[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [RFC PATCH v2 0/2] Support NMI Injection

From: Gavin Shan
Subject: Re: [RFC PATCH v2 0/2] Support NMI Injection
Date: Wed, 5 Feb 2020 22:32:28 +1100
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.2.0

On 2/5/20 10:22 PM, Andrew Jones wrote:
On Wed, Feb 05, 2020 at 10:10:30PM +1100, Gavin Shan wrote:
On 2/5/20 9:57 PM, Peter Maydell wrote:
On Wed, 5 Feb 2020 at 03:12, Gavin Shan <address@hidden> wrote:

This intends to support HMP/QMP "nmi" command. When it's issued, the
SError interrupt is injected to the guest. The guest is expected to
crash with it. The behavior is similar to x86: NMI is injected to
guest as error indication. The guest possiblly crashes and reboots
with the injected NMI. Note that the functionality is currently
supported on "virt" machine and {"host", "max"} CPU models only.

Hi; you forgot to cc qemu-devel; can you repost, please, so that the
tools like patchew that monitor the mailing list pick it up?

-- PMM

Sure, The series was resent with a "RESEND" tag.

Another problem with the series is that patches 1/2 and 2/2 are not
in-reply-to 0/2, so the threading of the series is broken. I see
you've already reposted. I'm not sure patchew will be happy without
the threading corrected though.


Thanks, Drew. I had "sendemail.thread=false" in the configuration script,
which was copied from somebody else. Threading starts to work after it's
corrected to "true". I probably wait until getting some feedbacks on
"RESEND RFC v2" if it's reasonable.


reply via email to

[Prev in Thread] Current Thread [Next in Thread]