diff options
author | Jesse Larrew <[email protected]> | 2015-03-13 11:03:39 -0500 |
---|---|---|
committer | Ingo Molnar <[email protected]> | 2015-03-23 10:16:43 +0100 |
commit | f77ac507f893fc00c1b9ea0076f3c9e664b0f9ab (patch) | |
tree | 746da99d0fb1efe66fc2061f34d51dfb71a3a51f /net/lapb/lapb_iface.c | |
parent | fa45a45ca34891614789e68dfbf7ce344c9013ac (diff) |
x86/mce: Use safe MSR accesses for AMD quirk
Certain MSRs are only relevant to a kernel in host mode, and kvm had
chosen not to implement these MSRs at all for guests. If a guest kernel
ever tried to access these MSRs, the result was a general protection
fault.
KVM will be separately patched to return 0 when these MSRs are read,
and this patch ensures that MSR accesses are tolerant of exceptions.
Signed-off-by: Jesse Larrew <[email protected]>
[ Drop {} braces around loop ]
Signed-off-by: Borislav Petkov <[email protected]>
Reviewed-by: Joel Schopp <[email protected]>
Acked-by: Tony Luck <[email protected]>
Cc: H. Peter Anvin <[email protected]>
Cc: Thomas Gleixner <[email protected]>
Cc: [email protected]
Link: http://lkml.kernel.org/r/[email protected]
Signed-off-by: Ingo Molnar <[email protected]>
Diffstat (limited to 'net/lapb/lapb_iface.c')
0 files changed, 0 insertions, 0 deletions