This bug was fixed in the package linux - 3.13.0-153.203 --------------- linux (3.13.0-153.203) trusty; urgency=medium
* linux: 3.13.0-153.203 -proposed tracker (LP: #1776819) * CVE-2018-3665 (x86) - x86/fpu: Print out whether we are doing lazy/eager FPU context switches - x86/fpu: Default eagerfpu=on on all CPUs - x86/fpu: Fix math emulation in eager fpu mode linux (3.13.0-152.202) trusty; urgency=medium * linux: 3.13.0-152.202 -proposed tracker (LP: #1776350) * CVE-2017-15265 - ALSA: seq: Fix use-after-free at creating a port * register on binfmt_misc may overflow and crash the system (LP: #1775856) - fs/binfmt_misc.c: do not allow offset overflow * CVE-2018-1130 - dccp: check sk for closed state in dccp_sendmsg() - ipv6: dccp: add missing bind_conflict to dccp_ipv6_mapped * add_key04 in LTP syscall test cause kernel oops (NULL pointer dereference) with T kernel (LP: #1775316) // CVE-2017-12193 - assoc_array: Fix a buggy node-splitting case * CVE-2017-12154 - kvm: nVMX: Don't allow L2 to access the hardware CR8 * CVE-2018-7757 - scsi: libsas: fix memory leak in sas_smp_get_phy_events() * CVE-2018-6927 - futex: Prevent overflow by strengthen input validation * FS-Cache: Assertion failed: FS-Cache: 6 == 5 is false (LP: #1774336) - SAUCE: CacheFiles: fix a read_waiter/read_copier race * CVE-2018-5803 - sctp: verify size of a new chunk in _sctp_make_chunk() * WARNING: CPU: 28 PID: 34085 at /build/linux- 90Gc2C/linux-3.13.0/net/core/dev.c:1433 dev_disable_lro+0x87/0x90() (LP: #1771480) - net/core: generic support for disabling netdev features down stack - SAUCE: Backport helper function netdev_upper_get_next_dev_rcu * CVE-2018-7755 - SAUCE: floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl * CVE-2018-5750 - ACPI: sbshc: remove raw pointer from printk() message -- Stefan Bader <stefan.ba...@canonical.com> Thu, 14 Jun 2018 07:00:42 +0200 ** Changed in: linux (Ubuntu Trusty) Status: Fix Committed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12154 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-12193 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15265 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1130 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3665 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5750 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5803 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6927 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7755 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-7757 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1771480 Title: WARNING: CPU: 28 PID: 34085 at /build/linux- 90Gc2C/linux-3.13.0/net/core/dev.c:1433 dev_disable_lro+0x87/0x90() Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: Fix Released Bug description: [impact] with a specific network configuration, a kernel WARNING is issued. [test case] configure a trusty system with e/n/i like this: auto bond0.2004 iface bond0.2004 inet manual mtu 9100 vlan-raw-device bond0 auto bond0 iface bond0 inet manual mtu 9100 bond-slaves eth1 eth2 bond-mode 802.3ad bond-miimon 100 bond-use-carrier 1 bond-lacp-rate fast bond-updelay 3000 bond-downdelay 1000 bond-ad-select bandwidth bond-xmit-hash-policy layer3+4 post-up sleep 45 auto br-mesh iface br-mesh inet static bridge_ports bond0.2004 address 192.168.210.3/24 auto eth1 iface eth1 inet manual mtu 9100 bond-master bond0 auto eth2 iface eth2 inet manual mtu 9100 bond-master bond0 adjusting the interface names as needed, of course. then reboot, and the kernel WARNING will appear in the dmesg. [regression potential] the kernel patch has the potential to incorrectly set, or incorrectly not set, features on devices. [other info] previous bug description: I have multiple instances of this dev_disable_lro error in kern.log. Also seeing this: systemd-udevd[1452]: timeout: killing 'bridge-network-interface' [2765] <4>May 1 22:56:42 xxx kernel: [ 404.520990] bonding: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond <4>May 1 22:56:44 xxx kernel: [ 406.926429] bonding: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond <4>May 1 22:56:45 xxx kernel: [ 407.569020] ------------[ cut here ]------------ <4>May 1 22:56:45 xxx kernel: [ 407.569029] WARNING: CPU: 28 PID: 34085 at /build/linux-90Gc2C/linux-3.13.0/net/core/dev.c:1433 dev_disable_lro+0x87/0x90() <4>May 1 22:56:45 xxx kernel: [ 407.569032] netdevice: bond0.2004 <4>May 1 22:56:45 xxx kernel: [ 407.569032] failed to disable LRO! <4>May 1 22:56:45 xxx kernel: [ 407.569035] Modules linked in: 8021q garp mrp bridge stp llc bonding iptable_filter ip_tables x_tables nf_conntrack_proto_gre nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack ipmi_devintf mxm_wmi dcdbas x86_pkg_temp_thermal coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd lpc_ich mei_me mei ipmi_si shpchp wmi acpi_power_meter mac_hid xfs libcrc32c raid10 usb_storage raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 raid0 igb ixgbe i2c_algo_bit multipath ahci dca ptp libahci pps_core linear megaraid_sas mdio dm_multipath scsi_dh <4>May 1 22:56:45 xxx kernel: [ 407.569112] CPU: 28 PID: 34085 Comm: brctl Not tainted 3.13.0-142-generic #191-Ubuntu <4>May 1 22:56:45 xxx kernel: [ 407.569115] Hardware name: Dell Inc. PowerEdge R730xd/072T6D, BIOS 2.7.1 001/22/2018 <4>May 1 22:56:45 xxx kernel: [ 407.569118] 0000000000000000 ffff881fcc753c70 ffffffff8172e7fc ffff881fcc753cb8 <4>May 1 22:56:45 xxx kernel: [ 407.569129] 0000000000000009 ffff881fcc753ca8 ffffffff8106afad ffff883fcc6f8000 <4>May 1 22:56:45 xxx kernel: [ 407.569139] ffff883fcc696880 ffff883fcc6f8000 0000000000000000 ffff881fce82dd40 <4>May 1 22:56:45 xxx kernel: [ 407.569150] Call Trace: <4>May 1 22:56:45 xxx kernel: [ 407.569160] [<ffffffff8172e7fc>] dump_stack+0x64/0x82 <4>May 1 22:56:45 xxx kernel: [ 407.569168] [<ffffffff8106afad>] warn_slowpath_common+0x7d/0xa0 <4>May 1 22:56:45 xxx kernel: [ 407.569175] [<ffffffff8106b01c>] warn_slowpath_fmt+0x4c/0x50 <4>May 1 22:56:45 xxx kernel: [ 407.569183] [<ffffffff816342f7>] dev_disable_lro+0x87/0x90 <4>May 1 22:56:45 xxx kernel: [ 407.569195] [<ffffffffa03f2213>] br_add_if+0x1f3/0x430 [bridge] <4>May 1 22:56:45 xxx kernel: [ 407.569205] [<ffffffffa03f2c4d>] add_del_if+0x5d/0x90 [bridge] <4>May 1 22:56:45 xxx kernel: [ 407.569215] [<ffffffffa03f353b>] br_dev_ioctl+0x5b/0x90 [bridge] <4>May 1 22:56:45 xxx kernel: [ 407.569223] [<ffffffff81646853>] dev_ifsioc+0x313/0x360 <4>May 1 22:56:45 xxx kernel: [ 407.569230] [<ffffffff8162dac9>] ? dev_get_by_name_rcu+0x69/0x90 <4>May 1 22:56:45 xxx kernel: [ 407.569237] [<ffffffff81646989>] dev_ioctl+0xe9/0x590 <4>May 1 22:56:45 xxx kernel: [ 407.569245] [<ffffffff81614b25>] sock_do_ioctl+0x45/0x50 <4>May 1 22:56:45 xxx kernel: [ 407.569252] [<ffffffff81615050>] sock_ioctl+0x1f0/0x2c0 <4>May 1 22:56:45 xxx kernel: [ 407.569260] [<ffffffff811d6670>] do_vfs_ioctl+0x2e0/0x4c0 <4>May 1 22:56:45 xxx kernel: [ 407.569267] [<ffffffff811c4e2e>] ? ____fput+0xe/0x10 <4>May 1 22:56:45 xxx kernel: [ 407.569273] [<ffffffff811d68d1>] SyS_ioctl+0x81/0xa0 <4>May 1 22:56:45 xxx kernel: [ 407.569283] [<ffffffff8173f8a5>] system_call_fastpath+0x2f/0x34 <4>May 1 22:56:45 xxx kernel: [ 407.569287] ---[ end trace df5aa31d75a7e2b1 ]--- <4>May 1 22:56:54 xxx kernel: [ 416.320138] bonding: bond1: Warning: the permanent HWaddr of enp131s0f0 - a0:36:9f:c1:25:d0 - is still in use by bond1. Set the HWaddr of enp131s0f0 to a different address to avoid conflicts. <4>May 1 22:57:00 xxx kernel: [ 422.362677] bonding: bond1: Warning: No 802.3ad response from the link partner for any adapters in the bond <4>May 1 22:57:07 xxx kernel: [ 429.522843] ------------[ cut here ]------------ And here: <4>May 1 22:57:07 xxx kernel: [ 429.522843] ------------[ cut here ]------------ <4>May 1 22:57:07 xxx kernel: [ 429.522853] WARNING: CPU: 0 PID: 34191 at /build/linux-90Gc2C/linux-3.13.0/net/core/dev.c:1433 dev_disable_lro+0x87/0x90() <4>May 1 22:57:07 xxx kernel: [ 429.522857] netdevice: bond1.2001 <4>May 1 22:57:07 xxx kernel: [ 429.522857] failed to disable LRO! <4>May 1 22:57:07 xxx kernel: [ 429.522861] Modules linked in: 8021q garp mrp bridge stp llc bonding iptable_filter ip_tables x_tables nf_conntrack_proto_gre nf_conntrack_ipv6 nf_defrag_ipv6 nf_conntrack_ipv4 nf_defrag_ipv4 nf_conntrack ipmi_devintf mxm_wmi dcdbas x86_pkg_temp_thermal coretemp kvm_intel kvm crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd lpc_ich mei_me mei ipmi_si shpchp wmi acpi_power_meter mac_hid xfs libcrc32c raid10 usb_storage raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 raid0 igb ixgbe i2c_algo_bit multipath ahci dca ptp libahci pps_core linear megaraid_sas mdio dm_multipath scsi_dh <4>May 1 22:57:07 xxx kernel: [ 429.522933] CPU: 0 PID: 34191 Comm: brctl Tainted: G W 3.13.0-142-generic #191-Ubuntu <4>May 1 22:57:07 xxx kernel: [ 429.522937] Hardware name: Dell Inc. PowerEdge R730xd/072T6D, BIOS 2.7.1 001/22/2018 <4>May 1 22:57:07 xxx kernel: [ 429.522940] 0000000000000000 ffff88056ca57c70 ffffffff8172e7fc ffff88056ca57cb8 <4>May 1 22:57:07 xxx kernel: [ 429.522951] 0000000000000009 ffff88056ca57ca8 ffffffff8106afad ffff883fcc9a3000 <4>May 1 22:57:07 xxx kernel: [ 429.522961] ffff881fce800880 ffff883fcc9a3000 0000000000000000 ffff883fcdb93d40 <4>May 1 22:57:07 xxx kernel: [ 429.522972] Call Trace: <4>May 1 22:57:07 xxx kernel: [ 429.522981] [<ffffffff8172e7fc>] dump_stack+0x64/0x82 <4>May 1 22:57:07 xxx kernel: [ 429.522989] [<ffffffff8106afad>] warn_slowpath_common+0x7d/0xa0 <4>May 1 22:57:07 xxx kernel: [ 429.522996] [<ffffffff8106b01c>] warn_slowpath_fmt+0x4c/0x50 <4>May 1 22:57:07 xxx kernel: [ 429.523004] [<ffffffff816342f7>] dev_disable_lro+0x87/0x90 <4>May 1 22:57:07 xxx kernel: [ 429.523016] [<ffffffffa03f2213>] br_add_if+0x1f3/0x430 [bridge] <4>May 1 22:57:07 xxx kernel: [ 429.523027] [<ffffffffa03f2c4d>] add_del_if+0x5d/0x90 [bridge] <4>May 1 22:57:07 xxx kernel: [ 429.523038] [<ffffffffa03f353b>] br_dev_ioctl+0x5b/0x90 [bridge] <4>May 1 22:57:07 xxx kernel: [ 429.523047] [<ffffffff81646853>] dev_ifsioc+0x313/0x360 <4>May 1 22:57:07 xxx kernel: [ 429.523054] [<ffffffff8162dac9>] ? dev_get_by_name_rcu+0x69/0x90 <4>May 1 22:57:07 xxx kernel: [ 429.523061] [<ffffffff81646989>] dev_ioctl+0xe9/0x590 <4>May 1 22:57:07 xxx kernel: [ 429.523070] [<ffffffff81614b25>] sock_do_ioctl+0x45/0x50 <4>May 1 22:57:07 xxx kernel: [ 429.523076] [<ffffffff81615050>] sock_ioctl+0x1f0/0x2c0 <4>May 1 22:57:07 xxx kernel: [ 429.523084] [<ffffffff811d6670>] do_vfs_ioctl+0x2e0/0x4c0 <4>May 1 22:57:07 xxx kernel: [ 429.523091] [<ffffffff811c4e2e>] ? ____fput+0xe/0x10 <4>May 1 22:57:07 xxx kernel: [ 429.523098] [<ffffffff811d68d1>] SyS_ioctl+0x81/0xa0 <4>May 1 22:57:07 xxx kernel: [ 429.523107] [<ffffffff8173f8a5>] system_call_fastpath+0x2f/0x34 <4>May 1 22:57:07 xxx kernel: [ 429.523111] ---[ end trace df5aa31d75a7e2b2 ]--- root@xxx:/var/log# ip link|grep enp 6: enp3s0f0: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9100 qdisc mq master bond0 state UP mode DEFAULT group default qlen 1000 7: enp3s0f1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9100 qdisc mq master bond1 state UP mode DEFAULT group default qlen 1000 8: enp131s0f0: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9100 qdisc mq master bond1 state UP mode DEFAULT group default qlen 1000 9: enp131s0f1: <BROADCAST,MULTICAST,SLAVE,UP,LOWER_UP> mtu 9100 qdisc mq master bond0 state UP mode DEFAULT group default qlen 1000 root@xxx:/ar/log# ethtool -i enp3s0f0 driver: ixgbe version: 3.15.1-k firmware-version: 0x800008bd bus-info: 0000:03:00.0 supports-statistics: yes supports-test: yes supports-eeprom-access: yes supports-register-dump: yes supports-priv-flags: no root@xxx:/var/log# lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description: Ubuntu 14.04.5 LTS Release: 14.04 Codename: trusty root@xxx:/var/log# cat /proc/version Linux version 3.13.0-142-generic (buildd@lcy01-amd64-014) (gcc version 4.8.4 (Ubuntu 4.8.4-2ubuntu1~14.04.3) ) #191-Ubuntu SMP Fri Feb 2 12:13:35 UTC 2018 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1771480/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp