I have bisected this, and the commit that *fixes* this between the focal kernel (5.15.0-30-generic) and the current 5.17 release is
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2f46993d83ff4abb310ef7b4beced56ba96f0d9d x86: change default to spec_store_bypass_disable=prctl spectre_v2_user=prctl Switch the kernel default of SSBD and STIBP to the ones with CONFIG_SECCOMP=n (i.e. spec_store_bypass_disable=prctl spectre_v2_user=prctl) even if CONFIG_SECCOMP=y. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1973839 Title: 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004) Status in linux package in Ubuntu: Confirmed Bug description: When booting this in one of our clouds, we see an error early in the kernel output kernel: unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004) at rIP: 0xffffffffabc90af4 (native_write_msr+0x4/0x20) and then an un-ending stream of "bare" tracebacks; which I think must be related [ 2.285717] kernel: Call Trace: [ 2.285722] kernel: <TASK> [ 2.285723] kernel: ? speculation_ctrl_update+0x95/0x200 [ 2.292001] kernel: speculation_ctrl_update_current+0x1f/0x30 [ 2.292011] kernel: ssb_prctl_set+0x92/0xe0 [ 2.292016] kernel: arch_seccomp_spec_mitigate+0x62/0x70 [ 2.292019] kernel: seccomp_set_mode_filter+0x4de/0x530 [ 2.292024] kernel: do_seccomp+0x37/0x1f0 [ 2.292026] kernel: __x64_sys_seccomp+0x18/0x20 [ 2.292028] kernel: do_syscall_64+0x5c/0xc0 [ 2.292035] kernel: ? handle_mm_fault+0xd8/0x2c0 [ 2.299617] kernel: ? do_user_addr_fault+0x1e3/0x670 [ 2.312878] kernel: ? exit_to_user_mode_prepare+0x37/0xb0 [ 2.312894] kernel: ? irqentry_exit_to_user_mode+0x9/0x20 [ 2.312905] kernel: ? irqentry_exit+0x19/0x30 [ 2.312907] kernel: ? exc_page_fault+0x89/0x160 [ 2.312909] kernel: ? asm_exc_page_fault+0x8/0x30 [ 2.312914] kernel: entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2.312919] kernel: RIP: 0033:0x7fcffd6eaa3d [ 2.312924] kernel: Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48 [ 2.312926] kernel: RSP: 002b:00007ffe352e2938 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 2.312930] kernel: RAX: ffffffffffffffda RBX: 0000557d99d0c0c0 RCX: 00007fcffd6eaa3d [ 2.319941] systemd[1]: Starting Load Kernel Module configfs... [ 2.320103] kernel: RDX: 0000557d99c01290 RSI: 0000000000000000 RDI: 0000000000000001 [ 2.339938] kernel: RBP: 0000000000000000 R08: 0000000000000001 R09: 0000557d99c01290 [ 2.339941] kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 2.339942] kernel: R13: 0000000000000001 R14: 0000557d99c01290 R15: 0000000000000001 [ 2.339947] kernel: </TASK> We never see any more warnings or context for the tracebacks, but they just keep coming over and over, filling up the logs. This is with a jammy x86_64 system running 5.15.0-30-generic Unfortunately I don't exactly know what is behind it on the cloud side. There seem to be several bugs that are similar but not exactly the same https://bugzilla.redhat.com/show_bug.cgi?id=1808996 https://bugs.launchpad.net/ubuntu/+source/qemu/+bug/1921880 The gist seems to be that 0x4 refers to SSBD mitigation and something about the combo of some versions of qemu and a Jammy guest kernel make the guest unhappy. I will attach cpuid info for the guest. I installed the 5.17 kernel from the mainline repository, and this appears to go away. I will attempt to bisect it to something more specific. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1973839/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp