jammy/linux-gcp: 5.15.0-1028.35 -proposed tracker
Bug Description
This bug will contain status and test results related to a kernel source (or snap) as stated in the title.
For an explanation of the tasks and the associated workflow see:
https:/
-- swm properties --
built:
from: e9c0b2a32c8e5969
route-entry: 1
delta:
promote-
flag:
boot-
bugs-spammed: true
proposed-
proposed-
stream-
issue: KSRU-6092
kernel-
packages:
lrg: linux-restricte
lrm: linux-restricte
lrs: linux-restricte
main: linux-gcp
meta: linux-meta-gcp
signed: linux-signed-gcp
phase: Testing
phase-changed: Wednesday, 18. January 2023 02:06 UTC
reason:
automated-
regression-
security-signoff: Stalled -s waiting for signoff
verification-
synthetic:
:promote-
trackers:
focal/
variant: debs
versions:
lrm: 5.15.0-1028.35
main: 5.15.0-1028.35
meta: 5.15.0.1028.23
signed: 5.15.0-1028.35
~~:
clamps:
new-review: e9c0b2a32c8e5969
promote-
self: 5.15.0-1028.35
sru-review: e9c0b2a32c8e5969
CVE References
tags: | added: kernel-release-tracking-bug-live |
description: | updated |
tags: | added: kernel-sru-cycle-2023.01.02-1 |
description: | updated |
tags: | added: kernel-sru-derivative-of-2001801 |
Changed in kernel-sru-workflow: | |
status: | New → Confirmed |
importance: | Undecided → Medium |
Changed in linux-gcp (Ubuntu Jammy): | |
importance: | Undecided → Medium |
Changed in kernel-sru-workflow: | |
status: | Confirmed → Triaged |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | Triaged → In Progress |
tags: | added: kernel-jira-issue-ksru-6013 |
description: | updated |
tags: |
added: kernel-jira-issue-ksru-6092 removed: kernel-jira-issue-ksru-6013 |
description: | updated |
description: | updated |
description: | updated |
summary: |
- jammy/linux-gcp: <version to be filled> -proposed tracker + jammy/linux-gcp: 5.15.0-1028.35 -proposed tracker |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
tags: | added: kernel-signing-bot |
Changed in canonical-signing-jobs: | |
assignee: | nobody → Andy Whitcroft (apw) |
importance: | Undecided → Medium |
importance explanation: | unset → unset |
status explanation: | unset → validate --exclude jammy:linux-gcp --publications ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14444386 ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14444382 ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14444383 ~canonical-kernel-team/+archive/ubuntu/ppa/+sourcepub/14444384 ~canonical-kernel-team/+archive/ubuntu/ppa-ps/+sourcepub/14444397 ~canonical-kernel-team/+archive/ubuntu/ppa-ps/+sourcepub/14444398 copy --from ppa:canonical-kernel-team/ubuntu/ppa --from-suite jammy --sources linux-restricted-modules-gcp/5.15.0-1028.35 linux-gcp/5.15.0-1028.35 linux-meta-gcp/5.15.0.1028.23 linux-signed-gcp/5.15.0-1028.35/signing --from ppa:canonical-kernel-team/ubuntu/ppa-ps --from-suite jammy --sources linux-restricted-generate-gcp/5.15.0-1028.35 linux-restricted-signatures-gcp/5.15.0-1028.35/signing --to signing:ubuntu/2 --to-suite jammy copy --from signing:ubuntu/2 --from-suite jammy --sources linux-restricted-modules-gcp/5.15.0-1028.35 linux-gcp/5.15.0-1028.35 linux-meta-gcp/5.15.0.1028.23 linux-signed-gcp/5.15.0-1028.35 linux-restricted-signatures-gcp/5.15.0-1028.35 --to ubuntu --to-suite jammy-proposed delete --from signing:ubuntu/2 --from-suite jammy --sources linux-restricted-modules-gcp/5.15.0-1028.35 linux-gcp/5.15.0-1028.35 linux-meta-gcp/5.15.0.1028.23 linux-signed-gcp/5.15.0-1028.35 linux-restricted-generate-gcp/5.15.0-1028.35 linux-restricted-signatures-gcp/5.15.0-1028.35 |
status: | New → Triaged |
description: | updated |
Changed in canonical-signing-jobs: | |
status: | Triaged → Confirmed |
description: | updated |
Changed in canonical-signing-jobs: | |
status: | Confirmed → In Progress |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in canonical-signing-jobs: | |
importance explanation: | unset → Successful |
status: | In Progress → Fix Released |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
description: | updated |
Changed in kernel-sru-workflow: | |
status: | In Progress → Fix Committed |
Changed in kernel-sru-workflow: | |
status: | Fix Committed → Fix Released |
This bug was fixed in the package linux-gcp - 5.15.0-1029.36
---------------
linux-gcp (5.15.0-1029.36) jammy; urgency=medium
* jammy/linux-gcp: 5.15.0-1029.36 -proposed tracker (LP: #2003429)
[ Ubuntu: 5.15.0-60.66 ]
* jammy/linux: 5.15.0-60.66 -proposed tracker (LP: #2003450)
* Revoke & rotate to new signing key (LP: #2002812)
- [Packaging] Revoke and rotate to new signing key
linux-gcp (5.15.0-1028.35) jammy; urgency=medium
* jammy/linux-gcp: 5.15.0-1028.35 -proposed tracker (LP: #2001767)
* Add support for SEV-SNP (LP: #2001605) ghcb_hv_ call() for use by HyperV active( ) with cc_platform_has() exception( ) forward declarations acpi: Move EFI detection to helper acpi: Move EFI system table lookup to helper acpi: Move EFI config table lookup to helper acpi: Move EFI vendor table lookup to helper acpi: Move EFI kexec handling into common code
- KVM: SVM: Define sev_features and vmpl field in the VMSA
- KVM: SEV: Refactor out sev_es_state struct
- KVM: SVM: Create a separate mapping for the SEV-ES save area
- KVM: SVM: Create a separate mapping for the GHCB save area
- KVM: SVM: Update the SEV-ES save area mapping
- x86/boot: Introduce helpers for MSR reads/writes
- x86/boot: Use MSR read/write helpers instead of inline assembly
- SAUCE: x86/compressed/64: Detect/setup SEV/SME features earlier in boot
- x86/sev: Detect/setup SEV/SME features earlier in boot
- x86/sev: Use CC_ATTR attribute to generalize string I/O unroll
- x86/mm: Extend cc_attr to include AMD SEV-SNP
- x86/sev: Shorten GHCB terminate macro names
- SAUCE: x86/sev: Define the Linux specific guest termination reasons
- x86/sev: Save the negotiated GHCB version
- x86/sev: Carve out HV call's return value verification
- x86/sev: Expose sev_es_
- x86/sev: Check SEV-SNP features support
- x86/sev: Add a helper for the PVALIDATE instruction
- x86/sev: Check the vmpl level
- x86/compressed: Add helper for validating pages in the decompression stage
- x86/compressed: Register GHCB memory when SEV-SNP is active
- x86/sev: Register GHCB memory when SEV-SNP is active
- x86/sev: Rename mem_encrypt.c to mem_encrypt_amd.c
- x86/sev: Add helper for validating pages in early enc attribute changes
- treewide: Replace the use of mem_encrypt_
- x86/head64: Carve out the guest encryption postprocessing into a helper
- SAUCE: x86/kernel: Make the .bss..decrypted section shared in RMP table
- x86/kernel: Validate ROM memory before accessing when SEV-SNP is active
- SAUCE: x86/mm: Add support to validate memory when changing C-bit
- x86/sev: Remove do_early_
- x86/sev: Use SEV-SNP AP creation to start secondary CPUs
- x86/head/64: Re-enable stack protection
- x86/compressed/
- x86/compressed/
- x86/compressed/
- x86/compressed/
- x86/compressed/
- x86/boot: Add Confidential Computing type to setup_data
- KVM: x86: Move lookup of indexed CPUID leafs to helper
- x86/sev: Move MSR-based VMGEXITs for CPUID to helper
- x86/compressed/64: Add support for SEV-SNP CPUID table in #VC handlers
- x86/boot: Add a pointer to Confident...