Skip to content
Commit f77ac507 authored by Jesse Larrew's avatar Jesse Larrew Committed by Ingo Molnar
Browse files

x86/mce: Use safe MSR accesses for AMD quirk



Certain MSRs are only relevant to a kernel in host mode, and kvm had
chosen not to implement these MSRs at all for guests. If a guest kernel
ever tried to access these MSRs, the result was a general protection
fault.

KVM will be separately patched to return 0 when these MSRs are read,
and this patch ensures that MSR accesses are tolerant of exceptions.

Signed-off-by: default avatarJesse Larrew <jesse.larrew@amd.com>
[ Drop {} braces around loop ]
Signed-off-by: default avatarBorislav Petkov <bp@suse.de>
Reviewed-by: default avatarJoel Schopp <joel.schopp@amd.com>
Acked-by: default avatarTony Luck <tony.luck@intel.com>
Cc: H. Peter Anvin <hpa@zytor.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: linux-edac@vger.kernel.org
Link: http://lkml.kernel.org/r/1426262619-5016-1-git-send-email-jesse.larrew@amd.com
Signed-off-by: default avatarIngo Molnar <mingo@kernel.org>
parent fa45a45c
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment