From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: Oops for sale Date: Mon, 09 Jun 2008 19:33:19 +0300 Message-ID: <484D5B4F.3080300@qumranet.com> References: <48494341.1060007@redhat.com> <4849A2B7.1030305@qumranet.com> <484D3310.6070908@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Cc: kvm@vger.kernel.org To: Gerd Hoffmann Return-path: Received: from il.qumranet.com ([212.179.150.194]:15452 "EHLO il.qumranet.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751937AbYFIQdN (ORCPT ); Mon, 9 Jun 2008 12:33:13 -0400 In-Reply-To: <484D3310.6070908@redhat.com> Sender: kvm-owner@vger.kernel.org List-ID: Gerd Hoffmann wrote: > Log attached. Scanning it and having a brief look at the source code > makes me suspect it could be a flags update triggering this: Due to > 64bit xen guest kernels running in ring3 xenner may just flip the user > bit (off->on) in the page table handler, which is a unusual operation I > guess ... > The unshadow-on-userspace-access heuristic is broken. Since it is also bad for Xenner, try removing the following lines: spte |= PT_WRITABLE_MASK; if (user_fault) { mmu_unshadow(vcpu->kvm, gfn); goto unshadowed; } -- Do not meddle in the internals of kernels, for they are subtle and quick to panic.