Bug#347711: kernel: linux-image-2.6.15-1-amd64-generic panics when pppd is run

2006-01-27 Thread Brendon Higgins
I wrote (Saturday 28 January 2006 3:55 pm):
 Hi!

Sorry, KMail giving me crap, links are:
http://bugzilla.kernel.org/show_bug.cgi?id=5857
http://lkml.org/lkml/2006/1/15/113
http://bugzilla.kernel.org/attachment.cgi?id=7086action=view

Peace,
Brendon


pgp1YKFpcLmI4.pgp
Description: PGP signature


Bug#347711: kernel: linux-image-2.6.15-1-amd64-generic panics when pppd is run

2006-01-12 Thread Richard Frith-Macdonald
Package: kernel
Severity: normal


When I start pppd to tunnel over ssh for a vpn, the kernel panics and
the pppd process is killed.

Partial dmesg output follows ...


CSLIP: code copyright 1989 Regents of the University of California
PPP generic driver version 2.4.2
skb_over_panic: text:88205ce1 len:1 put:1 head:810050012800 
data:810150012800 tail:810150012801 end:810050012e00 dev:NULL
--- [cut here ] - [please bite here ] -
Kernel BUG at net/core/skbuff.c:94
invalid operand:  [1] 
CPU 0 
Modules linked in: ppp_async crc_ccitt ppp_generic slhc videodev ipv6 
parport_pc parport floppy pcspkr tg3 i2c_i801 i2c_core piix generic hw_random 
ehci_hcd uhci_hcd snd_hda_intel snd_hda_codec snd_pcm_oss snd_mixer_oss snd_pcm 
snd_timer snd soundcore snd_page_alloc shpchp pci_hotplug tsdev psmouse 
ide_generic ide_disk ide_cd cdrom ide_core jfs raid1 md_mod sd_mod ahci libata 
scsi_mod evdev
Pid: 5269, comm: ssh Not tainted 2.6.15-1-amd64-generic #1
RIP: 0010:[8024f333] 8024f333{skb_over_panic+75}
RSP: 0018:8100568fdd98  EFLAGS: 00010096
RAX: 009a RBX: 810150012800 RCX: 80314f90
RDX: 80314f90 RSI: 0001 RDI: 81005d974750
RBP: 81005828e800 R08:  R09: 81005dbe1cc0
R10: 0010 R11: 0010 R12: 
R13: 810046132c01 R14: 0001 R15: 002c
FS:  2bf13d10() GS:803c8800() knlGS:
CS:  0010 DS:  ES:  CR0: 8005003b
CR2: 7fc2aa28 CR3: 4e87b000 CR4: 06e0
Process ssh (pid: 5269, threadinfo 8100568fc000, task 810052f20990)
Stack: 810150012801 810050012e00 802d5e94 810150012801 
   810150012801 88205ce9 0040 810045d71000 
   0202 002d 
Call Trace:88205ce9{:ppp_async:ppp_asynctty_receive+496}
   8021983b{pty_write+68} 802176bc{write_chan+698}
   80129f0d{default_wake_function+0} 
801751a1{__pollwait+0}
   802143c3{tty_write+399} 80217402{write_chan+0}
   80165189{vfs_write+203} 80165a67{sys_write+69}
   8010e4ba{system_call+126} 

Code: 0f 0b 68 14 2f 2e 80 c2 5e 00 48 83 c4 28 c3 51 49 89 d2 48 
RIP 8024f333{skb_over_panic+75} RSP 8100568fdd98
 1Unable to handle kernel paging request at 81005dac2100 RIP: 
[81005dac2100]
PGD 8063 PUD a063 PMD 80005da001e3 PTE 10247c894804c783
Oops: 0011 [2] 
CPU 0 
Modules linked in: ppp_async crc_ccitt ppp_generic slhc videodev ipv6 
parport_pc parport floppy pcspkr tg3 i2c_i801 i2c_core piix generic hw_random 
ehci_hcd uhci_hcd snd_hda_intel snd_hda_codec snd_pcm_oss snd_mixer_oss snd_pcm 
snd_timer snd soundcore snd_page_alloc shpchp pci_hotplug tsdev psmouse 
ide_generic ide_disk ide_cd cdrom ide_core jfs raid1 md_mod sd_mod ahci libata 
scsi_mod evdev
Pid: 5268, comm: su Not tainted 2.6.15-1-amd64-generic #1
RIP: 0010:[81005dac2100] [81005dac2100]
RSP: 0018:81004dbb1d50  EFLAGS: 00010006
RAX: 8100568fde70 RBX: 568fde78 RCX: 
RDX:  RSI: 0001 RDI: 8100568fde58
RBP: 81004dbb1d88 R08:  R09: 0010
R10: 81005f78b8e8 R11: 81005f78b8e8 R12: 810052f20990
R13: 0001 R14: 8100536ee9e0 R15: 
FS:  () GS:803c8800() knlGS:
CS:  0010 DS:  ES:  CR0: 8005003b
CR2: 81005dac2100 CR3: 4dba3000 CR4: 06e0
Process su (pid: 5268, threadinfo 81004dbb, task 81005d8258f0)
Stack: 80129544 0001 0246 81005db5dbe0 
   0005 810052f4e3c0 0001 81004dbb1da8 
   80129580 81005f78b8e8 
Call Trace:80129544{__wake_up_common+57} 
80129580{__wake_up+20}
   80219984{pty_close+111} 8021609e{release_dev+538}
   8015691a{free_pgd_range+824} 802168cd{tty_release+9}
   80165e71{__fput+155} 80163913{filp_close+89}
   8012db08{put_files_struct+106} 8012e8da{do_exit+583}
   8012f239{sys_exit_group+0} 8010e4ba{system_call+126}
   

Code: 00 00 00 00 00 00 00 00 00 00 76 5d 00 81 ff ff 07 00 00 00 
RIP [81005dac2100] RSP 81004dbb1d50
CR2: 81005dac2100
 1Fixing recursive fault but reboot is needed!

-- System Information:
Debian Release: testing/unstable
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'testing'), (500, 'stable')
Architecture: amd64 (x86_64)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-amd64-generic
Locale: LANG=en_GB, LC_CTYPE=en_GB (charmap=ISO-8859-1)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL