I did test the kernel from lunar proposed (6.2.0.1015.16) on AWS. The image boots with sev-snp enabled:
# sudo dmesg | grep -i sev [ 5.563677] Memory Encryption Features active: AMD SEV SEV-ES SEV-SNP [ 6.140250] SEV: Using SNP CPUID table, 64 entries present. [ 8.507286] SEV: SNP guest platform device initialized. [ 20.829729] sev-guest sev-guest: Initialized SEV guest driver (using vmpck_id 0)
# apt-cache policy linux-aws linux-aws: Installed: 6.2.0.1015.16 Candidate: 6.2.0.1015.16 Version table: *** 6.2.0.1015.16 100 100 http://archive.ubuntu.com/ubuntu lunar-proposed/main amd64 Packages 100 /var/lib/dpkg/status 6.2.0.1013.14 500 500 http://us-east-2.ec2.archive.ubuntu.com/ubuntu lunar-updates/main amd64 Packages 500 http://security.ubuntu.com/ubuntu lunar-security/main amd64 Packages 6.2.0.1003.4 500 500 http://us-east-2.ec2.archive.ubuntu.com/ubuntu lunar/main amd64 Packages
I did test the kernel from lunar proposed (6.2.0.1015.16) on AWS. The image boots with sev-snp enabled:
# sudo dmesg | grep -i sev
[ 5.563677] Memory Encryption Features active: AMD SEV SEV-ES SEV-SNP
[ 6.140250] SEV: Using SNP CPUID table, 64 entries present.
[ 8.507286] SEV: SNP guest platform device initialized.
[ 20.829729] sev-guest sev-guest: Initialized SEV guest driver (using vmpck_id 0)
# apt-cache policy linux-aws archive. ubuntu. com/ubuntu lunar-proposed/main amd64 Packages dpkg/status us-east- 2.ec2.archive. ubuntu. com/ubuntu lunar-updates/main amd64 Packages security. ubuntu. com/ubuntu lunar-security/main amd64 Packages us-east- 2.ec2.archive. ubuntu. com/ubuntu lunar/main amd64 Packages
linux-aws:
Installed: 6.2.0.1015.16
Candidate: 6.2.0.1015.16
Version table:
*** 6.2.0.1015.16 100
100 http://
100 /var/lib/
6.2.0.1013.14 500
500 http://
500 http://
6.2.0.1003.4 500
500 http://