Re: [PATCH 1/5] mm: compaction: push watermark into compaction_suitable() callers

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Hello,

kernel test robot noticed "BUG:unable_to_handle_page_fault_for_address" on:

commit: 6304be90cf5460f33b031e1e19cbe7ffdcbc9f66 ("[PATCH 1/5] mm: compaction: push watermark into compaction_suitable() callers")
url: https://github.com/intel-lab-lkp/linux/commits/Johannes-Weiner/mm-compaction-push-watermark-into-compaction_suitable-callers/20250314-050839
base: https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-everything
patch link: https://lore.kernel.org/all/20250313210647.1314586-2-hannes@xxxxxxxxxxx/
patch subject: [PATCH 1/5] mm: compaction: push watermark into compaction_suitable() callers

in testcase: trinity
version: trinity-x86_64-ba2360ed-1_20241228
with following parameters:

	runtime: 300s
	group: group-03
	nr_groups: 5



config: x86_64-kexec
compiler: clang-20
test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G

(please refer to attached dmesg/kmsg for entire log/backtrace)


+---------------------------------------------+------------+------------+
|                                             | 0174ed04ed | 6304be90cf |
+---------------------------------------------+------------+------------+
| BUG:unable_to_handle_page_fault_for_address | 0          | 5          |
| Oops                                        | 0          | 5          |
| RIP:__zone_watermark_ok                     | 0          | 5          |
+---------------------------------------------+------------+------------+


If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <oliver.sang@xxxxxxxxx>
| Closes: https://lore.kernel.org/oe-lkp/202503201604.a3aa6a95-lkp@xxxxxxxxx


[   24.321289][   T36] BUG: unable to handle page fault for address: ffff88844000c5f8
[   24.322631][   T36] #PF: supervisor read access in kernel mode
[   24.323577][   T36] #PF: error_code(0x0000) - not-present page
[   24.324482][   T36] PGD 3a01067 P4D 3a01067 PUD 0
[   24.325301][   T36] Oops: Oops: 0000 [#1] PREEMPT SMP PTI
[   24.326157][   T36] CPU: 1 UID: 0 PID: 36 Comm: kcompactd0 Not tainted 6.14.0-rc6-00559-g6304be90cf54 #1
[   24.327631][   T36] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[ 24.329194][ T36] RIP: 0010:__zone_watermark_ok (mm/page_alloc.c:3256) 
[ 24.330125][ T36] Code: 84 c0 78 14 4c 8b 97 48 06 00 00 45 31 db 4d 85 d2 4d 0f 4f da 4c 01 de 49 29 f1 41 f7 c0 38 02 00 00 0f 85 92 00 00 00 48 98 <48> 03 54 c7 38 49 39 d1 7e 7e b0 01 85 c9 74 7a 83 f9 0a 7f 73 48
All code
========
   0:	84 c0                	test   %al,%al
   2:	78 14                	js     0x18
   4:	4c 8b 97 48 06 00 00 	mov    0x648(%rdi),%r10
   b:	45 31 db             	xor    %r11d,%r11d
   e:	4d 85 d2             	test   %r10,%r10
  11:	4d 0f 4f da          	cmovg  %r10,%r11
  15:	4c 01 de             	add    %r11,%rsi
  18:	49 29 f1             	sub    %rsi,%r9
  1b:	41 f7 c0 38 02 00 00 	test   $0x238,%r8d
  22:	0f 85 92 00 00 00    	jne    0xba
  28:	48 98                	cltq
  2a:*	48 03 54 c7 38       	add    0x38(%rdi,%rax,8),%rdx		<-- trapping instruction
  2f:	49 39 d1             	cmp    %rdx,%r9
  32:	7e 7e                	jle    0xb2
  34:	b0 01                	mov    $0x1,%al
  36:	85 c9                	test   %ecx,%ecx
  38:	74 7a                	je     0xb4
  3a:	83 f9 0a             	cmp    $0xa,%ecx
  3d:	7f 73                	jg     0xb2
  3f:	48                   	rex.W

Code starting with the faulting instruction
===========================================
   0:	48 03 54 c7 38       	add    0x38(%rdi,%rax,8),%rdx
   5:	49 39 d1             	cmp    %rdx,%r9
   8:	7e 7e                	jle    0x88
   a:	b0 01                	mov    $0x1,%al
   c:	85 c9                	test   %ecx,%ecx
   e:	74 7a                	je     0x8a
  10:	83 f9 0a             	cmp    $0xa,%ecx
  13:	7f 73                	jg     0x88
  15:	48                   	rex.W
[   24.333001][   T36] RSP: 0018:ffffc90000137cd0 EFLAGS: 00010246
[   24.334003][   T36] RAX: 00000000000036a8 RBX: 0000000000000001 RCX: 0000000000000000
[   24.335270][   T36] RDX: 0000000000000006 RSI: 0000000000000000 RDI: ffff88843fff1080
[   24.336551][   T36] RBP: 0000000000000001 R08: 0000000000000080 R09: 0000000000003b14
[   24.337799][   T36] R10: 00000000000018b0 R11: 00000000000018b0 R12: 0000000000000001
[   24.339130][   T36] R13: 0000000000000000 R14: ffff88843fff1080 R15: 00000000000036a8
[   24.340412][   T36] FS:  0000000000000000(0000) GS:ffff88842fd00000(0000) knlGS:0000000000000000
[   24.341739][   T36] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   24.342448][   T36] CR2: ffff88844000c5f8 CR3: 00000001bceba000 CR4: 00000000000406f0
[   24.343331][   T36] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   24.347498][   T36] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   24.348260][   T36] Call Trace:
[   24.348621][   T36]  <TASK>
[ 24.348958][ T36] ? __die_body (arch/x86/kernel/dumpstack.c:421) 
[ 24.349447][ T36] ? page_fault_oops (arch/x86/mm/fault.c:710) 
[ 24.350008][ T36] ? do_kern_addr_fault (arch/x86/mm/fault.c:1198) 
[ 24.350582][ T36] ? exc_page_fault (arch/x86/mm/fault.c:1479) 
[ 24.351065][ T36] ? asm_exc_page_fault (arch/x86/include/asm/idtentry.h:623) 
[ 24.351550][ T36] ? __zone_watermark_ok (mm/page_alloc.c:3256) 
[ 24.352049][ T36] compaction_suitable (mm/compaction.c:2407) 
[ 24.352532][ T36] compaction_suit_allocation_order (mm/compaction.c:?) 
[ 24.353127][ T36] kcompactd (mm/compaction.c:3109) 
[ 24.353618][ T36] kthread (kernel/kthread.c:466) 
[ 24.354105][ T36] ? __pfx_kcompactd (mm/compaction.c:3184) 
[ 24.354658][ T36] ? __pfx_kthread (kernel/kthread.c:413) 
[ 24.355121][ T36] ret_from_fork (arch/x86/kernel/process.c:154) 
[ 24.355567][ T36] ? __pfx_kthread (kernel/kthread.c:413) 
[ 24.356032][ T36] ret_from_fork_asm (arch/x86/entry/entry_64.S:257) 
[   24.356505][   T36]  </TASK>
[   24.356837][   T36] Modules linked in: can_bcm can_raw can cn scsi_transport_iscsi sr_mod ipmi_msghandler cdrom sg ata_generic dm_mod fuse
[   24.358098][   T36] CR2: ffff88844000c5f8
[   24.358662][   T36] ---[ end trace 0000000000000000 ]---
[ 24.359178][ T36] RIP: 0010:__zone_watermark_ok (mm/page_alloc.c:3256) 
[ 24.359726][ T36] Code: 84 c0 78 14 4c 8b 97 48 06 00 00 45 31 db 4d 85 d2 4d 0f 4f da 4c 01 de 49 29 f1 41 f7 c0 38 02 00 00 0f 85 92 00 00 00 48 98 <48> 03 54 c7 38 49 39 d1 7e 7e b0 01 85 c9 74 7a 83 f9 0a 7f 73 48
All code
========
   0:	84 c0                	test   %al,%al
   2:	78 14                	js     0x18
   4:	4c 8b 97 48 06 00 00 	mov    0x648(%rdi),%r10
   b:	45 31 db             	xor    %r11d,%r11d
   e:	4d 85 d2             	test   %r10,%r10
  11:	4d 0f 4f da          	cmovg  %r10,%r11
  15:	4c 01 de             	add    %r11,%rsi
  18:	49 29 f1             	sub    %rsi,%r9
  1b:	41 f7 c0 38 02 00 00 	test   $0x238,%r8d
  22:	0f 85 92 00 00 00    	jne    0xba
  28:	48 98                	cltq
  2a:*	48 03 54 c7 38       	add    0x38(%rdi,%rax,8),%rdx		<-- trapping instruction
  2f:	49 39 d1             	cmp    %rdx,%r9
  32:	7e 7e                	jle    0xb2
  34:	b0 01                	mov    $0x1,%al
  36:	85 c9                	test   %ecx,%ecx
  38:	74 7a                	je     0xb4
  3a:	83 f9 0a             	cmp    $0xa,%ecx
  3d:	7f 73                	jg     0xb2
  3f:	48                   	rex.W

Code starting with the faulting instruction
===========================================
   0:	48 03 54 c7 38       	add    0x38(%rdi,%rax,8),%rdx
   5:	49 39 d1             	cmp    %rdx,%r9
   8:	7e 7e                	jle    0x88
   a:	b0 01                	mov    $0x1,%al
   c:	85 c9                	test   %ecx,%ecx
   e:	74 7a                	je     0x8a
  10:	83 f9 0a             	cmp    $0xa,%ecx
  13:	7f 73                	jg     0x88
  15:	48                   	rex.W


The kernel config and materials to reproduce are available at:
https://download.01.org/0day-ci/archive/20250320/202503201604.a3aa6a95-lkp@xxxxxxxxx



-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki





[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux