diff options
author | Yijing Wang <wangyijing@huawei.com> | 2014-10-27 10:44:36 +0800 |
---|---|---|
committer | Bjorn Helgaas <bhelgaas@google.com> | 2014-11-06 16:34:39 -0700 |
commit | 38737d82f9f0168955f9944c3f8bd3bb262c7e88 (patch) | |
tree | d43a3bc4a84dad0e3a178f74478ea6996c0773c8 /arch/x86/include/asm/trace | |
parent | f114040e3ea6e07372334ade75d1ee0775c355e1 (diff) | |
download | op-kernel-dev-38737d82f9f0168955f9944c3f8bd3bb262c7e88.zip op-kernel-dev-38737d82f9f0168955f9944c3f8bd3bb262c7e88.tar.gz |
PCI/MSI: Add pci_msi_ignore_mask to prevent writes to MSI/MSI-X Mask Bits
MSI-X vector Mask Bits are in MSI-X Tables in PCI memory space. Xen PV
guests can't write to those tables. MSI vector Mask Bits are in PCI
configuration space. Xen PV guests can write to config space, but those
writes are ignored.
Commit 0e4ccb1505a9 ("PCI: Add x86_msi.msi_mask_irq() and
msix_mask_irq()") added a way to override default_mask_msi_irqs() and
default_mask_msix_irqs() so they can be no-ops in Xen guests, but this is
more complicated than necessary.
Add "pci_msi_ignore_mask" in the core PCI MSI code. If set,
default_mask_msi_irqs() and default_mask_msix_irqs() return without doing
anything. This is less flexible, but much simpler.
[bhelgaas: changelog]
Signed-off-by: Yijing Wang <wangyijing@huawei.com>
Signed-off-by: Bjorn Helgaas <bhelgaas@google.com>
Reviewed-by: David Vrabel <david.vrabel@citrix.com>
CC: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
CC: xen-devel@lists.xenproject.org
Diffstat (limited to 'arch/x86/include/asm/trace')
0 files changed, 0 insertions, 0 deletions