From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [PATCH 08/13] xen/pvticketlock: disable interrupts while blocking Date: Wed, 07 Sep 2011 20:09:37 +0300 Message-ID: <4E67A551.4000502@redhat.com> References: <1314996468.8255.0.camel@twins> <4E614FBD.2030509@goop.org> <20110906151408.GA7459@redhat.com> <4E66615E.8070806@goop.org> <20110906182758.GR5795@redhat.com> <4E66EF86.9070200@redhat.com> <20110907134411.GV5795@redhat.com> <4E678992.5050709@redhat.com> <20110907155657.GX5795@redhat.com> <4E679AF4.50209@redhat.com> <20110907165203.GQ6838@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20110907165203.GQ6838@redhat.com> Sender: linux-kernel-owner@vger.kernel.org To: Don Zickus Cc: Jeremy Fitzhardinge , Peter Zijlstra , "H. Peter Anvin" , Linus Torvalds , Ingo Molnar , the arch/x86 maintainers , Linux Kernel Mailing List , Nick Piggin , Marcelo Tosatti , KVM , Andi Kleen , Xen Devel , Jeremy Fitzhardinge , Stefano Stabellini List-Id: xen-devel@lists.xenproject.org On 09/07/2011 07:52 PM, Don Zickus wrote: > > > > May I ask how? Detecting a back-to-back NMI? > > Pretty boring actually. Currently we execute an NMI handler until one of > them returns handled. Then we stop. This may cause us to miss an NMI in > the case of multiple NMIs at once. Now we are changing it to execute > _all_ the handlers to make sure we didn't miss one. That's going to be pretty bad for kvm - those handlers become a lot more expensive since they involve reading MSRs. Even worse if we start using NMIs as a wakeup for pv spinlocks as provided by this patchset. > But then the downside > here is we accidentally handle an NMI that was latched. This would cause > a 'Dazed on confused' message as that NMI was already handled by the > previous NMI. > > We are working on an algorithm to detect this condition and flag it > (nothing complicated). But it may never be perfect. > > On the other hand, what else are we going to do with an edge-triggered > shared interrupt line? > How about, during NMI, save %rip to a per-cpu variable. Handle just one cause. If, on the next NMI, we hit the same %rip, assume back-to-back NMI has occured and now handle all causes. -- error compiling committee.c: too many arguments to function