I built a Bionic test kernel with commits b0a182f8 and cc51e542. The test kernel can be downloaded from: http://kernel.ubuntu.com/~jsalisbury/lp1789834/bionic
Can you test this kernel and see if it resolves this bug? Note about installing test kernels: • If the test kernel is prior to 4.15(Bionic) you need to install the linux-image and linux-image-extra .deb packages. • If the test kernel is 4.15(Bionic) or newer, you need to install the linux-modules, linux-modules-extra and linux-image-unsigned .deb packages. Thanks in advance! -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1789834 Title: off-by-one bug in L1TF mitigation Status in linux package in Ubuntu: Triaged Status in linux source package in Trusty: Triaged Status in linux source package in Xenial: Triaged Status in linux source package in Bionic: Triaged Bug description: due to an off-by-one bug in the L1TF patch, the "rare" case of systems still vulnerable is more frequent. This typically happens on Nehalem+ destop/entry-level server systems with 32G memory installed. Originally this was reported in OpenSUSE, but I can confirm this is also happens with the latest trusty kernel (3.13.0-157-generic) https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b0a182f875689647b014bc01d36b340217792852 The following patch increases the memory limit for the mitigation on these systems in general: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?h=x86/urgent&id=cc51e5428ea54f575d49cfcede1d4cb3a72b4ec4 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1789834/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp