I just checked trying to apply those patches. I was able to apply the following on top of jammy-devel:
113d8f4e95 s390x: pv: Add dump support 1af0006ab9 dump: Replace opaque DumpState pointer with a typed one 9b72224f44 dump: Add architecture section and section string table support 13fd417ddc dump: Reintroduce memory_offset and section_offset cb415fd61e dump: Write ELF section headers right after ELF header e41ed29bce dump: Use a buffer for ELF section data and headers 94d788408d dump: fix kdump to work over non-aligned blocks 08df343874 dump: simplify a bit kdump get_next_page() 2341a94d3a dump: Rename write_elf*_phdr_note to prepare_elf*_phdr_note 670e76998a dump: Split elf header functions into prepare and write c370d5300f dump: Rework dump_calculate_size function dddf725f70 dump: Rework filter area variables 0c2994ac90 dump: Rework get_start_block 1e8113032f dump: Refactor dump_iterate and introduce dump_filter_memblock_*() afae6056ea dump: Rename write_elf_loads to write_elf_phdr_loads c68124738b dump: Consolidate elf note function 5ff2e5a3e1 dump: Cleanup dump_begin write functions bc7d558017 dump: Consolidate phdr note writes 05bbaa5040 dump: Introduce dump_is_64bit() helper function e71d353360 dump: Add more offset variables 344107e07b dump: Remove the section if when calculating the memory offset 862a395858 dump: Introduce shdr_num to decrease complexity 046bc4160b dump: Remove the sh_info variable 86a518bba4 dump: Use ERRP_GUARD() However ad3b2e693d s390x: Add protected dump cap Fails to apply. Were you able to apply all of those patches without issue? I see ad3b2e693d conflicts with the file `target/s390x/kvm/kvm.c` -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1959966 Title: [23.04 FEAT] KVM: Secure Execution guest dump encryption with customer keys - qemu part To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-z-systems/+bug/1959966/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
