RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 702183 - kernel panic when remove dccp_probe module
Summary: kernel panic when remove dccp_probe module
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel
Version: 6.0
Hardware: x86_64
OS: Linux
unspecified
medium
Target Milestone: rc
: ---
Assignee: Neil Horman
QA Contact: Petr Beňas
URL:
Whiteboard:
: 698062 705934 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-05-05 01:15 UTC by Dayong Tian
Modified: 2015-01-04 23:00 UTC (History)
6 users (show)

Fixed In Version: kernel-2.6.32-153.el6
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2011-12-06 13:22:04 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2011:1530 0 normal SHIPPED_LIVE Moderate: Red Hat Enterprise Linux 6 kernel security, bug fix and enhancement update 2011-12-06 01:45:35 UTC

Description Dayong Tian 2011-05-05 01:15:58 UTC
Description of problem:
Compile the kernel with the upstream patch 
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=8ed030dd0aa400d18c63861c2c6deb7c38f4edde, then we are able to load the dccp module, but with the patch kernel panic appeared when load/remove dccp_probe module.

Version-Release number of selected component (if applicable):
2.6.32-71.24.1.el6

How reproducible:
always

Steps to Reproduce:
1. Compile the kernel with the upstream patch, then dccp module can be loaded.
2. load dccp_probe module.
3. remove dccp_probe module
  
Actual results:

kernel panic:

[root@amd-dinar-04 ~]# lsmod|grep dccp
dccp_probe              3529  0 
dccp                   86846  0 
[root@amd-dinar-04 ~]# modprobe -r dccp_probe
general protection fault: 0000 [#1] SMP 
last sysfs file: /sys/module/dccp_probe/refcnt
CPU 6 
Modules linked in: dccp_probe(-) ip6table_filter ip6_tables ebtable_nat ebtables xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT bridge stp llc autofs4 lockd sunrpc cpufreq_ondemand powernow_k8 freq_table ipv6 xt_physdev iptable_filter ip_tables dm_mirror dm_region_hash dm_log kvm_amd kvm serio_raw edac_core edac_mce_amd sg i2c_piix4 bnx2 ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif ata_generic pata_acpi pata_atiixp ahci radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core dm_mod [last unloaded: dccp]

Modules linked in: dccp_probe(-) ip6table_filter ip6_tables ebtable_nat ebtables xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT bridge stp llc autofs4 lockd sunrpc cpufreq_ondemand powernow_k8 freq_table ipv6 xt_physdev iptable_filter ip_tables dm_mirror dm_region_hash dm_log kvm_amd kvm serio_raw edac_core edac_mce_amd sg i2c_piix4 bnx2 ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif ata_generic pata_acpi pata_atiixp ahci radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core dm_mod [last unloaded: dccp]
Pid: 3005, comm: modprobe Not tainted 2.6.32 #1 Dinar
RIP: 0010:[<ffffffff81158709>]  [<ffffffff81158709>] kfree+0x79/0x320
RSP: 0018:ffff8801f532fe48  EFLAGS: 00010003
RAX: 017a90dabe5870d0 RBX: 6c2f343662696c2f RCX: 0000000000000017
RDX: ffffea0000000000 RSI: 0000000000000018 RDI: 6c2f343662696c2f
RBP: ffff8801f532fea8 R08: ffffffff818a39e0 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffffffff810923a9
R13: 0000000000000202 R14: 0000000000000000 R15: 000000000040f4a0
FS:  00007ff22ee2a700(0000) GS:ffff880082200000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00000000006d55a4 CR3: 000000012e2df000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process modprobe (pid: 3005, threadinfo ffff8801f532e000, task ffff8801efb06040)
Stack:
 ffff8801f532fe78 ffff8801f532fe98 ffffffffa0448880 00000000fffffff0
<0> 0000000000000000 000000000040f4a0 ffff8801f532fe88 ffff880135406b40
<0> ffffffffa0448880 00000000fffffff0 0000000000000000 000000000040f4a0
Call Trace:
 [<ffffffff810923a9>] kfifo_free+0x19/0x30
 [<ffffffffa044855d>] dccpprobe_exit+0x15/0x36 [dccp_probe]
 [<ffffffff810ac906>] sys_delete_module+0x1a6/0x280
 [<ffffffff810d4372>] ? audit_syscall_entry+0x272/0x2a0
 [<ffffffff81013172>] system_call_fastpath+0x16/0x1b
Code: 66 66 90 48 89 df e8 a7 28 ef ff 48 c1 e8 0c 48 8d 14 c5 00 00 00 00 48 c1 e0 06 48 29 d0 48 ba 00 00 00 00 00 ea ff ff 48 01 d0 <48> 8b 10 66 85 d2 0f 88 1d 02 00 00 84 d2 0f 89 0d 02 00 00 4c 
RIP  [<ffffffff81158709>] kfree+0x79/0x320
 RSP <ffff8801f532fe48>

Message from syslogd@amd-dinar-04 at May  4 04:09:12 ...
 kernel:general protection fault: 0000 [#1] SMP 

Message from syslogd@amd-dinar-04 at May  4 04:09:12 ...
 kernel:last sysfs file: /sys/module/dccp_probe/refcnt

Message from syslogd@amd-dinar-04 at May  4 04:09:12 ...
 kernel:Stack:

Me---[ end trace c66ca98a8443396d ]---
Kernel panic - not syncing: Fatal exception
Pid: 3005, comm: modprobe Tainted: G      D    ----------------  2.6.32 #1
Call Trace:
 [<ffffffff814c8b54>] panic+0x78/0x137
 [<ffffffff814ccc24>] oops_end+0xe4/0x100
 [<ffffffff8101733b>] die+0x5b/0x90
 [<ffffffff814cc772>] do_general_protection+0x152/0x160
 [<ffffffff810923a9>] ? kfifo_free+0x19/0x30
 [<ffffffff814cbf45>] general_protection+0x25/0x30
 [<ffffffff810923a9>] ? kfifo_free+0x19/0x30
 [<ffffffff81158709>] ? kfree+0x79/0x320
 [<ffffffff811586e9>] ? kfree+0x59/0x320
 [<ffffffff810923a9>] kfifo_free+0x19/0x30
 [<ffffffffa044855d>] dccpprobe_exit+0x15/0x36 [dccp_probe]
 [<ffffffff810ac906>] sys_delete_module+0x1a6/0x280
 [<ffffffff810d4372>] ? audit_syscall_entry+0x272/0x2a0
 [<ffffffff81013172>] system_call_fastpath+0x16/0x1b
ssage from syslopanic occurred, switching back to text console
------------[ cut here ]------------
WARNING: at arch/x86/kernel/smp.c:117 native_smp_send_reschedule+0x5c/0x60() (Tainted: G      D    ---------------- )
Hardware name: Dinar
Modules linked in: dccp_probe(-) ip6table_filter ip6_tables ebtable_nat ebtables xt_CHECKSUM iptable_mangle ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT bridge stp llc autofs4 lockd sunrpc cpufreq_ondemand powernow_k8 freq_table ipv6 xt_physdev iptable_filter ip_tables dm_mirror dm_region_hash dm_log kvm_amd kvm serio_raw edac_core edac_mce_amd sg i2c_piix4 bnx2 ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif ata_generic pata_acpi pata_atiixp ahci radeon ttm drm_kms_helper drm i2c_algo_bit i2c_core dm_mod [last unloaded: dccp]
Pid: 3005, comm: modprobe Tainted: G      D    ----------------  2.6.32 #1
Call Trace:
 <IRQ>  [<ffffffff8106b947>] warn_slowpath_common+0x87/0xc0
 [<ffffffff8106b99a>] warn_slowpath_null+0x1a/0x20
 [<ffffffff8102ea7c>] native_smp_send_reschedule+0x5c/0x60
 [<ffffffff810508e8>] resched_task+0x68/0x80
 [<ffffffff81050995>] check_preempt_curr_idle+0x15/0x20
 [<ffffffff8105c44f>] try_to_wake_up+0x24f/0x380
 [<ffffffff8105c592>] default_wake_function+0x12/0x20
 [<ffffffff81091eb6>] autoremove_wake_function+0x16/0x40
 [<ffffffff810500e9>] __wake_up_common+0x59/0x90
 [<ffffffff810563e8>] __wake_up+0x48/0x70
 [<ffffffff810a0e90>] ? tick_sched_timer+0x0/0xc0
 [<ffffffff8106c1c7>] printk_tick+0x47/0x50
 [<ffffffff8107d96d>] update_process_times+0x4d/0x70
 [<ffffffff810a0ef6>] tick_sched_timer+0x66/0xc0
 [<ffffffff8109584e>] __run_hrtimer+0x8e/0x1a0
 [<ffffffff8101a4f9>] ? read_tsc+0x9/0x20
 [<ffffffff81095bf6>] hrtimer_interrupt+0xe6/0x250
 [<ffffffff814d0a2c>] smp_apic_timer_interrupt+0x6c/0x9c
 [<ffffffff81013c93>] apic_timer_interrupt+0x13/0x20
 <EOI>  [<ffffffff814c8bed>] ? panic+0x111/0x137
 [<ffffffff814c8b7d>] ? panic+0xa1/0x137
 [<ffffffff814ccc24>] oops_end+0xe4/0x100
 [<ffffffff8101733b>] die+0x5b/0x90
 [<ffffffff814cc772>] do_general_protection+0x152/0x160
 [<ffffffff810923a9>] ? kfifo_free+0x19/0x30
 [<ffffffff814cbf45>] general_protection+0x25/0x30
 [<ffffffff810923a9>] ? kfifo_free+0x19/0x30
 [<ffffffff81158709>] ? kfree+0x79/0x320
 [<ffffffff811586e9>] ? kfree+0x59/0x320
 [<ffffffff810923a9>] kfifo_free+0x19/0x30
 [<ffffffffa044855d>] dccpprobe_exit+0x15/0x36 [dccp_probe]
 [<ffffffff810ac906>] sys_delete_module+0x1a6/0x280
 [<ffffffff810d4372>] ? audit_syscall_entry+0x272/0x2a0
 [<ffffffff81013172>] system_call_fastpath+0x16/0x1b
---[ end trace c66ca98a8443396e ]---

Comment 2 RHEL Program Management 2011-05-05 06:01:53 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 3 Neil Horman 2011-05-05 18:07:58 UTC
This should be fixed with this commit 1386be55e32a3c5d8ef4a2b243c530a7b664c02c


Heres a test build for you.  Please confirm that it solves the problem and I'll post it.

http://brewweb.devel.redhat.com/brew/taskinfo?taskID=3304460

Comment 4 Dayong Tian 2011-05-06 03:37:40 UTC
Hi Neil, seems this build didn't include the upstream patch bug 698062 mentioned http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=8ed030dd0aa400d18c63861c2c6deb7c38f4edde?
This bug is a regression of the patch for bug 698062, I think we should include that patch first.

Comment 5 Neil Horman 2011-05-06 10:32:51 UTC
Yup, ok, I'll respin.

Comment 6 Neil Horman 2011-05-06 12:36:04 UTC
*** Bug 698062 has been marked as a duplicate of this bug. ***

Comment 7 Neil Horman 2011-05-06 12:39:46 UTC
http://brewweb.devel.redhat.com/brew/taskinfo?taskID=3306450

New build with both fixes included.  Please test and confirm the fix.  thanks!

Comment 8 Dayong Tian 2011-05-09 01:38:47 UTC
The new build worked for me:

[root@dell-per515-01 ~]# modprobe dccp_probe
CCID: Activated CCID 2 (TCP-like)
CCID: Activated CCID 3 (TCP-Friendly Rate Control)
DCCP watch registered (port=0)
[root@dell-per515-01 ~]# lsmod|grep dccp
dccp                   86847  0 
dccp_probe              3529  0 
[root@dell-per515-01 ~]# modprobe -r dccp_probe
[root@dell-per515-01 ~]# lsmod|grep dccp
dccp                   86847  0 
[root@dell-per515-01 ~]# modprobe -r dccp
CCID: Deactivated CCID 2 (TCP-like)
CCID: Deactivated CCID 3 (TCP-Friendly Rate Control)
[root@dell-per515-01 ~]# lsmod|grep dccp
[root@dell-per515-01 ~]# echo $?
1
[root@dell-per515-01 ~]# modprobe dccp
CCID: Activated CCID 2 (TCP-like)
CCID: Activated CCID 3 (TCP-Friendly Rate Control)
[root@dell-per515-01 ~]# lsmod|grep dccp
dccp                   86847  0

Comment 9 RHEL Program Management 2011-05-13 15:22:35 UTC
This request was evaluated by Red Hat Product Management for inclusion
in a Red Hat Enterprise Linux maintenance release. Product Management has 
requested further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed 
products. This request is not yet committed for inclusion in an Update release.

Comment 10 Aristeu Rozanski 2011-05-25 18:57:02 UTC
Patch(es) available on kernel-2.6.32-153.el6

Comment 16 Petr Beňas 2011-07-25 07:29:11 UTC
Reproduced in kernel-2.6.32-130.el6 and verified in 2.6.32-156.el6.x86_64.

Comment 17 errata-xmlrpc 2011-12-06 13:22:04 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHSA-2011-1530.html

Comment 18 Thomas Graf 2013-02-27 13:28:28 UTC
*** Bug 705934 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.