[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [RFC PATCH v2 0/2] Support NMI Injection
From: |
Peter Maydell |
Subject: |
Re: [RFC PATCH v2 0/2] Support NMI Injection |
Date: |
Wed, 5 Feb 2020 10:57:37 +0000 |
On Wed, 5 Feb 2020 at 03:12, Gavin Shan <address@hidden> wrote:
>
> This intends to support HMP/QMP "nmi" command. When it's issued, the
> SError interrupt is injected to the guest. The guest is expected to
> crash with it. The behavior is similar to x86: NMI is injected to
> guest as error indication. The guest possiblly crashes and reboots
> with the injected NMI. Note that the functionality is currently
> supported on "virt" machine and {"host", "max"} CPU models only.
Hi; you forgot to cc qemu-devel; can you repost, please, so that the
tools like patchew that monitor the mailing list pick it up?
thanks
-- PMM