** Description changed:

  Description:
  The memory_failure() path for userspace consumed poison takes preventative 
measures that are skipped by kernelspace consume poison, like set_mce_nospec.
  
- Target Kernel: 5.2
- Target ReleasE: 19.10
+ Target Kernel: 5.5
+ Target ReleasE: 20.04

** Tags removed: intel-19.10-kernel
** Tags added: intel-kernel-20.04

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1834408

Title:
  Support set_mce_nospec() for kernel encountered poison.

Status in intel:
  New
Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Description:
  The memory_failure() path for userspace consumed poison takes preventative 
measures that are skipped by kernelspace consume poison, like set_mce_nospec.

  Target Kernel: 5.5
  Target ReleasE: 20.04

To manage notifications about this bug go to:
https://bugs.launchpad.net/intel/+bug/1834408/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to