Re: 2.0.32 Oopses in ppp

Tomasz Motylewski (motyl@stan.chemie.unibas.ch)
Sat, 22 Nov 1997 01:03:32 +0100 (MET)


Well, both occured on ppp.c:1817 in GETC macro.

while (indx-- > 0) {
GETC (c);
put_user (c, buf);
++buf;
}
[...]
#define GETC(c) \
{ \
c = buf_base (ppp->ubuf) [ppp->ubuf->tail++]; \
ppp->ubuf->tail &= ppp->ubuf->size; \
}

The changes to ppp.c from 2.0.29 to 2.0.32 were not dramatic,
IFF_SOFTHEADERS flag support added, fileversion changed from 960528 to
970703, some manipulations with PPP_HARD_HDR_LEN.

--
Tomasz Motylewski

On Fri, 21 Nov 1997, Daniel Ryde wrote:

> Here is two opses that I found in the logs on two separate machines > running kernel 2.0.32. These machines mostly run pppd. The opses did not > freeze the machines, but they were probably swapping due to the kernel > memory leak I've reported many times now. I can't find any way of > reproducing these opses. [...] > Using `/boot/System.map-2.0.32' to map addresses to symbols. > > >>EIP: 186f10 <ppp_tty_read+2b0/304> > Trace: 16b74d <tty_read+9d/bc> > Trace: 1220f8 <sys_read+c0/e8> > Trace: 10a645 <system_call+55/80> > > Code: 186f10 <ppp_tty_read+2b0/304> movb 0x20(%edx),%dl > Code: 186f13 <ppp_tty_read+2b3/304> movb %dl,0x14(%esp,1) [...]