[Bugme-new] [Bug 4167] New: kernel BUG at net/core/dev.c:3109
bugme-daemon at osdl.org
bugme-daemon at osdl.org
Fri Feb 4 14:03:23 PST 2005
http://bugme.osdl.org/show_bug.cgi?id=4167
Summary: kernel BUG at net/core/dev.c:3109
Kernel Version: 2.6.5-7.111.19-smp
Status: NEW
Severity: blocking
Owner: acme at conectiva.com.br
Submitter: jdouglas at kronos.com
Distribution: SuSE Pro 9.1
Hardware Environment: Dual PIII (Coppermines) with 2 Gigs of memory.
Software Environment: PoPToP 1.2.1 running with ppp-2.4.3-0.cvs_20040527
Problem Description: After an uspecified amount of time (random), pptpd locks
up due to "net/core/dev.c:3109".
Steps to reproduce: Setup up a PoPToP server with some 300+ connections
constantly being dropped and reconnected. The result will be:
------------[ cut here ]------------
kernel BUG at net/core/dev.c:3109!
invalid operand: 0000 [#1]
SMP
CPU: 1
EIP: 0060:[<c02af601>] Tainted: P
EFLAGS: 00010297 (2.6.5-7.111.19-smp)
EIP is at free_netdev+0x31/0x40
eax: f73f6000 ebx: ee425a00 ecx: cdfe1e00 edx: 00000003
esi: f73f6000 edi: f91d199c ebp: f70248d0 esp: ed4c9f54
ds: 007b es: 007b ss: 0068
Process pppd (pid: 16197, threadinfo=ed4c8000 task=ee8801a0)
Stack: f91ca3d1 ee425a00 f7d64500 f7725ad0 f91cab65 ec41a480 c016b3e6 ec41a480
00000000 ec36e680 ed4c9fa0 c01669ff 00000000 ec36e680 00000009 00000000
c0166b3d ec41a480 00000000 00000000 00000000 00000009 c012b2b6 00000009
Call Trace:
[<f91ca3d1>] ppp_shutdown_interface+0x81/0xd0 [ppp_generic]
[<f91cab65>] ppp_release+0x45/0x60 [ppp_generic]
[<c016b3e6>] __fput+0x106/0x150
[<c01669ff>] filp_close+0x4f/0x90
[<c0166b3d>] sys_close+0xfd/0x110
[<c012b2b6>] sys_time+0x16/0x50
[<c01091e9>] sysenter_past_esp+0x52/0x79
Code: 0f 0b 25 0c 9e 3c 36 c0 eb d4 90 8d 74 26 00 55 57 56 53 83
or
------------[ cut here ]------------
kernel BUG at net/core/dev.c:3109!
invalid operand: 0000 [#1]
SMP
CPU: 1
EIP: 0060:[<c02af601>] Tainted: P
EFLAGS: 00010297 (2.6.5-7.111.5-smp)
EIP is at free_netdev+0x31/0x40
eax: edb44c00 ebx: ecbf9000 ecx: cdfe1e00 edx: 00000003
esi: edb44c00 edi: f91d199c ebp: f700ec60 esp: eebcdf54
ds: 007b es: 007b ss: 0068
Process pppd (pid: 19764, threadinfo=eebcc000 task=ef4eadc0)
Stack: f91ca3d1 ecbf9000 f7fe1f40 c2201ad0 f91cab65 eddb3d80 c016b426 eddb3d80
00000000 ec671700 eebcdfa0 c0166a3f 00000000 ec671700 00000009 00000000
c0166b7d eddb3d80 00000000 00000000 00000000 00000009 00000007 00000009
Call Trace:
[<f91ca3d1>] ppp_shutdown_interface+0x81/0xd0 [ppp_generic]
[<f91cab65>] ppp_release+0x45/0x60 [ppp_generic]
[<c016b426>] __fput+0x106/0x150
[<c0166a3f>] filp_close+0x4f/0x90
[<c0166b7d>] sys_close+0xfd/0x110
[<c01091e9>] sysenter_past_esp+0x52/0x79
Code: 0f 0b 25 0c 1a 3c 36 c0 eb d4 90 8d 74 26 00 55 57 56 53 83
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.
More information about the Bugme-new
mailing list