Public bug reported:

This is a public version of: https://bugs.launchpad.net/bugs/2055741

[ Impact ]

Machine check SMIs (MSMI) signaled during SEAM operation (typically
inside TDX guests), on a system with Intel eMCA enabled, might
eventually be reported to the kernel #MC handler with the saved RIP on
the stack pointing to the instruction in kernel code after the SEAMCALL
instruction that entered the SEAM operation. Linux currently says that
is a fatal error and shuts down.

[ Fix ]

Clean cherry pick of:
7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
Which was merged in v6.10

[ Test Plan ]

Compiled

[ Where problems could occur ]

Regression in TDX management.

** Affects: linux-intel (Ubuntu)
     Importance: Undecided
         Status: New

** Affects: linux-intel (Ubuntu Noble)
     Importance: Undecided
     Assignee: Thibf (thibf)
         Status: In Progress

** Also affects: linux-intel (Ubuntu Noble)
   Importance: Undecided
       Status: New

** Changed in: linux-intel (Ubuntu Noble)
       Status: New => In Progress

** Changed in: linux-intel (Ubuntu Noble)
     Assignee: (unassigned) => Thibf (thibf)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2080352

Title:
  [SRU]TDX: Fix Host panic when poison consumed in TDX SEAM non-root
  mode with eMCA enabled

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-intel/+bug/2080352/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to