This bug is awaiting verification that the linux-intel/6.8.0-1014.21
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-noble-linux-intel' to 'verification-done-noble-
linux-intel'. If the problem still exists, change the tag 'verification-
needed-noble-linux-intel' to 'verification-failed-noble-linux-intel'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-noble-linux-intel-v2 
verification-needed-noble-linux-intel

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-intel in Ubuntu.
https://bugs.launchpad.net/bugs/2080352

Title:
  [SRU]TDX: Fix Host panic when poison consumed in TDX SEAM non-root
  mode with eMCA enabled

Status in linux-intel package in Ubuntu:
  New
Status in linux-intel source package in Noble:
  Fix Committed

Bug description:
  This is a public version of: https://bugs.launchpad.net/bugs/2055741

  [ Impact ]

  Machine check SMIs (MSMI) signaled during SEAM operation (typically
  inside TDX guests), on a system with Intel eMCA enabled, might
  eventually be reported to the kernel #MC handler with the saved RIP on
  the stack pointing to the instruction in kernel code after the
  SEAMCALL instruction that entered the SEAM operation. Linux currently
  says that is a fatal error and shuts down.

  [ Fix ]

  Clean cherry pick of:
  7911f145de5f x86/mce: Implement recovery for errors in TDX/SEAM non-root mode
  Which was merged in v6.10 upstream

  [ Test Plan ]

  Compiled and tdx guest started.

  [ Where problems could occur ]

  Regression in TDX management.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-intel/+bug/2080352/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to