x86/pci/xen: Disable PCI/MSI[-X] masking for XEN_HVM guests
stable inclusion from stable-v5.10.114 commit ad604cbd1d54ba9b2944da72f97cd4669c8fcc1a category: bugfix bugzilla: https://gitee.com/openeuler/kernel/issues/I5IY1V Reference: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ad604cbd1d54ba9b2944da72f97cd4669c8fcc1a -------------------------------- commit 7e0815b3 upstream. When a XEN_HVM guest uses the XEN PIRQ/Eventchannel mechanism, then PCI/MSI[-X] masking is solely controlled by the hypervisor, but contrary to XEN_PV guests this does not disable PCI/MSI[-X] masking in the PCI/MSI layer. This can lead to a situation where the PCI/MSI layer masks an MSI[-X] interrupt and the hypervisor grants the write despite the fact that it already requested the interrupt. As a consequence interrupt delivery on the affected device is not happening ever. Set pci_msi_ignore_mask to prevent that like it's done for XEN_PV guests already. Fixes: 809f9267 ("xen: map MSIs into pirqs") Reported-by: NJeremi Piotrowski <jpiotrowski@linux.microsoft.com> Reported-by: NDusty Mabe <dustymabe@redhat.com> Reported-by: NSalvatore Bonaccorso <carnil@debian.org> Signed-off-by: NThomas Gleixner <tglx@linutronix.de> Tested-by: NNoah Meyerhans <noahm@debian.org> Cc: stable@vger.kernel.org Link: https://lore.kernel.org/r/87tuaduxj5.ffs@tglxSigned-off-by: NGreg Kroah-Hartman <gregkh@linuxfoundation.org> Signed-off-by: NZheng Zengkai <zhengzengkai@huawei.com> Acked-by: NXie XiuQi <xiexiuqi@huawei.com>
Showing
想要评论请 注册 或 登录