2015-04-13 14:38+0200, Paolo Bonzini: > If so, the most likely culprit is this: > > commit 6addfc42992be4b073c39137ecfdf4b2aa2d487f > Author: Paolo Bonzini <pbonzini@xxxxxxxxxx> > Date: Thu Mar 27 11:29:28 2014 +0100 > > KVM: x86: avoid useless set of KVM_REQ_EVENT after emulation | [...] > > I would first try this one, and see if it is bad. > > Radim, do you think this could cause a missed interrupt injection > after Windows does a TPR write? I don't think it could, all changes to TPR/ISR should call apic_update_ppr, which sets KVM_REQ_EVENT when needed ... I'll take a look what could have gone wrong. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html