This bug was fixed in the package linux - 4.4.0-148.174 --------------- linux (4.4.0-148.174) xenial; urgency=medium
* CVE-2018-12126 // CVE-2018-12127 // CVE-2018-12130 - Documentation/l1tf: Fix small spelling typo - perf/x86/intel: Add model number for Skylake Server to perf - perf/x86: Add model numbers for Kabylake CPUs - perf/x86/intel: Use Intel family macros for core perf events - perf/x86/msr: Use Intel family macros for MSR events code - perf/x86/msr: Add missing Intel models - SAUCE: perf/x86/{cstate,rapl,uncore}: Use Intel Model name macros - perf/x86/msr: Add missing CPU IDs - x86/speculation: Simplify the CPU bug detection logic - x86/cpu: Sanitize FAM6_ATOM naming - kvm: x86: Report STIBP on GET_SUPPORTED_CPUID - bitops: avoid integer overflow in GENMASK(_ULL) - locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file - tools include: Adopt linux/bits.h - x86/msr-index: Cleanup bit defines - x86/speculation: Consolidate CPU whitelists - x86/speculation/mds: Add basic bug infrastructure for MDS - x86/speculation/mds: Add BUG_MSBDS_ONLY - x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests - x86/speculation/mds: Add mds_clear_cpu_buffers() - locking/static_keys: Provide DECLARE and well as DEFINE macros - x86/speculation/mds: Clear CPU buffers on exit to user - x86/kvm/vmx: Add MDS protection when L1D Flush is not active - x86/speculation/mds: Conditionally clear CPU buffers on idle entry - SAUCE: sched/smt: Introduce sched_smt_{active,present} - SAUCE: Rename the Ubuntu-only spec_ctrl_mutex mutex - SAUCE: x86/speculation: Introduce arch_smt_update() - x86/speculation: Rework SMT state change - x86/speculation: Reorder the spec_v2 code - x86/speculation: Unify conditional spectre v2 print functions - x86/speculation/mds: Add mitigation control for MDS - x86/speculation/mds: Add sysfs reporting for MDS - x86/speculation/mds: Add mitigation mode VMWERV - Documentation: Move L1TF to separate directory - Documentation: Add MDS vulnerability documentation - x86/speculation/mds: Add mds=full,nosmt cmdline option - x86/speculation: Move arch_smt_update() call to after mitigation decisions - x86/speculation/mds: Add SMT warning message - x86/speculation/mds: Fix comment - x86/speculation/mds: Print SMT vulnerable on MSBDS with mitigations off - x86/speculation/mds: Add 'mitigations=' support for MDS * CVE-2017-5715 // CVE-2017-5753 - s390/speculation: Support 'mitigations=' cmdline option * CVE-2017-5715 // CVE-2017-5753 // CVE-2017-5754 // CVE-2018-3639 - powerpc/speculation: Support 'mitigations=' cmdline option * CVE-2017-5715 // CVE-2017-5754 // CVE-2018-3620 // CVE-2018-3639 // CVE-2018-3646 - cpu/speculation: Add 'mitigations=' cmdline option - x86/speculation: Support 'mitigations=' cmdline option * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log linux (4.4.0-147.173) xenial; urgency=medium * linux: 4.4.0-147.173 -proposed tracker (LP: #1826036) * Packaging resync (LP: #1786013) - [Packaging] resync git-ubuntu-log * Xenial: Sync to upstream v4.9 (Spectre) (LP: #1820872) - SAUCE: cpu/hotplug: Fix Documentation/kernel-parameters.txt - SAUCE: Fix typo in Documentation/kernel-parameters.txt - SAUCE: x86: Move hunks and sync to upstream stable 4.9 - Revert "module: Add retpoline tag to VERMAGIC" * CVE-2017-5753 - posix-timers: Protect posix clock array access against speculation - arm64: fix possible spectre-v1 in ptrace_hbp_get_event() - sched/autogroup: Fix possible Spectre-v1 indexing for sched_prio_to_weight[] - media: dvb_ca_en50221: prevent using slot_info for Spectre attacs - s390/keyboard: sanitize array index in do_kdsk_ioctl - arm64: fix possible spectre-v1 write in ptrace_hbp_set_event() - pktcdvd: Fix possible Spectre-v1 for pkt_devs - net: socket: Fix potential spectre v1 gadget in sock_is_registered - net: sock_diag: Fix spectre v1 gadget in __sock_diag_cmd() - hwmon: (nct6775) Fix potential Spectre v1 - mac80211_hwsim: Fix possible Spectre-v1 for hwsim_world_regdom_custom - nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT - ipmi: msghandler: Fix potential Spectre v1 vulnerabilities - powerpc/ptrace: Mitigate potential Spectre v1 - cfg80211: prevent speculation on cfg80211_classify8021d() return - ALSA: rawmidi: Fix potential Spectre v1 vulnerability - ALSA: seq: oss: Fix Spectre v1 vulnerability * CVE-2019-3874 - sctp: fix the issue that a __u16 variable may overflow in sctp_ulpq_renege - sctp: use sk_wmem_queued to check for writable space - sctp: implement memory accounting on tx path - sctp: implement memory accounting on rx path * Kprobe event argument syntax in ftrace from ubuntu_kernel_selftests failed on B PowerPC (LP: #1812809) - selftests/ftrace: Add ppc support for kprobe args tests * CVE-2019-3882 - vfio/type1: Limit DMA mappings per container * Intel I210 Ethernet card not working after hotplug [8086:1533] (LP: #1818490) - igb: Fix WARN_ONCE on runtime suspend * TSC clocksource not available in nested guests (LP: #1822821) - x86/tsc: Add X86_FEATURE_TSC_KNOWN_FREQ flag - kvmclock: fix TSC calibration for nested guests * Remove btrfs module after a failed fallocate attempt will cause error on 4.4 i386 (LP: #1822579) - Btrfs: fix extent map leak during fallocate error path * systemd cause kernel trace "BUG: unable to handle kernel paging request at 6db23a14" on Cosmic i386 (LP: #1813244) // systemd cause kernel trace "BUG: unable to handle kernel paging request at 6db23a14" on Cosmic i386 (LP: #1813244) - openvswitch: fix flow actions reallocation -- Stefan Bader <stefan.ba...@canonical.com> Tue, 07 May 2019 11:35:48 +0200 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1818490 Title: Intel I210 Ethernet card not working after hotplug [8086:1533] Status in HWE Next: Confirmed Status in OEM Priority Project: Triaged Status in linux package in Ubuntu: In Progress Status in linux source package in Trusty: Fix Committed Status in linux source package in Xenial: Fix Released Status in linux source package in Bionic: Fix Released Status in linux source package in Cosmic: Fix Released Status in linux source package in Disco: Fix Released Bug description: Summary: Intel I210 Ethernet card not working after hotplug Steps to reproduce: 1. Power on system with ethernet cable on Intel I210 2. Check ethernet is workable 3. Unplug then plug the ethernet cable Expected result: Intel I210 Ethernet card is working, e.g. IP address acquired automatically if configured as DHCP. Actual result: Intel I210 Ethernet card not working after hotplug. dmesg has following error messages instead: [ 16.464321] ------------[ cut here ]------------ [ 16.464326] PCI PM: State of device not saved by igb_runtime_suspend+0x0/0x90 [igb] [ 16.464334] WARNING: CPU: 2 PID: 49 at /build/linux-oem-ta19Pv/linux-oem-4.15.0/drivers/pci/pci-driver.c:1282 pci_pm_runtime_suspend+0x175/0x180 [ 16.464334] Modules linked in: joydev input_leds nls_iso8859_1 snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm snd_hda_intel irqbypass snd_hda_codec crct10dif_pclmul snd_hda_core crc32_pclmul snd_hwdep ghash_clmulni_intel pcbc snd_pcm dell_smm_hwmon aesni_intel aes_x86_64 snd_seq_midi crypto_simd snd_seq_midi_event glue_helper cryptd snd_rawmidi intel_cstate snd_seq intel_rapl_perf dell_wmi snd_seq_device dell_smbios dcdbas snd_timer dell_wmi_aio dell_wmi_descriptor intel_wmi_thunderbolt snd sparse_keymap wmi_bmof soundcore idma64 virt_dma mei_me intel_lpss_pci intel_pch_thermal mei intel_lpss mac_hid acpi_pad sch_fq_codel parport_pc ppdev lp parport ip_tables x_tables autofs4 btrfs zstd_compress raid10 raid456 [ 16.464354] async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear dm_mirror dm_region_hash dm_log hid_generic usbhid hid i915 igb drm_kms_helper syscopyarea dca sysfillrect i2c_algo_bit e1000e sysimgblt ptp fb_sys_fops pps_core ahci libahci drm wmi video [ 16.464366] CPU: 2 PID: 49 Comm: kworker/2:1 Not tainted 4.15.0-1032-oem #37-Ubuntu [ 16.464367] Hardware name: Dell Inc. Precision 3630 Tower/, BIOS 99.2.2 01/14/2019 [ 16.464369] Workqueue: pm pm_runtime_work [ 16.464370] RIP: 0010:pci_pm_runtime_suspend+0x175/0x180 [ 16.464371] RSP: 0018:ffffa968c3363d48 EFLAGS: 00010282 [ 16.464372] RAX: 0000000000000000 RBX: ffff8a2557aee0a0 RCX: 0000000000000006 [ 16.464372] RDX: 0000000000000007 RSI: 0000000000000096 RDI: ffff8a257c496490 [ 16.464373] RBP: ffffa968c3363d70 R08: 0000000000000001 R09: 0000000000000373 [ 16.464373] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 16.464373] R13: ffffffffc0481540 R14: ffff8a2557aee000 R15: 0000000000000000 [ 16.464374] FS: 0000000000000000(0000) GS:ffff8a257c480000(0000) knlGS:0000000000000000 [ 16.464375] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 16.464375] CR2: 00007f30b3e93170 CR3: 0000000842c0a004 CR4: 00000000003606e0 [ 16.464376] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 16.464376] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 16.464376] Call Trace: [ 16.464379] ? pci_pm_runtime_resume+0xb0/0xb0 [ 16.464380] __rpm_callback+0xca/0x210 [ 16.464381] ? __switch_to_asm+0x40/0x70 [ 16.464382] ? __switch_to_asm+0x34/0x70 [ 16.464382] rpm_callback+0x59/0x80 [ 16.464383] ? pci_pm_runtime_resume+0xb0/0xb0 [ 16.464384] rpm_suspend+0x137/0x640 [ 16.464385] ? __switch_to_asm+0x40/0x70 [ 16.464386] pm_runtime_work+0x81/0xa0 [ 16.464388] process_one_work+0x1de/0x410 [ 16.464389] worker_thread+0x32/0x410 [ 16.464390] kthread+0x121/0x140 [ 16.464391] ? process_one_work+0x410/0x410 [ 16.464392] ? kthread_create_worker_on_cpu+0x70/0x70 [ 16.464392] ret_from_fork+0x35/0x40 [ 16.464393] Code: 2b ff ff ff 80 3d 21 c6 11 01 00 0f 85 1e ff ff ff 49 8b b5 a0 00 00 00 48 c7 c7 a0 56 b2 ad c6 05 06 c6 11 01 01 e8 0b 74 b9 ff <0f> 0b e9 fd fe ff ff 0f 1f 40 00 0f 1f 44 00 00 55 48 89 e5 53 [ 16.464408] ---[ end trace 97e5f2cf651b62e6 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/hwe-next/+bug/1818490/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp