x86/mce: Use "safe" MSR functions when enabling additional error logging
authorTony Luck <tony.luck@intel.com>
Wed, 11 Nov 2020 00:39:54 +0000 (16:39 -0800)
committerBorislav Petkov <bp@suse.de>
Mon, 16 Nov 2020 16:34:08 +0000 (17:34 +0100)
commit098416e6986127f7e4c8ce4fd6bbbd80e55b0386
treec772d5cb6e156bfd78513fef766374ed9fe92777
parent15af36596ae305aefc8c502c2d3e8c58221709eb
x86/mce: Use "safe" MSR functions when enabling additional error logging

Booting as a guest under KVM results in error messages about
unchecked MSR access:

  unchecked MSR access error: RDMSR from 0x17f at rIP: 0xffffffff84483f16 (mce_intel_feature_init+0x156/0x270)

because KVM doesn't provide emulation for random model specific
registers.

Switch to using rdmsrl_safe()/wrmsrl_safe() to avoid the message.

Fixes: 68299a42f842 ("x86/mce: Enable additional error logging on certain Intel CPUs")
Reported-by: Qian Cai <cai@redhat.com>
Signed-off-by: Tony Luck <tony.luck@intel.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Link: https://lkml.kernel.org/r/20201111003954.GA11878@agluck-desk2.amr.corp.intel.com
arch/x86/kernel/cpu/mce/intel.c