lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <524470A8.7090103@amd.com>
Date:	Thu, 26 Sep 2013 12:36:40 -0500
From:	Sherry Hurwitz <sherry.hurwitz@....com>
To:	Henrique de Moraes Holschuh <hmh@....eng.br>
CC:	Borislav Petkov <bp@...en8.de>, Jacob Shin <jacob.shin@....com>,
	Andreas Herrmann <herrmann.der.user@...glemail.com>,
	<linux-kernel@...r.kernel.org>
Subject: Re: Issues with AMD microcode updates

On 09/25/2013 08:49 AM, Henrique de Moraes Holschuh wrote:
> On Tue, 24 Sep 2013, Sherry Hurwitz wrote:
>> You can direct AMD microcode issues to me now.
>> We are setting up some systems in the lab and trying to duplicate
>> the problem now.
> Thank you!
>
> If you're going to be taking care of AMD microcode update issues, maybe it
> would be a good idea to add your name to the MAINTAINERS file for the "AMD
> MICROCODE UPDATE SUPPORT", and remove the (dead for a while now)
> amd64-microcode@...64.org mailing list?
>
We have failed to reproduce a hang while loading microcode.
We have tested with kernel and AMD family combinations with
normal and error condition so error paths were taken.  Obviously
there are factors we are missing that the users are hitting.
Any suggestions on how we improve the test matrix would be
helpful.  We will continue the investigation but any insights are appreciated.

NOTE: kernels before 3.0 only load 1 (2k) size of microcode patch and
therefore do not support microcode loading of family 14h, 15h, and 16h.
Also,in a test request on another thread you suggested someone with
family 15h revC0 to load microcode twice with an earlier patch and then
the latest, but there has only been 1 microcode patch level published for revB2
so that test won't work.

Test Matrix:

kernel           cpu family             results             conditions
---------------------------------------------------------------------------------
2.6.38           fam10h                 load passed         normal
2.6.38           fam15h revC0           load failed         2.6.38 can not handle 4k patches
3.5.2            fam10h                 load passed         normal
3.5.2            fam15h revB2           load passed         loaded 637 then second load 63d
3.5.2            fam15h revC0           load passed         normal
3.5.2            fam15h revC0           load failed         used a corrupted bin file
3.7              fam15h revC0           load passed         loaded  81c then second load 822
3.10             fam15h revC0           load passed         loaded 81c then second load 822
3.11rc7          fam15h revB2           load passedBIOS loaded 637; test loaded 63d; sysfs info can be misleading


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ