APPLIED: [SRU][N:intel][PATCH 0/1] TDX: Fix Host panic when poison consumed in TDX SEAM non-root mode with eMCA enabled

Thibault Ferrante thibault.ferrante at canonical.com
Fri Oct 4 12:00:13 UTC 2024


On 11-09-2024 23:52, Thibault Ferrante wrote:
> BugLink: https://bugs.launchpad.net/bugs/2080352
> 
> [ Impact ]
> 
> Machine check SMIs (MSMI) signaled during SEAM operation (typically inside TDX guests),
> on a system with Intel eMCA enabled, might eventually be reported to the kernel #MC handler
> with the saved RIP on the stack pointing to the instruction in kernel code after the SEAMCALL
> instruction that entered the SEAM operation.
> Linux currently says that is a fatal error and shuts down.
> 
> [ Fix ]
> 
> Clean cherry pick of:
> 7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
> Which was merged in v6.10 upstream.
> 
> [ Test Plan ]
> 
> Compiled
> 
> [ Where problems could occur ]
> 
> Regression in TDX management.
> 
> 
> Tony Luck (1):
>    x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
> 
>   arch/x86/include/asm/mce.h         |  2 ++
>   arch/x86/kernel/cpu/mce/core.c     | 18 ++++++++++++++++++
>   arch/x86/kernel/cpu/mce/severity.c | 16 ++++++++++++++--
>   3 files changed, 34 insertions(+), 2 deletions(-)
> 

Applied to noble:linux-intel main-next branch.
Thanks,

--
Thibault



More information about the kernel-team mailing list