Bug 2744 - unload "button" module -> "kernel BUG"
Summary: unload "button" module -> "kernel BUG"
Status: CLOSED CODE_FIX
Alias: None
Product: ACPI
Classification: Unclassified
Component: Other (show other bugs)
Hardware: i386 Linux
: P2 high
Assignee: Wang, Zhenyu Z
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2004-05-21 06:12 UTC by David Eriksson
Modified: 2004-11-04 13:11 UTC (History)
1 user (show)

See Also:
Kernel Version: 2.6.5
Subsystem:
Regression: ---
Bisected commit-id:


Attachments

Description David Eriksson 2004-05-21 06:12:34 UTC
Distribution: Fedora Core 2
Hardware Environment: IBM ThinkPad T30 (See
http://www.2good.nu/thinkpad_t30_fc2/ for details.)
Software Environment: kernel-2.6.5-1.358
Problem Description:

I was having the same problem as http://bugzilla.kernel.org/show_bug.cgi?id=2643
and as hinted in that bug there are problems when unloading the "button" module:

May 21 14:56:51 zion kernel: ------------[ cut here ]------------
May 21 14:56:51 zion kernel: kernel BUG at fs/proc/generic.c:685!
May 21 14:56:51 zion kernel: invalid operand: 0000 [#1]
May 21 14:56:51 zion kernel: CPU:    0
May 21 14:56:51 zion kernel: EIP:    0060:[<02167496>]    Not tainted
May 21 14:56:51 zion kernel: EFLAGS: 00010202   (2.6.5-1.358)
May 21 14:56:51 zion kernel: EIP is at remove_proc_entry+0x92/0xe4
May 21 14:56:51 zion kernel: eax: 21f30284   ebx: 228505f5   ecx: 00000000  
edx: 21f19590
May 21 14:56:51 zion kernel: esi: 21f195c4   edi: 208b2190   ebp: 00000006  
esp: 0acabf50
May 21 14:56:51 zion kernel: ds: 007b   es: 007b   ss: 0068
May 21 14:56:51 zion kernel: Process rmmod (pid: 4587, threadinfo=0acab000
task=1007f6b0)
May 21 14:56:51 zion kernel: Stack: 21f19590 228505f5 22850f80 022c997c 00000000
0acab000 228504b2 02126b19
May 21 14:56:51 zion kernel:        00000000 74747562 1f006e6f 00000246 00000000
1f283d00 f7034000 1f283d00
May 21 14:56:51 zion kernel:        02137c1f 0aeb5444 f7035000 02137f64 0911e744
1f283d00 0acabfc0 00000004
May 21 14:56:51 zion kernel: Call Trace:
May 21 14:56:51 zion kernel:  [<228504b2>] acpi_button_exit+0x1a/0x1b [button]
May 21 14:56:51 zion kernel:  [<02126b19>] sys_delete_module+0x122/0x162
May 21 14:56:51 zion kernel:  [<02137c1f>] unmap_vma_list+0xe/0x17
May 21 14:56:51 zion kernel:  [<02137f64>] do_munmap+0xfe/0x108
May 21 14:56:51 zion kernel:  [<02114408>] do_page_fault+0x0/0x446
May 21 14:56:51 zion kernel:
May 21 14:56:51 zion kernel: Code: 0f 0b ad 02 8d 5e 29 02 8b 47 44 85 c0 75 09
89 f8 e8 21 


Steps to reproduce:

Running this command as root:

rmmod button
Comment 1 David Eriksson 2004-05-21 08:05:31 UTC
Slightly different backtrace with kernel-2.6.6-1.374 due to the "fixed buttons":

May 21 16:58:32 zion kernel: ------------[ cut here ]------------
May 21 16:58:32 zion kernel: kernel BUG at fs/proc/generic.c:685!
May 21 16:58:32 zion kernel: invalid operand: 0000 [#1]
May 21 16:58:32 zion kernel: Modules linked in: snd_mixer_oss snd_intel8x0
snd_ac97_codec snd_pcm snd_timer snd_page_alloc gameport snd_mpu401_uart
snd_rawmidi snd_seq_device snd soundcore parport_pc lp parport autofs4 rfcomm
l2cap bluetooth ds yenta_socket pcmcia_core sunrpc orinoco_pci orinoco hermes
eepro100 mii microcode sd_mod scsi_mod dm_mod uhci_hcd button battery asus_acpi
ac ipv6 ext3 jbd
May 21 16:58:32 zion kernel: CPU:    0
May 21 16:58:32 zion kernel: EIP:    0060:[<0219c2e3>]    Not tainted
May 21 16:58:32 zion kernel: EFLAGS: 00010202   (2.6.6-1.374)
May 21 16:58:32 zion kernel: EIP is at remove_proc_entry+0x92/0xe3
May 21 16:58:32 zion kernel: eax: 00000001   ebx: 2284b629   ecx: 00000000  
edx: 213e81a4
May 21 16:58:32 zion kernel: esi: 208070b8   edi: 20807230   ebp: 00000005  
esp: 02782f3c
May 21 16:58:32 zion kernel: ds: 007b   es: 007b   ss: 0068
May 21 16:58:32 zion kernel: Process rmmod (pid: 3922, threadinfo=02782000
task=0f0fc630)
May 21 16:58:32 zion kernel: Stack: 213e81a4 2284b629 21f1b450 21f1b450 00000000
02782000 2284b1f8 20cbf484
May 21 16:58:32 zion kernel:        2284b4eb 2284c100 02334fc0 2284b50b 02136329
00000000 74747562 02006e6f
May 21 16:58:32 zion kernel:        00000246 00000000 0ec43648 0edd5b94 f7011000
02150e81 0ec43648 f7012000
May 21 16:58:32 zion kernel: Call Trace:
May 21 16:58:32 zion kernel:  [<2284b1f8>] acpi_button_remove_fs+0x4d/0x5b [button]
May 21 16:58:32 zion kernel:  [<2284b4eb>] acpi_button_remove+0x5e/0x6b [button]
May 21 16:58:32 zion kernel:  [<2284b50b>] acpi_button_exit+0x13/0x41 [button]
May 21 16:58:32 zion kernel:  [<02136329>] sys_delete_module+0x122/0x162
May 21 16:58:32 zion kernel:  [<02150e81>] unmap_vma_list+0xe/0x17
May 21 16:58:32 zion kernel:  [<02151395>] do_munmap+0x1dc/0x1e6
May 21 16:58:32 zion kernel:  [<021190e8>] do_page_fault+0x0/0x446
May 21 16:58:32 zion kernel:
May 21 16:58:32 zion kernel: Code: 0f 0b ad 02 1d e4 2f 02 8b 47 44 85 c0 75 09
89 f8 e8 21 ff
Comment 2 Shaohua 2004-05-23 17:50:18 UTC
did you check latest ACPI tree, we have an update for this issue. Thanks.
Comment 3 Wang, Zhenyu Z 2004-05-26 01:04:19 UTC
Pls. apply the updated acpi patch at
http://www.kernel.org/pub/linux/kernel/people/lenb/acpi/patches/release/2.6.6/

thanks,
-zhen
Comment 4 Wang, Zhenyu Z 2004-07-06 01:44:21 UTC
Upstream linux kernel contains patch. -- close

Note You need to log in before you can comment on or make changes to this bug.