From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754886AbbCMWXm (ORCPT ); Fri, 13 Mar 2015 18:23:42 -0400 Received: from mail.skyhub.de ([78.46.96.112]:45084 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752124AbbCMWXk (ORCPT ); Fri, 13 Mar 2015 18:23:40 -0400 Date: Fri, 13 Mar 2015 23:22:11 +0100 From: Borislav Petkov To: jesse.larrew@amd.com Cc: x86@kernel.org, Joel Schopp , Tony Luck , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , linux-edac@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] mce: use safe MSR accesses Message-ID: <20150313222211.GD30678@pd.tnic> References: <1426262619-5016-1-git-send-email-jesse.larrew@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <1426262619-5016-1-git-send-email-jesse.larrew@amd.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 13, 2015 at 11:03:39AM -0500, jesse.larrew@amd.com wrote: > From: Jesse Larrew > > Certain MSRs are only relevant to a kernel in host mode, and kvm had > chosen not to implement these MSRs at all for guests. If a guest kernel > ever tried to access these MSRs, the result was a general protection > fault. > > KVM will be separately patched to return 0 when these MSRs are read, > and this patch ensures that MSR accesses are tolerant of exceptions. > > Signed-off-by: Jesse Larrew > --- > arch/x86/kernel/cpu/mcheck/mce.c | 11 +++-------- > 1 file changed, 3 insertions(+), 8 deletions(-) Applied, thanks. -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you reply. --