On 6/24/19 4:08 PM, Jan Kiszka wrote: > On 24.06.19 15:57, Ralf Ramsauer wrote: >> Hi Jan, >> >> On 6/24/19 8:28 AM, Jan Kiszka wrote: >>> This series comes out of pre-release testing: With new kernel versions, >>> we spuriously injected masked MSI vectors that are not acked by Linux, >>> thus caused interrupt stalling. >>> >>> Jan >>> >>> Jan Kiszka (3): >>> core, tools: Add msi_maskable flag to jailhouse_pci_device >>> x86: pci: Do not inject masked MSI vectors on handover >>> core: Rename arch_pci_suppress_msi to arch_pci_set_suppress_msi >> >> FYI: tested this on our AMD machine. Sometimes, we still loose the >> ethernet device on jailhouse enable; especially, when jailhouse is >> enabled over ethernet via ssh. It's a rtl8169, supports MSI-X. >> >> From my gut feeling I would say that this series, together with >> 9c633193fd583e lowers the chance of loosing the device when enabling, >> still, the symptoms didn't fully disappear. > > Recent changes in next may require regenerating the config in order to > get the desired fix. Did you do this as well?
Of course - not. But doesn't make a difference, the only device with msi_maskable = 1 is a secondary RS232 card... Ralf > > Jan > >> >> Ralf >> >>> >>> hypervisor/arch/arm-common/pci.c | 6 +++--- >>> hypervisor/arch/x86/pci.c | 15 ++++++++++----- >>> hypervisor/include/jailhouse/pci.h | 8 ++++---- >>> hypervisor/pci.c | 6 +++--- >>> include/jailhouse/cell-config.h | 3 ++- >>> pyjailhouse/sysfs_parser.py | 2 ++ >>> tools/root-cell-config.c.tmpl | 1 + >>> 7 files changed, 25 insertions(+), 16 deletions(-) >>> > -- You received this message because you are subscribed to the Google Groups "Jailhouse" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/d/msgid/jailhouse-dev/8d9a8525-c8f7-ca0d-9401-9c264e896866%40oth-regensburg.de. For more options, visit https://groups.google.com/d/optout.
