Message ID | 20090705114048.GD4798@redhat.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
diff --git a/hw/msix.c b/hw/msix.c index b67ea39..33549f5 100644 --- a/hw/msix.c +++ b/hw/msix.c @@ -301,6 +301,7 @@ void msix_load(PCIDevice *dev, QEMUFile *f) if (!dev->cap_present & QEMU_PCI_CAP_MSIX) return; + msix_free_irq_entries(dev); qemu_get_buffer(f, dev->msix_table_page, n * MSIX_ENTRY_SIZE); qemu_get_buffer(f, dev->msix_table_page + MSIX_PAGE_PENDING, (n + 7) / 8); }
Clean up msix vector usage state on load. Since guest might have control over it through the device, the device will have to load this state from file. Signed-off-by: Michael S. Tsirkin <mst@redhat.com> --- hw/msix.c | 1 + 1 files changed, 1 insertions(+), 0 deletions(-)