[SRU][N:intel][PATCH 0/1] TDX: Fix Host panic when poison consumed in TDX SEAM non-root mode with eMCA enabled
Thibault Ferrante
thibault.ferrante at canonical.com
Wed Sep 11 21:52:09 UTC 2024
BugLink: https://bugs.launchpad.net/bugs/2080352
[ Impact ]
Machine check SMIs (MSMI) signaled during SEAM operation (typically inside TDX guests),
on a system with Intel eMCA enabled, might eventually be reported to the kernel #MC handler
with the saved RIP on the stack pointing to the instruction in kernel code after the SEAMCALL
instruction that entered the SEAM operation.
Linux currently says that is a fatal error and shuts down.
[ Fix ]
Clean cherry pick of:
7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
Which was merged in v6.10 upstream.
[ Test Plan ]
Compiled
[ Where problems could occur ]
Regression in TDX management.
Tony Luck (1):
x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
arch/x86/include/asm/mce.h | 2 ++
arch/x86/kernel/cpu/mce/core.c | 18 ++++++++++++++++++
arch/x86/kernel/cpu/mce/severity.c | 16 ++++++++++++++--
3 files changed, 34 insertions(+), 2 deletions(-)
--
2.43.0
More information about the kernel-team
mailing list