From: bugzilla-daemon@bugzilla.kernel.org
To: kvm@kernel.org
Subject: [Bug 196717] CPU: 0 PID: 5405 at arch/x86/kvm/mmu.c:717 mmu_spte_clear_track_bits+0xe7/0x100
Date: Wed, 23 Aug 2017 01:39:21 +0000 [thread overview]
Message-ID: <bug-196717-28872-rwVzIfQSaZ@https.bugzilla.kernel.org/> (raw)
In-Reply-To: <bug-196717-28872@https.bugzilla.kernel.org/>
https://bugzilla.kernel.org/show_bug.cgi?id=196717
--- Comment #6 from Jeff Cook (jeff@jeffcook.io) ---
After a little bit of digging, it seems that the patchset "KVM: nVMX: nested
EPT improvements and A/D bits, RDRAND and RDSEED exits" (described at
https://lkml.org/lkml/2017/3/8/586) is the likely origin point of this error.
This was first merged in 4.12, which is when I first started encountering this
error.
Something about the "accessed_dirty" flag causes the warning on line 717 of
arch/x86/kvm/mmu.c to trigger:
WARN_ON(!kvm_is_reserved_pfn(pfn) && !page_count(pfn_to_page(pfn)));
and then later, the system refuses to allocate the memory requested because
when checking if the page is safe to use, it encounters a dirty flag:
[94449.442437] BUG: Bad page state in process makepkg pfn:2a401a
[94449.442447] flags: 0x17fff0000000014(referenced|dirty)
[...]
[94449.442462] page dumped because: PAGE_FLAGS_CHECK_AT_PREP flag set
[94449.442465] bad because of flags: 0x14(referenced|dirty)
[...]
[94449.442615] Call Trace:
[...]
[94449.442907] bad_page+0xce/0x130
[94449.442912] check_new_page_bad+0x67/0x80
[94449.442916] get_page_from_freelist+0x979/0xad0
[...]
As the diff for kvm/mmu.c between 4.11 and 4.12 is quite small, it seems likely
that this change is the origin point of the bug.
Perhaps something in along the way has not been updated to account for this
flag? I would revert to test, but it appears that this patchset has grown
several dependents. If someone wants to suggest a series of commits to revert
or a patch to test, I am happy to try that.
--
You are receiving this mail because:
You are watching the assignee of the bug.
prev parent reply other threads:[~2017-08-23 1:40 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-08-21 9:18 [Bug 196717] New: CPU: 0 PID: 5405 at arch/x86/kvm/mmu.c:717 mmu_spte_clear_track_bits+0xe7/0x100 bugzilla-daemon
2017-08-22 10:20 ` [Bug 196717] " bugzilla-daemon
2017-08-22 15:03 ` bugzilla-daemon
2017-08-22 15:05 ` bugzilla-daemon
2017-08-22 15:09 ` bugzilla-daemon
2017-08-22 15:14 ` bugzilla-daemon
2017-08-23 1:39 ` bugzilla-daemon [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=bug-196717-28872-rwVzIfQSaZ@https.bugzilla.kernel.org/ \
--to=bugzilla-daemon@bugzilla.kernel.org \
--cc=kvm@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox