Re: [PATCH v3 1/2] target/arm: Support SError injection

2020-02-16 Thread Gavin Shan
Hi Marc, On 2/16/20 11:34 PM, Marc Zyngier wrote: On 2020-02-14 05:59, Gavin Shan wrote: This supports SError injection, which will be used by "virt" board to simulating the behavior of NMI injection in next patch. As Peter Maydell suggested, this adds a new interrupt (ARM_CPU_SERROR), which is

Re: [PATCH v3 1/2] target/arm: Support SError injection

2020-02-16 Thread Gavin Shan
On 2/16/20 2:41 PM, Richard Henderson wrote: On 2/13/20 9:59 PM, Gavin Shan wrote: diff --git a/target/arm/cpu.c b/target/arm/cpu.c index b0762a76c4..180e29fb83 100644 --- a/target/arm/cpu.c +++ b/target/arm/cpu.c @@ -78,7 +78,7 @@ static bool arm_cpu_has_work(CPUState *cs) && cs->inte

Re: [PATCH v3 1/2] target/arm: Support SError injection

2020-02-16 Thread Marc Zyngier
Hi Gavin, On 2020-02-14 05:59, Gavin Shan wrote: This supports SError injection, which will be used by "virt" board to simulating the behavior of NMI injection in next patch. As Peter Maydell suggested, this adds a new interrupt (ARM_CPU_SERROR), which is parallel to CPU_INTERRUPT_HARD. The b

Re: [PATCH v3 1/2] target/arm: Support SError injection

2020-02-15 Thread Richard Henderson
On 2/13/20 9:59 PM, Gavin Shan wrote: > diff --git a/target/arm/cpu.c b/target/arm/cpu.c > index b0762a76c4..180e29fb83 100644 > --- a/target/arm/cpu.c > +++ b/target/arm/cpu.c > @@ -78,7 +78,7 @@ static bool arm_cpu_has_work(CPUState *cs) > && cs->interrupt_request & > (CPU_INTER

[PATCH v3 1/2] target/arm: Support SError injection

2020-02-13 Thread Gavin Shan
This supports SError injection, which will be used by "virt" board to simulating the behavior of NMI injection in next patch. As Peter Maydell suggested, this adds a new interrupt (ARM_CPU_SERROR), which is parallel to CPU_INTERRUPT_HARD. The backend depends on if kvm is enabled or not. kvm_vcpu_io