Public bug reported:

[Impact]
on ARM64 servers we observe call trace "arm64/mm: Found insecure W+X mapping at 
address 0000000000a99000/0xa99000" while booting. These messages are a false 
positive and triggered at random.

[Test]
There is no reliable way to reproduce these warnings, they are triggered at 
random. But these messages can appear on any ARM64 server Cavium, Qualcomm etc. 

[Fix]
Upstream fix is available in linux-next

65d313ee1a7d init: fix false positives in W+X checking

[Regression Potential]
potential for any regression is low.

** Affects: linux (Ubuntu)
     Importance: High
         Status: Incomplete


** Tags: bionic qdf2400

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1769696

Title:
  [SRU][Bionic] fix false positives in W+X checking

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]
  on ARM64 servers we observe call trace "arm64/mm: Found insecure W+X mapping 
at address 0000000000a99000/0xa99000" while booting. These messages are a false 
positive and triggered at random.

  [Test]
  There is no reliable way to reproduce these warnings, they are triggered at 
random. But these messages can appear on any ARM64 server Cavium, Qualcomm etc. 

  [Fix]
  Upstream fix is available in linux-next

  65d313ee1a7d init: fix false positives in W+X checking

  [Regression Potential]
  potential for any regression is low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1769696/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to