The verification passed for jammy: ``` william@william-Latitude-E7470 ~ apt-cache policy udev udev: Installed: 249.11-0ubuntu3.7 Candidate: 249.11-0ubuntu3.8 Version table: *** 249.11-0ubuntu3.8 500 500 http://us.archive.ubuntu.com/ubuntu jammy-proposed/main amd64 Packages 100 /var/lib/dpkg/status 249.11-0ubuntu3.7 500 500 http://us.archive.ubuntu.com/ubuntu jammy-updates/main amd64 Packages 500 http://security.ubuntu.com/ubuntu jammy-security/main amd64 Packages 249.11-0ubuntu3 500 500 http://us.archive.ubuntu.com/ubuntu jammy/main amd64 Packages william@william-Latitude-E7470 ~ ls -al /dev/sgx_vepc crw------- 1 root root 10, 125 Mar 14 14:01 /dev/sgx_vepc william@william-Latitude-E7470 ~ apt-cache policy udev udev: Installed: 249.11-0ubuntu3.8 Candidate: 249.11-0ubuntu3.8 Version table: *** 249.11-0ubuntu3.8 500 500 http://us.archive.ubuntu.com/ubuntu jammy-proposed/main amd64 Packages 100 /var/lib/dpkg/status 249.11-0ubuntu3.7 500 500 http://us.archive.ubuntu.com/ubuntu jammy-updates/main amd64 Packages 500 http://security.ubuntu.com/ubuntu jammy-security/main amd64 Packages 249.11-0ubuntu3 500 500 http://us.archive.ubuntu.com/ubuntu jammy/main amd64 Packages william@william-Latitude-E7470 ~ ls -al /dev/sgx_vepc crw-rw---- 1 root sgx 10, 125 Mar 14 14:01 /dev/sgx_vepc ```
** Tags removed: verification-needed verification-needed-jammy ** Tags added: verification-done verification-done-jammy -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to systemd in Ubuntu. https://bugs.launchpad.net/bugs/2009502 Title: Enable /dev/sgx_vepc access for the group 'sgx' Status in systemd package in Ubuntu: Fix Released Status in systemd source package in Jammy: Fix Committed Bug description: [ Impact ] On systems where Intel SGX is available, access to a specific device node (/dev/sgx_vepc) must be enforced, with a specific permission (0660) and group (sgx). This allows KVM-based virtual machines to use such feature (the SGX "enclaves") in a proper fashion. Without this, a manual udev rule needs to be created. [ Test Plan ] As the patch itself only tailors the permissions/group to the device node, in a system with Intel-SGX enabled, merely `ls -la` against the device node should show if the permissions and group are seen as expected. [ Where problems could occur ] N/A. This seems to be a very straightforward inclusion, very specific to access enablement to the SGX reserved memory used for hosting enclaves. [ Other Info ] N/A. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/2009502/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp