Not sure why this didn't close automatically. As far as I can tell
Xenial commit e728c9a3629770bc73bc2f884feeaf901801c28f ('x86/mm: Fix
slow_virt_to_phys() for X86_PAE again') was released in Ubuntu--
4.4.0-13.28
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Fix Released
Will these patches be released in final 16.04?
I see that commit bf70e5513dfea29c3682e7eb3dbb45f0723bac09 is present in
the xenial kernel source.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
This bug was fixed in the package linux - 3.13.0-85.129
---
linux (3.13.0-85.129) trusty; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1558727
[ Upstream Kernel Changes ]
* Revert "Revert "af_unix: Revert 'lock_interruptible' in stream receive
code""
This bug was fixed in the package linux - 4.2.0-35.40
---
linux (4.2.0-35.40) wily; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1557706
[ Upstream Kernel Changes ]
* Revert "workqueue: make sure delayed work run in local cpu"
- LP: #1556269
* Revert
Verified this and confirmed as good with the following:
- Trusty - proposed kernel 3.13.0.85.91
- Wily - proposed kernel 4.2.0.35.38
** Tags removed: verification-needed-trusty verification-needed-wily
** Tags added: verification-done-trusty verification-done-wily
--
You received this bug
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1549601
Title:
[Hyper-V] x86,pageattr: prevent overflow in slow_virt_to_phys()
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1549601
Title:
[Hyper-V] x86,pageattr: prevent overflow
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
I submitted the SRU request, which is prior to the March 11th cutoff, so
this fix should be in the next SRU cycle.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1549601
Title:
Hi Joe,
Adrian is from my team and his test results are valid. Can you please confirm
that this patch will be included in the March 11th SRUs?
Thank you!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
Hi!
I tested all three kernels on both WS2012R2 and WS2008R2 and I got good
results. Netvsc driver loaded successfully everytime with different
memory settings. You can merge the patches.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to
I also built a Wily and Trusty test kernel with commit bf70e551. Those
kernels can be downloaded from:
Wily: http://kernel.ubuntu.com/~jsalisbury/lp1549601/wily
Trusty: http://kernel.ubuntu.com/~jsalisbury/lp1549601/trusty
Can you also test this kernels? If we can receive positive test
I built a Xenial test kernel with commit bf70e551. The test kernel can
be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1549601/xenial/
Can you test this kernel and see if it resolves this bug?
I'm also building test kernels for Wily and Trusty. The have slightly
different backports
** Changed in: linux (Ubuntu Xenial)
Assignee: (unassigned) => Joseph Salisbury (jsalisbury)
** Changed in: linux (Ubuntu Wily)
Assignee: (unassigned) => Joseph Salisbury (jsalisbury)
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Joseph Salisbury (jsalisbury)
**
** Changed in: linux (Ubuntu Wily)
Status: New => Triaged
** Changed in: linux (Ubuntu Trusty)
Status: New => Triaged
** Changed in: linux (Ubuntu Wily)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Trusty)
Importance: Undecided => Medium
--
You received
** Also affects: linux (Ubuntu Xenial)
Importance: Medium
Status: Triaged
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because
Commit:
https://git.kernel.org/cgit/linux/kernel/git/tip/tip.git/commit/?id=bf70e5513dfea29c3682e7eb3dbb45f0723bac09
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1549601
Title:
I'm expecting an upstream fix for this problem soon, based on this
discussion (lkml):
>From Dexuan Cui:
"d1cd12108346: x86, pageattr: Prevent overflow in slow_virt_to_phys() for
X86_PAE"
was unintentionally removed by the recent
"34437e67a672: x86/mm: Fix slow_virt_to_phys() to handle large PAT
** Tags added: kernel-da-key kernel-hyper-v
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu)
Status: Confirmed => Triaged
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in
Thanks for your analysis Dexuan, I had not had a change to look at the
mainline differences yet.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1549601
Title:
[Hyper-V] x86,pageattr:
Good catch Chris!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1549601
Title:
[Hyper-V] x86,pageattr: prevent overflow in slow_virt_to_phys() for
X86_PAE
Status in linux package in
** Changed in: linux (Ubuntu)
Status: Incomplete => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1549601
Title:
[Hyper-V] x86,pageattr: prevent overflow in
It turns out the issue also exists in the latest mainline kernel!
The fix "x86, pageattr: Prevent overflow in slow_virt_to_phys() for X86_PAE" is
there, but a later patch "x86/mm: Fix slow_virt_to_phys() to handle large PAT
bit"
25 matches
Mail list logo