Bug 1976699
Summary: | [SCTP]WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00 | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | ying xu <yinxu> |
Component: | kernel | Assignee: | Xin Long <lxin> |
kernel sub component: | sctp | QA Contact: | ying xu <yinxu> |
Status: | CLOSED ERRATA | Docs Contact: | |
Severity: | unspecified | ||
Priority: | unspecified | CC: | acaringi, jiji, lxin, network-qe |
Version: | 8.5 | ||
Target Milestone: | beta | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | kernel-4.18.0-325.el8 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2021-11-09 19:18:09 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Bug Depends On: | |||
Bug Blocks: | 1983864 |
Description
ying xu
2021-06-28 04:42:15 UTC
Hi, ying, Can you set qa_ack+ for this bug, and let's only fix the call trace on this bug. please file another bug for the case failure, and I've posted a fix for that. Thanks. (In reply to Xin Long from comment #7) > Hi, ying, > > Can you set qa_ack+ for this bug, and let's only fix the call trace on this > bug. > please file another bug for the case failure, and I've posted a fix for that. > > Thanks. done。 I will raise another two bugs for the case failure,on rhel8 and rhel9. tested on version: 4.18.0-320.el8.mr920_210704_1802.x86_64 no call trace set tested. tested on version: 4.18.0-325.el8.x86_64 :: [ 23:05:28 ] :: [ BEGIN ] :: Running 'sysctl -w net.sctp.auth_enable=1' net.sctp.auth_enable = 1 :: [ 23:05:28 ] :: [ PASS ] :: Command 'sysctl -w net.sctp.auth_enable=1' (Expected 0, got 0) :: [ 23:05:28 ] :: [ BEGIN ] :: Running './large_optlen' setsockopt(SCTP_HMAC_IDENT): Cannot allocate memory :: [ 23:05:28 ] :: [ FAIL ] :: Command './large_optlen' (Expected 0, got 255) :: [ 23:05:28 ] :: [ BEGIN ] :: Running 'sysctl -w net.sctp.auth_enable=0' net.sctp.auth_enable = 0 :: [ 23:05:28 ] :: [ PASS ] :: Command 'sysctl -w net.sctp.auth_enable=0' (Expected 0, got 0) :: [ 23:05:28 ] :: [ PASS ] :: Using a large optlen for setsockopt(SCTP_HMAC_IDENT) fail because of another bug(not fixed yet) set verified. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: kernel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:4356 |