From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.0 required=3.0 tests=BAYES_00,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1F3F1C433E2 for ; Wed, 9 Sep 2020 06:41:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id C7DF921741 for ; Wed, 9 Sep 2020 06:41:26 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725917AbgIIGl0 convert rfc822-to-8bit (ORCPT ); Wed, 9 Sep 2020 02:41:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:44390 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725826AbgIIGlV (ORCPT ); Wed, 9 Sep 2020 02:41:21 -0400 From: bugzilla-daemon@bugzilla.kernel.org To: kvm@vger.kernel.org Subject: [Bug 209079] CPU 0/KVM: page allocation failure on 5.8 kernel Date: Wed, 09 Sep 2020 06:41:20 +0000 X-Bugzilla-Reason: None X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: AssignedTo virtualization_kvm@kernel-bugs.osdl.org X-Bugzilla-Product: Virtualization X-Bugzilla-Component: kvm X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: sean.j.christopherson@intel.com X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P1 X-Bugzilla-Assigned-To: virtualization_kvm@kernel-bugs.osdl.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: cc Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT X-Bugzilla-URL: https://bugzilla.kernel.org/ Auto-Submitted: auto-generated MIME-Version: 1.0 Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org https://bugzilla.kernel.org/show_bug.cgi?id=209079 Sean Christopherson (sean.j.christopherson@intel.com) changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |sean.j.christopherson@intel | |.com --- Comment #2 from Sean Christopherson (sean.j.christopherson@intel.com) --- Are you disabling NPT (via KVM module param)? You're obviously running a 64-bit kernel, and presumably that CPU supports NPT, so the only way KVM should reach the failing allocation is if NPT is being explicitly disabled. There's nothing wrong with using shadow paging, it's just uncommon these days. NPT aside, the interesting part of the failing allocation is that it uses GFP_DMA32. I did a quick test to force that allocation on my system and nothing exploded. Odds are good the bug is outside of KVM, which means a bisection is probably necessary. -- You are receiving this mail because: You are watching the assignee of the bug.