This bug was fixed in the package linux - 3.13.0-153.203

---------------
linux (3.13.0-153.203) trusty; urgency=medium

  * linux: 3.13.0-153.203 -proposed tracker (LP: #1776819)

  * CVE-2018-3665 (x86)
    - x86/fpu: Print out whether we are doing lazy/eager FPU context switches
    - x86/fpu: Default eagerfpu=on on all CPUs
    - x86/fpu: Fix math emulation in eager fpu mode

linux (3.13.0-152.202) trusty; urgency=medium

  * linux: 3.13.0-152.202 -proposed tracker (LP: #1776350)

  * CVE-2017-15265
    - ALSA: seq: Fix use-after-free at creating a port

  * register on binfmt_misc may overflow and crash the system (LP: #1775856)
    - fs/binfmt_misc.c: do not allow offset overflow

  * CVE-2018-1130
    - dccp: check sk for closed state in dccp_sendmsg()
    - ipv6: dccp: add missing bind_conflict to dccp_ipv6_mapped

  * add_key04 in LTP syscall test cause kernel oops (NULL pointer dereference)
    with T kernel (LP: #1775316) // CVE-2017-12193
    - assoc_array: Fix a buggy node-splitting case

  * CVE-2017-12154
    - kvm: nVMX: Don't allow L2 to access the hardware CR8

  * CVE-2018-7757
    - scsi: libsas: fix memory leak in sas_smp_get_phy_events()

  * CVE-2018-6927
    - futex: Prevent overflow by strengthen input validation

  * FS-Cache: Assertion failed: FS-Cache: 6 == 5 is false (LP: #1774336)
    - SAUCE: CacheFiles: fix a read_waiter/read_copier race

  * CVE-2018-5803
    - sctp: verify size of a new chunk in _sctp_make_chunk()

  * WARNING: CPU: 28 PID: 34085 at /build/linux-
    90Gc2C/linux-3.13.0/net/core/dev.c:1433 dev_disable_lro+0x87/0x90()
    (LP: #1771480)
    - net/core: generic support for disabling netdev features down stack
    - SAUCE: Backport helper function netdev_upper_get_next_dev_rcu

  * CVE-2018-7755
    - SAUCE: floppy: Do not copy a kernel pointer to user memory in FDGETPRM 
ioctl

  * CVE-2018-5750
    - ACPI: sbshc: remove raw pointer from printk() message

 -- Stefan Bader <stefan.ba...@canonical.com>  Thu, 14 Jun 2018 07:00:42
+0200

** Changed in: linux (Ubuntu Trusty)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12154

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12193

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15265

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1130

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3665

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5750

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5803

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6927

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7755

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7757

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1771480

Title:
  WARNING: CPU: 28 PID: 34085 at /build/linux-
  90Gc2C/linux-3.13.0/net/core/dev.c:1433 dev_disable_lro+0x87/0x90()

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  Fix Released

Bug description:
  [impact]

  with a specific network configuration, a kernel WARNING is issued.

  [test case]

  configure a trusty system with e/n/i like this:

  auto bond0.2004
  iface bond0.2004 inet manual
  mtu 9100
  vlan-raw-device bond0

  auto bond0
  iface bond0 inet manual
  mtu 9100
  bond-slaves eth1 eth2
  bond-mode 802.3ad
  bond-miimon 100
  bond-use-carrier 1
  bond-lacp-rate fast
  bond-updelay 3000
  bond-downdelay 1000
  bond-ad-select bandwidth
  bond-xmit-hash-policy layer3+4
  post-up sleep 45

  auto br-mesh
  iface br-mesh inet static
  bridge_ports bond0.2004
  address 192.168.210.3/24

  auto eth1
  iface eth1 inet manual
  mtu 9100
  bond-master bond0

  auto eth2
  iface eth2 inet manual
  mtu 9100
  bond-master bond0

  
  adjusting the interface names as needed, of course.  then reboot, and the 
kernel WARNING will appear in the dmesg.

  [regression potential]

  the kernel patch has the potential to incorrectly set, or incorrectly
  not set, features on devices.

  [other info]

  previous bug description:


  I have multiple instances of this dev_disable_lro error in kern.log. Also 
seeing this:
  systemd-udevd[1452]: timeout: killing 'bridge-network-interface' [2765]
  <4>May 1 22:56:42 xxx kernel: [ 404.520990] bonding: bond0: Warning: No 
802.3ad response from the link partner for any adapters in the bond
  <4>May 1 22:56:44 xxx kernel: [ 406.926429] bonding: bond0: Warning: No 
802.3ad response from the link partner for any adapters in the bond
  <4>May 1 22:56:45 xxx kernel: [ 407.569020] ------------[ cut here 
]------------
  <4>May 1 22:56:45 xxx kernel: [ 407.569029] WARNING: CPU: 28 PID: 34085 at 
/build/linux-90Gc2C/linux-3.13.0/net/core/dev.c:1433 dev_disable_lro+0x87/0x90()
  <4>May 1 22:56:45 xxx kernel: [ 407.569032] netdevice: bond0.2004
  <4>May 1 22:56:45 xxx kernel: [ 407.569032] failed to disable LRO!
  <4>May 1 22:56:45 xxx kernel: [ 407.569035] Modules linked in: 8021q garp mrp 
bridge stp llc bonding iptable_filter ip_tables x_tables nf_conntrack_proto_gre 
nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack 
ipmi_devintf mxm_wmi dcdbas x86_pkg_temp_thermal coretemp kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd lpc_ich mei_me mei ipmi_si shpchp wmi 
acpi_power_meter mac_hid xfs libcrc32c raid10 usb_storage raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
raid0 igb ixgbe i2c_algo_bit multipath ahci dca ptp libahci pps_core linear 
megaraid_sas mdio dm_multipath scsi_dh
  <4>May 1 22:56:45 xxx kernel: [ 407.569112] CPU: 28 PID: 34085 Comm: brctl 
Not tainted 3.13.0-142-generic #191-Ubuntu
  <4>May 1 22:56:45 xxx kernel: [ 407.569115] Hardware name: Dell Inc. 
PowerEdge R730xd/072T6D, BIOS 2.7.1 001/22/2018
  <4>May 1 22:56:45 xxx kernel: [ 407.569118] 0000000000000000 ffff881fcc753c70 
ffffffff8172e7fc ffff881fcc753cb8
  <4>May 1 22:56:45 xxx kernel: [ 407.569129] 0000000000000009 ffff881fcc753ca8 
ffffffff8106afad ffff883fcc6f8000
  <4>May 1 22:56:45 xxx kernel: [ 407.569139] ffff883fcc696880 ffff883fcc6f8000 
0000000000000000 ffff881fce82dd40
  <4>May 1 22:56:45 xxx kernel: [ 407.569150] Call Trace:
  <4>May 1 22:56:45 xxx kernel: [ 407.569160] [<ffffffff8172e7fc>] 
dump_stack+0x64/0x82
  <4>May 1 22:56:45 xxx kernel: [ 407.569168] [<ffffffff8106afad>] 
warn_slowpath_common+0x7d/0xa0
  <4>May 1 22:56:45 xxx kernel: [ 407.569175] [<ffffffff8106b01c>] 
warn_slowpath_fmt+0x4c/0x50
  <4>May 1 22:56:45 xxx kernel: [ 407.569183] [<ffffffff816342f7>] 
dev_disable_lro+0x87/0x90
  <4>May 1 22:56:45 xxx kernel: [ 407.569195] [<ffffffffa03f2213>] 
br_add_if+0x1f3/0x430 [bridge]
  <4>May 1 22:56:45 xxx kernel: [ 407.569205] [<ffffffffa03f2c4d>] 
add_del_if+0x5d/0x90 [bridge]
  <4>May 1 22:56:45 xxx kernel: [ 407.569215] [<ffffffffa03f353b>] 
br_dev_ioctl+0x5b/0x90 [bridge]
  <4>May 1 22:56:45 xxx kernel: [ 407.569223] [<ffffffff81646853>] 
dev_ifsioc+0x313/0x360
  <4>May 1 22:56:45 xxx kernel: [ 407.569230] [<ffffffff8162dac9>] ? 
dev_get_by_name_rcu+0x69/0x90
  <4>May 1 22:56:45 xxx kernel: [ 407.569237] [<ffffffff81646989>] 
dev_ioctl+0xe9/0x590
  <4>May 1 22:56:45 xxx kernel: [ 407.569245] [<ffffffff81614b25>] 
sock_do_ioctl+0x45/0x50
  <4>May 1 22:56:45 xxx kernel: [ 407.569252] [<ffffffff81615050>] 
sock_ioctl+0x1f0/0x2c0
  <4>May 1 22:56:45 xxx kernel: [ 407.569260] [<ffffffff811d6670>] 
do_vfs_ioctl+0x2e0/0x4c0
  <4>May 1 22:56:45 xxx kernel: [ 407.569267] [<ffffffff811c4e2e>] ? 
____fput+0xe/0x10
  <4>May 1 22:56:45 xxx kernel: [ 407.569273] [<ffffffff811d68d1>] 
SyS_ioctl+0x81/0xa0
  <4>May 1 22:56:45 xxx kernel: [ 407.569283] [<ffffffff8173f8a5>] 
system_call_fastpath+0x2f/0x34
  <4>May 1 22:56:45 xxx kernel: [ 407.569287] ---[ end trace df5aa31d75a7e2b1 
]---
  <4>May 1 22:56:54 xxx kernel: [ 416.320138] bonding: bond1: Warning: the 
permanent HWaddr of enp131s0f0 - a0:36:9f:c1:25:d0 - is still in use by bond1. 
Set the HWaddr of enp131s0f0 to a different address to avoid conflicts.
  <4>May 1 22:57:00 xxx kernel: [ 422.362677] bonding: bond1: Warning: No 
802.3ad response from the link partner for any adapters in the bond
  <4>May 1 22:57:07 xxx kernel: [ 429.522843] ------------[ cut here 
]------------
  And here:

  <4>May 1 22:57:07 xxx kernel: [ 429.522843] ------------[ cut here 
]------------
  <4>May 1 22:57:07 xxx kernel: [ 429.522853] WARNING: CPU: 0 PID: 34191 at 
/build/linux-90Gc2C/linux-3.13.0/net/core/dev.c:1433 dev_disable_lro+0x87/0x90()
  <4>May 1 22:57:07 xxx kernel: [ 429.522857] netdevice: bond1.2001
  <4>May 1 22:57:07 xxx kernel: [ 429.522857] failed to disable LRO!
  <4>May 1 22:57:07 xxx kernel: [ 429.522861] Modules linked in: 8021q garp mrp 
bridge stp llc bonding iptable_filter ip_tables x_tables nf_conntrack_proto_gre 
nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack 
ipmi_devintf mxm_wmi dcdbas x86_pkg_temp_thermal coretemp kvm_intel kvm 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw 
gf128mul glue_helper ablk_helper cryptd lpc_ich mei_me mei ipmi_si shpchp wmi 
acpi_power_meter mac_hid xfs libcrc32c raid10 usb_storage raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 
raid0 igb ixgbe i2c_algo_bit multipath ahci dca ptp libahci pps_core linear 
megaraid_sas mdio dm_multipath scsi_dh
  <4>May 1 22:57:07 xxx kernel: [ 429.522933] CPU: 0 PID: 34191 Comm: brctl 
Tainted: G W 3.13.0-142-generic #191-Ubuntu
  <4>May 1 22:57:07 xxx kernel: [ 429.522937] Hardware name: Dell Inc. 
PowerEdge R730xd/072T6D, BIOS 2.7.1 001/22/2018
  <4>May 1 22:57:07 xxx kernel: [ 429.522940] 0000000000000000 ffff88056ca57c70 
ffffffff8172e7fc ffff88056ca57cb8
  <4>May 1 22:57:07 xxx kernel: [ 429.522951] 0000000000000009 ffff88056ca57ca8 
ffffffff8106afad ffff883fcc9a3000
  <4>May 1 22:57:07 xxx kernel: [ 429.522961] ffff881fce800880 ffff883fcc9a3000 
0000000000000000 ffff883fcdb93d40
  <4>May 1 22:57:07 xxx kernel: [ 429.522972] Call Trace:
  <4>May 1 22:57:07 xxx kernel: [ 429.522981] [<ffffffff8172e7fc>] 
dump_stack+0x64/0x82
  <4>May 1 22:57:07 xxx kernel: [ 429.522989] [<ffffffff8106afad>] 
warn_slowpath_common+0x7d/0xa0
  <4>May 1 22:57:07 xxx kernel: [ 429.522996] [<ffffffff8106b01c>] 
warn_slowpath_fmt+0x4c/0x50
  <4>May 1 22:57:07 xxx kernel: [ 429.523004] [<ffffffff816342f7>] 
dev_disable_lro+0x87/0x90
  <4>May 1 22:57:07 xxx kernel: [ 429.523016] [<ffffffffa03f2213>] 
br_add_if+0x1f3/0x430 [bridge]
  <4>May 1 22:57:07 xxx kernel: [ 429.523027] [<ffffffffa03f2c4d>] 
add_del_if+0x5d/0x90 [bridge]
  <4>May 1 22:57:07 xxx kernel: [ 429.523038] [<ffffffffa03f353b>] 
br_dev_ioctl+0x5b/0x90 [bridge]
  <4>May 1 22:57:07 xxx kernel: [ 429.523047] [<ffffffff81646853>] 
dev_ifsioc+0x313/0x360
  <4>May 1 22:57:07 xxx kernel: [ 429.523054] [<ffffffff8162dac9>] ? 
dev_get_by_name_rcu+0x69/0x90
  <4>May 1 22:57:07 xxx kernel: [ 429.523061] [<ffffffff81646989>] 
dev_ioctl+0xe9/0x590
  <4>May 1 22:57:07 xxx kernel: [ 429.523070] [<ffffffff81614b25>] 
sock_do_ioctl+0x45/0x50
  <4>May 1 22:57:07 xxx kernel: [ 429.523076] [<ffffffff81615050>] 
sock_ioctl+0x1f0/0x2c0
  <4>May 1 22:57:07 xxx kernel: [ 429.523084] [<ffffffff811d6670>] 
do_vfs_ioctl+0x2e0/0x4c0
  <4>May 1 22:57:07 xxx kernel: [ 429.523091] [<ffffffff811c4e2e>] ? 
____fput+0xe/0x10
  <4>May 1 22:57:07 xxx kernel: [ 429.523098] [<ffffffff811d68d1>] 
SyS_ioctl+0x81/0xa0
  <4>May 1 22:57:07 xxx kernel: [ 429.523107] [<ffffffff8173f8a5>] 
system_call_fastpath+0x2f/0x34
  <4>May 1 22:57:07 xxx kernel: [ 429.523111] ---[ end trace df5aa31d75a7e2b2 
]---

  root@xxx:/var/log# ip link|grep enp
  6: enp3s0f0: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9100 qdisc mq master 
bond0 state UP mode DEFAULT group default qlen 1000
  7: enp3s0f1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9100 qdisc mq master 
bond1 state UP mode DEFAULT group default qlen 1000
  8: enp131s0f0: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9100 qdisc mq 
master bond1 state UP mode DEFAULT group default qlen 1000
  9: enp131s0f1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9100 qdisc mq 
master bond0 state UP mode DEFAULT group default qlen 1000
  root@xxx:/ar/log# ethtool -i enp3s0f0
  driver: ixgbe
  version: 3.15.1-k
  firmware-version: 0x800008bd
  bus-info: 0000:03:00.0
  supports-statistics: yes
  supports-test: yes
  supports-eeprom-access: yes
  supports-register-dump: yes
  supports-priv-flags: no
  root@xxx:/var/log# lsb_release -a
  No LSB modules are available.
  Distributor ID: Ubuntu
  Description: Ubuntu 14.04.5 LTS
  Release: 14.04
  Codename: trusty
  root@xxx:/var/log# cat /proc/version
  Linux version 3.13.0-142-generic (buildd@lcy01-amd64-014) (gcc version 4.8.4 
(Ubuntu 4.8.4-2ubuntu1~14.04.3) ) #191-Ubuntu SMP Fri Feb 2 12:13:35 UTC 2018

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1771480/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to