APPLIED: [SRU][N:linux-gke][PATCH 0/2] Fix HLT logic execution for TDX VMs

Ian Whitfield ian.whitfield at canonical.com
Fri Sep 26 02:19:15 UTC 2025


On Wed, Sep 17, 2025 at 09:31:25PM -0400, Ian Whitfield wrote:
> BugLink: https://bugs.launchpad.net/bugs/2112602
> 
> [Impact]
> GKE has requested confidential VM patchset parity with linux-gcp. This patchset
> was originally applied on noble:linux-gcp and oracular:linux-gcp, and is now
> being applied on noble:linux-gke.
> 
> Google has requested a backport of the following commits:
> 22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
> 9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
> 
> [Fix]
> Noble required both patches. Upstream stable backports were used for both
> patches, and these applied cleanly.
> 
> [Test plan]
> Compile and boot test. These patches have been in linux-gcp for a few cycles.
> 
> [Where problems could occur]
> This fix affects TDX guest VMs which call the HLT instruction. An issue with
> this fix would be visible to the user as unexpected #VEs (virtualization
> exceptions) or unexpected interrupt behavior in their TDX guest VM.
> 
> Kirill A. Shutemov (1):
>   x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT
> 
> Vishal Annapurve (1):
>   x86/tdx: Fix arch_safe_halt() execution for TDX VMs
> 
>  arch/x86/Kconfig                      |  1 +
>  arch/x86/coco/tdx/tdx.c               | 26 ++++++++++++++++-
>  arch/x86/include/asm/irqflags.h       | 40 +++++++++++++++------------
>  arch/x86/include/asm/paravirt.h       | 20 +++++++-------
>  arch/x86/include/asm/paravirt_types.h |  3 +-
>  arch/x86/include/asm/tdx.h            |  4 +--
>  arch/x86/kernel/paravirt.c            | 14 ++++++----
>  arch/x86/kernel/process.c             |  2 +-
>  8 files changed, 70 insertions(+), 40 deletions(-)
> 
> -- 
> 2.43.0
> 

Applied to noble:linux-gke master-next branch. 9f98a4f4e721 ("x86/tdx: Fix
arch_safe_halt() execution for TDX VMs") had already been applied to the tree,
so I only applied the other patch in this series.



More information about the kernel-team mailing list