Bugzilla – Full Text Bug Listing |
Summary: | kernel 3.16.7.-7-desktop shows davfs2 relevant bug known of kernel branch 3.17 | ||
---|---|---|---|
Product: | [openSUSE] openSUSE Distribution | Reporter: | Klaus Wolf <yanestra> |
Component: | Kernel | Assignee: | Miklos Szeredi <mszeredi> |
Status: | RESOLVED FIXED | QA Contact: | E-mail List <qa-bugs> |
Severity: | Normal | ||
Priority: | P5 - None | CC: | markcscott2003, mszeredi, tiwai |
Version: | 13.2 | ||
Target Milestone: | --- | ||
Hardware: | Other | ||
OS: | Other | ||
Whiteboard: | |||
Found By: | --- | Services Priority: | |
Business Priority: | Blocker: | --- | |
Marketing QA Status: | --- | IT Deployment: | --- |
Description
Klaus Wolf
2015-02-22 01:49:12 UTC
Miklos, could you take care of this? Commits c7f3888ad7f0 "switch iov_iter_get_pages() to passing maximal number of pages" 2c80929c4c4d "fuse: honour max_read and max_write in direct_io mode" pushed to openSUSE-13.2 branch. *** Bug 918638 has been marked as a duplicate of this bug. *** With all due respect, the bug might be fixed in the source tree, but is apparently unavailble to users. (In reply to Klaus Wolf from comment #4) > With all due respect, the bug might be fixed in the source tree, but is > apparently unavailble to users. A kernel update (including this fix) has been submitted to the maintenance process: https://build.opensuse.org/patchinfo/show/openSUSE:Maintenance:3606/patchinfo It takes a while until this is released though, because of the review and testing (normally about a week, for a kernel it takes a bit longer apparently). If you want to install/test the update _now_, the packages are available from the update-test repo: http://download.opensuse.org/update/13.2-test/ Thank you. I understand that there are difficulties before releasing a kernel patch. It's just that we are not long before next OpenSUSE release, and it might obviously happen, that instead of fixing, you will ignore it. Like the 17 versions before, you did. You incorporate the fix in your next release but don't fix the current one. FIX THE DAMN BUG PLEASE NOW. The actutal fix is long time incorparated in the mainline kernel. Note that user can get the kernel packages built from the latest git branch in OBS Kernel:openSUSE-13.2 repo, too. It's been available all the time. Absolutely, you can get the kernel sources all the time. But it's a thing difficult for a normal user to integrate e.g. nvidia drivers or such alike. If you try, your system will simply break. (In reply to Klaus Wolf from comment #6) > Thank you. I understand that there are difficulties before releasing a > kernel patch. > > It's just that we are not long before next OpenSUSE release, and it might > obviously happen, that instead of fixing, you will ignore it. Like the 17 > versions before, you did. > > You incorporate the fix in your next release but don't fix the current one. > > FIX THE DAMN BUG PLEASE NOW. What are you talking about? The bug has been fixed, an update with the fix has been submitted to the maintenance process, and it will be released (for 13.2) after it has gone through that process. You attendance is annoying, Wofgang Bauer. (In reply to Klaus Wolf from comment #10) > You attendance is annoying, Wofgang Bauer. Your's too. (In reply to Klaus Wolf from comment #8) > Absolutely, you can get the kernel sources all the time. No, no, you'll get the binary kernel-* rpm files built from the latest git branch in the given OBS repository: http://download.opensuse.org/repositories/Kernel:/openSUSE-13.2/standard/ You can add this repo like: zypper ar obs://Kernel:/openSUSE-13.2/standard KOTD and zypper up -r KOTD -f kernel-desktop and reboot. That's all. This is no official update release, so thie kernel itself isn't tested by QA. But it contains the latest fixes applied to openSUSE-13.2 git branch. Obviously, you're making it a joke. Quite funny. There is no way for me on further using OpenSUSE. Case CLOSED. Let's close, really. *** Bug 925498 has been marked as a duplicate of this bug. *** openSUSE-SU-2015:0713-1: An update that solves 13 vulnerabilities and has 52 fixes is now available. Category: security (important) Bug References: 867199,893428,895797,900811,901925,903589,903640,904899,905681,907039,907818,907988,908582,908588,908589,908592,908593,908594,908596,908598,908603,908604,908605,908606,908608,908610,908612,909077,909078,909477,909634,910150,910322,910440,911311,911325,911326,911356,911438,911578,911835,912061,912202,912429,912705,913059,913466,913695,914175,915425,915454,915456,915577,915858,916608,917830,917839,918954,918970,919463,920581,920604,921313,922542,922944 CVE References: CVE-2014-8134,CVE-2014-8160,CVE-2014-8559,CVE-2014-9419,CVE-2014-9420,CVE-2014-9428,CVE-2014-9529,CVE-2014-9584,CVE-2014-9585,CVE-2015-0777,CVE-2015-1421,CVE-2015-1593,CVE-2015-2150 Sources used: openSUSE 13.2 (src): bbswitch-0.8-3.6.6, cloop-2.639-14.6.6, crash-7.0.8-6.6, hdjmod-1.28-18.7.6, ipset-6.23-6.6, kernel-docs-3.16.7-13.2, kernel-obs-build-3.16.7-13.7, kernel-obs-qa-3.16.7-13.1, kernel-obs-qa-xen-3.16.7-13.1, kernel-source-3.16.7-13.1, kernel-syms-3.16.7-13.1, pcfclock-0.44-260.6.2, vhba-kmp-20140629-2.6.2, virtualbox-4.3.20-10.2, xen-4.4.1_08-12.2, xtables-addons-2.6-6.2 |