On 24.06.19 15:57, Ralf Ramsauer wrote:
Hi Jan,

On 6/24/19 8:28 AM, Jan Kiszka wrote:
This series comes out of pre-release testing: With new kernel versions,
we spuriously injected masked MSI vectors that are not acked by Linux,
thus caused interrupt stalling.

Jan

Jan Kiszka (3):
   core, tools: Add msi_maskable flag to jailhouse_pci_device
   x86: pci: Do not inject masked MSI vectors on handover
   core: Rename arch_pci_suppress_msi to arch_pci_set_suppress_msi

FYI: tested this on our AMD machine. Sometimes, we still loose the
ethernet device on jailhouse enable; especially, when jailhouse is
enabled over ethernet via ssh. It's a rtl8169, supports MSI-X.

 From my gut feeling I would say that this series, together with
9c633193fd583e lowers the chance of loosing the device when enabling,
still, the symptoms didn't fully disappear.

Recent changes in next may require regenerating the config in order to get the desired fix. Did you do this as well?

Jan


   Ralf


  hypervisor/arch/arm-common/pci.c   |  6 +++---
  hypervisor/arch/x86/pci.c          | 15 ++++++++++-----
  hypervisor/include/jailhouse/pci.h |  8 ++++----
  hypervisor/pci.c                   |  6 +++---
  include/jailhouse/cell-config.h    |  3 ++-
  pyjailhouse/sysfs_parser.py        |  2 ++
  tools/root-cell-config.c.tmpl      |  1 +
  7 files changed, 25 insertions(+), 16 deletions(-)


--
Siemens AG, Corporate Technology, CT RDA IOT SES-DE
Corporate Competence Center Embedded Linux

--
You received this message because you are subscribed to the Google Groups 
"Jailhouse" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/jailhouse-dev/49b44cac-9657-f4b1-745c-bda91a515b26%40siemens.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to