Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1976699

Summary: [SCTP]WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00
Product: Red Hat Enterprise Linux 8 Reporter: ying xu <yinxu>
Component: kernelAssignee: Xin Long <lxin>
kernel sub component: sctp QA Contact: ying xu <yinxu>
Status: CLOSED ERRATA Docs Contact:
Severity: unspecified    
Priority: unspecified CC: acaringi, jiji, lxin, network-qe
Version: 8.5Flags: pm-rhel: mirror+
Target Milestone: beta   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: kernel-4.18.0-325.el8 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-11-09 19:18:09 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1983864    

Description ying xu 2021-06-28 04:42:15 UTC
Description of problem:
WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00

Version-Release number of selected component (if applicable):
# uname -r
4.18.0-315.el8.x86_64


How reproducible:
always

Steps to Reproduce:
run the case :/networking/sctp/bugs/large_buffer_optlen_bugs

Actual results:
[  110.456696] WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00
[  110.466603] Modules linked in: sctp ip6_udp_tunnel udp_tunnel rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm iTCO_wdt iTCO_vendor_support intel_rapl_msr mxm_wmi dcdbas intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate intel_uncore pcspkr i40iw mlx4_ib mlx5_ib ib_uverbs lpc_ich mei_me ib_core ipmi_ssif mei ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter ip_tables xfs libcrc32c mlx4_en sr_mod cdrom sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect ahci sysimgblt fb_sys_fops libahci mlx5_core drm crc32c_intel i40e mlx4_core libata megaraid_sas i2c_algo_bit tg3 mlxfw pci_hyperv_intf tls dm_mirror dm_region_hash dm_log dm_mod
[  110.551418] CPU: 29 PID: 3165 Comm: large_optlen Kdump: loaded Not tainted 4.18.0-315.el8.x86_64 #1
[  110.561515] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.1.5 04/11/2016
[  110.569866] RIP: 0010:__alloc_pages_slowpath+0xb74/0xd00
[  110.575795] Code: 24 0c 00 00 00 00 c7 44 24 4c 00 00 00 00 c7 44 24 3c 01 00 00 00 e9 29 fd ff ff 31 c0 41 81 e6 00 02 00 00 0f 85 37 fa ff ff <0f> 0b e9 30 fa ff ff 65 48 8b 04 25 40 5c 01 00 8b 80 f8 0c 00 00
[  110.596752] RSP: 0018:ffffb7be09ed3c58 EFLAGS: 00010246
[  110.602583] RAX: 0000000000000000 RBX: 00000000006240c0 RCX: 0000000000000000
[  110.610547] RDX: ffffb7be09ed3d50 RSI: 000000000000000b RDI: 00000000006240c0
[  110.618508] RBP: 000000000000000b R08: 0000000000000201 R09: 0000000000000000
[  110.626469] R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000000
[  110.634431] R13: 00000000006240c0 R14: 0000000000000000 R15: 0000000000000001
[  110.642394] FS:  00007fd9dd29c500(0000) GS:ffff94bf1fd80000(0000) knlGS:0000000000000000
[  110.651426] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  110.657837] CR2: 00007fd9dcdc03b0 CR3: 0000000888a50002 CR4: 00000000001706e0
[  110.665802] Call Trace:
[  110.668540]  ? context_to_sid+0x91/0x120
[  110.672922]  ? page_add_file_rmap+0x11/0x140
[  110.677687]  __alloc_pages_nodemask+0x29b/0x2d0
[  110.682750]  kmalloc_order+0x28/0x90
[  110.686741]  kmalloc_order_trace+0x1d/0xa0
[  110.691317]  __kmalloc_track_caller+0x1e7/0x240
[  110.696377]  memdup_user+0x28/0x70
[  110.700197]  sctp_setsockopt.part.33+0x45/0x2be0 [sctp]
[  110.706034]  __sys_setsockopt+0xd6/0x1d0
[  110.710413]  __x64_sys_setsockopt+0x20/0x30
[  110.715085]  do_syscall_64+0x5b/0x1a0
[  110.719174]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[  110.724813] RIP: 0033:0x7fd9dcdb13ee
[  110.728801] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 6a 0a 2c 00 f7 d8 64 89 01 48
[  110.749759] RSP: 002b:00007ffda91493a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000036
[  110.758208] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd9dcdb13ee
[  110.766169] RDX: 0000000000000016 RSI: 0000000000000084 RDI: 0000000000000003
[  110.774131] RBP: 00007ffda97893e0 R08: 0000000000640000 R09: 00007fd9dd073d20
[  110.782096] R10: 00007ffda91493c0 R11: 0000000000000202 R12: 00000000004006f0
[  110.790060] R13: 00007ffda97894c0 R14: 0000000000000000 R15: 0000000000000000
[  110.798024] ---[ end trace 4e899ad2115ab950 ]---


Expected results:
no warning

Additional info:
there was a bug before:https://bugzilla.redhat.com/show_bug.cgi?id=1544628

Comment 7 Xin Long 2021-07-19 16:58:40 UTC
Hi, ying,

Can you set qa_ack+ for this bug, and let's only fix the call trace on this bug.
please file another bug for the case failure, and I've posted a fix for that.

Thanks.

Comment 8 ying xu 2021-07-20 03:10:01 UTC
(In reply to Xin Long from comment #7)
> Hi, ying,
> 
> Can you set qa_ack+ for this bug, and let's only fix the call trace on this
> bug.
> please file another bug for the case failure, and I've posted a fix for that.
> 
> Thanks.

done。
I will raise another two bugs for the case failure,on rhel8 and rhel9.

Comment 9 ying xu 2021-07-26 15:15:11 UTC
tested on version:
4.18.0-320.el8.mr920_210704_1802.x86_64

no call trace

set tested.

Comment 14 ying xu 2021-07-30 03:08:41 UTC
tested on version:
4.18.0-325.el8.x86_64

:: [ 23:05:28 ] :: [  BEGIN   ] :: Running 'sysctl -w net.sctp.auth_enable=1'
net.sctp.auth_enable = 1
:: [ 23:05:28 ] :: [   PASS   ] :: Command 'sysctl -w net.sctp.auth_enable=1' (Expected 0, got 0)
:: [ 23:05:28 ] :: [  BEGIN   ] :: Running './large_optlen'
setsockopt(SCTP_HMAC_IDENT): Cannot allocate memory
:: [ 23:05:28 ] :: [   FAIL   ] :: Command './large_optlen' (Expected 0, got 255)
:: [ 23:05:28 ] :: [  BEGIN   ] :: Running 'sysctl -w net.sctp.auth_enable=0'
net.sctp.auth_enable = 0
:: [ 23:05:28 ] :: [   PASS   ] :: Command 'sysctl -w net.sctp.auth_enable=0' (Expected 0, got 0)
:: [ 23:05:28 ] :: [   PASS   ] :: Using a large optlen for setsockopt(SCTP_HMAC_IDENT) 


fail because of another bug(not fixed yet)
set verified.

Comment 16 errata-xmlrpc 2021-11-09 19:18:09 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: kernel security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:4356