Hi Jan,

On 6/24/19 8:28 AM, Jan Kiszka wrote:
> This series comes out of pre-release testing: With new kernel versions,
> we spuriously injected masked MSI vectors that are not acked by Linux,
> thus caused interrupt stalling.
> 
> Jan
> 
> Jan Kiszka (3):
>   core, tools: Add msi_maskable flag to jailhouse_pci_device
>   x86: pci: Do not inject masked MSI vectors on handover
>   core: Rename arch_pci_suppress_msi to arch_pci_set_suppress_msi

FYI: tested this on our AMD machine. Sometimes, we still loose the
ethernet device on jailhouse enable; especially, when jailhouse is
enabled over ethernet via ssh. It's a rtl8169, supports MSI-X.

>From my gut feeling I would say that this series, together with
9c633193fd583e lowers the chance of loosing the device when enabling,
still, the symptoms didn't fully disappear.

  Ralf

> 
>  hypervisor/arch/arm-common/pci.c   |  6 +++---
>  hypervisor/arch/x86/pci.c          | 15 ++++++++++-----
>  hypervisor/include/jailhouse/pci.h |  8 ++++----
>  hypervisor/pci.c                   |  6 +++---
>  include/jailhouse/cell-config.h    |  3 ++-
>  pyjailhouse/sysfs_parser.py        |  2 ++
>  tools/root-cell-config.c.tmpl      |  1 +
>  7 files changed, 25 insertions(+), 16 deletions(-)
> 

-- 
You received this message because you are subscribed to the Google Groups 
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jailhouse-dev/1c8de33e-8ec3-9e4f-5a4e-d70ad133362a%40oth-regensburg.de.
For more options, visit https://groups.google.com/d/optout.

Reply via email to