I did test the kernel from lunar proposed (6.2.0.1015.16) on AWS. The
image boots with sev-snp enabled:

# sudo dmesg | grep -i sev
[    5.563677] Memory Encryption Features active: AMD SEV SEV-ES SEV-SNP
[    6.140250] SEV: Using SNP CPUID table, 64 entries present.
[    8.507286] SEV: SNP guest platform device initialized.
[   20.829729] sev-guest sev-guest: Initialized SEV guest driver (using 
vmpck_id 0)


# apt-cache policy linux-aws
linux-aws:
  Installed: 6.2.0.1015.16
  Candidate: 6.2.0.1015.16
  Version table:
 *** 6.2.0.1015.16 100
        100 http://archive.ubuntu.com/ubuntu lunar-proposed/main amd64 Packages
        100 /var/lib/dpkg/status
     6.2.0.1013.14 500
        500 http://us-east-2.ec2.archive.ubuntu.com/ubuntu lunar-updates/main 
amd64 Packages
        500 http://security.ubuntu.com/ubuntu lunar-security/main amd64 Packages
     6.2.0.1003.4 500
        500 http://us-east-2.ec2.archive.ubuntu.com/ubuntu lunar/main amd64 
Packages


** Tags removed: verification-needed-lunar-linux-aws
** Tags added: verification-done-lunar-linux-aws

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2037316

Title:
  SEV_SNP failure to init

Status in linux-aws package in Ubuntu:
  Fix Released
Status in linux-gcp package in Ubuntu:
  Fix Released
Status in linux-aws source package in Jammy:
  Invalid
Status in linux-gcp source package in Jammy:
  Fix Committed
Status in linux-aws source package in Lunar:
  Fix Committed
Status in linux-gcp source package in Lunar:
  Fix Committed
Status in linux-aws source package in Mantic:
  Fix Released
Status in linux-gcp source package in Mantic:
  Fix Released

Bug description:
  [Impact]

  * Kernel fails to boot on SEV-SNP instances when compiled with GCC
  12.3.0

  [Fix]

  *
  https://lore.kernel.org/lkml/20230912002703.3924521-1-acdun...@google.com/

  [Test Case]

  * Compile tested
  * Boot tested
  * Tested by Google

  [Where things could go wrong]

  * Patches relatively isolated and maintain similar checking
  functionality, just earlier in boot. Likely a low chance of
  regression.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-aws/+bug/2037316/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to