Public bug reported: Description: The memory_failure() path for userspace consumed poison takes preventative measures that are skipped by kernelspace consume poison, like set_mce_nospec.
Target Kernel: 5.2 Target ReleasE: 19.10 ** Affects: intel Importance: Undecided Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags: intel-19.10-kernel ** Also affects: linux (Ubuntu) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1834408 Title: Support set_mce_nospec() for kernel encountered poison. Status in intel: New Status in linux package in Ubuntu: New Bug description: Description: The memory_failure() path for userspace consumed poison takes preventative measures that are skipped by kernelspace consume poison, like set_mce_nospec. Target Kernel: 5.2 Target ReleasE: 19.10 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1834408/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp