Package Details: linux-amd-znver3-headers 6.8.v.9-1

Git Clone URL: https://aur.archlinux.org/linux-amd-znver3.git (read-only, click to copy)
Package Base: linux-amd-znver3
Description: Header files and scripts for building modules for the linux-amd-znver3 kernel
Upstream URL: https://www.kernel.org/
Licenses: GPL2
Submitter: None
Maintainer: bebna
Last Packager: bebna
Votes: 11
Popularity: 1.72
First Submitted: 2023-05-04 15:47 (UTC)
Last Updated: 2024-05-03 10:20 (UTC)

Pinned Comments

<deleted-account> commented on 2023-05-07 09:41 (UTC)

Tired of compiling? Use this binary repo instead! Add this at the end of /etc/pacman.conf :

[linuxkernels]
Server = http://nhameh.ovh/$repo/$arch
SigLevel = Optional TrustAll

Latest Comments

« First ‹ Previous 1 .. 3 4 5 6 7 8 9 10 Next › Last »

<deleted-account> commented on 2023-10-28 14:08 (UTC)

@iseja ty for the heads up!! rebuilds coming up.

Iseja commented on 2023-10-28 12:42 (UTC)

Please enable CONFIG_UNICODE, casefolding on ext4 needs that.

<deleted-account> commented on 2023-10-25 16:45 (UTC)

Okay well I'll commit that change regardless. I think this is a really random thing (like a race timing condition like mentioned) and its not worth losing your mind over...

Anarconda commented on 2023-10-25 16:39 (UTC)

@eggz 1. It seems I was wrong because linux-cachyos-lto 6.5.9 shows the same message. 2. ArchLinux Zen 6.5.8 doesn't 3. Your kernel whith CONFIG_CRYPTO_USER_API_ENABLE_OBSOLETE=n shows the message.

<deleted-account> commented on 2023-10-25 15:23 (UTC)

On second thought I think it might be CONFIG_CRYPTO_USER_API_ENABLE_OBSOLETE that does it. Let me fire up a build for you. (because I am going to disable it regardless)

<deleted-account> commented on 2023-10-25 15:21 (UTC)

They both have CONFIG_CRYPTO_JITTERENTROPY=yso that makes not much sense to me on first sight.

Anarconda commented on 2023-10-25 14:03 (UTC)

By the way, I'm using other kernels eventually (cachyos-lto and ArchLinux zen version) but the message appears only with this kernel.

<deleted-account> commented on 2023-10-25 13:56 (UTC)

Interesting. While I'm sure this error is not intended and a bug indeed, since it seems to pop up pretty commonly (and popped up fairly recently), the impact is effectively zero. I'll dig in the commits if I have some spare time to see what commit might have caused this behaviour none the less as it is interesting indeed.

Anarconda commented on 2023-10-25 13:49 (UTC)

@eggz, "I assume that error does not concern this specific kernel version, because it seems to be a common error"

That is correct. I saw this error en latest kernel versions (not sure but maybe 3 or 4) but not before. I'll let it go because everything seems to be ok.

Thanks again

<deleted-account> commented on 2023-10-25 13:25 (UTC)

@Anarconda, I assume that error does not concern this specific kernel version, because it seems to be a common error:

This is what I could dig up:

with AMD 2nd generation EPYC (Rome) CPUs seems to report this error more frequently than other systems, but all x86 servers (both Intel and AMD CPUs) can experience this error.

Since that article was made back in the day, I assume its a thing for all zenv2+ CPUs.

A race condition between calibrating the TSC clock source and initializing the jitterentropy crypto code. This will remove the the jitterentropy source of entropy, but the kernel and rngd daemon can use other sources such as a hardware TRNG or the RDRAND/RDSEED instructions on newer x86 CPUs.
Source: https://access.redhat.com/solutions/4384951

This rings true, modern (AMD) CPUs use RDRAND/RDSEED now:

AMD’s Family 17h processor and other products of 2016 and beyond are equipped
with Cryptographic Co-processor 5.0 hardware that enables the generation of
cryptographically secure random numbers. 

Source: https://www.amd.com/content/dam/amd/en/documents/pdfs/developer/aocl/amd-secure-random-number-generator-library-2.0-whitepaper.pdf

The Cryptographic Co-processor is indeed capable of RDSEED/RDRAND.

As far as I can understand, this is really not worth losing any sleep over. The thing that failed seems to be legacy and superseeded by more modern means to generate random numbers by using capabilities already present on your CPU. I am always open to the contrary, but this seems to rings true to me.