[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250312123130.8290-1-me@mixaill.net>
Date: Wed, 12 Mar 2025 15:31:28 +0300
From: Mikhail Paulyshka <me@...aill.net>
To: Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>,
Borislav Petkov <bp@...en8.de>,
Dave Hansen <dave.hansen@...ux.intel.com>,
x86@...nel.org,
linux-kernel@...r.kernel.org
Cc: Mikhail Paulyshka <me@...aill.net>
Subject: [PATCH 0/2] x86/rdrand: implement sanity check for RDSEED
On the AMD Cyan Skillfish (Family 0x17 Model 0x47 Stepping 0x0), which
is a Zen2-based APU found on the AMD BC-250 board, there is a situation
where RDRAND works fine, but RDSEED generates FF. This leads to some
applications that use RDSEED to generate random numbers (such as
Qt and KDE) into a nearly unusable state.
Although AMD has fixed the Zen2 RDRAND issues in 2019 with a microcode update,
no such update has been released for the Family 0x17 Model 0x47 core.
This patchset introduces an separate sanity check for RDSEED and hides the
RDSEED and RDRAND from CPUID on AMD platforms in the case of a malfunction.
Mikhail Paulyshka (2):
x86/rdrand: implement sanity check for RDSEED
x86/rdrand: hide RDRAND and RDSEED from CPUID in case of a malfunction
arch/x86/include/asm/archrandom.h | 1 +
arch/x86/include/asm/msr-index.h | 1 +
arch/x86/kernel/cpu/common.c | 1 +
arch/x86/kernel/cpu/rdrand.c | 48 ++++++++++++++++++++++++--
tools/arch/x86/include/asm/msr-index.h | 1 +
5 files changed, 49 insertions(+), 3 deletions(-)
--
2.48.1
Powered by blists - more mailing lists