[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

kernel crash with tc

I was testing diffserv on a 2.2.10 kernel (AMD K6) that had been patched
with Alan Cox's patch-2.2.10-ac10. I get a consistent oops and crash
after running the Edge32-ca-u32 example script that ships with diffserv
6. The crash happens upon issuing the following command:

tc qdisc del dev eth0 root

Version 6 of diffserv
Version 063099 of tc

Obviously this doesn't happen with 2.2.10 kernels that haven't been
patched with ac patches, so that's what I'm using now. But something
is going on, I figured someone might be interested. Following is the 
output from ksymoops. 

Let me know if you need more info. 


No modules in ksyms, skipping objects
Unable to handle kernel paging request at virtual address 5a5a5a6a
current->tss.cr3 = 037d4000, %cr3 = 037d4000
*pde = 00000000
Oops: 0000
CPU:    0
EIP:    0010:[<c016b9c3>]
EFLAGS: 00010206
eax: 5a5a5a5e   ebx: 00000002   ecx: 5a5a5a6a   edx: 5a5a5a5a
esi: 5a5a5a5a   edi: c39de7e0   ebp: 5a5a5a5e   esp: c37c3c50
ds: 0018   es: 0018   ss: 0018
Process tc (pid: 838, process nr: 23, stackpage=c37c3000)
Stack: c37c3cb4 c39de7e0 c39de7e0 00000040 5a5a5a5e c016bf07 c397acc0 5a5a5a5e 
       c016becf c397acc0 5a5a5a5e c37c3cb4 c39de7e0 c397acc0 c3ccae60 ffffffff 
       c022eb2e c016bf47 c397acc0 c37c3cb4 c01e56a0 c397acc0 c39de7e0 c3d6da88 
Call Trace: [<c016bf07>] [<c016becf>] [<c016bf47>] [<c01e56a0>] [<c016bef8>] [<c016b55e>] [<c016193d>] 
       [<c01623ab>] [<c0160f45>] [<c018eaf1>] [<c018e29d>] [<c018e735>] [<c018e588>] [<c0158d58>] [<c018e588>] 
       [<c0159e63>] [<c015a0c1>] [<c0159982>] [<c011c12a>] [<c015a2e8>] [<c0107b71>] [<c0107a6c>] 
Code: 8b 46 10 89 01 31 db 8b 7c 24 18 87 5f 04 e8 4a e1 f9 ff 85 

>>EIP: c016b9c3 <tcf_police_dump+62f3/c878>
Trace: c016bf07 <tcf_police_dump+6837/c878>
Trace: c016becf <tcf_police_dump+67ff/c878>
Trace: c016bf47 <tcf_police_dump+6877/c878>
Trace: c01e56a0 <sprintf+c918/2768c>
Trace: c016bef8 <tcf_police_dump+6828/c878>
Trace: c016b55e <tcf_police_dump+5e8e/c878>
Trace: c016193d <__rta_fill+235/368>
Trace: c01623ab <eth_type_trans+3f/168>
Trace: c0159e63 <sock_create+6bb/1204>
Code:  c016b9c3 <tcf_police_dump+62f3/c878>    00000000 <_EIP>: <===
Code:  c016b9c3 <tcf_police_dump+62f3/c878>       0:    8b 46 10        movl   0x10(%esi),%eax <===
Code:  c016b9c6 <tcf_police_dump+62f6/c878>       3:    89 01           movl   %eax,(%ecx)
Code:  c016b9c8 <tcf_police_dump+62f8/c878>       5:    31 db           xorl   %ebx,%ebx
Code:  c016b9ca <tcf_police_dump+62fa/c878>       7:    8b 7c 24 18     movl   0x18(%esp,1),%edi
Code:  c016b9ce <tcf_police_dump+62fe/c878>       b:    87 5f 04        xchgl  %ebx,0x4(%edi)
Code:  c016b9d1 <tcf_police_dump+6301/c878>       e:    e8 4a e1 f9 ff  call    c0109b20 <enable_irq+dc/17c>
Code:  c016b9d6 <tcf_police_dump+6306/c878>      13:    85 00           testl  %eax,(%eax)

Dave Jorgenson ----- davej@inttek.net -