Patch submitted: https://lists.ubuntu.com/archives/kernel-
team/2024-September/153664.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-intel in Ubuntu.
https://bugs.launchpad.net/bugs/2080352

Title:
  [SRU]TDX: Fix Host panic when poison consumed in TDX SEAM non-root
  mode with eMCA enabled

Status in linux-intel package in Ubuntu:
  New
Status in linux-intel source package in Noble:
  In Progress

Bug description:
  This is a public version of: https://bugs.launchpad.net/bugs/2055741

  [ Impact ]

  Machine check SMIs (MSMI) signaled during SEAM operation (typically
  inside TDX guests), on a system with Intel eMCA enabled, might
  eventually be reported to the kernel #MC handler with the saved RIP on
  the stack pointing to the instruction in kernel code after the
  SEAMCALL instruction that entered the SEAM operation. Linux currently
  says that is a fatal error and shuts down.

  [ Fix ]

  Clean cherry pick of:
  7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
  Which was merged in v6.10 upstream

  [ Test Plan ]

  Compiled and tdx guest started.

  [ Where problems could occur ]

  Regression in TDX management.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-intel/+bug/2080352/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to