[Bug 1959977] Re: [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests

2022-05-28 Thread Frank Heimes
This bug is already Fix Released and closed and was requested for jammy only.
So it wasn't requested for focal, hence updating the tags to 
'verification-done-focal' to unblock any processes.

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959977

Title:
  [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959977/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959977] Re: [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests

2022-05-27 Thread Ubuntu Kernel Bot
This bug is awaiting verification that the linux-
oracle-5.15/5.15.0-1006.8~20.04.1 kernel in -proposed solves the
problem. Please test the kernel and update this bug with the results. If
the problem is solved, change the tag 'verification-needed-focal' to
'verification-done-focal'. If the problem still exists, change the tag
'verification-needed-focal' to 'verification-failed-focal'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959977

Title:
  [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959977/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959977] Re: [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests

2022-03-18 Thread Frank Heimes
** Changed in: ubuntu-z-systems
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959977

Title:
  [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959977/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1959977] Re: [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests

2022-03-18 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 5.15.0-23.23

---
linux (5.15.0-23.23) jammy; urgency=medium

  * jammy/linux: 5.15.0-23.23 -proposed tracker (LP: #1964573)

  * Packaging resync (LP: #1786013)
- [Packaging] resync dkms-build{,--nvidia-N} from LRMv5
- debian/dkms-versions -- update from kernel-versions (main/master)

  * [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests
(LP: #1959977)
- KVM: s390: pv: make use of ultravisor AIV support

  * intel_iommu breaks Intel IPU6 camera: isys port open ready failed -16
(LP: #1958004)
- SAUCE: iommu: intel-ipu: use IOMMU passthrough mode for Intel IPUs

  * CVE-2022-23960
- ARM: report Spectre v2 status through sysfs
- ARM: early traps initialisation
- ARM: use LOADADDR() to get load address of sections
- ARM: Spectre-BHB workaround
- ARM: include unprivileged BPF status in Spectre V2 reporting
- arm64: Add Neoverse-N2, Cortex-A710 CPU part definition
- arm64: Add HWCAP for self-synchronising virtual counter
- arm64: Add Cortex-X2 CPU part definition
- arm64: add ID_AA64ISAR2_EL1 sys register
- arm64: cpufeature: add HWCAP for FEAT_AFP
- arm64: cpufeature: add HWCAP for FEAT_RPRES
- arm64: entry.S: Add ventry overflow sanity checks
- arm64: spectre: Rename spectre_v4_patch_fw_mitigation_conduit
- KVM: arm64: Allow indirect vectors to be used without SPECTRE_V3A
- arm64: entry: Make the trampoline cleanup optional
- arm64: entry: Free up another register on kpti's tramp_exit path
- arm64: entry: Move the trampoline data page before the text page
- arm64: entry: Allow tramp_alias to access symbols after the 4K boundary
- arm64: entry: Don't assume tramp_vectors is the start of the vectors
- arm64: entry: Move trampoline macros out of ifdef'd section
- arm64: entry: Make the kpti trampoline's kpti sequence optional
- arm64: entry: Allow the trampoline text to occupy multiple pages
- arm64: entry: Add non-kpti __bp_harden_el1_vectors for mitigations
- arm64: entry: Add vectors that have the bhb mitigation sequences
- arm64: entry: Add macro for reading symbol addresses from the trampoline
- arm64: Add percpu vectors for EL1
- arm64: proton-pack: Report Spectre-BHB vulnerabilities as part of 
Spectre-v2
- arm64: Mitigate spectre style branch history side channels
- KVM: arm64: Allow SMCCC_ARCH_WORKAROUND_3 to be discovered and migrated
- arm64: Use the clearbhb instruction in mitigations
- arm64: proton-pack: Include unprivileged eBPF status in Spectre v2
  mitigation reporting
- ARM: fix build error when BPF_SYSCALL is disabled

  * CVE-2021-26401
- x86/speculation: Use generic retpoline by default on AMD
- x86/speculation: Update link to AMD speculation whitepaper
- x86/speculation: Warn about Spectre v2 LFENCE mitigation
- x86/speculation: Warn about eIBRS + LFENCE + Unprivileged eBPF + SMT

  * CVE-2022-0001
- x86,bugs: Unconditionally allow spectre_v2=retpoline,amd
- x86/speculation: Rename RETPOLINE_AMD to RETPOLINE_LFENCE
- x86/speculation: Add eIBRS + Retpoline options
- Documentation/hw-vuln: Update spectre doc
- x86/speculation: Include unprivileged eBPF status in Spectre v2 mitigation
  reporting

  * Jammy update: v5.15.27 upstream stable release (LP: #1964361)
- mac80211_hwsim: report NOACK frames in tx_status
- mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
- i2c: bcm2835: Avoid clock stretching timeouts
- ASoC: rt5668: do not block workqueue if card is unbound
- ASoC: rt5682: do not block workqueue if card is unbound
- regulator: core: fix false positive in regulator_late_cleanup()
- Input: clear BTN_RIGHT/MIDDLE on buttonpads
- btrfs: get rid of warning on transaction commit when using flushoncommit
- KVM: arm64: vgic: Read HW interrupt pending state from the HW
- block: loop:use kstatfs.f_bsize of backing file to set discard granularity
- tipc: fix a bit overflow in tipc_crypto_key_rcv()
- cifs: do not use uninitialized data in the owner/group sid
- cifs: fix double free race when mount fails in cifs_get_root()
- cifs: modefromsids must add an ACE for authenticated users
- selftests/seccomp: Fix seccomp failure by adding missing headers
- drm/amd/pm: correct UMD pstate clocks for Dimgrey Cavefish and Beige Goby
- dmaengine: shdma: Fix runtime PM imbalance on error
- i2c: cadence: allow COMPILE_TEST
- i2c: imx: allow COMPILE_TEST
- i2c: qup: allow COMPILE_TEST
- net: usb: cdc_mbim: avoid altsetting toggling for Telit FN990
- block-map: add __GFP_ZERO flag for alloc_page in function bio_copy_kern
- usb: gadget: don't release an existing dev->buf
- usb: gadget: clear related members when goto fail
- exfat: reuse exfat_inode_info variable instead of calling EXFAT_I()
- exfat: fix i_blocks for files truncated over 

[Bug 1959977] Re: [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests

2022-03-09 Thread Frank Heimes
Kernel SRU request submitted for jammy:
https://lists.ubuntu.com/archives/kernel-team/2022-March/thread.html#128531
changing status to 'In Progress'.

** Information type changed from Private to Public

** Changed in: linux (Ubuntu)
   Status: New => In Progress

** Changed in: ubuntu-z-systems
   Status: New => In Progress

** Changed in: linux (Ubuntu)
 Assignee: Skipper Bug Screeners (skipper-screen-team) => Canonical Kernel 
Team (canonical-kernel-team)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1959977

Title:
  [22.04 FEAT] KVM: Enable GISA support for Secure Execution guests

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959977/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs