APPLIED: [SRU][N:intel][PATCH 0/1] TDX: Fix Host panic when poison consumed in TDX SEAM non-root mode with eMCA enabled
Thibault Ferrante
thibault.ferrante at canonical.com
Fri Oct 4 12:00:13 UTC 2024
On 11-09-2024 23:52, Thibault Ferrante wrote:
> BugLink: https://bugs.launchpad.net/bugs/2080352
>
> [ Impact ]
>
> Machine check SMIs (MSMI) signaled during SEAM operation (typically inside TDX guests),
> on a system with Intel eMCA enabled, might eventually be reported to the kernel #MC handler
> with the saved RIP on the stack pointing to the instruction in kernel code after the SEAMCALL
> instruction that entered the SEAM operation.
> Linux currently says that is a fatal error and shuts down.
>
> [ Fix ]
>
> Clean cherry pick of:
> 7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
> Which was merged in v6.10 upstream.
>
> [ Test Plan ]
>
> Compiled
>
> [ Where problems could occur ]
>
> Regression in TDX management.
>
>
> Tony Luck (1):
> x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
>
> arch/x86/include/asm/mce.h | 2 ++
> arch/x86/kernel/cpu/mce/core.c | 18 ++++++++++++++++++
> arch/x86/kernel/cpu/mce/severity.c | 16 ++++++++++++++--
> 3 files changed, 34 insertions(+), 2 deletions(-)
>
Applied to noble:linux-intel main-next branch.
Thanks,
--
Thibault
More information about the kernel-team
mailing list