lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CC418B80-5ED9-4F64-917F-BA6F94130F83@alien8.de>
Date: Mon, 30 Sep 2024 18:16:29 +0200
From: Borislav Petkov <bp@...en8.de>
To: Jens Axboe <axboe@...nel.dk>
CC: Thomas Gleixner <tglx@...utronix.de>,
 the arch/x86 maintainers <x86@...nel.org>,
 LKML <linux-kernel@...r.kernel.org>,
 "regressions@...ts.linux.dev" <regressions@...ts.linux.dev>
Subject: Re: AMD zen microcode updates breaks boot

On September 30, 2024 2:27:03 PM GMT+02:00, Jens Axboe <axboe@...nel.dk> wrote:
>Would it perhaps be an idea to revert the cleanup until then? I can't
>be the only one hit by this. We obviously missed -rc1 now, but...

You're the first one I'm hearing about. Either your configuration is weird or something else is amiss. I've tested this patch on all AMD families. But sure, feel free to send a properly explained revert and I'll ack it.

Thx.

-- 
Sent from a small device: formatting sucks and brevity is inevitable. 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ