From: Joerg Roedel <joerg.roe...@amd.com> This patch prevents MCE intercepts from being propagated into the L1 guest if they happened in an L2 guest.
Signed-off-by: Joerg Roedel <joerg.roe...@amd.com> Signed-off-by: Avi Kivity <a...@redhat.com> diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index 30e49fe..889f660 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -1651,6 +1651,7 @@ static int nested_svm_exit_special(struct vcpu_svm *svm) switch (exit_code) { case SVM_EXIT_INTR: case SVM_EXIT_NMI: + case SVM_EXIT_EXCP_BASE + MC_VECTOR: return NESTED_EXIT_HOST; case SVM_EXIT_NPF: /* For now we are always handling NPFs when using them */ -- To unsubscribe from this list: send the line "unsubscribe kvm-commits" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html