ACK: [SRU][N:intel][PATCH 0/1] TDX: Fix Host panic when poison consumed in TDX SEAM non-root mode with eMCA enabled

Manuel Diewald manuel.diewald at canonical.com
Fri Oct 4 11:52:03 UTC 2024


On Wed, Sep 11, 2024 at 11:52:09PM +0200, Thibault Ferrante wrote:
> BugLink: https://bugs.launchpad.net/bugs/2080352
> 
> [ Impact ]
> 
> Machine check SMIs (MSMI) signaled during SEAM operation (typically inside TDX guests),
> on a system with Intel eMCA enabled, might eventually be reported to the kernel #MC handler
> with the saved RIP on the stack pointing to the instruction in kernel code after the SEAMCALL
> instruction that entered the SEAM operation.
> Linux currently says that is a fatal error and shuts down.
> 
> [ Fix ]
> 
> Clean cherry pick of:
> 7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
> Which was merged in v6.10 upstream.
> 
> [ Test Plan ]
> 
> Compiled
> 
> [ Where problems could occur ]
> 
> Regression in TDX management.
> 
> 
> Tony Luck (1):
>   x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
> 
>  arch/x86/include/asm/mce.h         |  2 ++
>  arch/x86/kernel/cpu/mce/core.c     | 18 ++++++++++++++++++
>  arch/x86/kernel/cpu/mce/severity.c | 16 ++++++++++++++--
>  3 files changed, 34 insertions(+), 2 deletions(-)
> 
> -- 
> 2.43.0
> 
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team

Acked-by: Manuel Diewald <manuel.diewald at canonical.com>

-- 
 Manuel
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20241004/b53f4ae5/attachment.sig>


More information about the kernel-team mailing list