In case we load a PCI device with active vectors, we have to process them and invoke potential notifiers. Signed-off-by: Jan Kiszka <jan.kiszka@xxxxxxxxxxx> --- This amends the QEMU series but should be equally relevant as bug fix for qemu-kvm. hw/msix.c | 5 +++++ 1 files changed, 5 insertions(+), 0 deletions(-) diff --git a/hw/msix.c b/hw/msix.c index 2114b99..59c7a83 100644 --- a/hw/msix.c +++ b/hw/msix.c @@ -351,6 +351,7 @@ void msix_save(PCIDevice *dev, QEMUFile *f) void msix_load(PCIDevice *dev, QEMUFile *f) { unsigned n = dev->msix_entries_nr; + unsigned int vector; if (!(dev->cap_present & QEMU_PCI_CAP_MSIX)) { return; @@ -360,6 +361,10 @@ void msix_load(PCIDevice *dev, QEMUFile *f) qemu_get_buffer(f, dev->msix_table_page, n * PCI_MSIX_ENTRY_SIZE); qemu_get_buffer(f, dev->msix_table_page + MSIX_PAGE_PENDING, (n + 7) / 8); msix_update_function_masked(dev); + + for (vector = 0; vector < n; vector++) { + msix_handle_mask_update(dev, vector, true); + } } /* Does device support MSI-X? */ -- 1.7.3.4 -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html