On 24.06.19 15:57, Ralf Ramsauer wrote:
Hi Jan,
On 6/24/19 8:28 AM, Jan Kiszka wrote:
This series comes out of pre-release testing: With new kernel versions,
we spuriously injected masked MSI vectors that are not acked by Linux,
thus caused interrupt stalling.
Jan
Jan Kiszka (3):
core, tools: Add msi_maskable flag to jailhouse_pci_device
x86: pci: Do not inject masked MSI vectors on handover
core: Rename arch_pci_suppress_msi to arch_pci_set_suppress_msi
FYI: tested this on our AMD machine. Sometimes, we still loose the
ethernet device on jailhouse enable; especially, when jailhouse is
enabled over ethernet via ssh. It's a rtl8169, supports MSI-X.
From my gut feeling I would say that this series, together with
9c633193fd583e lowers the chance of loosing the device when enabling,
still, the symptoms didn't fully disappear.
Recent changes in next may require regenerating the config in order to get the
desired fix. Did you do this as well?
Jan
Ralf
hypervisor/arch/arm-common/pci.c | 6 +++---
hypervisor/arch/x86/pci.c | 15 ++++++++++-----
hypervisor/include/jailhouse/pci.h | 8 ++++----
hypervisor/pci.c | 6 +++---
include/jailhouse/cell-config.h | 3 ++-
pyjailhouse/sysfs_parser.py | 2 ++
tools/root-cell-config.c.tmpl | 1 +
7 files changed, 25 insertions(+), 16 deletions(-)
--
Siemens AG, Corporate Technology, CT RDA IOT SES-DE
Corporate Competence Center Embedded Linux
--
You received this message because you are subscribed to the Google Groups
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/d/msgid/jailhouse-dev/49b44cac-9657-f4b1-745c-bda91a515b26%40siemens.com.
For more options, visit https://groups.google.com/d/optout.