kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* kvm device assignment and MSI-X masking
@ 2012-08-14 13:48 Jan Kiszka
  2012-08-14 14:05 ` Alex Williamson
  0 siblings, 1 reply; 7+ messages in thread
From: Jan Kiszka @ 2012-08-14 13:48 UTC (permalink / raw)
  To: Alex Williamson; +Cc: kvm

Hi Alex,

you once wrote this comment in device-assignment.c, msix_mmio_write:

    if (!msix_masked(&orig) && msix_masked(entry)) {
        /*
         * Vector masked, disable it
         *
         * XXX It's not clear if we can or should actually attempt
         * to mask or disable the interrupt.  KVM doesn't have
         * support for pending bits and kvm_assign_set_msix_entry
         * doesn't modify the device hardware mask.  Interrupts
         * while masked are simply not injected to the guest, so
         * are lost.  Can we get away with always injecting an
         * interrupt on unmask?
         */

I'm wondering what made you think that we won't inject if the vector is
masked like this (ie. in the shadow MSI-X table). Can you recall the
details?

I'm trying to refactor this code to make the KVM interface a bit more
encapsulating the kernel interface details, not fixing anything. Still,
I would also like to avoid introducing regressions.

Jan

-- 
Siemens AG, Corporate Technology, CT RTC ITP SDP-DE
Corporate Competence Center Embedded Linux

^ permalink raw reply	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2012-08-14 15:47 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2012-08-14 13:48 kvm device assignment and MSI-X masking Jan Kiszka
2012-08-14 14:05 ` Alex Williamson
2012-08-14 14:10   ` Jan Kiszka
2012-08-14 14:31     ` Alex Williamson
2012-08-14 15:15       ` Jan Kiszka
2012-08-14 15:34         ` Alex Williamson
2012-08-14 15:47           ` Jan Kiszka

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).