Re: [PATCH v4 1/3] target/arm: Support SError injection

2020-02-19 Thread Marc Zyngier
On Wed, 19 Feb 2020 10:09:39 +1100 Gavin Shan wrote: > Hi Marc, > > On 2/19/20 3:28 AM, Marc Zyngier wrote: > > On 2020-02-18 02:04, Gavin Shan wrote: > >> This supports SError injection, which will be used by "virt" board to > >> simulating the behavior of NMI injection in next patch. As Pete

Re: [PATCH v4 1/3] target/arm: Support SError injection

2020-02-18 Thread Gavin Shan
Hi Marc, On 2/19/20 3:28 AM, Marc Zyngier wrote: On 2020-02-18 02:04, Gavin Shan wrote: This supports SError injection, which will be used by "virt" board to simulating the behavior of NMI injection in next patch. As Peter Maydell suggested, this adds a new interrupt (ARM_CPU_SERROR), which is

Re: [PATCH v4 1/3] target/arm: Support SError injection

2020-02-18 Thread Marc Zyngier
On 2020-02-18 02:04, Gavin Shan wrote: This supports SError injection, which will be used by "virt" board to simulating the behavior of NMI injection in next patch. As Peter Maydell suggested, this adds a new interrupt (ARM_CPU_SERROR), which is parallel to CPU_INTERRUPT_HARD. The backend depe

[PATCH v4 1/3] target/arm: Support SError injection

2020-02-17 Thread Gavin Shan
This supports SError injection, which will be used by "virt" board to simulating the behavior of NMI injection in next patch. As Peter Maydell suggested, this adds a new interrupt (ARM_CPU_SERROR), which is parallel to CPU_INTERRUPT_HARD. The backend depends on if kvm is enabled or not. kvm_vcpu_io