On Tue 2019-08-27 15:30:30, Thomas Gleixner wrote: > On Tue, 27 Aug 2019, Pavel Machek wrote: > > > On Tue 2019-08-27 09:50:51, Greg Kroah-Hartman wrote: > > > From: Tom Lendacky <thomas.lendacky@xxxxxxx> > > > > > > commit c49a0a80137c7ca7d6ced4c812c9e07a949f6f24 upstream. > > > > > > There have been reports of RDRAND issues after resuming from suspend on > > > some AMD family 15h and family 16h systems. This issue stems from a BIOS > > > not performing the proper steps during resume to ensure RDRAND continues > > > to function properly. > > > > Yes. And instead of reinitializing the RDRAND on resume, this patch > > breaks support even for people with properly functioning BIOSes... > > There is no way to reinitialize RDRAND from the kernel otherwise we would > have exactly done that. If you know how to do that please tell. Would they? AMD is not exactly doing good job with communication here. If BIOS can do it, kernel can do it, too... or do you have information saying otherwise? > Also disabling it for every BIOS is the only way which can be done because > there is no way to know whether the BIOS is fixed or not at cold boot > time. And it has to be known there because applications cache the I'm pretty sure DMI-based whitelist would help here. It should be reasonably to fill it with the common machines at least. Plus, where is the CVE, and does AMD do anything to make BIOS vendors fix them? Best regards, Pavel -- DENX Software Engineering GmbH, Managing Director: Wolfgang Denk HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany
Attachment:
signature.asc
Description: Digital signature