------- Comment From [email protected] 2022-02-25 07:32 EDT------- Capability number will be 211, see this merge
https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?h=next&id=4dfc4ec2b7f5a3a27d166ac42cf8a583fa2d3284 diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index dbc550bbd9fa3..a02bbf8fd0f67 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -1140,7 +1140,8 @@ struct kvm_ppc_resize_hpt { #define KVM_CAP_VM_GPA_BITS 207 #define KVM_CAP_XSAVE2 208 #define KVM_CAP_SYS_ATTRIBUTES 209 -#define KVM_CAP_S390_MEM_OP_EXTENSION 210 +#define KVM_CAP_PPC_AIL_MODE_3 210 +#define KVM_CAP_S390_MEM_OP_EXTENSION 211 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1933179 Title: [22.04 FEAT] KVM: Enable storage key checking for intercepted instruction handled by userspace To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1933179/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
