** Tags removed: kernel-bug-break-fix
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1486146
Title:
recvfrom SYSCALL infinite loop/deadlock chewing 100% CPU
(MSG_PEEK|MSG_WAITALL)
This bug was fixed in the package linux-lts-utopic -
3.16.0-50.66~14.04.1
---
linux-lts-utopic (3.16.0-50.66~14.04.1) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1494371
[ Chris J Arges ]
* [Config] DEFAULT_IOSCHED="deadline" for ppc64el
-
This bug was fixed in the package linux - 3.19.0-30.33
---
linux (3.19.0-30.33) vivid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1498065
* Revert "[Config]
MFD_INTEL_LPSS/MFD_INTEL_LPSS_ACPI/MFD_INTEL_LPSS_PCI=m"
- LP: #1498137
* [Config] Disable
This bug was fixed in the package linux - 3.13.0-65.105
---
linux (3.13.0-65.105) trusty; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1498108
[ Upstream Kernel Changes ]
* net: Fix skb_set_peeked use-after-free bug
- LP: #1497184
linux
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1486146
Title:
recvfrom SYSCALL infinite loop/deadlock
Verified this is fixed in Wily.
** Changed in: linux (Ubuntu Wily)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1486146
Title:
recvfrom
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1486146
Title:
recvfrom SYSCALL infinite loop/deadlock
Hi Dan,
Can you verify this bug is now fixed in the -proposed kernel as
requested in comments 5 and 6?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1486146
Title:
recvfrom SYSCALL
** No longer affects: linux-lts-utopic (Ubuntu)
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-lts-utopic in Ubuntu.
https://bugs.launchpad.net/bugs/1486146
Title:
recvfrom SYSCALL infinite loop/deadlock chewing 100% CPU
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1486146
Title:
recvfrom SYSCALL infinite loop/deadlock chewing 100% CPU
** Changed in: linux-lts-utopic (Ubuntu)
Status: New => Fix Committed
** Changed in: linux-lts-utopic (Ubuntu)
Importance: Undecided => High
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Importance: Undecided => High
--
You received this bug notification because you are a member
** Tags added: kernel-bug-break-fix
** Description changed:
In a multi-threaded pthreads process running on Ubuntu 14.04 AMD64 (with
over 1000 threads) which uses real time FIFO scheduling, we occasionally
see calls to recv() with flags (MSG_PEEK | MSG_WAITALL) get stuck in an
infinte
** Also affects: linux-lts-utopic (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-lts-utopic (Ubuntu Wily)
** No longer affects: linux-lts-utopic (Ubuntu Vivid)
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New = Fix Committed
** Changed in:
Thanks for testing, Dan. I'll submit a SRU request for this commit to
be included in all Ubuntu releases.
** Changed in: linux (Ubuntu Trusty)
Status: Triaged = In Progress
** Changed in: linux (Ubuntu Vivid)
Status: Triaged = In Progress
** Changed in: linux (Ubuntu Wily)
Hi Joseph,
I re-created the issue on a new install of Ubuntu 14.04.3 (amd64)
running the linux-image-3.19.0-26-generic kernel using the following
code:
#include stdlib.h
#include netinet/ip.h
int main(void)
{
struct sockaddr_in addr = {
According to the upstream bug:
This bug is now fixed in the net tree:
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=dfbafc995304ebb9a9b03f65083e6e9cea143b20;
This commit is already applied to mainline:
$ git describe --contains dfbafc995304ebb9a9b03f65083e6e9cea143b20
I built a Trusty test kernel with a cherry-pick of dfbafc99. This test
kernel can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1486146/
Can you test this kernel and see if it resolves this bug?
Thanks in advance!
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
19 matches
Mail list logo