Hi Jan, On 6/24/19 8:28 AM, Jan Kiszka wrote: > This series comes out of pre-release testing: With new kernel versions, > we spuriously injected masked MSI vectors that are not acked by Linux, > thus caused interrupt stalling. > > Jan > > Jan Kiszka (3): > core, tools: Add msi_maskable flag to jailhouse_pci_device > x86: pci: Do not inject masked MSI vectors on handover > core: Rename arch_pci_suppress_msi to arch_pci_set_suppress_msi
FYI: tested this on our AMD machine. Sometimes, we still loose the ethernet device on jailhouse enable; especially, when jailhouse is enabled over ethernet via ssh. It's a rtl8169, supports MSI-X. >From my gut feeling I would say that this series, together with 9c633193fd583e lowers the chance of loosing the device when enabling, still, the symptoms didn't fully disappear. Ralf > > hypervisor/arch/arm-common/pci.c | 6 +++--- > hypervisor/arch/x86/pci.c | 15 ++++++++++----- > hypervisor/include/jailhouse/pci.h | 8 ++++---- > hypervisor/pci.c | 6 +++--- > include/jailhouse/cell-config.h | 3 ++- > pyjailhouse/sysfs_parser.py | 2 ++ > tools/root-cell-config.c.tmpl | 1 + > 7 files changed, 25 insertions(+), 16 deletions(-) > -- You received this message because you are subscribed to the Google Groups "Jailhouse" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/jailhouse-dev/1c8de33e-8ec3-9e4f-5a4e-d70ad133362a%40oth-regensburg.de. For more options, visit https://groups.google.com/d/optout.
