On Fri, 24 Nov 2023 16:24:04 +0100, Benedikt Spranger wrote:
> I rebuild the Package without these flags (-msse4.1 / -maes) and
> everything works as expected. I also removed the -maes flag, since AES
> is, like SSE4.1, is not part of the Debian amd64 architectural
> baseline. Patch is attached.
Control: severity +1 serious
Control: patch
Dear maintainer,
while looking at the bug I recognized, that the AMD Athlon(tm) II X2
255 Processor is not capable to handle SSE4.1 opcodes. The SSE4.1 and
SSE4.2 support by AMD CPUs was introduced later.
I rebuild the Package without these flags (-mss
Package: libcryptx-perl
Version: 0.080-1
Severity: important
X-Debbugs-Cc: b.spran...@linutronix.de
Dear maintainer,
spamd fail due to an invalid opcode in CryptX.so on an AMD Athlon(tm) II X2
255 machine:
2023-11-21T13:16:47.795562+00:00 tanja kernel: [1127566.199310] traps: spamd
child[12938]
3 matches
Mail list logo