[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [RFC PATCH v2 0/2] Support NMI Injection

From: Gavin Shan
Subject: Re: [RFC PATCH v2 0/2] Support NMI Injection
Date: Wed, 5 Feb 2020 22:10:30 +1100
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.0

On 2/5/20 9:57 PM, Peter Maydell wrote:
On Wed, 5 Feb 2020 at 03:12, Gavin Shan <address@hidden> wrote:

This intends to support HMP/QMP "nmi" command. When it's issued, the
SError interrupt is injected to the guest. The guest is expected to
crash with it. The behavior is similar to x86: NMI is injected to
guest as error indication. The guest possiblly crashes and reboots
with the injected NMI. Note that the functionality is currently
supported on "virt" machine and {"host", "max"} CPU models only.

Hi; you forgot to cc qemu-devel; can you repost, please, so that the
tools like patchew that monitor the mailing list pick it up?

-- PMM

Sure, The series was resent with a "RESEND" tag.


reply via email to

[Prev in Thread] Current Thread [Next in Thread]