I built a Bionic test kernel with commits b0a182f8 and cc51e542.  The test 
kernel can be downloaded from:
http://kernel.ubuntu.com/~jsalisbury/lp1789834/bionic

Can you test this kernel and see if it resolves this bug?

Note about installing test kernels:
• If the test kernel is prior to 4.15(Bionic) you need to install the 
linux-image and linux-image-extra .deb packages.
• If the test kernel is 4.15(Bionic) or newer, you need to install the 
linux-modules, linux-modules-extra and linux-image-unsigned .deb packages.

Thanks in advance!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1789834

Title:
  off-by-one bug in L1TF mitigation

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  Triaged
Status in linux source package in Xenial:
  Triaged
Status in linux source package in Bionic:
  Triaged

Bug description:
  due to an off-by-one bug in the L1TF patch, the "rare" case of systems still 
vulnerable
  is more frequent.

  This typically happens on Nehalem+ destop/entry-level server systems
  with 32G memory installed.

  Originally this was reported in OpenSUSE, but I can confirm this is
  also happens with the latest trusty kernel (3.13.0-157-generic)

  
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b0a182f875689647b014bc01d36b340217792852

  The following patch increases the memory limit for the mitigation on
  these systems in general:

  
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?h=x86/urgent&id=cc51e5428ea54f575d49cfcede1d4cb3a72b4ec4

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1789834/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to