[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs

2025-10-21 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-gke - 6.8.0-1038.43

---
linux-gke (6.8.0-1038.43) noble; urgency=medium

  * noble/linux-gke: 6.8.0-1038.43 -proposed tracker (LP: #2125362)

  * sources list generation using dwarfdump takes up to 0.5hr in build process
(LP: #2104911)
- [Packaging] gke: Don't generate list of source files

  * Fix HLT logic execution for TDX VMs (LP: #2112602)
- x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT

  * Add SVSM vTPM support for AMD SEV-SNP confidential VMs (LP: #2111956)
- x86/irqflags: Provide native versions of the local_irq_save()/restore()
- x86/sev: Rename snp_init() in boot/compressed/sev.c
- x86/sev: Make the VMPL0 checking more straight forward
- x86/sev: Shorten struct name snp_secrets_page_layout to snp_secrets_page
- x86/sev: Check for the presence of an SVSM in the SNP secrets page
- x86/sev: Use kernel provided SVSM Calling Areas
- x86/sev: Perform PVALIDATE using the SVSM when not at VMPL0
- x86/sev: Use the SVSM to create a vCPU when not in VMPL0
- x86/sev: Provide SVSM discovery support
- x86/sev: Provide guest VMPL level to userspace
- virt: sev-guest: Choose the VMPCK key based on executing VMPL
- sev-guest: configfs-tsm: Allow the privlevel_floor attribute to be
  updated
- fs/configfs: Add a callback to determine attribute visibility
- x86/sev: Take advantage of configfs visibility support in TSM
- x86/sev: Extend the config-fs attestation support for an SVSM
- x86/sev: Allow non-VMPL0 execution when an SVSM is present
- x86/sev: Move SEV compilation units
- Documentation/ABI/configfs-tsm: Fix an unexpected indentation silly
- tpm: Make chip->{status,cancel,req_canceled} opt
- x86/sev: Add SVSM vTPM probe/send_command functions
- svsm: Add header with SVSM_VTPM_CMD helpers
- tpm: Add SNP SVSM vTPM driver
- x86/sev: Register tpm-svsm platform device
- [Config] gke: Make tpm_svsm built-in

  [ Ubuntu: 6.8.0-86.87 ]

  * noble/linux: 6.8.0-86.87 -proposed tracker (LP: #2125391)
- Fix FTBS caused by incorrect pick/backport of
  "perf dso: fix dso__is_kallsyms() check"
  * noble ubuntu_ftrace_smoke_test:mmiotrace timeout on aws:r5.metal
(LP: #2121673)
- mm: memcg: add NULL check to obj_cgroup_put()
- memcg: drain obj stock on cpu hotplug teardown
  * [25.04 FEAT] [post announcement] [KRN2304] CPU-MF Counters for new IBM Z
hardware - perf part (LP: #2103415)
- perf list: Add IBM z17 event descriptions
  * memory leaks when configuring a small rate limit in audit (LP: #2122554)
- audit: fix skb leak when audit rate limit is exceeded
  * [UBUNTU 24.04] PAI/NNPA support for new IBM z17 (LP: #2121956)
- s390/pai: export number of sysfs attribute files
- s390/pai_crypto: Add support for MSA 10 and 11 pai counters
- s390/pai_ext: Update PAI extension 1 counters
  * [UBUNTU 24.04] s390/pci: Don't abort recovery for user-space drivers
(LP: #2121150)
- s390/pci: Allow automatic recovery with minimal driver support
  * [UBUNTU 24.04] s390/pci: Fix stale function handles in error handling
(LP: #2121149)
- s390/pci: Fix stale function handles in error handling
- s390/pci: Do not try re-enabling load/store if device is disabled
  * [UBUNTU 24.04] vfio/pci: fix 8-byte PCI loads and stores (LP: #2121146)
- vfio/pci: Extract duplicated code into macro
- vfio/pci: Support 8-byte PCI loads and stores
- vfio/pci: Fix typo in macro to declare accessors
  * x86 systems with PCIe BAR addresses located outside a certain range see
P2PDMA allocation failures and CUDA initialization errors (LP: #2120209)
- x86/kaslr: Reduce KASLR entropy on most x86 systems
- x86/mm/init: Handle the special case of device private pages in
  add_pages(), to not increase max_pfn and trigger
  dma_addressing_limited() bounce buffers
  * sources list generation using dwarfdump takes up to 0.5hr in build process
(LP: #2104911)
- [Packaging] Don't generate list of source files
  * [SRU] Apparmor: Unshifted uids for hardlinks and unix sockets in user
namespaces (LP: #2121257)
- apparmor: shift ouid when mediating hard links in userns
- apparmor: shift uid when mediating af_unix in userns
  * UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:452:16
(LP: #2119713)
- EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller
  * [IdeaPad Slim 5 13ARP10 , 83J2] Microphone on AMD Ryzen 7 7735HS does not
work (LP: #2102749)
- ASoC: amd: yc: update quirk data for new Lenovo model
  * Fix compilation failure because of incomplete backport (LP: #2120561)
- SAUCE: netfilter: ctnetlink: Fix -Wuninitialized in
  ctnetlink_secctx_size()
  * Noble update: upstream stable patchset 2025-09-01 (LP: #2121716)
- x86/mm/pat: cpa-test: fix length for CPA_ARRAY test
- cpufreq: scpi: compare kHz instead of Hz
- smack: dont compile 

[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs

2025-09-17 Thread Ian Whitfield
** Also affects: linux-gke (Ubuntu)
   Importance: Undecided
   Status: New

** No longer affects: linux-gke (Ubuntu Oracular)

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602

Title:
  Fix HLT logic execution for TDX VMs

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gke package in Ubuntu:
  New
Status in linux-gcp source package in Noble:
  Fix Released
Status in linux-gke source package in Noble:
  New
Status in linux-gcp source package in Oracular:
  Fix Released

Bug description:
  SRU Justification

  [Impact]
  Google has requested a backport of the following commits:
  22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
  9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
  Targets include 6.8 onwards.

  [Fix]
  Backport the patches as needed to noble:linux-gcp and later kernels.

  [Test plan]
  Compile and boot test. Verification on Google's side is optional as this is a 
fairly isolated backport.

  [Where problems could occur]
  This fix affects TDX guest VMs which call the HLT instruction. An issue with 
this fix would be visible to the user as unexpected #VEs (virtualization 
exceptions) or unexpected interrupt behavior in their TDX guest VM.

  [Other]
  SF #00412211

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs

2025-08-05 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-gcp-
fips/6.8.0-1035.37+fips1 kernel in -proposed solves the problem. Please
test the kernel and update this bug with the results. If the problem is
solved, change the tag 'verification-needed-noble-linux-gcp-fips' to
'verification-done-noble-linux-gcp-fips'. If the problem still exists,
change the tag 'verification-needed-noble-linux-gcp-fips' to
'verification-failed-noble-linux-gcp-fips'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-noble-linux-gcp-fips-v2 
verification-needed-noble-linux-gcp-fips

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602

Title:
  Fix HLT logic execution for TDX VMs

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Noble:
  Fix Released
Status in linux-gcp source package in Oracular:
  Fix Released

Bug description:
  SRU Justification

  [Impact]
  Google has requested a backport of the following commits:
  22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
  9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
  Targets include 6.8 onwards.

  [Fix]
  Backport the patches as needed to noble:linux-gcp and later kernels.

  [Test plan]
  Compile and boot test. Verification on Google's side is optional as this is a 
fairly isolated backport.

  [Where problems could occur]
  This fix affects TDX guest VMs which call the HLT instruction. An issue with 
this fix would be visible to the user as unexpected #VEs (virtualization 
exceptions) or unexpected interrupt behavior in their TDX guest VM.

  [Other]
  SF #00412211

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs

2025-07-22 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-gcp - 6.8.0-1033.35

---
linux-gcp (6.8.0-1033.35) noble; urgency=medium

  * noble/linux-gcp: 6.8.0-1033.35 -proposed tracker (LP: #2114640)

  * linux-gcp: NVIDIA Grace platform support (LP: #2111859)
- arm64: tlb: Improve __TLBI_VADDR_RANGE()
- arm64: tlb: Allow range operation for MAX_TLBI_RANGE_PAGES
- arm64/io: Provide a WC friendly __iowriteXX_copy()
- net: hns3: Remove io_stop_wc() calls after __iowrite64_copy()
- PCI: Clear Secondary Status errors after enumeration
- coresight: Remove unused ETM Perf stubs
- coresight: Clarify comments around the PID of the sink owner
- coresight: Move struct coresight_trace_id_map to common header
- coresight: Expose map arguments in trace ID API
- coresight: Make CPU id map a property of a trace ID map
- coresight: Make language around "activated" sinks consistent
- coresight: Remove ops callback checks
- coresight: Move mode to struct coresight_device
- coresight: Remove the 'enable' field.
- coresight: Move all sysfs code to sysfs file
- coresight: Remove atomic type from refcnt
- coresight: Remove unused stubs
- coresight: Add explicit member initializers to coresight_dev_type
- coresight: Add helper for atomically taking the device
- coresight: Add a helper for getting csdev->mode
- coresight: Use per-sink trace ID maps for Perf sessions
- coresight: Remove pending trace ID release mechanism
- coresight: Emit sink ID in the HW_ID packets
- coresight: Make trace ID map spinlock local to the map
- perf auxtrace: Allow number of queues to be specified
- perf cs-etm: Print error for new PERF_RECORD_AUX_OUTPUT_HW_ID versions
- perf arm-spe/cs-etm: Directly iterate CPU maps
- perf cs-etm: Use struct perf_cpu as much as possible
- perf cs-etm: Create decoders after both AUX and HW_ID search passes
- perf: cs-etm: Allocate queues for all CPUs
- perf: cs-etm: Move traceid_list to each queue
- perf: cs-etm: Create decoders based on the trace ID mappings
- perf: cs-etm: Only save valid trace IDs into files
- perf: cs-etm: Support version 0.1 of HW_ID packets
- perf: cs-etm: Print queue number in raw trace dump
- PCI: Use downstream bridges for distributing resources
- PCI/DOE: Support discovery version 2
- cppc_cpufreq: Remove HiSilicon CPPC workaround
- ACPI/HMAT: Move HMAT messages to pr_debug()
- Fix mmu notifiers for range-based invalidates
- perf arm-spe: Rename arm_spe__synth_data_source_generic()
- perf arm-spe: Rename the common data source encoding
- perf arm-spe: Support metadata version 2
- perf arm-spe: Introduce arm_spe__is_homogeneous()
- perf arm-spe: Use metadata to decide the data source feature
- perf arm-spe: Remove the unused 'midr' field
- perf arm-spe: Add Neoverse-V2 to common data source encoding list
- perf arm-spe: Add Cortex CPUs to common data source encoding list
- perf: arm_cspmu: nvidia: remove unsupported SCF events
- perf: arm_cspmu: nvidia: fix sysfs path in the kernel doc
- perf: arm_cspmu: nvidia: enable NVLINK-C2C port filtering
- perf: arm_cspmu: nvidia: monitor all ports by default
- arm64: amu: Delay allocating cpumask for AMU FIE support
- arch_topology: init capacity_freq_ref to 0
- cpufreq: Allow arch_freq_get_on_cpu to return an error
- cpufreq: Introduce an optional cpuinfo_avg_freq sysfs entry
- arm64: Provide an AMU-based version of arch_freq_get_on_cpu
- arm64: Update AMU-based freq scale factor on entering idle
- arm64: Utilize for_each_cpu_wrap for reference lookup
- [Packaging] gcp: enable CONFIG_CPUFREQ_ARCH_CUR_FREQ
- [Packaging] gcp: enable CONFIG_ARM64_CONTPTE
- x86: Stop using weak symbols for __iowrite32_copy()
- s390: Implement __iowrite32_copy()
- s390: Stop using weak symbols for __iowrite64_copy()
- perf arm-spe: Define metadata header version 2
- tools/include: Sync arm64 headers with the kernel sources
- arm64/io: add constant-argument check
- perf cs-etm: Fix the assert() to handle captured and unprocessed cpu
  trace
- perf arm-spe: Use old behavior when opening old SPE files
- mm: make folio_pte_batch available outside of mm/memory.c
- mm: fix folio_pte_batch() on XEN PV

  * backport arm64 THP improvements from 6.9 (LP: #2059316) // linux-gcp:
NVIDIA Grace platform support (LP: #2111859)
- arm64/mm: make set_ptes() robust when OAs cross 48-bit boundary
- arm/pgtable: define PFN_PTE_SHIFT
- nios2/pgtable: define PFN_PTE_SHIFT
- powerpc/pgtable: define PFN_PTE_SHIFT
- riscv/pgtable: define PFN_PTE_SHIFT
- s390/pgtable: define PFN_PTE_SHIFT
- sparc/pgtable: define PFN_PTE_SHIFT
- mm/pgtable: make pte_next_pfn() independent of set_ptes()
- arm/mm: use pte_next_pfn() in set_ptes()
- powerpc/mm: use pte_next_pfn() in set_ptes()

[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs

2025-06-30 Thread Launchpad Bug Tracker
This bug was fixed in the package linux-gcp - 6.11.0-1017.17

---
linux-gcp (6.11.0-1017.17) oracular; urgency=medium

  * oracular/linux-gcp: 6.11.0-1017.17 -proposed tracker (LP: #2114290)

  * Packaging resync (LP: #1786013)
- [Packaging] update variants

  * Fix HLT logic execution for TDX VMs (LP: #2112602)
- x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT

  [ Ubuntu: 6.11.0-29.29 ]

  * oracular/linux: 6.11.0-29.29 -proposed tracker (LP: #2114305)
  * Packaging resync (LP: #1786013)
- [Packaging] update variants
- [Packaging] update annotations scripts
  * CVE-2025-37890
- net_sched: hfsc: Fix a UAF vulnerability in class with netem as child
  qdisc
- sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
- net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
  * raid1: Fix NULL pointer dereference in process_checks() (LP: #2112519)
- md/raid1: Add check for missing source disk in process_checks()
  * CVE-2025-37798
- sch_htb: make htb_qlen_notify() idempotent
- sch_htb: make htb_deactivate() idempotent
- sch_drr: make drr_qlen_notify() idempotent
- sch_hfsc: make hfsc_qlen_notify() idempotent
- sch_qfq: make qfq_qlen_notify() idempotent
- sch_ets: make est_qlen_notify() idempotent
- codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog()
  * CVE-2025-37997
- netfilter: ipset: fix region locking in hash types

 -- Ian Whitfield   Wed, 25 Jun 2025
13:26:12 -0700

** Changed in: linux-gcp (Ubuntu Oracular)
   Status: Fix Committed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37798

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37890

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2025-37997

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602

Title:
  Fix HLT logic execution for TDX VMs

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Noble:
  Fix Committed
Status in linux-gcp source package in Oracular:
  Fix Released

Bug description:
  SRU Justification

  [Impact]
  Google has requested a backport of the following commits:
  22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
  9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
  Targets include 6.8 onwards.

  [Fix]
  Backport the patches as needed to noble:linux-gcp and later kernels.

  [Test plan]
  Compile and boot test. Verification on Google's side is optional as this is a 
fairly isolated backport.

  [Where problems could occur]
  This fix affects TDX guest VMs which call the HLT instruction. An issue with 
this fix would be visible to the user as unexpected #VEs (virtualization 
exceptions) or unexpected interrupt behavior in their TDX guest VM.

  [Other]
  SF #00412211

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs

2025-06-26 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-gcp/6.11.0-1017.17
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-oracular-linux-gcp' to 'verification-done-
oracular-linux-gcp'. If the problem still exists, change the tag
'verification-needed-oracular-linux-gcp' to 'verification-failed-
oracular-linux-gcp'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-oracular-linux-gcp-v2 
verification-needed-oracular-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602

Title:
  Fix HLT logic execution for TDX VMs

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Noble:
  Fix Committed
Status in linux-gcp source package in Oracular:
  Fix Committed

Bug description:
  SRU Justification

  [Impact]
  Google has requested a backport of the following commits:
  22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
  9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
  Targets include 6.8 onwards.

  [Fix]
  Backport the patches as needed to noble:linux-gcp and later kernels.

  [Test plan]
  Compile and boot test. Verification on Google's side is optional as this is a 
fairly isolated backport.

  [Where problems could occur]
  This fix affects TDX guest VMs which call the HLT instruction. An issue with 
this fix would be visible to the user as unexpected #VEs (virtualization 
exceptions) or unexpected interrupt behavior in their TDX guest VM.

  [Other]
  SF #00412211

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs

2025-06-09 Thread Ian Whitfield
** No longer affects: linux-gcp (Ubuntu Plucky)

** Description changed:

  SRU Justification
  
  [Impact]
- Google has requested a backport of the following patchset:
- https://lore.kernel.org/all/[email protected]/
+ Google has requested a backport of the following commits:
+ 22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
+ 9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
  Targets include 6.8 onwards.
  
  [Fix]
- Backport the three patches in that patchset, as needed, to noble:linux-gcp, 
oracular:linux-gcp, and plucky:linux-gcp.
+ Backport the patches as needed to noble:linux-gcp and later kernels.
  
  [Test plan]
  Compile and boot test. Verification on Google's side is optional as this is a 
fairly isolated backport.
  
  [Where problems could occur]
  This fix affects TDX guest VMs which call the HLT instruction. An issue with 
this fix would be visible to the user as unexpected #VEs (virtualization 
exceptions) or unexpected interrupt behavior in their TDX guest VM.
  
  [Other]
  SF #00412211

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602

Title:
  Fix HLT logic execution for TDX VMs

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Noble:
  New
Status in linux-gcp source package in Oracular:
  New

Bug description:
  SRU Justification

  [Impact]
  Google has requested a backport of the following commits:
  22cc5ca5de52 ("x86/paravirt: Move halt paravirt calls under CONFIG_PARAVIRT")
  9f98a4f4e721 ("x86/tdx: Fix arch_safe_halt() execution for TDX VMs")
  Targets include 6.8 onwards.

  [Fix]
  Backport the patches as needed to noble:linux-gcp and later kernels.

  [Test plan]
  Compile and boot test. Verification on Google's side is optional as this is a 
fairly isolated backport.

  [Where problems could occur]
  This fix affects TDX guest VMs which call the HLT instruction. An issue with 
this fix would be visible to the user as unexpected #VEs (virtualization 
exceptions) or unexpected interrupt behavior in their TDX guest VM.

  [Other]
  SF #00412211

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 2112602] Re: Fix HLT logic execution for TDX VMs

2025-06-05 Thread Ian Whitfield
** Also affects: linux-gcp (Ubuntu Noble)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Oracular)
   Importance: Undecided
   Status: New

** Also affects: linux-gcp (Ubuntu Plucky)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2112602

Title:
  Fix HLT logic execution for TDX VMs

Status in linux-gcp package in Ubuntu:
  New
Status in linux-gcp source package in Noble:
  New
Status in linux-gcp source package in Oracular:
  New
Status in linux-gcp source package in Plucky:
  New

Bug description:
  SRU Justification

  [Impact]
  Google has requested a backport of the following patchset:
  https://lore.kernel.org/all/[email protected]/
  Targets include 6.8 onwards.

  [Fix]
  Backport the three patches in that patchset, as needed, to noble:linux-gcp, 
oracular:linux-gcp, and plucky:linux-gcp.

  [Test plan]
  Compile and boot test. Verification on Google's side is optional as this is a 
fairly isolated backport.

  [Where problems could occur]
  This fix affects TDX guest VMs which call the HLT instruction. An issue with 
this fix would be visible to the user as unexpected #VEs (virtualization 
exceptions) or unexpected interrupt behavior in their TDX guest VM.

  [Other]
  SF #00412211

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2112602/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp