diff options
| author | Roedel, Joerg <[email protected]> | 2011-05-19 09:13:39 +0000 |
|---|---|---|
| committer | Ingo Molnar <[email protected]> | 2011-05-20 10:57:18 +0000 |
| commit | d47cc0db8fd6011de2248df505fc34990b7451bf (patch) | |
| tree | a019570daeba6e6f9ad3410b9adf2d0c2760223b /net/unix/af_unix.c | |
| parent | selinux: avoid unnecessary avc cache stat hit count (diff) | |
| download | kernel-d47cc0db8fd6011de2248df505fc34990b7451bf.tar.gz kernel-d47cc0db8fd6011de2248df505fc34990b7451bf.zip | |
x86, amd: Use _safe() msr access for GartTlbWlk disable code
The workaround for Bugzilla:
https://bugzilla.kernel.org/show_bug.cgi?id=33012
introduced a read and a write to the MC4 mask msr.
Unfortunatly this MSR is not emulated by the KVM hypervisor
so that the kernel will get a #GP and crashes when applying
this workaround when running inside KVM.
This issue was reported as:
https://bugzilla.kernel.org/show_bug.cgi?id=35132
and is fixed with this patch. The change just let the kernel
ignore any #GP it gets while accessing this MSR by using the
_safe msr access methods.
Reported-by: Török Edwin <[email protected]>
Signed-off-by: Joerg Roedel <[email protected]>
Cc: Rafael J. Wysocki <[email protected]>
Cc: Maciej Rutecki <[email protected]>
Cc: Avi Kivity <[email protected]>
Cc: Andrew Morton <[email protected]>
Cc: <[email protected]> # .39.x
Signed-off-by: Ingo Molnar <[email protected]>
Diffstat (limited to 'net/unix/af_unix.c')
0 files changed, 0 insertions, 0 deletions
