[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 2/4] x86/MSI-X: access MSI-X table only after having enabled MSI-X
On Wed, Mar 25, 2015 at 04:39:49PM +0000, Jan Beulich wrote: > As done in Linux by f598282f51 ("PCI: Fix the NIU MSI-X problem in a > better way") and its broken predecessor, make sure we don't access the > MSI-X table without having enabled MSI-X first, using the mask-all flag > instead to prevent interrupts from occurring. This causes an regression with an Linux guest that has the XSA120 + XSA120 addendum with PV guests (hadn't tried yet HVM). When PV guest requests an MSI-X, pciback gets: [ 122.778654] xen-pciback: 0000:0a:00.0: enable MSI-X [ 122.778861] pciback 0000:0a:00.0: xen map irq failed -6 for 1 domain [ 122.778887] xen_pciback: 0000:0a:00.0: error enabling MSI-X for guest 1: err -6! The device has the PCI_COMMAND enabled correctly: # lspci -s 0a:0.0 -vvv | head 0a:00.0 Ethernet controller: Intel Corporation 82576 Gigabit Network Connection (rev 01) Subsystem: Super Micro Computer Inc Device 10c9 Control: I/O+ Mem+ BusMaster- SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx- Attaching the 'xl dmesg', 'dmesg', and 'lspci' The guest config is [konrad@build-external tst036]$ more pf-pv.xm extra="console=hvc0 debug " kernel="/mnt/lab/bootstrap-x86_64/vmlinuz" ramdisk="/mnt/lab/bootstrap-x86_64/initramfs.cpio.gz" memory=2048 vcpus=6 name="pv-pf" on_crash="preserve" pci=["0000:0a:0.0"]; Attachment:
d Attachment:
x Attachment:
lspci _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |