Patch submitted: https://lists.ubuntu.com/archives/kernel- team/2024-September/153664.html
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-intel in Ubuntu. https://bugs.launchpad.net/bugs/2080352 Title: [SRU]TDX: Fix Host panic when poison consumed in TDX SEAM non-root mode with eMCA enabled Status in linux-intel package in Ubuntu: New Status in linux-intel source package in Noble: In Progress Bug description: This is a public version of: https://bugs.launchpad.net/bugs/2055741 [ Impact ] Machine check SMIs (MSMI) signaled during SEAM operation (typically inside TDX guests), on a system with Intel eMCA enabled, might eventually be reported to the kernel #MC handler with the saved RIP on the stack pointing to the instruction in kernel code after the SEAMCALL instruction that entered the SEAM operation. Linux currently says that is a fatal error and shuts down. [ Fix ] Clean cherry pick of: 7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode Which was merged in v6.10 upstream [ Test Plan ] Compiled and tdx guest started. [ Where problems could occur ] Regression in TDX management. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-intel/+bug/2080352/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp