From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Michael S. Tsirkin" Subject: Re: [PATCH 7/8] KVM: assigned dev: Introduce io_device for MSI-X MMIO accessing Date: Wed, 20 Oct 2010 12:33:04 +0200 Message-ID: <20101020103304.GC12878@redhat.com> References: <1287563192-29685-1-git-send-email-sheng@linux.intel.com> <1287563192-29685-8-git-send-email-sheng@linux.intel.com> <4CBEBA87.3040107@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Sheng Yang , Marcelo Tosatti , kvm@vger.kernel.org To: Avi Kivity Return-path: Received: from mx1.redhat.com ([209.132.183.28]:11471 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752876Ab0JTKjg (ORCPT ); Wed, 20 Oct 2010 06:39:36 -0400 Content-Disposition: inline In-Reply-To: <4CBEBA87.3040107@redhat.com> Sender: kvm-owner@vger.kernel.org List-ID: On Wed, Oct 20, 2010 at 11:46:47AM +0200, Avi Kivity wrote: > >+ /* Only allow entry modification when entry was masked */ > >+ if (!entry_masked) { > >+ printk(KERN_WARNING > >+ "KVM: guest try to write unmasked MSI-X entry. " > >+ "addr 0x%llx, len %d, val 0x%lx\n", > >+ addr, len, new_val); > >+ r = 0; > > What does the spec says about this situation? That it's not allowed. However, existing userspace changes entries that kvm thinks are unmasked, because it does not know how to tell kvm about mask bits, so we need to keep supporting this. -- MST