lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20251114130629.GBaRcpVfE-nq88BSy0@fat_crate.local>
Date: Fri, 14 Nov 2025 14:06:29 +0100
From: Borislav Petkov <bp@...en8.de>
To: Andrew Cooper <andrew.cooper3@...rix.com>
Cc: mario.limonciello@....com, dave.hansen@...ux.intel.com,
	mingo@...hat.com, tglx@...utronix.de, x86@...nel.org,
	lkml <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] x86/CPU/AMD: Add additional fixed microcode for SB-7055

On Fri, Nov 14, 2025 at 12:37:58PM +0000, Andrew Cooper wrote:
> Linux-firmware says the min revision for loading this ucode is 0x02, but
> there's no row for it in needs_sha_check().

Author: Borislav Petkov (AMD) <bp@...en8.de>
Date:   Fri Nov 14 14:01:14 2025 +0100

    x86/microcode/AMD: Add Zen5 model 0x44, stepping 0x1 minrev
    
    Add the minimum Entrysign revision for that model+stepping to the list
    of minimum revisions.
    
    Fixes: 50cef76d5cb0 ("x86/microcode/AMD: Load only SHA256-checksummed patches")
    Reported-by: Andrew Cooper <andrew.cooper3@...rix.com>
    Signed-off-by: Borislav Petkov (AMD) <bp@...en8.de>
    Cc: <stable@...nel.org>
    Link: https://lore.kernel.org/r/e94dd76b-4911-482f-8500-5c848a3df026@citrix.com

diff --git a/arch/x86/kernel/cpu/microcode/amd.c b/arch/x86/kernel/cpu/microcode/amd.c
index dc82153009da..a881bf4c2011 100644
--- a/arch/x86/kernel/cpu/microcode/amd.c
+++ b/arch/x86/kernel/cpu/microcode/amd.c
@@ -224,6 +224,7 @@ static bool need_sha_check(u32 cur_rev)
 	case 0xb1010: return cur_rev <= 0xb101046; break;
 	case 0xb2040: return cur_rev <= 0xb204031; break;
 	case 0xb4040: return cur_rev <= 0xb404031; break;
+	case 0xb4041: return cur_rev <= 0xb404101; break;
 	case 0xb6000: return cur_rev <= 0xb600031; break;
 	case 0xb6080: return cur_rev <= 0xb608031; break;
 	case 0xb7000: return cur_rev <= 0xb700031; break;


-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ