x86/boot: Fix another __read_cr4() case on 486
[deliverable/linux.git] / arch / x86 / kernel / setup.c
index 0fa60f5f5a1641dc8eb2c82968dbadd650ed6e37..98c9cd6f3b5d18c26fe71d4afc0d94145eb5decf 100644 (file)
@@ -1137,9 +1137,7 @@ void __init setup_arch(char **cmdline_p)
         * auditing all the early-boot CR4 manipulation would be needed to
         * rule it out.
         */
-       if (boot_cpu_data.cpuid_level >= 0)
-               /* A CPU has %cr4 if and only if it has CPUID. */
-               mmu_cr4_features = __read_cr4();
+       mmu_cr4_features = __read_cr4_safe();
 
        memblock_set_current_limit(get_max_mapped());
 
This page took 0.02389 seconds and 5 git commands to generate.