http://bugzilla.novell.com/show_bug.cgi?id=624814 http://bugzilla.novell.com/show_bug.cgi?id=624814#c0 Summary: kernel BUG when rmmod blktap2 called (kotd 2010-07-20) Classification: openSUSE Product: openSUSE 11.3 Version: Final Platform: x86-64 OS/Version: openSUSE 11.3 Status: NEW Severity: Normal Priority: P5 - None Component: Xen AssignedTo: jdouglas@novell.com ReportedBy: carlos@keysoft.pt QAContact: qa@suse.de Found By: --- Blocker: --- User-Agent: Opera/9.80 (Windows NT 6.1; U; en) Presto/2.6.30 Version/10.60 [ 370.971469] ------------[ cut here ]------------ [ 370.971475] kernel BUG at /usr/src/packages/BUILD/kernel-xen-2.6.34.1/linux-2.6.34/drivers/xen/balloon/balloon.c:159! [ 370.971479] invalid opcode: 0000 [#1] SMP [ 370.971483] last sysfs file: /sys/devices/virtual/blktap2/blktap0/remove [ 370.971487] CPU 0 [ 370.971489] Modules linked in: blktap2(-) ip6t_LOG xt_tcpudp xt_pkttype xt_physdev ipt_LOG xt_limit tun usbbk gntdev netbk blkbk blkback_pagemap blktap domctl xenbus_be evtchn snd_pcm_oss snd_mixer_oss snd_seq snd_seq_device edd bridge stp llc ip6t_REJECT nf_conntrack_ipv6 ip6table_raw xt_NOTRACK ipt_REJECT xt_state iptable_raw iptable_filter ip6table_mangle nf_conntrack_netbios_ns nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 ip_tables ip6table_filter ip6_tables x_tables fuse loop raid0 dm_mod snd_hda_codec_realtek snd_hda_intel snd_hda_codec snd_hwdep i2c_i801 sg sr_mod snd_pcm r8169 floppy asus_atk0110 pcspkr snd_timer 8250_pnp 8250 serial_core iTCO_wdt iTCO_vendor_support atl1 snd soundcore snd_page_alloc ext4 jbd2 crc16 usbhid hid uhci_hcd nouveau ttm drm_kms_helper intel_agp ehci_hcd drm i2c_algo_bit sd_mod agpgart i2c_core button usbcore xenblk cdrom xennet fan thermal processor thermal_sys hwmon ata_generic pata_marvell ata_piix ahci libata scsi_mod [last unloaded: blktap2] [ 370.971607] [ 370.971611] Pid: 4778, comm: rmmod Not tainted 2.6.34.1-0.0.12.2ab1bc1-xen #1 P5K SE/P5K SE [ 370.971614] RIP: e030:[<ffffffff802de02f>] [<ffffffff802de02f>] balloon_append+0xff/0x110 [ 370.971625] RSP: e02b:ffff880074883e18 EFLAGS: 00010046 [ 370.971628] RAX: 000000000004956e RBX: 0000000000000160 RCX: 000000008bc00026 [ 370.971631] RDX: 4000000000000010 RSI: 0000000000000000 RDI: ffff88000359b010 [ 370.971635] RBP: ffff88004925e000 R08: 0000000000000000 R09: ffff880076004f00 [ 370.971637] R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000001 [ 370.971641] R13: ffff88004925e008 R14: 0000000000000001 R15: 0000000000000000 [ 370.971651] FS: 00007f87fbe9d700(0000) GS:ffff880002005000(0000) knlGS:0000000000000000 [ 370.971655] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 370.971658] CR2: 00007f87fba4e5e0 CR3: 00000000742b4000 CR4: 0000000000002660 [ 370.971662] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 370.971665] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 370.971669] Process rmmod (pid: 4778, threadinfo ffff880074882000, task ffff880073c84300) [ 370.971672] Stack: [ 370.971674] 0000000000000000 ffffffff802de4a1 ffff880076089390 0000000000000001 [ 370.971679] <0> ffff880049317ca0 ffff88004909e000 ffffffffa07b0ea0 0000000000000880 [ 370.971686] <0> 0000000000000000 0000000000000000 0000000000000001 ffffffffa07ad513 [ 370.971693] Call Trace: [ 370.971707] [<ffffffff802de4a1>] _free_empty_pages_and_pagevec+0x81/0x110 [ 370.971716] [<ffffffffa07ad513>] blktap_request_pool_free_bucket+0x23/0x50 [blktap2] [ 370.971740] [<ffffffffa07ad924>] blktap_request_pool_free+0xe4/0x120 [blktap2] [ 370.971751] [<ffffffff8007db6f>] sys_delete_module+0x18f/0x2a0 [ 370.971760] [<ffffffff80007438>] system_call_fastpath+0x16/0x1b [ 370.971769] [<00007f87fba07d77>] 0x7f87fba07d77 [ 370.971771] Code: 01 48 83 c4 08 c3 0f 0b 80 3d a5 7d 5a 00 01 74 9d be a0 00 00 00 48 c7 c7 10 c5 58 80 e8 aa 59 d6 ff c6 05 8b 7d 5a 00 01 eb 83 <0f> 0b 0f 0b 66 66 66 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 18 [ 370.971825] RIP [<ffffffff802de02f>] balloon_append+0xff/0x110 [ 370.971830] RSP <ffff880074883e18> [ 370.971835] ---[ end trace 088b955ba7896b03 ]--- Reproducible: Always Steps to Reproduce: # modprobe blktap2 # tapdisk2 -n aio:/var/lib/xen/images/suse-11.2/disk0 /dev/xen/blktap-2/tapdev0 # fdisk -lu /dev/xen/blktap-2/tapdev0 # echo 1 > /sys/class/blktap2/blktap0/remove # rmmod blktap2 After this, reboot hangs with: BUG: soft lockup - CPU#1 stuck for 61s Note: this report done using kotd 2010-07-20 to fix bug 620205. uname -a: Linux poseidon 2.6.34.1-0.0.12.2ab1bc1-xen #1 SMP 2010-07-20 14:04:17 +0200 x86_64 x86_64 x86_64 GNU/Linux Just tested with stock 11.3-xen kernel and bug also happens with it. uname -a: Linux poseidon 2.6.34-12-xen #1 SMP 2010-06-29 02:39:08 +0200 x86_64 x86_64 x86_64 GNU/Linux -- Configure bugmail: http://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug.