]> www.infradead.org Git - users/jedix/linux-maple.git/commitdiff
xen/mce: Register native mce handler as vMCE bounce back point
authorLiu, Jinsong <jinsong.liu@intel.com>
Thu, 19 Apr 2012 21:09:55 +0000 (05:09 +0800)
committerKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Fri, 11 May 2012 20:36:30 +0000 (16:36 -0400)
When Xen hypervisor inject vMCE to guest, use native mce handler
to handle it

Signed-off-by: Liu, Jinsong <jinsong.liu@intel.com>
Signed-off-by: Ke, Liping <liping.ke@intel.com>
Signed-off-by: Jiang, Yunhong <yunhong.jiang@intel.com>
Signed-off-by: Jeremy Fitzhardinge <jeremy.fitzhardinge@citrix.com>
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
arch/x86/xen/enlighten.c

index bfaf510e578d23257b2547f20744b4bd07845056..02b6818e3783915d7580317433c01614b37eb9d8 100644 (file)
@@ -518,8 +518,8 @@ static int cvt_gate_to_trap(int vector, const gate_desc *val,
        /*
         * Look for known traps using IST, and substitute them
         * appropriately.  The debugger ones are the only ones we care
-        * about.  Xen will handle faults like double_fault and
-        * machine_check, so we should never see them.  Warn if
+        * about.  Xen will handle faults like double_fault,
+        * so we should never see them.  Warn if
         * there's an unexpected IST-using fault handler.
         */
        if (addr == (unsigned long)debug)
@@ -534,7 +534,11 @@ static int cvt_gate_to_trap(int vector, const gate_desc *val,
                return 0;
 #ifdef CONFIG_X86_MCE
        } else if (addr == (unsigned long)machine_check) {
-               return 0;
+               /*
+                * when xen hyeprvisor inject vMCE to guest,
+                * use native mce handler to handle it
+                */
+               ;
 #endif
        } else {
                /* Some other trap using IST? */