[kernel] r22257 - dists/wheezy-security/linux/debian/patches/bugfix/x86

Ben Hutchings benh at moszumanska.debian.org
Mon Jan 12 18:36:31 UTC 2015


Author: benh
Date: Mon Jan 12 18:36:31 2015
New Revision: 22257

Log:
Change CVE-2013-6885 fix to use {rd,wr}msrl_amd_safe() as the generic {rd,wr}msrl_safe() are not defined

Modified:
   dists/wheezy-security/linux/debian/patches/bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch

Modified: dists/wheezy-security/linux/debian/patches/bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch
==============================================================================
--- dists/wheezy-security/linux/debian/patches/bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch	Mon Jan 12 14:34:44 2015	(r22256)
+++ dists/wheezy-security/linux/debian/patches/bugfix/x86/x86-cpu-amd-add-workaround-for-family-16h-erratum-79.patch	Mon Jan 12 18:36:31 2015	(r22257)
@@ -45,7 +45,7 @@
  - Venkatesh Srinivas pointed out we should use {rd,wr}msrl_safe() to
    avoid crashing on KVM.  This was fixed upstream by commit 8f86a7373a1c
    ("x86, AMD: Convert to the new bit access MSR accessors") but that's too
-   much trouble to backport.]
+   much trouble to backport.  Here we must use {rd,wr}msrl_amd_safe().]
 ---
  arch/x86/include/asm/msr-index.h |  1 +
  arch/x86/kernel/cpu/amd.c             | 10 ++++++++++
@@ -72,9 +72,9 @@
 +	if (c->x86 == 0x16 && c->x86_model <= 0xf) {
 +		u64 val;
 +
-+		if (!rdmsrl_safe(MSR_AMD64_LS_CFG, &val) &&
++		if (!rdmsrl_amd_safe(MSR_AMD64_LS_CFG, &val) &&
 +		    !(val & BIT(15)))
-+			wrmsrl_safe(MSR_AMD64_LS_CFG, val | BIT(15));
++			wrmsrl_amd_safe(MSR_AMD64_LS_CFG, val | BIT(15));
 +	}
 +
  }



More information about the Kernel-svn-changes mailing list