2.1.98 Oops with PPP

riffraff@kdi.com
Wed, 29 Apr 1998 11:19:46 -0500


Unable to handle kernel NULL pointer dereference at virtual address 0000000c
current->tss.cr3 = 00310000, <A8>r3 = 00310000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c01834db>]
EFLAGS: 00010206
eax: 00000008 ebx: c0005400 ecx: c0432000 edx: 00000000
esi: 00000000 edi: 00000005 ebp: 08063ce2 esp: c0433f5c
ds: 0018 es: 0018 ss: 0018
Process pppd (pid: 95, process nr: 26, stackpage=c0433000)
Stack: c043d000 c067a3c0 c0c1e800 000005e0 00000008 00000006 00000008 06613284
c016b7c1 c043d000 c067a3c0 08063ce0 000005e0 c067a3c0 00000000 ffffffea
c01230d6 c067a3c0 08063ce0 000005e0 c067a3d4 c0432000 bffff7e8 08063ce0
Call Trace: [<c016b7c1>] [<c01230d6>] [<c0109838>]
Code: 03 52 0c 8a 42 1c 88 44 24 1f 8b 53 78 ff 42 0c 8b 43 78 8b

Using `/etc/System.map' to map addresses to symbols.

>>EIP: c01834db <ppp_tty_read+1df/24c>

Code: c01834db <ppp_tty_read+1df/24c>
Code: c01834db <ppp_tty_read+1df/24c> 03 52 0c addl 0xc(%edx),%edx
Code: c01834de <ppp_tty_read+1e2/24c> 8a 42 1c movb 0x1c(%edx),%al
Code: c01834e1 <ppp_tty_read+1e5/24c> 88 44 24 1f movb %al,0x1f(%esp,1)
Code: c01834eb <ppp_tty_read+1ef/24c> 8b 53 78 movl 0x78(%ebx),%edx
Code: c01834ee <ppp_tty_read+1f2/24c> ff 42 0c incl 0xc(%edx)
Code: c01834f1 <ppp_tty_read+1f5/24c> 8b 43 78 movl 0x78(%ebx),%eax
Code: c01834f4 <ppp_tty_read+1f8/24c> 8b 00 movl (%eax),%eax
Code: c01834fc <ppp_tty_read+200/24c> 90 nop
Code: c01834fd <ppp_tty_read+201/24c> 90 nop
Code: c01834fe <ppp_tty_read+202/24c> 90 nop

I am using pppd 2.3.4, if that makes a difference...

-- 
Shawn McHorse      |        The Musical World of Rocky Horror
riffraff@kdi.com   |   (Obscure Distorted Instruments and Imagery)
Austin RHPS Cast   |         <http://www.kdi.com/~riffraff/>

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu