Re: [PATCH] AMD Opteron Rev. E hack

From: Kostik Belousov <kostikbel_at_gmail.com>
Date: Thu, 5 Nov 2009 13:28:34 +0200
On Thu, Nov 05, 2009 at 12:02:39PM +0100, Giovanni Trematerra wrote:
> Hi,
> I have a quick and dirty patch to address the problem as discussed on
> commit r198868 in svn-src-head_at_
> I introduced BROKEN_OPTERON_E kernel option for i386/amd64 arch.
> The patch isn't tested yet, I only successfully compiled on i386.
> Can you let me know if the patch is on the right direction to resolve the issue?
> style(9) tips are welcomed.

I think there is no much sense in printing that hack in unused;
instead, you should print info when option is enabled and vulnerable
CPU is detected.

Aren't atomic_readandclear need the same workaround ?

It would be much easier to read the patch if you generated it
with analog of "svn diff -x -p" for your VCS.

Received on Thu Nov 05 2009 - 10:28:41 UTC

This archive was generated by hypermail 2.4.0 : Wed May 19 2021 - 11:39:57 UTC