SlackwareThis Forum is for the discussion of Slackware Linux.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Yes, it was a long time since the last release, but that doesn't matter. In my opinion a release should be free of important bugs[1] at the time of release and I think this wasn't the case here.
Like I said, most people will know how to fix this bugs and most people will not be affected anyway. But since I am affected I feel just a little bit like I am invited to a party where the bar hasn't my favourite beverage, that's all
[1] "Important bug" means a bug which has a major effect on the usability of a package, without rendering it completely unusable to everyone.
Unfortunately, your report came too late. Pat knew we were towards the end, saw your report, included the proposed upstream fix, and before you stated it didn't work, he had already finalized 14.2 and started the release process (even if we didn't see if until the next day). He wrote the changelog announcement of 14.2 on 30 JUN 2016 @ 20:26 UTC (which is around 4:30PM Eastern Daylight Time). You didn't reply to your thread until almost 24 hours later (1:50PM EDT).
He had the 4.4.14 kernel in there since 24 June, so it seems like if this was reported earlier, a fix that was tested might've made it in to 14.2. As it stands, he took the fix that was proposed by the upstream people and assumed it would work.
Unfortunately, bugs will always exist in stable products. Long development cycles like this one help to minimize them (and he did minimize a TON, especially these last few weeks), but they won't get rid of all of them. Luckily, your issue won't be a problem during a stock install (only upgrades where you already have that encryption set up). You can safely install Slackware, install the needed fix, then set up your encryption as needed.
In his case, an upgrade would likely have the encryption already set up, so once he booted up, it would fail to mount. On a new install, he would have to set up that encryption, so he could install the fix before he creates the encryption.
A little late to the party here. A hearty "thank you" & tip of the hat to Pat and the team for the stellar work they do. Eagerly awaiting my subscription dvd. I've been running -current for several years now, and the best just keeps on getting better. Slackware.....what else can be said!
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.