[PATCH] AMD Opteron Rev. E hack

Kostik Belousov kostikbel at gmail.com
Thu Nov 5 11:28:41 UTC 2009


On Thu, Nov 05, 2009 at 12:02:39PM +0100, Giovanni Trematerra wrote:
> Hi,
> I have a quick and dirty patch to address the problem as discussed on
> commit r198868 in svn-src-head@
> I introduced BROKEN_OPTERON_E kernel option for i386/amd64 arch.
> The patch isn't tested yet, I only successfully compiled on i386.
> Can you let me know if the patch is on the right direction to resolve the issue?
> style(9) tips are welcomed.

I think there is no much sense in printing that hack in unused;
instead, you should print info when option is enabled and vulnerable
CPU is detected.

Aren't atomic_readandclear need the same workaround ?

It would be much easier to read the patch if you generated it
with analog of "svn diff -x -p" for your VCS.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 196 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-current/attachments/20091105/ea312f9b/attachment.pgp


More information about the freebsd-current mailing list