[SRU][N:intel][PATCH 0/1] TDX: Fix Host panic when poison consumed in TDX SEAM non-root mode with eMCA enabled

Thibault Ferrante thibault.ferrante at canonical.com
Wed Sep 11 21:52:09 UTC 2024


BugLink: https://bugs.launchpad.net/bugs/2080352

[ Impact ]

Machine check SMIs (MSMI) signaled during SEAM operation (typically inside TDX guests),
on a system with Intel eMCA enabled, might eventually be reported to the kernel #MC handler
with the saved RIP on the stack pointing to the instruction in kernel code after the SEAMCALL
instruction that entered the SEAM operation.
Linux currently says that is a fatal error and shuts down.

[ Fix ]

Clean cherry pick of:
7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
Which was merged in v6.10 upstream.

[ Test Plan ]

Compiled

[ Where problems could occur ]

Regression in TDX management.


Tony Luck (1):
  x86/mce: Implement recovery for errors in TDX/SEAM non-root mode

 arch/x86/include/asm/mce.h         |  2 ++
 arch/x86/kernel/cpu/mce/core.c     | 18 ++++++++++++++++++
 arch/x86/kernel/cpu/mce/severity.c | 16 ++++++++++++++--
 3 files changed, 34 insertions(+), 2 deletions(-)

-- 
2.43.0




More information about the kernel-team mailing list