Hide Forgot
Description of problem: WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00 Version-Release number of selected component (if applicable): # uname -r 4.18.0-315.el8.x86_64 How reproducible: always Steps to Reproduce: run the case :/networking/sctp/bugs/large_buffer_optlen_bugs Actual results: [ 110.456696] WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00 [ 110.466603] Modules linked in: sctp ip6_udp_tunnel udp_tunnel rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm iTCO_wdt iTCO_vendor_support intel_rapl_msr mxm_wmi dcdbas intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate intel_uncore pcspkr i40iw mlx4_ib mlx5_ib ib_uverbs lpc_ich mei_me ib_core ipmi_ssif mei ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter ip_tables xfs libcrc32c mlx4_en sr_mod cdrom sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect ahci sysimgblt fb_sys_fops libahci mlx5_core drm crc32c_intel i40e mlx4_core libata megaraid_sas i2c_algo_bit tg3 mlxfw pci_hyperv_intf tls dm_mirror dm_region_hash dm_log dm_mod [ 110.551418] CPU: 29 PID: 3165 Comm: large_optlen Kdump: loaded Not tainted 4.18.0-315.el8.x86_64 #1 [ 110.561515] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.1.5 04/11/2016 [ 110.569866] RIP: 0010:__alloc_pages_slowpath+0xb74/0xd00 [ 110.575795] Code: 24 0c 00 00 00 00 c7 44 24 4c 00 00 00 00 c7 44 24 3c 01 00 00 00 e9 29 fd ff ff 31 c0 41 81 e6 00 02 00 00 0f 85 37 fa ff ff <0f> 0b e9 30 fa ff ff 65 48 8b 04 25 40 5c 01 00 8b 80 f8 0c 00 00 [ 110.596752] RSP: 0018:ffffb7be09ed3c58 EFLAGS: 00010246 [ 110.602583] RAX: 0000000000000000 RBX: 00000000006240c0 RCX: 0000000000000000 [ 110.610547] RDX: ffffb7be09ed3d50 RSI: 000000000000000b RDI: 00000000006240c0 [ 110.618508] RBP: 000000000000000b R08: 0000000000000201 R09: 0000000000000000 [ 110.626469] R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000000 [ 110.634431] R13: 00000000006240c0 R14: 0000000000000000 R15: 0000000000000001 [ 110.642394] FS: 00007fd9dd29c500(0000) GS:ffff94bf1fd80000(0000) knlGS:0000000000000000 [ 110.651426] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 110.657837] CR2: 00007fd9dcdc03b0 CR3: 0000000888a50002 CR4: 00000000001706e0 [ 110.665802] Call Trace: [ 110.668540] ? context_to_sid+0x91/0x120 [ 110.672922] ? page_add_file_rmap+0x11/0x140 [ 110.677687] __alloc_pages_nodemask+0x29b/0x2d0 [ 110.682750] kmalloc_order+0x28/0x90 [ 110.686741] kmalloc_order_trace+0x1d/0xa0 [ 110.691317] __kmalloc_track_caller+0x1e7/0x240 [ 110.696377] memdup_user+0x28/0x70 [ 110.700197] sctp_setsockopt.part.33+0x45/0x2be0 [sctp] [ 110.706034] __sys_setsockopt+0xd6/0x1d0 [ 110.710413] __x64_sys_setsockopt+0x20/0x30 [ 110.715085] do_syscall_64+0x5b/0x1a0 [ 110.719174] entry_SYSCALL_64_after_hwframe+0x65/0xca [ 110.724813] RIP: 0033:0x7fd9dcdb13ee [ 110.728801] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 6a 0a 2c 00 f7 d8 64 89 01 48 [ 110.749759] RSP: 002b:00007ffda91493a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000036 [ 110.758208] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd9dcdb13ee [ 110.766169] RDX: 0000000000000016 RSI: 0000000000000084 RDI: 0000000000000003 [ 110.774131] RBP: 00007ffda97893e0 R08: 0000000000640000 R09: 00007fd9dd073d20 [ 110.782096] R10: 00007ffda91493c0 R11: 0000000000000202 R12: 00000000004006f0 [ 110.790060] R13: 00007ffda97894c0 R14: 0000000000000000 R15: 0000000000000000 [ 110.798024] ---[ end trace 4e899ad2115ab950 ]--- Expected results: no warning Additional info: there was a bug before:https://bugzilla.redhat.com/show_bug.cgi?id=1544628
Hi, ying, Can you set qa_ack+ for this bug, and let's only fix the call trace on this bug. please file another bug for the case failure, and I've posted a fix for that. Thanks.
(In reply to Xin Long from comment #7) > Hi, ying, > > Can you set qa_ack+ for this bug, and let's only fix the call trace on this > bug. > please file another bug for the case failure, and I've posted a fix for that. > > Thanks. done。 I will raise another two bugs for the case failure,on rhel8 and rhel9.
tested on version: 4.18.0-320.el8.mr920_210704_1802.x86_64 no call trace set tested.
tested on version: 4.18.0-325.el8.x86_64 :: [ 23:05:28 ] :: [ BEGIN ] :: Running 'sysctl -w net.sctp.auth_enable=1' net.sctp.auth_enable = 1 :: [ 23:05:28 ] :: [ PASS ] :: Command 'sysctl -w net.sctp.auth_enable=1' (Expected 0, got 0) :: [ 23:05:28 ] :: [ BEGIN ] :: Running './large_optlen' setsockopt(SCTP_HMAC_IDENT): Cannot allocate memory :: [ 23:05:28 ] :: [ FAIL ] :: Command './large_optlen' (Expected 0, got 255) :: [ 23:05:28 ] :: [ BEGIN ] :: Running 'sysctl -w net.sctp.auth_enable=0' net.sctp.auth_enable = 0 :: [ 23:05:28 ] :: [ PASS ] :: Command 'sysctl -w net.sctp.auth_enable=0' (Expected 0, got 0) :: [ 23:05:28 ] :: [ PASS ] :: Using a large optlen for setsockopt(SCTP_HMAC_IDENT) fail because of another bug(not fixed yet) set verified.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: kernel security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:4356