From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [PATCH] KVM: allow bit 10 to be cleared in MSR_IA32_MC4_CTL Date: Thu, 25 Mar 2010 14:28:33 +0200 Message-ID: <4BAB56F1.20509@redhat.com> References: <1269449202-8008-1-git-send-email-andre.przywara@amd.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org To: Andre Przywara Return-path: Received: from mx1.redhat.com ([209.132.183.28]:11950 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752177Ab0CYM2g (ORCPT ); Thu, 25 Mar 2010 08:28:36 -0400 In-Reply-To: <1269449202-8008-1-git-send-email-andre.przywara@amd.com> Sender: kvm-owner@vger.kernel.org List-ID: On 03/24/2010 06:46 PM, Andre Przywara wrote: > There is a quirk for AMD K8 CPUs in many Linux kernels (see > arch/x86/kernel/cpu/mcheck/mce.c:__mcheck_cpu_apply_quirks()) that > clears bit 10 in that MCE related MSR. KVM can only cope with all > zeros or all ones, so it will inject a #GP into the guest, which > will let it panic. > So lets add a quirk to the quirk and ignore this single cleared bit. > This fixes -cpu kvm64 on all machines and -cpu host on K8 machines > with some guest Linux kernels. > Applied, thanks. -- error compiling committee.c: too many arguments to function