywolf
Member
 
Registered: Jul 2007
Posts: 683

Rep: Reputation: 253Reputation: 253Reputation: 253
Quote:
Some code changes would be required in xorg-server, xinit, and various login
managers to make rootless X work out of the box or to fall back in cases
where elogind isn't supported, and those changes aren't appropriate here in
the RC stage, but you can try it without recompiling:
chmod 755 /usr/libexec/Xorg*
Thanks to LuckyCyborg.
I have read the aforecited message in the ChangeLog, and I am thinking whether it would be appropriate to make a (sticky) thread dedicated to "requests for -current after 15.0"? Because in this thread "long-term" changes are interspersed amid "immediate" changes.

I would have asked for that "X without root privileges" feature be there, as well as, perhaps, rc.kexec (discussed in a separate thread), and libcgroup-v2 (which is being developed quite quickly, so I hope it should be available for 15.1).
 
Old 12-16-2021, 08:59 PM   #9270
Jeebizz
Senior Member
 
Registered: May 2004
Distribution: Slackware15.0 64-Bit Desktop, Debian 11 non-free Toshiba Satellite Notebook
Posts: 4,190

Rep: Reputation: 1383Reputation: 1383Reputation: 1383Reputation: 1383Reputation: 1383Reputation: 1383Reputation: 1383Reputation: 1383Reputation: 1383Reputation: 1383
Quote:
Originally Posted by Lockywolf View Post
I have read the aforecited message in the ChangeLog, and I am thinking whether it would be appropriate to make a (sticky) thread dedicated to "requests for -current after 15.0"? Because in this thread "long-term" changes are interspersed amid "immediate" changes.

I would have asked for that "X without root privileges" feature be there, as well as, perhaps, rc.kexec (discussed in a separate thread), and libcgroup-v2 (which is being developed quite quickly, so I hope it should be available for 15.1).
I also for one vote for this; if however it is not feasible to implement this now(by default) - I do absolutely would want rootless-Xserver for 15.1

Last edited by Jeebizz; 12-16-2021 at 09:31 PM.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Requests for -current (20151216) rworkman Slackware 3441 12-28-2017 03:50 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 01:50 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration