Public bug reported: SRU Justification
[Impact] Google has made a request for SVSM vTPM support in linux-gcp kernels 6.8 and later. [Fix] Patches requested in the support case: 980a573621ea ("tpm: Make chip->{status,cancel,req_canceled} opt") 770de678bc28 ("x86/sev: Add SVSM vTPM probe/send_command functions") b2849b072366 ("svsm: Add header with SVSM_VTPM_CMD helpers") 93b7c6b3ce91 ("tpm: Add SNP SVSM vTPM driver") e396dd85172c ("x86/sev: Register tpm-svsm platform device") The config for all kernels must have CONFIG_TCG_SVSM=y 6.8 may also require the changes from this pull request: https://lore.kernel.org/lkml/20240716095557.GAZpZDrdC3HA0Zilxr@fat_crate.local/ and CONFIG_SEV_GUEST=m/y and CONFIG_TSM_REPORTS=y on condition of the 6.8 kernel having "configfs TSM report support". [Test Plan] Testing will be performed by Google. [Regression Potential] These changes are in core kernel security modules, so care should be taken to ensure that patches are applied correctly to avoid creating new security vulnerabilities. [Other] SF #00409503 ** Affects: linux-gcp (Ubuntu) Importance: Undecided Status: New ** Affects: linux-gcp (Ubuntu Noble) Importance: Undecided Status: New ** Affects: linux-gcp (Ubuntu Oracular) Importance: Undecided Status: New ** Affects: linux-gcp (Ubuntu Plucky) Importance: Undecided Status: New ** Also affects: linux-gcp (Ubuntu Plucky) Importance: Undecided Status: New ** Also affects: linux-gcp (Ubuntu Noble) Importance: Undecided Status: New ** Also affects: linux-gcp (Ubuntu Oracular) Importance: Undecided Status: New -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux-gcp in Ubuntu. https://bugs.launchpad.net/bugs/2111956 Title: Add SVSM vTPM support for AMD SEV-SNP confidential VMs Status in linux-gcp package in Ubuntu: New Status in linux-gcp source package in Noble: New Status in linux-gcp source package in Oracular: New Status in linux-gcp source package in Plucky: New Bug description: SRU Justification [Impact] Google has made a request for SVSM vTPM support in linux-gcp kernels 6.8 and later. [Fix] Patches requested in the support case: 980a573621ea ("tpm: Make chip->{status,cancel,req_canceled} opt") 770de678bc28 ("x86/sev: Add SVSM vTPM probe/send_command functions") b2849b072366 ("svsm: Add header with SVSM_VTPM_CMD helpers") 93b7c6b3ce91 ("tpm: Add SNP SVSM vTPM driver") e396dd85172c ("x86/sev: Register tpm-svsm platform device") The config for all kernels must have CONFIG_TCG_SVSM=y 6.8 may also require the changes from this pull request: https://lore.kernel.org/lkml/20240716095557.GAZpZDrdC3HA0Zilxr@fat_crate.local/ and CONFIG_SEV_GUEST=m/y and CONFIG_TSM_REPORTS=y on condition of the 6.8 kernel having "configfs TSM report support". [Test Plan] Testing will be performed by Google. [Regression Potential] These changes are in core kernel security modules, so care should be taken to ensure that patches are applied correctly to avoid creating new security vulnerabilities. [Other] SF #00409503 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2111956/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp