[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [RFC PATCH v2 0/2] Support NMI Injection
From: |
Andrew Jones |
Subject: |
Re: [RFC PATCH v2 0/2] Support NMI Injection |
Date: |
Wed, 5 Feb 2020 12:22:47 +0100 |
On Wed, Feb 05, 2020 at 10:10:30PM +1100, Gavin Shan wrote:
> On 2/5/20 9:57 PM, Peter Maydell wrote:
> > On Wed, 5 Feb 2020 at 03:12, Gavin Shan <address@hidden> wrote:
> > >
> > > This intends to support HMP/QMP "nmi" command. When it's issued, the
> > > SError interrupt is injected to the guest. The guest is expected to
> > > crash with it. The behavior is similar to x86: NMI is injected to
> > > guest as error indication. The guest possiblly crashes and reboots
> > > with the injected NMI. Note that the functionality is currently
> > > supported on "virt" machine and {"host", "max"} CPU models only.
> >
> > Hi; you forgot to cc qemu-devel; can you repost, please, so that the
> > tools like patchew that monitor the mailing list pick it up?
> >
> > thanks
> > -- PMM
> >
>
> Sure, The series was resent with a "RESEND" tag.
>
Another problem with the series is that patches 1/2 and 2/2 are not
in-reply-to 0/2, so the threading of the series is broken. I see
you've already reposted. I'm not sure patchew will be happy without
the threading corrected though.
Thanks,
drew