Hide Forgot
Description of problem: Compile the kernel with the upstream patch http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=8ed030dd0aa400d18c63861c2c6deb7c38f4edde, then we are able to load the dccp module, but with the patch kernel panic appeared when load/remove dccp_probe module. Version-Release number of selected component (if applicable): 2.6.32-71.24.1.el6 How reproducible: always Steps to Reproduce: 1. Compile the kernel with the upstream patch, then dccp module can be loaded. 2. load dccp_probe module. 3. remove dccp_probe module Actual results: kernel panic: [root@amd-dinar-04 ~]# lsmod|grep dccp dccp_probe 3529 0 dccp 86846 0 [root@amd-dinar-04 ~]# modprobe -r dccp_probe general protection fault: 0000 [#1] SMP last sysfs file: /sys/module/dccp_probe/refcnt CPU 6 Modules linked in: dccp_probe(-) ip6table_filter ip6_tables ebtable_nat ebtables xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT bridge stp llc autofs4 lockd sunrpc cpufreq_ondemand powernow_k8 freq_table ipv6 xt_physdev iptable_filter ip_tables dm_mirror dm_region_hash dm_log kvm_amd kvm serio_raw edac_core edac_mce_amd sg i2c_piix4 bnx2 ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif ata_generic pata_acpi pata_atiixp ahci radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core dm_mod [last unloaded: dccp] Modules linked in: dccp_probe(-) ip6table_filter ip6_tables ebtable_nat ebtables xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT bridge stp llc autofs4 lockd sunrpc cpufreq_ondemand powernow_k8 freq_table ipv6 xt_physdev iptable_filter ip_tables dm_mirror dm_region_hash dm_log kvm_amd kvm serio_raw edac_core edac_mce_amd sg i2c_piix4 bnx2 ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif ata_generic pata_acpi pata_atiixp ahci radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core dm_mod [last unloaded: dccp] Pid: 3005, comm: modprobe Not tainted 2.6.32 #1 Dinar RIP: 0010:[<ffffffff81158709>] [<ffffffff81158709>] kfree+0x79/0x320 RSP: 0018:ffff8801f532fe48 EFLAGS: 00010003 RAX: 017a90dabe5870d0 RBX: 6c2f343662696c2f RCX: 0000000000000017 RDX: ffffea0000000000 RSI: 0000000000000018 RDI: 6c2f343662696c2f RBP: ffff8801f532fea8 R08: ffffffff818a39e0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000001 R12: ffffffff810923a9 R13: 0000000000000202 R14: 0000000000000000 R15: 000000000040f4a0 FS: 00007ff22ee2a700(0000) GS:ffff880082200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b CR2: 00000000006d55a4 CR3: 000000012e2df000 CR4: 00000000000006e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Process modprobe (pid: 3005, threadinfo ffff8801f532e000, task ffff8801efb06040) Stack: ffff8801f532fe78 ffff8801f532fe98 ffffffffa0448880 00000000fffffff0 <0> 0000000000000000 000000000040f4a0 ffff8801f532fe88 ffff880135406b40 <0> ffffffffa0448880 00000000fffffff0 0000000000000000 000000000040f4a0 Call Trace: [<ffffffff810923a9>] kfifo_free+0x19/0x30 [<ffffffffa044855d>] dccpprobe_exit+0x15/0x36 [dccp_probe] [<ffffffff810ac906>] sys_delete_module+0x1a6/0x280 [<ffffffff810d4372>] ? audit_syscall_entry+0x272/0x2a0 [<ffffffff81013172>] system_call_fastpath+0x16/0x1b Code: 66 66 90 48 89 df e8 a7 28 ef ff 48 c1 e8 0c 48 8d 14 c5 00 00 00 00 48 c1 e0 06 48 29 d0 48 ba 00 00 00 00 00 ea ff ff 48 01 d0 <48> 8b 10 66 85 d2 0f 88 1d 02 00 00 84 d2 0f 89 0d 02 00 00 4c RIP [<ffffffff81158709>] kfree+0x79/0x320 RSP <ffff8801f532fe48> Message from syslogd@amd-dinar-04 at May 4 04:09:12 ... kernel:general protection fault: 0000 [#1] SMP Message from syslogd@amd-dinar-04 at May 4 04:09:12 ... kernel:last sysfs file: /sys/module/dccp_probe/refcnt Message from syslogd@amd-dinar-04 at May 4 04:09:12 ... kernel:Stack: Me---[ end trace c66ca98a8443396d ]--- Kernel panic - not syncing: Fatal exception Pid: 3005, comm: modprobe Tainted: G D ---------------- 2.6.32 #1 Call Trace: [<ffffffff814c8b54>] panic+0x78/0x137 [<ffffffff814ccc24>] oops_end+0xe4/0x100 [<ffffffff8101733b>] die+0x5b/0x90 [<ffffffff814cc772>] do_general_protection+0x152/0x160 [<ffffffff810923a9>] ? kfifo_free+0x19/0x30 [<ffffffff814cbf45>] general_protection+0x25/0x30 [<ffffffff810923a9>] ? kfifo_free+0x19/0x30 [<ffffffff81158709>] ? kfree+0x79/0x320 [<ffffffff811586e9>] ? kfree+0x59/0x320 [<ffffffff810923a9>] kfifo_free+0x19/0x30 [<ffffffffa044855d>] dccpprobe_exit+0x15/0x36 [dccp_probe] [<ffffffff810ac906>] sys_delete_module+0x1a6/0x280 [<ffffffff810d4372>] ? audit_syscall_entry+0x272/0x2a0 [<ffffffff81013172>] system_call_fastpath+0x16/0x1b ssage from syslopanic occurred, switching back to text console ------------[ cut here ]------------ WARNING: at arch/x86/kernel/smp.c:117 native_smp_send_reschedule+0x5c/0x60() (Tainted: G D ---------------- ) Hardware name: Dinar Modules linked in: dccp_probe(-) ip6table_filter ip6_tables ebtable_nat ebtables xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT bridge stp llc autofs4 lockd sunrpc cpufreq_ondemand powernow_k8 freq_table ipv6 xt_physdev iptable_filter ip_tables dm_mirror dm_region_hash dm_log kvm_amd kvm serio_raw edac_core edac_mce_amd sg i2c_piix4 bnx2 ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif ata_generic pata_acpi pata_atiixp ahci radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core dm_mod [last unloaded: dccp] Pid: 3005, comm: modprobe Tainted: G D ---------------- 2.6.32 #1 Call Trace: <IRQ> [<ffffffff8106b947>] warn_slowpath_common+0x87/0xc0 [<ffffffff8106b99a>] warn_slowpath_null+0x1a/0x20 [<ffffffff8102ea7c>] native_smp_send_reschedule+0x5c/0x60 [<ffffffff810508e8>] resched_task+0x68/0x80 [<ffffffff81050995>] check_preempt_curr_idle+0x15/0x20 [<ffffffff8105c44f>] try_to_wake_up+0x24f/0x380 [<ffffffff8105c592>] default_wake_function+0x12/0x20 [<ffffffff81091eb6>] autoremove_wake_function+0x16/0x40 [<ffffffff810500e9>] __wake_up_common+0x59/0x90 [<ffffffff810563e8>] __wake_up+0x48/0x70 [<ffffffff810a0e90>] ? tick_sched_timer+0x0/0xc0 [<ffffffff8106c1c7>] printk_tick+0x47/0x50 [<ffffffff8107d96d>] update_process_times+0x4d/0x70 [<ffffffff810a0ef6>] tick_sched_timer+0x66/0xc0 [<ffffffff8109584e>] __run_hrtimer+0x8e/0x1a0 [<ffffffff8101a4f9>] ? read_tsc+0x9/0x20 [<ffffffff81095bf6>] hrtimer_interrupt+0xe6/0x250 [<ffffffff814d0a2c>] smp_apic_timer_interrupt+0x6c/0x9c [<ffffffff81013c93>] apic_timer_interrupt+0x13/0x20 <EOI> [<ffffffff814c8bed>] ? panic+0x111/0x137 [<ffffffff814c8b7d>] ? panic+0xa1/0x137 [<ffffffff814ccc24>] oops_end+0xe4/0x100 [<ffffffff8101733b>] die+0x5b/0x90 [<ffffffff814cc772>] do_general_protection+0x152/0x160 [<ffffffff810923a9>] ? kfifo_free+0x19/0x30 [<ffffffff814cbf45>] general_protection+0x25/0x30 [<ffffffff810923a9>] ? kfifo_free+0x19/0x30 [<ffffffff81158709>] ? kfree+0x79/0x320 [<ffffffff811586e9>] ? kfree+0x59/0x320 [<ffffffff810923a9>] kfifo_free+0x19/0x30 [<ffffffffa044855d>] dccpprobe_exit+0x15/0x36 [dccp_probe] [<ffffffff810ac906>] sys_delete_module+0x1a6/0x280 [<ffffffff810d4372>] ? audit_syscall_entry+0x272/0x2a0 [<ffffffff81013172>] system_call_fastpath+0x16/0x1b ---[ end trace c66ca98a8443396e ]---
Since RHEL 6.1 External Beta has begun, and this bug remains unresolved, it has been rejected as it is not proposed as exception or blocker. Red Hat invites you to ask your support representative to propose this request, if appropriate and relevant, in the next release of Red Hat Enterprise Linux.
This should be fixed with this commit 1386be55e32a3c5d8ef4a2b243c530a7b664c02c Heres a test build for you. Please confirm that it solves the problem and I'll post it. http://brewweb.devel.redhat.com/brew/taskinfo?taskID=3304460
Hi Neil, seems this build didn't include the upstream patch bug 698062 mentioned http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=8ed030dd0aa400d18c63861c2c6deb7c38f4edde? This bug is a regression of the patch for bug 698062, I think we should include that patch first.
Yup, ok, I'll respin.
*** Bug 698062 has been marked as a duplicate of this bug. ***
http://brewweb.devel.redhat.com/brew/taskinfo?taskID=3306450 New build with both fixes included. Please test and confirm the fix. thanks!
The new build worked for me: [root@dell-per515-01 ~]# modprobe dccp_probe CCID: Activated CCID 2 (TCP-like) CCID: Activated CCID 3 (TCP-Friendly Rate Control) DCCP watch registered (port=0) [root@dell-per515-01 ~]# lsmod|grep dccp dccp 86847 0 dccp_probe 3529 0 [root@dell-per515-01 ~]# modprobe -r dccp_probe [root@dell-per515-01 ~]# lsmod|grep dccp dccp 86847 0 [root@dell-per515-01 ~]# modprobe -r dccp CCID: Deactivated CCID 2 (TCP-like) CCID: Deactivated CCID 3 (TCP-Friendly Rate Control) [root@dell-per515-01 ~]# lsmod|grep dccp [root@dell-per515-01 ~]# echo $? 1 [root@dell-per515-01 ~]# modprobe dccp CCID: Activated CCID 2 (TCP-like) CCID: Activated CCID 3 (TCP-Friendly Rate Control) [root@dell-per515-01 ~]# lsmod|grep dccp dccp 86847 0
This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release.
Patch(es) available on kernel-2.6.32-153.el6
Reproduced in kernel-2.6.32-130.el6 and verified in 2.6.32-156.el6.x86_64.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2011-1530.html
*** Bug 705934 has been marked as a duplicate of this bug. ***