This bug was fixed in the package linux - 3.13.0-39.66
---
linux (3.13.0-39.66) trusty; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1386629
[ Upstream Kernel Changes ]
* KVM: x86: Check non-canonical addresses upon WRMSR
- LP: #1384539
-
No crashes so far with 3.13.0-38-generic, looks like it's fixed.
** Tags removed: verification-needed-trusty
** Tags added: verification-done-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
We installed 3.13.0-38-generic from proposed during a maintenance today on one
of the initially affected server.
We'll provide an update soon.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
This patch fixes an issue with a currently applied patch to the ubuntu-
trusty kernel. If the patch was applied to 3.13.11.y, I would suggest it
go through the stable process and be applied there (and in fact it is
applied to other stables). Overall it would be best if the original
reporter could
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from
** Branch linked: lp:ubuntu/trusty-proposed/linux-keystone
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851
Title:
Kernel panic skb_segment+0x5d7/0x980
Status in “linux” package
** Branch linked: lp:ubuntu/precise-proposed/linux-lts-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851
Title:
Kernel panic skb_segment+0x5d7/0x980
Status in “linux”
** Changed in: linux (Ubuntu Trusty)
Status: Confirmed = Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851
Title:
Kernel panic skb_segment+0x5d7/0x980
Status
Can't test with the 3.13 mainline as these are productive servers and we can't
risk another outage at this time.
As mentioned in the first post it in appears to be fixed in the 3.16 mainline
kernel.
** Tags added: kernel-unable-to-test-upstream
** Changed in: linux (Ubuntu)
Status:
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Utopic)
Importance: High
Status: Confirmed
** Changed in: linux (Ubuntu Trusty)
Status: New = Confirmed
** Changed in: linux (Ubuntu Trusty)
Importance:
I strongly suspect this patch:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c3caf1192f904de2f1381211f564537235d50de3
And regardless this patch should be applied to 3.13.y, so I'll send an
email to include it.
--
You received this bug notification because you are a
backtrace already posted
** Changed in: linux (Ubuntu)
Status: Incomplete = Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1377851
Title:
Kernel panic
Would it be possible for you to test the latest upstream stable kernel?
Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the
latest v3.13 stable kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel
13 matches
Mail list logo