Follow up: PPP bug

Cristian Gafton (gafton@cccis.sfos.ro)
Wed, 19 Jul 1995 21:30:26 +0300 (EET DST)


Regarding the bug in the PPP code in the kernel I've posted: it
looks like the first fault after a reboot is always an "Unable to handle
kernel NULL pointer dereference at virtual address c0000000". After that,
if the PPP connection is reestablished, we will get only General
protection and at a different address. So it seems that the relevant bug
is only the first, which won't leave the system in a sane state from the
PPP code point of view.

Cristian Gafton

Again, the fault after a fresh reboot in 1.2.11 and ppp-2.1.2d:

============================================================================
Unable to handle kernel NULL pointer dereference at virtual address c0000000
current->tss.cr3 = 0084c000, Vr3 = 0084c000
*pde = 00102067
*pte = 00000027
Oops: 0002
EIP: 0010:0018e897
EFLAGS: 00010246
eax: 00000000 ebx: 001cabd0 ecx: 000000ff edx: 00000007
esi: 0000000f edi: 00010b41 ebp: 00000010 esp: 00bdef44
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process pppd (pid: 2759, process nr: 35, stackpage=00bde000)
Stack: 00836000 000770e0 00436cf0 00010b40 001337ff 00174f34 00836000 00436cf0
00010b40 00000010 00436cf0 000770e0 00000010 00126118 000770e0 00436cf0
00010b40 00000010 00207000 00010b40 00010910 bffffc14 0011ddb2 00000000
Call Trace: 001337ff 00174f34 00126118 0011ddb2 001106a5 00110721
Code: 88 08 ff 43 68 66 8b 53 38 66 c1 ea 08 8a 44 24 10 32 43 38

call info:
0018e300 t _ppp_read
0018e6a0 t _ppp_write
0018ebd0 t _ppp_ioctl
==========================================================================