[Kernel-packages] [Bug 1973839] Re: 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)

2022-05-19 Thread Ian Wienand
So after reading and experimenting a bit more, what the upstream change is doing is setting the defaults to spec_store_bypass_disable=prctl spectre_v2_user=prctl instead of "seccomp". This basically means that instead of all seccomp() users setting these flags, it is up to userspace to set

[Kernel-packages] [Bug 1973839] Re: 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)

2022-05-18 Thread Ian Wienand
I have bisected this, and the commit that *fixes* this between the focal kernel (5.15.0-30-generic) and the current 5.17 release is https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2f46993d83ff4abb310ef7b4beced56ba96f0d9d x86: change default to

[Kernel-packages] [Bug 1973839] Re: 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)

2022-05-17 Thread Ian Wienand
I've made this confirmed, because the log collection (apport-collect 1973839) is hundreds of megabytes, as dmesg is full of the tracebacks discussed ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel