This bug is awaiting verification that the linux-gcp/6.14.0-1011.11
kernel in -proposed solves the problem. Please test the kernel and
update this bug with the results. If the problem is solved, change the
tag 'verification-needed-plucky-linux-gcp' to 'verification-done-plucky-
linux-gcp'. If the problem still exists, change the tag 'verification-
needed-plucky-linux-gcp' to 'verification-failed-plucky-linux-gcp'.


If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.


See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: kernel-spammed-plucky-linux-gcp-v2 
verification-needed-plucky-linux-gcp

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-gcp in Ubuntu.
https://bugs.launchpad.net/bugs/2116545

Title:
  Attestation failure due to vTPM device error

Status in linux-gcp package in Ubuntu:
  In Progress
Status in linux-gcp source package in Noble:
  In Progress
Status in linux-gcp source package in Plucky:
  In Progress
Status in linux-gcp source package in Questing:
  In Progress

Bug description:
  SRU Justification:

  [Impact]

  Google requests that the following upstream commits be removed from
  6.14 kernels, namely plucky:linux-gcp and noble:linux-gcp-6.14. These
  commits are responsible for a TPM failure encountered on their TDX-
  enabled deployments. When present, the following error message is
  observed during boot and the TPM is not available.

  TPM fail - No TPM chip found

  [Fix]

  By reverting these two commits, the resulting kernel was verified to not 
exhibit the failing case.
  6a5abeea9c72e1d2c538622b4cf66c80cc816fd3 ("x86/mtrr: Rename 
mtrr_overwrite_state() to guest_force_mtrr_state()")
  8e690b817e38769dc2fa0e7473e5a5dc1fc25795 ("x86/kvm: Override default caching 
mode for SEV-SNP and TDX")

  [Test Plan]

  The fix has been verified to work both internally on TDX hardware and
  independently by Google.

  [What could go wrong]

  This change is considered low risk as the commits were cleanly
  reverted, and the resulting kernel has been verified to resolve the
  issue both internally and by Google.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-gcp/+bug/2116545/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to