** Description changed: Description: The memory_failure() path for userspace consumed poison takes preventative measures that are skipped by kernelspace consume poison, like set_mce_nospec. - Target Kernel: 5.2 - Target ReleasE: 19.10 + Target Kernel: 5.5 + Target ReleasE: 20.04
** Tags removed: intel-19.10-kernel ** Tags added: intel-kernel-20.04 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1834408 Title: Support set_mce_nospec() for kernel encountered poison. Status in intel: New Status in linux package in Ubuntu: Incomplete Bug description: Description: The memory_failure() path for userspace consumed poison takes preventative measures that are skipped by kernelspace consume poison, like set_mce_nospec. Target Kernel: 5.5 Target ReleasE: 20.04 To manage notifications about this bug go to: https://bugs.launchpad.net/intel/+bug/1834408/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp