On 10/17/25 1:26 AM, Andrew Cooper wrote:
Fixes: 630e8875ab36 ("x86/ucode: Perform extra SHA2 checks on AMD Fam17h/19h 
microcode")
Signed-off-by: Andrew Cooper<[email protected]>
---
CC: Jan Beulich<[email protected]>
CC: Roger Pau MonnĂ©<[email protected]>
CC: Oleksii Kurochko<[email protected]>

For 4.21.  This is a formatting fix with basically 0 risk.

It is encouraging that no-one has reported this bug so far, because it
suggests that no-one has turned off digest checking and then looked at dmesg.

Release-Acked-by: Oleksii Kurochko<[email protected]>

Thanks.

~ Oleksii

---
  xen/arch/x86/cpu/microcode/amd.c | 2 +-
  1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/xen/arch/x86/cpu/microcode/amd.c b/xen/arch/x86/cpu/microcode/amd.c
index a5729229a403..59332da2b827 100644
--- a/xen/arch/x86/cpu/microcode/amd.c
+++ b/xen/arch/x86/cpu/microcode/amd.c
@@ -519,7 +519,7 @@ void __init ucode_probe_amd(struct microcode_ops *ops)
      if ( !opt_digest_check && boot_cpu_data.family >= 0x17 )
      {
          printk(XENLOG_WARNING
-               "Microcode patch additional digest checks disabled");
+               "Microcode patch additional digest checks disabled\n");
          add_taint(TAINT_CPU_OUT_OF_SPEC);
      }
  

Reply via email to