RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1976699 - [SCTP]WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00
Summary: [SCTP]WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpa...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: kernel
Version: 8.5
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: beta
: ---
Assignee: Xin Long
QA Contact: ying xu
URL:
Whiteboard:
Depends On:
Blocks: 1983864
TreeView+ depends on / blocked
 
Reported: 2021-06-28 04:42 UTC by ying xu
Modified: 2023-05-19 07:42 UTC (History)
4 users (show)

Fixed In Version: kernel-4.18.0-325.el8
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-11-09 19:18:09 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Gitlab redhat/rhel/src/kernel rhel-8 merge_requests 920 0 None None None 2021-07-04 17:53:31 UTC
Red Hat Product Errata RHSA-2021:4356 0 None None None 2021-11-09 19:18:49 UTC

Description ying xu 2021-06-28 04:42:15 UTC
Description of problem:
WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00

Version-Release number of selected component (if applicable):
# uname -r
4.18.0-315.el8.x86_64


How reproducible:
always

Steps to Reproduce:
run the case :/networking/sctp/bugs/large_buffer_optlen_bugs

Actual results:
[  110.456696] WARNING: CPU: 29 PID: 3165 at mm/page_alloc.c:4579 __alloc_pages_slowpath+0xb74/0xd00
[  110.466603] Modules linked in: sctp ip6_udp_tunnel udp_tunnel rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm iTCO_wdt iTCO_vendor_support intel_rapl_msr mxm_wmi dcdbas intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl intel_cstate intel_uncore pcspkr i40iw mlx4_ib mlx5_ib ib_uverbs lpc_ich mei_me ib_core ipmi_ssif mei ipmi_si ipmi_devintf ipmi_msghandler wmi acpi_power_meter ip_tables xfs libcrc32c mlx4_en sr_mod cdrom sd_mod t10_pi sg mgag200 drm_kms_helper syscopyarea sysfillrect ahci sysimgblt fb_sys_fops libahci mlx5_core drm crc32c_intel i40e mlx4_core libata megaraid_sas i2c_algo_bit tg3 mlxfw pci_hyperv_intf tls dm_mirror dm_region_hash dm_log dm_mod
[  110.551418] CPU: 29 PID: 3165 Comm: large_optlen Kdump: loaded Not tainted 4.18.0-315.el8.x86_64 #1
[  110.561515] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.1.5 04/11/2016
[  110.569866] RIP: 0010:__alloc_pages_slowpath+0xb74/0xd00
[  110.575795] Code: 24 0c 00 00 00 00 c7 44 24 4c 00 00 00 00 c7 44 24 3c 01 00 00 00 e9 29 fd ff ff 31 c0 41 81 e6 00 02 00 00 0f 85 37 fa ff ff <0f> 0b e9 30 fa ff ff 65 48 8b 04 25 40 5c 01 00 8b 80 f8 0c 00 00
[  110.596752] RSP: 0018:ffffb7be09ed3c58 EFLAGS: 00010246
[  110.602583] RAX: 0000000000000000 RBX: 00000000006240c0 RCX: 0000000000000000
[  110.610547] RDX: ffffb7be09ed3d50 RSI: 000000000000000b RDI: 00000000006240c0
[  110.618508] RBP: 000000000000000b R08: 0000000000000201 R09: 0000000000000000
[  110.626469] R10: 0000000000000002 R11: 0000000000000000 R12: 0000000000000000
[  110.634431] R13: 00000000006240c0 R14: 0000000000000000 R15: 0000000000000001
[  110.642394] FS:  00007fd9dd29c500(0000) GS:ffff94bf1fd80000(0000) knlGS:0000000000000000
[  110.651426] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  110.657837] CR2: 00007fd9dcdc03b0 CR3: 0000000888a50002 CR4: 00000000001706e0
[  110.665802] Call Trace:
[  110.668540]  ? context_to_sid+0x91/0x120
[  110.672922]  ? page_add_file_rmap+0x11/0x140
[  110.677687]  __alloc_pages_nodemask+0x29b/0x2d0
[  110.682750]  kmalloc_order+0x28/0x90
[  110.686741]  kmalloc_order_trace+0x1d/0xa0
[  110.691317]  __kmalloc_track_caller+0x1e7/0x240
[  110.696377]  memdup_user+0x28/0x70
[  110.700197]  sctp_setsockopt.part.33+0x45/0x2be0 [sctp]
[  110.706034]  __sys_setsockopt+0xd6/0x1d0
[  110.710413]  __x64_sys_setsockopt+0x20/0x30
[  110.715085]  do_syscall_64+0x5b/0x1a0
[  110.719174]  entry_SYSCALL_64_after_hwframe+0x65/0xca
[  110.724813] RIP: 0033:0x7fd9dcdb13ee
[  110.728801] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b1 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 f3 0f 1e fa 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 6a 0a 2c 00 f7 d8 64 89 01 48
[  110.749759] RSP: 002b:00007ffda91493a8 EFLAGS: 00000202 ORIG_RAX: 0000000000000036
[  110.758208] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd9dcdb13ee
[  110.766169] RDX: 0000000000000016 RSI: 0000000000000084 RDI: 0000000000000003
[  110.774131] RBP: 00007ffda97893e0 R08: 0000000000640000 R09: 00007fd9dd073d20
[  110.782096] R10: 00007ffda91493c0 R11: 0000000000000202 R12: 00000000004006f0
[  110.790060] R13: 00007ffda97894c0 R14: 0000000000000000 R15: 0000000000000000
[  110.798024] ---[ end trace 4e899ad2115ab950 ]---


Expected results:
no warning

Additional info:
there was a bug before:https://bugzilla.redhat.com/show_bug.cgi?id=1544628

Comment 7 Xin Long 2021-07-19 16:58:40 UTC
Hi, ying,

Can you set qa_ack+ for this bug, and let's only fix the call trace on this bug.
please file another bug for the case failure, and I've posted a fix for that.

Thanks.

Comment 8 ying xu 2021-07-20 03:10:01 UTC
(In reply to Xin Long from comment #7)
> Hi, ying,
> 
> Can you set qa_ack+ for this bug, and let's only fix the call trace on this
> bug.
> please file another bug for the case failure, and I've posted a fix for that.
> 
> Thanks.

done。
I will raise another two bugs for the case failure,on rhel8 and rhel9.

Comment 9 ying xu 2021-07-26 15:15:11 UTC
tested on version:
4.18.0-320.el8.mr920_210704_1802.x86_64

no call trace

set tested.

Comment 14 ying xu 2021-07-30 03:08:41 UTC
tested on version:
4.18.0-325.el8.x86_64

:: [ 23:05:28 ] :: [  BEGIN   ] :: Running 'sysctl -w net.sctp.auth_enable=1'
net.sctp.auth_enable = 1
:: [ 23:05:28 ] :: [   PASS   ] :: Command 'sysctl -w net.sctp.auth_enable=1' (Expected 0, got 0)
:: [ 23:05:28 ] :: [  BEGIN   ] :: Running './large_optlen'
setsockopt(SCTP_HMAC_IDENT): Cannot allocate memory
:: [ 23:05:28 ] :: [   FAIL   ] :: Command './large_optlen' (Expected 0, got 255)
:: [ 23:05:28 ] :: [  BEGIN   ] :: Running 'sysctl -w net.sctp.auth_enable=0'
net.sctp.auth_enable = 0
:: [ 23:05:28 ] :: [   PASS   ] :: Command 'sysctl -w net.sctp.auth_enable=0' (Expected 0, got 0)
:: [ 23:05:28 ] :: [   PASS   ] :: Using a large optlen for setsockopt(SCTP_HMAC_IDENT) 


fail because of another bug(not fixed yet)
set verified.

Comment 16 errata-xmlrpc 2021-11-09 19:18:09 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Moderate: kernel security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHSA-2021:4356


Note You need to log in before you can comment on or make changes to this bug.