[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <202503201604.a3aa6a95-lkp@intel.com>
Date: Fri, 21 Mar 2025 14:21:20 +0800
From: kernel test robot <oliver.sang@...el.com>
To: Johannes Weiner <hannes@...xchg.org>
CC: <oe-lkp@...ts.linux.dev>, <lkp@...el.com>, <linux-kernel@...r.kernel.org>,
<linux-mm@...ck.org>, Andrew Morton <akpm@...ux-foundation.org>, "Vlastimil
Babka" <vbabka@...e.cz>, Mel Gorman <mgorman@...hsingularity.net>, Zi Yan
<ziy@...dia.com>, <oliver.sang@...el.com>
Subject: Re: [PATCH 1/5] mm: compaction: push watermark into
compaction_suitable() callers
Hello,
kernel test robot noticed "BUG:unable_to_handle_page_fault_for_address" on:
commit: 6304be90cf5460f33b031e1e19cbe7ffdcbc9f66 ("[PATCH 1/5] mm: compaction: push watermark into compaction_suitable() callers")
url: https://github.com/intel-lab-lkp/linux/commits/Johannes-Weiner/mm-compaction-push-watermark-into-compaction_suitable-callers/20250314-050839
base: https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-everything
patch link: https://lore.kernel.org/all/20250313210647.1314586-2-hannes@cmpxchg.org/
patch subject: [PATCH 1/5] mm: compaction: push watermark into compaction_suitable() callers
in testcase: trinity
version: trinity-x86_64-ba2360ed-1_20241228
with following parameters:
runtime: 300s
group: group-03
nr_groups: 5
config: x86_64-kexec
compiler: clang-20
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G
(please refer to attached dmesg/kmsg for entire log/backtrace)
+---------------------------------------------+------------+------------+
| | 0174ed04ed | 6304be90cf |
+---------------------------------------------+------------+------------+
| BUG:unable_to_handle_page_fault_for_address | 0 | 5 |
| Oops | 0 | 5 |
| RIP:__zone_watermark_ok | 0 | 5 |
+---------------------------------------------+------------+------------+
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@...el.com>
| Closes: https://lore.kernel.org/oe-lkp/202503201604.a3aa6a95-lkp@intel.com
[ 24.321289][ T36] BUG: unable to handle page fault for address: ffff88844000c5f8
[ 24.322631][ T36] #PF: supervisor read access in kernel mode
[ 24.323577][ T36] #PF: error_code(0x0000) - not-present page
[ 24.324482][ T36] PGD 3a01067 P4D 3a01067 PUD 0
[ 24.325301][ T36] Oops: Oops: 0000 [#1] PREEMPT SMP PTI
[ 24.326157][ T36] CPU: 1 UID: 0 PID: 36 Comm: kcompactd0 Not tainted 6.14.0-rc6-00559-g6304be90cf54 #1
[ 24.327631][ T36] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 24.329194][ T36] RIP: 0010:__zone_watermark_ok (mm/page_alloc.c:3256)
[ 24.330125][ T36] Code: 84 c0 78 14 4c 8b 97 48 06 00 00 45 31 db 4d 85 d2 4d 0f 4f da 4c 01 de 49 29 f1 41 f7 c0 38 02 00 00 0f 85 92 00 00 00 48 98 <48> 03 54 c7 38 49 39 d1 7e 7e b0 01 85 c9 74 7a 83 f9 0a 7f 73 48
All code
========
0: 84 c0 test %al,%al
2: 78 14 js 0x18
4: 4c 8b 97 48 06 00 00 mov 0x648(%rdi),%r10
b: 45 31 db xor %r11d,%r11d
e: 4d 85 d2 test %r10,%r10
11: 4d 0f 4f da cmovg %r10,%r11
15: 4c 01 de add %r11,%rsi
18: 49 29 f1 sub %rsi,%r9
1b: 41 f7 c0 38 02 00 00 test $0x238,%r8d
22: 0f 85 92 00 00 00 jne 0xba
28: 48 98 cltq
2a:* 48 03 54 c7 38 add 0x38(%rdi,%rax,8),%rdx <-- trapping instruction
2f: 49 39 d1 cmp %rdx,%r9
32: 7e 7e jle 0xb2
34: b0 01 mov $0x1,%al
36: 85 c9 test %ecx,%ecx
38: 74 7a je 0xb4
3a: 83 f9 0a cmp $0xa,%ecx
3d: 7f 73 jg 0xb2
3f: 48 rex.W
Code starting with the faulting instruction
===========================================
0: 48 03 54 c7 38 add 0x38(%rdi,%rax,8),%rdx
5: 49 39 d1 cmp %rdx,%r9
8: 7e 7e jle 0x88
a: b0 01 mov $0x1,%al
c: 85 c9 test %ecx,%ecx
e: 74 7a je 0x8a
10: 83 f9 0a cmp $0xa,%ecx
13: 7f 73 jg 0x88
15: 48 rex.W
[ 24.333001][ T36] RSP: 0018:ffffc90000137cd0 EFLAGS: 00010246
[ 24.334003][ T36] RAX: 00000000000036a8 RBX: 0000000000000001 RCX: 0000000000000000
[ 24.335270][ T36] RDX: 0000000000000006 RSI: 0000000000000000 RDI: ffff88843fff1080
[ 24.336551][ T36] RBP: 0000000000000001 R08: 0000000000000080 R09: 0000000000003b14
[ 24.337799][ T36] R10: 00000000000018b0 R11: 00000000000018b0 R12: 0000000000000001
[ 24.339130][ T36] R13: 0000000000000000 R14: ffff88843fff1080 R15: 00000000000036a8
[ 24.340412][ T36] FS: 0000000000000000(0000) GS:ffff88842fd00000(0000) knlGS:0000000000000000
[ 24.341739][ T36] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 24.342448][ T36] CR2: ffff88844000c5f8 CR3: 00000001bceba000 CR4: 00000000000406f0
[ 24.343331][ T36] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 24.347498][ T36] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 24.348260][ T36] Call Trace:
[ 24.348621][ T36] <TASK>
[ 24.348958][ T36] ? __die_body (arch/x86/kernel/dumpstack.c:421)
[ 24.349447][ T36] ? page_fault_oops (arch/x86/mm/fault.c:710)
[ 24.350008][ T36] ? do_kern_addr_fault (arch/x86/mm/fault.c:1198)
[ 24.350582][ T36] ? exc_page_fault (arch/x86/mm/fault.c:1479)
[ 24.351065][ T36] ? asm_exc_page_fault (arch/x86/include/asm/idtentry.h:623)
[ 24.351550][ T36] ? __zone_watermark_ok (mm/page_alloc.c:3256)
[ 24.352049][ T36] compaction_suitable (mm/compaction.c:2407)
[ 24.352532][ T36] compaction_suit_allocation_order (mm/compaction.c:?)
[ 24.353127][ T36] kcompactd (mm/compaction.c:3109)
[ 24.353618][ T36] kthread (kernel/kthread.c:466)
[ 24.354105][ T36] ? __pfx_kcompactd (mm/compaction.c:3184)
[ 24.354658][ T36] ? __pfx_kthread (kernel/kthread.c:413)
[ 24.355121][ T36] ret_from_fork (arch/x86/kernel/process.c:154)
[ 24.355567][ T36] ? __pfx_kthread (kernel/kthread.c:413)
[ 24.356032][ T36] ret_from_fork_asm (arch/x86/entry/entry_64.S:257)
[ 24.356505][ T36] </TASK>
[ 24.356837][ T36] Modules linked in: can_bcm can_raw can cn scsi_transport_iscsi sr_mod ipmi_msghandler cdrom sg ata_generic dm_mod fuse
[ 24.358098][ T36] CR2: ffff88844000c5f8
[ 24.358662][ T36] ---[ end trace 0000000000000000 ]---
[ 24.359178][ T36] RIP: 0010:__zone_watermark_ok (mm/page_alloc.c:3256)
[ 24.359726][ T36] Code: 84 c0 78 14 4c 8b 97 48 06 00 00 45 31 db 4d 85 d2 4d 0f 4f da 4c 01 de 49 29 f1 41 f7 c0 38 02 00 00 0f 85 92 00 00 00 48 98 <48> 03 54 c7 38 49 39 d1 7e 7e b0 01 85 c9 74 7a 83 f9 0a 7f 73 48
All code
========
0: 84 c0 test %al,%al
2: 78 14 js 0x18
4: 4c 8b 97 48 06 00 00 mov 0x648(%rdi),%r10
b: 45 31 db xor %r11d,%r11d
e: 4d 85 d2 test %r10,%r10
11: 4d 0f 4f da cmovg %r10,%r11
15: 4c 01 de add %r11,%rsi
18: 49 29 f1 sub %rsi,%r9
1b: 41 f7 c0 38 02 00 00 test $0x238,%r8d
22: 0f 85 92 00 00 00 jne 0xba
28: 48 98 cltq
2a:* 48 03 54 c7 38 add 0x38(%rdi,%rax,8),%rdx <-- trapping instruction
2f: 49 39 d1 cmp %rdx,%r9
32: 7e 7e jle 0xb2
34: b0 01 mov $0x1,%al
36: 85 c9 test %ecx,%ecx
38: 74 7a je 0xb4
3a: 83 f9 0a cmp $0xa,%ecx
3d: 7f 73 jg 0xb2
3f: 48 rex.W
Code starting with the faulting instruction
===========================================
0: 48 03 54 c7 38 add 0x38(%rdi,%rax,8),%rdx
5: 49 39 d1 cmp %rdx,%r9
8: 7e 7e jle 0x88
a: b0 01 mov $0x1,%al
c: 85 c9 test %ecx,%ecx
e: 74 7a je 0x8a
10: 83 f9 0a cmp $0xa,%ecx
13: 7f 73 jg 0x88
15: 48 rex.W
The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250320/202503201604.a3aa6a95-lkp@intel.com
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists