On Thu, 2010-10-07 at 00:05 +0800, Marcelo Tosatti wrote: > On Wed, Oct 06, 2010 at 10:58:36AM +0900, Hidetoshi Seto wrote: > > I got some more question: > > > > (2010/10/05 3:54), Marcelo Tosatti wrote: > > > Index: qemu/target-i386/cpu.h > > > =================================================================== > > > --- qemu.orig/target-i386/cpu.h > > > +++ qemu/target-i386/cpu.h > > > @@ -250,16 +250,32 @@ > > > #define PG_ERROR_RSVD_MASK 0x08 > > > #define PG_ERROR_I_D_MASK 0x10 > > > > > > -#define MCG_CTL_P (1UL<<8) /* MCG_CAP register available */ > > > +#define MCG_CTL_P (1ULL<<8) /* MCG_CAP register available */ > > > +#define MCG_SER_P (1ULL<<24) /* MCA recovery/new status bits */ > > > > > > -#define MCE_CAP_DEF MCG_CTL_P > > > +#define MCE_CAP_DEF (MCG_CTL_P|MCG_SER_P) > > > #define MCE_BANKS_DEF 10 > > > > > > > It seems that current kvm doesn't support SER_P, so injecting SRAO > > to guest will mean that guest receives VAL|UC|!PCC and RIPV event > > from virtual processor that doesn't have SER_P. > > Dean also noted this. I don't think it was deliberate choice to not > expose SER_P. Huang? In fact, that should be a BUG. I will fix it as soon as possible. Best Regards, Huang Ying -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html