The backport of 4c6abb7f7b34 ("KVM: s390: fix LPSWEY handling") has been
applied to noble:linux master-next branch as part of an upstream stable
update:


https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/noble/commit/?h=master-next&id=8bd98f4c41c9b0b52c8c341e9e7bbf56d9642ae9

The patch will be included in the next Kernel SRU cycle, currently
scheduled to start on Sep-30.

** Changed in: linux (Ubuntu Noble)
       Status: New => Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2072641

Title:
  [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction

Status in Ubuntu on IBM z Systems:
  In Progress
Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Jammy:
  Fix Committed
Status in linux source package in Noble:
  Fix Committed
Status in linux source package in Oracular:
  Fix Committed

Bug description:
  Description:   KVM: s390: unhandled guest LPSWEY instruction

  Symptom:       guest kernel oops on LPSWEY instruction

  Problem:       in rare cases like machine check injection with
                 PSW disabled, all load PSW instructions are
                 intercepted. LPSW and LPSWE are handled by KVM but
                 not the new LPSWEY

  Solution:      Provide an LPSWEY handler in KVM.

  Reproduction:  hotplug a device while a CPU is disabled for machine
                 checks, e.g. during early boot

  Upstream-ID:   4c6abb7f7b349f00c0f7ed5045bf67759c012892

  Preventive:    yes
  Reported:      upstream
  Component:     kernel

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to