On Tue, Jun 10, 2008 at 12:33:49AM +0200, Andrea Arcangeli wrote: > On Sun, Jun 08, 2008 at 11:35:49PM -0300, Marcelo Tosatti wrote: > > > > kvm_mmu_pte_write() does not handle 32-bit non-PAE large page backed > > guests properly. It will instantiate two 2MB sptes pointing to the same > > physical 2MB page when a guest large pte update is trapped. > > > > Instead of duplicating code to handle this, disallow directory level > > updates to happen through kvm_mmu_pte_write(), so the two 2MB sptes > > emulating one guest 4MB pte can be correctly created by the page fault > > handling path. > > This fix reminded me of this stack trace I looked some time ago, it > was also related to a 4M user pte IIRC, may they be related? In such a > case we can should update the bug status. > > http://sourceforge.net/tracker/index.php?func=detail&aid=1929279&group_id=180599&atid=893831 > > 7916:Mar 30 11:18:59 hmf kernel: RIP: 0010:[<ffffffff8882c99d>] > [<ffffffff8882c99d>] :kvm:rmap_remove+0x12d/0x1e0 > 7932:Mar 30 11:18:59 hmf kernel: Call Trace: > 7933:Mar 30 11:18:59 hmf kernel: [<ffffffff8882e870>] > :kvm:kvm_mmu_pte_write+0x220/0x850
Don't think it is related, the bug which patch fixes can only be triggered if the guest is large page backed, which does not seem to be the case of this bug report. 7909:Mar 30 11:18:59 hmf kernel: rmap_remove: ffff810005fb2000 2f7b5063 0->BUG This seems to be a regular 4k shadow pte: 0x63 = PT_PRESENT|PT_WRITABLE|PT_ACCESSED|PT_DIRTY Its tainted too: nvidia(P) -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
