KVM: SVM: Handle MCE intercepts always on host level
authorJoerg Roedel <joerg.roedel@amd.com>
Thu, 22 Apr 2010 10:33:14 +0000 (12:33 +0200)
committerAvi Kivity <avi@redhat.com>
Mon, 17 May 2010 09:19:27 +0000 (12:19 +0300)
This patch prevents MCE intercepts from being propagated
into the L1 guest if they happened in an L2 guest.

Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
arch/x86/kvm/svm.c

index 30e49fe7f8c0f0a29383d22dbb67a4a54acd10b7..889f66022e570d208d297d12a2ae934d0019d8ef 100644 (file)
@@ -1651,6 +1651,7 @@ static int nested_svm_exit_special(struct vcpu_svm *svm)
        switch (exit_code) {
        case SVM_EXIT_INTR:
        case SVM_EXIT_NMI:
+       case SVM_EXIT_EXCP_BASE + MC_VECTOR:
                return NESTED_EXIT_HOST;
        case SVM_EXIT_NPF:
                /* For now we are always handling NPFs when using them */