Public bug reported: This is a public version of: https://bugs.launchpad.net/bugs/2055741
[ Impact ] Machine check SMIs (MSMI) signaled during SEAM operation (typically inside TDX guests), on a system with Intel eMCA enabled, might eventually be reported to the kernel #MC handler with the saved RIP on the stack pointing to the instruction in kernel code after the SEAMCALL instruction that entered the SEAM operation. Linux currently says that is a fatal error and shuts down. [ Fix ] Clean cherry pick of: 7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode Which was merged in v6.10 [ Test Plan ] Compiled [ Where problems could occur ] Regression in TDX management. ** Affects: linux-intel (Ubuntu) Importance: Undecided Status: New ** Affects: linux-intel (Ubuntu Noble) Importance: Undecided Assignee: Thibf (thibf) Status: In Progress ** Also affects: linux-intel (Ubuntu Noble) Importance: Undecided Status: New ** Changed in: linux-intel (Ubuntu Noble) Status: New => In Progress ** Changed in: linux-intel (Ubuntu Noble) Assignee: (unassigned) => Thibf (thibf) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2080352 Title: [SRU]TDX: Fix Host panic when poison consumed in TDX SEAM non-root mode with eMCA enabled To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-intel/+bug/2080352/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs