On 01/17/2011 05:52 PM, Marcelo Tosatti wrote:
> > What a value is written by the guest, which kvm cannot handle itself > (i.e. a change to anything other than the mask bit), we exit with > the table and entry ids, so userspace can reread them. OK. But regarding access to the MSI-X entry in userspace, it can only be accessed safely wrt parallel updates by the kernel in the exit handler. Is the exit handler the only location where the MSI-X entry will be read or written to, in userspace?
Yes. This should be documented, that the kernel owns the msix area as far as writes are concerned.
-- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html