Bug 1976699

Summary: [SCTP]WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00
Product: Red Hat Enterprise Linux 8 Reporter: ying xu <yinxu>
Component: kernelAssignee: Xin Long <lxin>
kernel sub component: sctp QA Contact: ying xu <yinxu>
Status: CLOSED ERRATA Docs Contact:
Severity: unspecified    
Priority: unspecified CC: acaringi, jiji, lxin, network-qe
Version: 8.5   
Target Milestone: beta   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: kernel-4.18.0-325.el8 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-11-09 19:18:09 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1983864    

Description ying xu 2021-06-28 04:42:15 UTC
Description of problem:
WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00

Version-Release number of selected component (if applicable):
# uname -r
4.18.0-315.el8.x86_64


How reproducible:
always

Steps to Reproduce:
run the case :/networking/sctp/bugs/large_buffer_optlen_bugs

Actual results:
[  110.456696] WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00
[  110.466603] Modules linked in: sctp ip6_udp_tunnel udp_tunnel rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm iTCO_wdt iTCO_vendor_support intel_rapl_msr mxm_wmi dcdbas intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate intel_uncore pcspkr i40iw mlx4_ib mlx5_ib ib_uverbs lpc_ich mei_me ib_core ipmi_ssif mei ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter ip_tables xfs libcrc32c mlx4_en sr_mod cdrom sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect ahci sysimgblt fb_sys_fops libahci mlx5_core drm crc32c_intel i40e mlx4_core libata megaraid_sas i2c_algo_bit tg3 mlxfw pci_hyperv_intf tls dm_mirror dm_region_hash dm_log dm_mod
[  110.551418] CPU: 29 PID: 3165 Comm: large_optlen Kdump: loaded Not tainted 4.18.0-315.el8.x86_64 #1
[  110.561515] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.1.5 04/11/2016
[  110.569866] RIP: 0010:__alloc_pages_slowpath+0xb74/0xd00
[  110.575795] Code: 24 0c 00 00 00 00 c7 44 24 4c 00 00 00 00 c7 44 24 3c 01 00 00 00 e9 29 fd ff ff 31 c0 41 81 e6 00 02 00 00 0f 85 37 fa ff ff <0f> 0b e9 30 fa ff ff 65 48 8b 04 25 40 5c 01 00 8b 80 f8 0c 00 00
[  110.596752] RSP: 0018:ffffb7be09ed3c58 EFLAGS: 00010246
[  110.602583] RAX: 0000000000000000 RBX: 00000000006240c0 RCX: 0000000000000000
[  110.610547] RDX: ffffb7be09ed3d50 RSI: 000000000000000b RDI: 00000000006240c0
[  110.618508] RBP: 000000000000000b R08: 0000000000000201 R09: 0000000000000000
[  110.626469] R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000000
[  110.634431] R13: 00000000006240c0 R14: 0000000000000000 R15: 0000000000000001
[  110.642394] FS:  00007fd9dd29c500(0000) GS:ffff94bf1fd80000(0000) knlGS:0000000000000000
[  110.651426] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  110.657837] CR2: 00007fd9dcdc03b0 CR3: 0000000888a50002 CR4: 00000000001706e0
[  110.665802] Call Trace:
[  110.668540]  ? context_to_sid+0x91/0x120
[  110.672922]  ? page_add_file_rmap+0x11/0x140
[  110.677687]  __alloc_pages_nodemask+0x29b/0x2d0
[  110.682750]  kmalloc_order+0x28/0x90
[  110.686741]  kmalloc_order_trace+0x1d/0xa0
[  110.691317]  __kmalloc_track_caller+0x1e7/0x240
[  110.696377]  memdup_user+0x28/0x70
[  110.700197]  sctp_setsockopt.part.33+0x45/0x2be0 [sctp]
[  110.706034]  __sys_setsockopt+0xd6/0x1d0
[  110.710413]  __x64_sys_setsockopt+0x20/0x30
[  110.715085]  do_syscall_64+0x5b/0x1a0
[  110.719174]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[  110.724813] RIP: 0033:0x7fd9dcdb13ee
[  110.728801] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 6a 0a 2c 00 f7 d8 64 89 01 48
[  110.749759] RSP: 002b:00007ffda91493a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000036
[  110.758208] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd9dcdb13ee
[  110.766169] RDX: 0000000000000016 RSI: 0000000000000084 RDI: 0000000000000003
[  110.774131] RBP: 00007ffda97893e0 R08: 0000000000640000 R09: 00007fd9dd073d20
[  110.782096] R10: 00007ffda91493c0 R11: 0000000000000202 R12: 00000000004006f0
[  110.790060] R13: 00007ffda97894c0 R14: 0000000000000000 R15: 0000000000000000
[  110.798024] ---[ end trace 4e899ad2115ab950 ]---


Expected results:
no warning

Additional info:
there was a bug before:https://bugzilla.redhat.com/show_bug.cgi?id=1544628

Comment 7 Xin Long 2021-07-19 16:58:40 UTC
Hi, ying,

Can you set qa_ack+ for this bug, and let's only fix the call trace on this bug.
please file another bug for the case failure, and I've posted a fix for that.

Thanks.

Comment 8 ying xu 2021-07-20 03:10:01 UTC
(In reply to Xin Long from comment #7)
> Hi, ying,
> 
> Can you set qa_ack+ for this bug, and let's only fix the call trace on this
> bug.
> please file another bug for the case failure, and I've posted a fix for that.
> 
> Thanks.

done。
I will raise another two bugs for the case failure,on rhel8 and rhel9.

Comment 9 ying xu 2021-07-26 15:15:11 UTC
tested on version:
4.18.0-320.el8.mr920_210704_1802.x86_64

no call trace

set tested.

Comment 14 ying xu 2021-07-30 03:08:41 UTC
tested on version:
4.18.0-325.el8.x86_64

:: [ 23:05:28 ] :: [  BEGIN   ] :: Running 'sysctl -w net.sctp.auth_enable=1'
net.sctp.auth_enable = 1
:: [ 23:05:28 ] :: [   PASS   ] :: Command 'sysctl -w net.sctp.auth_enable=1' (Expected 0, got 0)
:: [ 23:05:28 ] :: [  BEGIN   ] :: Running './large_optlen'
setsockopt(SCTP_HMAC_IDENT): Cannot allocate memory
:: [ 23:05:28 ] :: [   FAIL   ] :: Command './large_optlen' (Expected 0, got 255)
:: [ 23:05:28 ] :: [  BEGIN   ] :: Running 'sysctl -w net.sctp.auth_enable=0'
net.sctp.auth_enable = 0
:: [ 23:05:28 ] :: [   PASS   ] :: Command 'sysctl -w net.sctp.auth_enable=0' (Expected 0, got 0)
:: [ 23:05:28 ] :: [   PASS   ] :: Using a large optlen for setsockopt(SCTP_HMAC_IDENT) 


fail because of another bug(not fixed yet)
set verified.

Comment 16 errata-xmlrpc 2021-11-09 19:18:09 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: kernel security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:4356