lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e8fd7cdf-b6a5-1c7d-bd08-0d60a1c10495@amd.com>
Date:   Wed, 29 Mar 2023 12:51:00 -0500
From:   "Limonciello, Mario" <mario.limonciello@....com>
To:     David R <david@...olicited.net>, Borislav Petkov <bp@...en8.de>,
        Gabriel David <ultracoolguy@...root.org>
Cc:     Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Kishon Vijay Abraham I <kvijayab@....com>
Subject: Re: Panic starting 6.2.x and later 6.1.x kernels

On 3/29/2023 11:20, David R wrote:
> On 29/03/2023 17:14, Borislav Petkov wrote:
>> Gabriel and David,
>>
>> can you both pls do:
>>
>> # acpidump -n MADT
>>
>> as root and dump the output here?
>>
>> Thx.
>>
> APIC @ 0x0000000000000000
>      0000: 41 50 49 43 DE 00 00 00 03 AC 41 4C 41 53 4B 41 APIC......ALASKA
>      0010: 41 20 4D 20 49 20 00 00 09 20 07 01 41 4D 49 20  A M I ... ..AMI
>      0020: 13 00 01 00 00 00 E0 FE 01 00 00 00 00 08 01 00 ................
>      0030: 01 00 00 00 00 08 02 01 01 00 00 00 00 08 03 02 ................
>      0040: 01 00 00 00 00 08 04 03 01 00 00 00 00 08 05 08 ................
>      0050: 01 00 00 00 00 08 06 09 01 00 00 00 00 08 07 0A ................
>      0060: 01 00 00 00 00 08 08 0B 01 00 00 00 00 08 09 00 ................
>      0070: 00 00 00 00 00 08 0A 00 00 00 00 00 00 08 0B 00 ................
>      0080: 00 00 00 00 00 08 0C 00 00 00 00 00 00 08 0D 00 ................
>      0090: 00 00 00 00 00 08 0E 00 00 00 00 00 00 08 0F 00 ................
>      00A0: 00 00 00 00 00 08 10 00 00 00 00 00 04 06 FF 05 ................
>      00B0: 00 01 01 0C 09 00 00 00 C0 FE 00 00 00 00 01 0C ................
>      00C0: 0A 00 00 10 C0 FE 18 00 00 00 02 0A 00 00 02 00 ................
>      00D0: 00 00 00 00 02 0A 00 09 09 00 00 00 0F 00 ..............
> 
> 
> Cheers
> David
> 

Can you guys have a try with this patch to see if it helps the situation?

https://lore.kernel.org/linux-pm/20230329174536.6931-1-mario.limonciello@amd.com/T/#u

Thanks,

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ