This bug was fixed in the package linux - 4.13.0-25.29
---
linux (4.13.0-25.29) artful; urgency=low
* linux: 4.13.0-25.29 -proposed tracker (LP: #1741955)
* CVE-2017-5754
- Revert "UBUNTU: [Config] updateconfigs to enable PTI"
- [Config] Enable PTI with UNWINDER_FRAME_POI
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package linux-aws - 4.4.0-1005.5
---
linux-aws (4.4.0-1005.5) trusty; urgency=low
* linux-aws: 4.4.0-1005.5 -proposed tracker (LP: #1736182)
* Update config with NET_DSA=n as required by changes in
upstream stable update to 4.4.98 (LP: #1732698)
This bug was fixed in the package linux - 4.13.0-19.22
---
linux (4.13.0-19.22) artful; urgency=low
* linux: 4.13.0-19.22 -proposed tracker (LP: #1736118)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
linux (4.13.0-18.21) artful
This bug was fixed in the package linux - 4.10.0-42.46
---
linux (4.10.0-42.46) zesty; urgency=low
* linux: 4.10.0-42.46 -proposed tracker (LP: #1736152)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
- ips
This bug was fixed in the package linux - 3.13.0-137.186
---
linux (3.13.0-137.186) trusty; urgency=low
* linux: 3.13.0-137.186 -proposed tracker (LP: #1736194)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 3.13.0-137.186
---
linux (3.13.0-137.186) trusty; urgency=low
* linux: 3.13.0-137.186 -proposed tracker (LP: #1736194)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
This bug was fixed in the package linux - 4.4.0-103.126
---
linux (4.4.0-103.126) xenial; urgency=low
* linux: 4.4.0-103.126 -proposed tracker (LP: #1736181)
* CVE-2017-1000405
- mm, thp: Do not make page table dirty unconditionally in touch_p[mu]d()
* CVE-2017-16939
-
[VERIFICATION TRUSTY]
#changelog
linux (3.13.0-136.185) trusty; urgency=low
* linux: 3.13.0-136.185 -proposed tracker (LP: #1734733)
* NVMe timeout is too short (LP: #1729119)
- NVMe: Make I/O timeout a module parameter
- nvme: update timeout module parameter type
# lsb_release -r
[VERIFICATION ARTFUL]
# rmadison
linux-image-4.13.0-18-generic | 4.13.0-18.21 | artful-proposed |
amd64, arm64, armhf, i386, ppc64el, s390x
# apt-get changelog linux-image-4.13.0-18-generic
* NVMe timeout is too short (LP: #1729119)
- nvme: update timeout module parameter type
#
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'. If the problem still exists,
change the tag 'verifica
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
artful' to 'verification-done-artful'. If the problem still exists,
change the tag 'verifica
[VERIFICATION ZESTY]
# rmadison
linux-image-4.10.0-41-generic | 4.10.0-41.45 | zesty-proposed | amd64,
arm64, armhf, i386, ppc64el, s390x
# lsb_release -r
Release:17.04
# apt-get changelog linux-image-4.10.0-41-generic | grep -A2 1729119
* NVMe timeout is too short (LP: #17
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
zesty' to 'verification-done-zesty'. If the problem still exists, change
the tag 'verificati
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1729119
Title:
NVMe timeout is too short
Status in li
Patches has been submitted by Daniel to kernel-team ML for Trusty kernel
(v3.13) as follow :
[SRU][T][PATCH 0/2] LP#1729119: NVMe timeout parameter type change
[SRU][T][PATCH 1/2] NVMe: Make I/O timeout a module parameter
[SRU][T][PATCH 2/2] nvme: update timeout module parameter type
** Also af
** Description changed:
[SRU Justification]
[Impact]
- Some NVMe operations time out too quickly. The module parameters allow the
timeouts to be extended, but only up to 255s, as the counters are bytes.
+ Some NVMe operations time out too quickly. The module parameters allow the
timeouts
** Changed in: linux (Ubuntu Artful)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Artful)
Status: New => Fix Committed
** Changed in: linux (Ubuntu Zesty)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Zesty)
Status: New => Fix Committed
** Chan
This bug was fixed in the package linux-aws - 4.4.0-1003.3
---
linux-aws (4.4.0-1003.3) trusty; urgency=low
* linux-aws: 4.4.0-1003.3 -proposed tracker (LP: #1729277)
* Remove vmbus-rdma driver from Xenial kernel (LP: #1721538)
- [config] update config for master changes
*
This bug was fixed in the package linux-aws - 4.4.0-1041.50
---
linux-aws (4.4.0-1041.50) xenial; urgency=low
* linux-aws: 4.4.0-1041.50 -proposed tracker (LP: #1732535)
* xen hibernation support for linux-aws (LP: #1732512)
- aws: [Config] disable SUSPEND
- aws: [Config]
** Also affects: linux (Ubuntu Artful)
Importance: Undecided
Status: New
** Also affects: linux-aws (Ubuntu Artful)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Zesty)
Importance: Undecided
Status: New
** Also affects: linux-aws (Ubuntu Zesty)
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-aws in Ubuntu.
https://bugs.launchpad.net/bugs/1729119
Title:
NVMe timeout is too short
Status in
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'. If the problem still exists,
change the tag 'verifica
** Changed in: linux-aws (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1729119
Title:
NVMe timeout is too short
Status in linux pack
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: New
** Also affects: linux-aws (Ubuntu Xenial)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
htt
** Also affects: linux-aws (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-aws (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/
26 matches
Mail list logo