Hello, kernel test robot noticed "BUG:unable_to_handle_page_fault_for_address" on: commit: 6304be90cf5460f33b031e1e19cbe7ffdcbc9f66 ("[PATCH 1/5] mm: compaction: push watermark into compaction_suitable() callers") url: https://github.com/intel-lab-lkp/linux/commits/Johannes-Weiner/mm-compaction-push-watermark-into-compaction_suitable-callers/20250314-050839 base: https://git.kernel.org/cgit/linux/kernel/git/akpm/mm.git mm-everything patch link: https://lore.kernel.org/all/20250313210647.1314586-2-hannes@xxxxxxxxxxx/ patch subject: [PATCH 1/5] mm: compaction: push watermark into compaction_suitable() callers in testcase: trinity version: trinity-x86_64-ba2360ed-1_20241228 with following parameters: runtime: 300s group: group-03 nr_groups: 5 config: x86_64-kexec compiler: clang-20 test machine: qemu-system-x86_64 -enable-kvm -cpu SandyBridge -smp 2 -m 16G (please refer to attached dmesg/kmsg for entire log/backtrace) +---------------------------------------------+------------+------------+ | | 0174ed04ed | 6304be90cf | +---------------------------------------------+------------+------------+ | BUG:unable_to_handle_page_fault_for_address | 0 | 5 | | Oops | 0 | 5 | | RIP:__zone_watermark_ok | 0 | 5 | +---------------------------------------------+------------+------------+ If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <oliver.sang@xxxxxxxxx> | Closes: https://lore.kernel.org/oe-lkp/202503201604.a3aa6a95-lkp@xxxxxxxxx [ 24.321289][ T36] BUG: unable to handle page fault for address: ffff88844000c5f8 [ 24.322631][ T36] #PF: supervisor read access in kernel mode [ 24.323577][ T36] #PF: error_code(0x0000) - not-present page [ 24.324482][ T36] PGD 3a01067 P4D 3a01067 PUD 0 [ 24.325301][ T36] Oops: Oops: 0000 [#1] PREEMPT SMP PTI [ 24.326157][ T36] CPU: 1 UID: 0 PID: 36 Comm: kcompactd0 Not tainted 6.14.0-rc6-00559-g6304be90cf54 #1 [ 24.327631][ T36] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 [ 24.329194][ T36] RIP: 0010:__zone_watermark_ok (mm/page_alloc.c:3256) [ 24.330125][ T36] Code: 84 c0 78 14 4c 8b 97 48 06 00 00 45 31 db 4d 85 d2 4d 0f 4f da 4c 01 de 49 29 f1 41 f7 c0 38 02 00 00 0f 85 92 00 00 00 48 98 <48> 03 54 c7 38 49 39 d1 7e 7e b0 01 85 c9 74 7a 83 f9 0a 7f 73 48 All code ======== 0: 84 c0 test %al,%al 2: 78 14 js 0x18 4: 4c 8b 97 48 06 00 00 mov 0x648(%rdi),%r10 b: 45 31 db xor %r11d,%r11d e: 4d 85 d2 test %r10,%r10 11: 4d 0f 4f da cmovg %r10,%r11 15: 4c 01 de add %r11,%rsi 18: 49 29 f1 sub %rsi,%r9 1b: 41 f7 c0 38 02 00 00 test $0x238,%r8d 22: 0f 85 92 00 00 00 jne 0xba 28: 48 98 cltq 2a:* 48 03 54 c7 38 add 0x38(%rdi,%rax,8),%rdx <-- trapping instruction 2f: 49 39 d1 cmp %rdx,%r9 32: 7e 7e jle 0xb2 34: b0 01 mov $0x1,%al 36: 85 c9 test %ecx,%ecx 38: 74 7a je 0xb4 3a: 83 f9 0a cmp $0xa,%ecx 3d: 7f 73 jg 0xb2 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 03 54 c7 38 add 0x38(%rdi,%rax,8),%rdx 5: 49 39 d1 cmp %rdx,%r9 8: 7e 7e jle 0x88 a: b0 01 mov $0x1,%al c: 85 c9 test %ecx,%ecx e: 74 7a je 0x8a 10: 83 f9 0a cmp $0xa,%ecx 13: 7f 73 jg 0x88 15: 48 rex.W [ 24.333001][ T36] RSP: 0018:ffffc90000137cd0 EFLAGS: 00010246 [ 24.334003][ T36] RAX: 00000000000036a8 RBX: 0000000000000001 RCX: 0000000000000000 [ 24.335270][ T36] RDX: 0000000000000006 RSI: 0000000000000000 RDI: ffff88843fff1080 [ 24.336551][ T36] RBP: 0000000000000001 R08: 0000000000000080 R09: 0000000000003b14 [ 24.337799][ T36] R10: 00000000000018b0 R11: 00000000000018b0 R12: 0000000000000001 [ 24.339130][ T36] R13: 0000000000000000 R14: ffff88843fff1080 R15: 00000000000036a8 [ 24.340412][ T36] FS: 0000000000000000(0000) GS:ffff88842fd00000(0000) knlGS:0000000000000000 [ 24.341739][ T36] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 24.342448][ T36] CR2: ffff88844000c5f8 CR3: 00000001bceba000 CR4: 00000000000406f0 [ 24.343331][ T36] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 24.347498][ T36] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 24.348260][ T36] Call Trace: [ 24.348621][ T36] <TASK> [ 24.348958][ T36] ? __die_body (arch/x86/kernel/dumpstack.c:421) [ 24.349447][ T36] ? page_fault_oops (arch/x86/mm/fault.c:710) [ 24.350008][ T36] ? do_kern_addr_fault (arch/x86/mm/fault.c:1198) [ 24.350582][ T36] ? exc_page_fault (arch/x86/mm/fault.c:1479) [ 24.351065][ T36] ? asm_exc_page_fault (arch/x86/include/asm/idtentry.h:623) [ 24.351550][ T36] ? __zone_watermark_ok (mm/page_alloc.c:3256) [ 24.352049][ T36] compaction_suitable (mm/compaction.c:2407) [ 24.352532][ T36] compaction_suit_allocation_order (mm/compaction.c:?) [ 24.353127][ T36] kcompactd (mm/compaction.c:3109) [ 24.353618][ T36] kthread (kernel/kthread.c:466) [ 24.354105][ T36] ? __pfx_kcompactd (mm/compaction.c:3184) [ 24.354658][ T36] ? __pfx_kthread (kernel/kthread.c:413) [ 24.355121][ T36] ret_from_fork (arch/x86/kernel/process.c:154) [ 24.355567][ T36] ? __pfx_kthread (kernel/kthread.c:413) [ 24.356032][ T36] ret_from_fork_asm (arch/x86/entry/entry_64.S:257) [ 24.356505][ T36] </TASK> [ 24.356837][ T36] Modules linked in: can_bcm can_raw can cn scsi_transport_iscsi sr_mod ipmi_msghandler cdrom sg ata_generic dm_mod fuse [ 24.358098][ T36] CR2: ffff88844000c5f8 [ 24.358662][ T36] ---[ end trace 0000000000000000 ]--- [ 24.359178][ T36] RIP: 0010:__zone_watermark_ok (mm/page_alloc.c:3256) [ 24.359726][ T36] Code: 84 c0 78 14 4c 8b 97 48 06 00 00 45 31 db 4d 85 d2 4d 0f 4f da 4c 01 de 49 29 f1 41 f7 c0 38 02 00 00 0f 85 92 00 00 00 48 98 <48> 03 54 c7 38 49 39 d1 7e 7e b0 01 85 c9 74 7a 83 f9 0a 7f 73 48 All code ======== 0: 84 c0 test %al,%al 2: 78 14 js 0x18 4: 4c 8b 97 48 06 00 00 mov 0x648(%rdi),%r10 b: 45 31 db xor %r11d,%r11d e: 4d 85 d2 test %r10,%r10 11: 4d 0f 4f da cmovg %r10,%r11 15: 4c 01 de add %r11,%rsi 18: 49 29 f1 sub %rsi,%r9 1b: 41 f7 c0 38 02 00 00 test $0x238,%r8d 22: 0f 85 92 00 00 00 jne 0xba 28: 48 98 cltq 2a:* 48 03 54 c7 38 add 0x38(%rdi,%rax,8),%rdx <-- trapping instruction 2f: 49 39 d1 cmp %rdx,%r9 32: 7e 7e jle 0xb2 34: b0 01 mov $0x1,%al 36: 85 c9 test %ecx,%ecx 38: 74 7a je 0xb4 3a: 83 f9 0a cmp $0xa,%ecx 3d: 7f 73 jg 0xb2 3f: 48 rex.W Code starting with the faulting instruction =========================================== 0: 48 03 54 c7 38 add 0x38(%rdi,%rax,8),%rdx 5: 49 39 d1 cmp %rdx,%r9 8: 7e 7e jle 0x88 a: b0 01 mov $0x1,%al c: 85 c9 test %ecx,%ecx e: 74 7a je 0x8a 10: 83 f9 0a cmp $0xa,%ecx 13: 7f 73 jg 0x88 15: 48 rex.W The kernel config and materials to reproduce are available at: https://download.01.org/0day-ci/archive/20250320/202503201604.a3aa6a95-lkp@xxxxxxxxx -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki