The backport of 4c6abb7f7b34 ("KVM: s390: fix LPSWEY handling") has been applied to noble:linux master-next branch as part of an upstream stable update:
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/noble/commit/?h=master-next&id=8bd98f4c41c9b0b52c8c341e9e7bbf56d9642ae9 The patch will be included in the next Kernel SRU cycle, currently scheduled to start on Sep-30. ** Changed in: linux (Ubuntu Noble) Status: New => Fix Committed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/2072641 Title: [UBUNTU 22.04] KVM: s390: unhandled guest LPSWEY instruction Status in Ubuntu on IBM z Systems: In Progress Status in linux package in Ubuntu: Fix Committed Status in linux source package in Jammy: Fix Committed Status in linux source package in Noble: Fix Committed Status in linux source package in Oracular: Fix Committed Bug description: Description: KVM: s390: unhandled guest LPSWEY instruction Symptom: guest kernel oops on LPSWEY instruction Problem: in rare cases like machine check injection with PSW disabled, all load PSW instructions are intercepted. LPSW and LPSWE are handled by KVM but not the new LPSWEY Solution: Provide an LPSWEY handler in KVM. Reproduction: hotplug a device while a CPU is disabled for machine checks, e.g. during early boot Upstream-ID: 4c6abb7f7b349f00c0f7ed5045bf67759c012892 Preventive: yes Reported: upstream Component: kernel To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/2072641/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp