[Kernel-packages] [Bug 1973839] Re: 5.15.0-30-generic : SSBD mitigation results in "unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)" and flood of kernel traces in some cl

2022-05-27 Thread Ian Wienand
> Which cloud is in use and what the instance type is? This was seen on OVH. I don't think it's a public instance type. I have attached the cpuid of the affected guest (https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973839/+attachment/5590542/+files/cpuid) but unfortunately I don't detail

[Kernel-packages] [Bug 1973839] Re: 5.15.0-30-generic : SSBD mitigation results in "unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)" and flood of kernel traces in some cl

2022-05-19 Thread Ian Wienand
** Summary changed: - 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0004) + 5.15.0-30-generic : SSBD mitigation results in "unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0004)" and flood of kernel traces in some cloud pro

[Kernel-packages] [Bug 1973839] Re: 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)

2022-05-19 Thread Ian Wienand
So after reading and experimenting a bit more, what the upstream change is doing is setting the defaults to spec_store_bypass_disable=prctl spectre_v2_user=prctl instead of "seccomp". This basically means that instead of all seccomp() users setting these flags, it is up to userspace to set manu

[Kernel-packages] [Bug 1973839] Re: 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)

2022-05-18 Thread Ian Wienand
I have bisected this, and the commit that *fixes* this between the focal kernel (5.15.0-30-generic) and the current 5.17 release is https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2f46993d83ff4abb310ef7b4beced56ba96f0d9d x86: change default to spec_store_bypass_disa

[Kernel-packages] [Bug 1973839] Re: 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)

2022-05-17 Thread Ian Wienand
I've made this confirmed, because the log collection (apport-collect 1973839) is hundreds of megabytes, as dmesg is full of the tracebacks discussed ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packa

[Kernel-packages] [Bug 1973839] [NEW] 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)

2022-05-17 Thread Ian Wienand
Public bug reported: When booting this in one of our clouds, we see an error early in the kernel output kernel: unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0004) at rIP: 0xabc90af4 (native_write_msr+0x4/0x20) and then an un-ending stream of "bare" tracebacks