This bug was fixed in the package linux - 3.13.0-160.210

---------------
linux (3.13.0-160.210) trusty; urgency=medium

  * CVE-2018-14633
    - iscsi target: Use hex2bin instead of a re-implementation

  * CVE-2018-14634
    - exec: Limit arg stack to at most 75% of _STK_LIM

linux (3.13.0-159.209) trusty; urgency=medium

  * linux: 3.13.0-159.209 -proposed tracker (LP: #1791754)

  * L1TF mitigation not effective in some CPU and RAM combinations
    (LP: #1788563) // CVE-2018-3620 // CVE-2018-3646
    - x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit
    - x86/speculation/l1tf: Fix off-by-one error when warning that system has 
too
      much RAM
    - x86/speculation/l1tf: Increase l1tf memory limit for Nehalem+

  * CVE-2018-15594
    - x86/paravirt: Fix spectre-v2 mitigations for paravirt guests

  * i40e NIC not recognized (LP: #1789215)
    - SAUCE: i40e_bpo: Import the i40e driver from Xenial 4.4
    - SAUCE: i40e_bpo: Add a compatibility layer
    - SAUCE: i40e_bpo: Don't probe for NICs supported by the in-tree driver
    - SAUCE: i40e_bpo: Rename the driver to i40e_bpo
    - SAUCE: i40e_bpo: Hook the driver into the kernel tree
    - [Config] Add CONFIG_I40E_BPO=m

  * Probable regression with EXT3 file systems and CVE-2018-1093 patches
    (LP: #1789131)
    - ext4: fix bitmap position validation

  * CVE-2018-3620 // CVE-2018-3646
    - mm: x86 pgtable: drop unneeded preprocessor ifdef
    - x86/asm: Move PUD_PAGE macros to page_types.h
    - x86/asm: Add pud/pmd mask interfaces to handle large PAT bit
    - x86/asm: Fix pud/pmd interfaces to handle large PAT bit
    - x86/mm: Fix regression with huge pages on PAE
    - SAUCE: x86/speculation/l1tf: Protect NUMA hinting PTEs against speculation
    - Revert "UBUNTU: [Config] disable NUMA_BALANCING"

  * CVE-2018-15572
    - x86/retpoline: Fill RSB on context switch for affected CPUs
    - x86/speculation: Protect against userspace-userspace spectreRSB

  * CVE-2018-6555
    - SAUCE: irda: Only insert new objects into the global database via 
setsockopt

  * CVE-2018-6554
    - SAUCE: irda: Fix memory leak caused by repeated binds of irda socket

  * BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119] (LP: #1788817)
    - drm/ast: Fixed system hanged if disable P2A

  * errors when scanning partition table of corrupted AIX disk (LP: #1787281)
    - partitions/aix: fix usage of uninitialized lv_info and lvname structures
    - partitions/aix: append null character to print data from disk

 -- Stefan Bader <stefan.ba...@canonical.com>  Mon, 24 Sep 2018 19:38:31
+0200

** Changed in: linux (Ubuntu Trusty)
       Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-1093

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14633

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14634

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15572

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-15594

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3620

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-3646

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6554

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-6555

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1788817

Title:
  BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Trusty:
  Fix Released

Bug description:
  == SRU Justification ==

  Booting Trusty with kernel 3.13.0-156-generic on a fairly new Intel
  box results in stuck CPU warnings:

  [   33.551942] BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:1119]
  [   33.558560] Modules linked in: hid_generic ast(+) crct10dif_pclmul 
syscopyarea crc32_pclmul sysfillrect ghash_clmulni_intel sysimgblt aesni_intel 
i2c_algo_bit aes_x86_64 lrw ttm gf128mul glue_helper drm_kms_helper ablk_helper 
usbhid cryptd ahci drm hid libahci wmi
  [   33.583971] CPU: 0 PID: 1119 Comm: kworker/0:1 Not tainted 
3.13.0-156-generic #206-Ubuntu
  [   33.592270] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS 
SE5C620.86B.01.00.0294.101220161543 10/12/2016
  [   33.602836] Workqueue: events work_for_cpu_fn
  [   33.607351] task: ffff88084ddbc6b0 ti: ffff88084dd98000 task.ti: 
ffff88084dd98000
  [   33.614957] RIP: 0010:[<ffffffff81383bb2>]  [<ffffffff81383bb2>] 
ioread32+0x42/0x50
  [   33.622805] RSP: 0018:ffff88084dd99d18  EFLAGS: 00000292
  [   33.628201] RAX: 00000000ffffffff RBX: ffff880851265000 RCX: 
00000000000028a6
  [   33.635429] RDX: ffffc90016bd0000 RSI: ffffc90016bd0000 RDI: 
ffffc90016bd0000
  [   33.642653] RBP: ffff88084dd99d40 R08: 0000000000000092 R09: 
000000000000079e
  [   33.649877] R10: ffffffff813df570 R11: ffff88084dd99a46 R12: 
0000000016bc0000
  [   33.657104] R13: ffffffffa01b2ab0 R14: ffff88084dd99cc8 R15: 
0000000000000000
  [   33.664329] FS:  0000000000000000(0000) GS:ffff88085f200000(0000) 
knlGS:0000000000000000
  [   33.672541] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  [   33.678380] CR2: 00007f3613be4000 CR3: 0000000001c0e000 CR4: 
0000000000360770
  [   33.685605] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 
0000000000000000
  [   33.692829] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 
0000000000000400
  [   33.700052] Stack:
  [   33.702150]  ffffffffa01a89e0 ffff880851265000 0000000000000000 
0000000000000000
  [   33.709948]  ffffffffa01b4100 ffff88084dd99d68 ffffffffa0073e88 
ffff880851265000
  [   33.717751]  ffff880850dee000 ffff880850dee098 ffff88084dd99db8 
ffffffffa0075d92
  [   33.725550] Call Trace:
  [   33.728085]  [<ffffffffa01a89e0>] ? ast_driver_load+0x320/0x540 [ast]
  [   33.734634]  [<ffffffffa0073e88>] drm_dev_register+0xa8/0x1f0 [drm]
  [   33.741000]  [<ffffffffa0075d92>] drm_get_pci_dev+0x92/0x140 [drm]
  [   33.747268]  [<ffffffffa01a81e5>] ast_pci_probe+0x15/0x20 [ast]
  [   33.753282]  [<ffffffff813b5f5a>] local_pci_probe+0x4a/0xb0
  [   33.758947]  [<ffffffff8108746a>] work_for_cpu_fn+0x1a/0x30
  [   33.764613]  [<ffffffff8108a5fe>] process_one_work+0x17e/0x480
  [   33.770536]  [<ffffffff8108b5ab>] worker_thread+0x29b/0x410
  [   33.776205]  [<ffffffff8108b310>] ? rescuer_thread+0x430/0x430
  [   33.782130]  [<ffffffff810922cb>] kthread+0xcb/0xf0
  [   33.787101]  [<ffffffff81092200>] ? kthread_create_on_node+0x1c0/0x1c0
  [   33.793721]  [<ffffffff8174758e>] ret_from_fork+0x6e/0xa0
  [   33.799211]  [<ffffffff81092200>] ? kthread_create_on_node+0x1c0/0x1c0
  [   33.805828] Code: 66 0f 1f 84 00 00 00 00 00 55 48 c7 c6 80 57 a9 81 48 89 
e5 e8 f0 fe ff ff b8 ff ff ff ff 5d c3 66 0f 1f 84 00 00 00 00 00 8b 07 <c3> 66 
66 66 66 2e 0f 1f 84 00 00 00 00 00 48 81 fe ff ff 03 00

  == Fix ==

  Backport commit 6c971c09f387 ("drm/ast: Fixed system hanged if disable
  P2A")

  
  == Regression Potential ==

  Low. The patch only touches the ast driver and the modifications are
  fairly small. The patch is also in Xenial (via a stable upstream
  update) and received testing there.

  == Test Case ==

  Booted a patched kernel on HW to verify it comes up without stuck CPU
  warnings.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1788817/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to