** Changed in: linux-intel (Ubuntu Noble)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-intel in Ubuntu.
https://bugs.launchpad.net/bugs/2080352
Title:
[SRU]TDX: Fix Host panic when poison consumed in TDX SEAM non-root
mode with eMCA enabled
Status in linux-intel package in Ubuntu:
New
Status in linux-intel source package in Noble:
Fix Committed
Bug description:
This is a public version of: https://bugs.launchpad.net/bugs/2055741
[ Impact ]
Machine check SMIs (MSMI) signaled during SEAM operation (typically
inside TDX guests), on a system with Intel eMCA enabled, might
eventually be reported to the kernel #MC handler with the saved RIP on
the stack pointing to the instruction in kernel code after the
SEAMCALL instruction that entered the SEAM operation. Linux currently
says that is a fatal error and shuts down.
[ Fix ]
Clean cherry pick of:
7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
Which was merged in v6.10 upstream
[ Test Plan ]
Compiled and tdx guest started.
[ Where problems could occur ]
Regression in TDX management.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-intel/+bug/2080352/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp