All of lore.kernel.org
 help / color / mirror / Atom feed
From: Alex Williamson <alex.williamson@redhat.com>
To: Jan Kiszka <jan.kiszka@siemens.com>
Cc: kvm <kvm@vger.kernel.org>
Subject: Re: kvm device assignment and MSI-X masking
Date: Tue, 14 Aug 2012 08:05:49 -0600	[thread overview]
Message-ID: <1344953149.4683.244.camel@ul30vt.home> (raw)
In-Reply-To: <502A572A.5040408@siemens.com>

On Tue, 2012-08-14 at 15:48 +0200, Jan Kiszka wrote:
> Hi Alex,
> 
> you once wrote this comment in device-assignment.c, msix_mmio_write:
> 
>     if (!msix_masked(&orig) && msix_masked(entry)) {
>         /*
>          * Vector masked, disable it
>          *
>          * XXX It's not clear if we can or should actually attempt
>          * to mask or disable the interrupt.  KVM doesn't have
>          * support for pending bits and kvm_assign_set_msix_entry
>          * doesn't modify the device hardware mask.  Interrupts
>          * while masked are simply not injected to the guest, so
>          * are lost.  Can we get away with always injecting an
>          * interrupt on unmask?
>          */
> 
> I'm wondering what made you think that we won't inject if the vector is
> masked like this (ie. in the shadow MSI-X table). Can you recall the
> details?
> 
> I'm trying to refactor this code to make the KVM interface a bit more
> encapsulating the kernel interface details, not fixing anything. Still,
> I would also like to avoid introducing regressions.

Yeah, I didn't leave a very good comment there.  I'm sure it made more
sense to me at the time.  I think I was trying to say that not only do
we not have a way to mask the physical hardware, but if we did, we don't
have a way to retrieve the pending bits, so any pending interrupts while
masked would be lost.  We might be able to deal with that by posting a
spurious interrupt on unmask, but for now we do nothing as masking is
usually done just to update the vector.  Thanks,

Alex



  reply	other threads:[~2012-08-14 14:05 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-08-14 13:48 kvm device assignment and MSI-X masking Jan Kiszka
2012-08-14 14:05 ` Alex Williamson [this message]
2012-08-14 14:10   ` Jan Kiszka
2012-08-14 14:31     ` Alex Williamson
2012-08-14 15:15       ` Jan Kiszka
2012-08-14 15:34         ` Alex Williamson
2012-08-14 15:47           ` Jan Kiszka

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1344953149.4683.244.camel@ul30vt.home \
    --to=alex.williamson@redhat.com \
    --cc=jan.kiszka@siemens.com \
    --cc=kvm@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.