5.15.0-30-generic : SSBD mitigation results in "unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004)" and flood of kernel traces in some cloud providers
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
When booting this in one of our clouds, we see an error early in the kernel output
kernel: unchecked MSR access error: WRMSR to 0x48 (tried to write 0x0000000000000004) at rIP: 0xffffffffabc90af4 (native_
and then an un-ending stream of "bare" tracebacks; which I think must be related
[ 2.285717] kernel: Call Trace:
[ 2.285722] kernel: <TASK>
[ 2.285723] kernel: ? speculation_
[ 2.292001] kernel: speculation_
[ 2.292011] kernel: ssb_prctl_
[ 2.292016] kernel: arch_seccomp_
[ 2.292019] kernel: seccomp_
[ 2.292024] kernel: do_seccomp+
[ 2.292026] kernel: __x64_sys_
[ 2.292028] kernel: do_syscall_
[ 2.292035] kernel: ? handle_
[ 2.299617] kernel: ? do_user_
[ 2.312878] kernel: ? exit_to_
[ 2.312894] kernel: ? irqentry_
[ 2.312905] kernel: ? irqentry_
[ 2.312907] kernel: ? exc_page_
[ 2.312909] kernel: ? asm_exc_
[ 2.312914] kernel: entry_SYSCALL_
[ 2.312919] kernel: RIP: 0033:0x7fcffd6eaa3d
[ 2.312924] kernel: Code: 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d c3 a3 0f 00 f7 d8 64 89 01 48
[ 2.312926] kernel: RSP: 002b:00007ffe35
[ 2.312930] kernel: RAX: ffffffffffffffda RBX: 0000557d99d0c0c0 RCX: 00007fcffd6eaa3d
[ 2.319941] systemd[1]: Starting Load Kernel Module configfs...
[ 2.320103] kernel: RDX: 0000557d99c01290 RSI: 0000000000000000 RDI: 0000000000000001
[ 2.339938] kernel: RBP: 0000000000000000 R08: 0000000000000001 R09: 0000557d99c01290
[ 2.339941] kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000
[ 2.339942] kernel: R13: 0000000000000001 R14: 0000557d99c01290 R15: 0000000000000001
[ 2.339947] kernel: </TASK>
We never see any more warnings or context for the tracebacks, but they just keep coming over and over, filling up the logs. This is with a jammy x86_64 system running 5.15.0-30-generic
Unfortunately I don't exactly know what is behind it on the cloud side.
There seem to be several bugs that are similar but not exactly the same
https:/
https:/
The gist seems to be that 0x4 refers to SSBD mitigation and something about the combo of some versions of qemu and a Jammy guest kernel make the guest unhappy. I will attach cpuid info for the guest.
I installed the 5.17 kernel from the mainline repository, and this appears to go away. I will attempt to bisect it to something more specific.
summary: |
- 5.15.0-30-generic : unchecked MSR access error: WRMSR to 0x48 (tried to - write 0x0000000000000004) + 5.15.0-30-generic : SSBD mitigation results in "unchecked MSR access + error: WRMSR to 0x48 (tried to write 0x0000000000000004)" and flood of + kernel traces in some cloud providers |
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1973839
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.