Are you getting a kernel oops too?
I think no.
If not, please get a stack trace from pppd ("gdb pppd" "run call provider").
I'm not sure, I generated core by "pppd call provider" and then gdb /usr/sbin/pppd core
(gdb) bt #0 0x08074fd2 in tdb_store () #1 0x08051b80 in unlock_db () #2 0x08061a11 in int_option () #3 0x08060b3b in options_from_list () #4 0x080601ef in parse_args () #5 0x0804ee59 in main () (gdb)
Is it OK? If not please write exect commands for me, I'm not a programmer and never dealt with gdb.
Regards, Alex
-- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]