Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932176AbWAPDDZ (ORCPT ); Sun, 15 Jan 2006 22:03:25 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S932191AbWAPDDZ (ORCPT ); Sun, 15 Jan 2006 22:03:25 -0500 Received: from uproxy.gmail.com ([66.249.92.192]:31193 "EHLO uproxy.gmail.com") by vger.kernel.org with ESMTP id S932179AbWAPDDY convert rfc822-to-8bit (ORCPT ); Sun, 15 Jan 2006 22:03:24 -0500 DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:date:from:to:cc:subject:message-id:in-reply-to:references:x-mailer:mime-version:content-type:content-transfer-encoding; b=OzH2RS/nttqPHfmUhVPgEHiup9B+ZHpRkfZkCTf4yw+TZ+KbylP9LfKq1SfNbVBU6PUpmGICdKjr6AidsD/japhzWBTBoGwm55PRcYwbJHr//PdVZMi5hr5u7c1oSOSln6n7wGWaIoPGm+AFYvS/+xTtETSCTxuLUy6Q6Nk1NRM= Date: Mon, 16 Jan 2006 04:03:02 +0100 From: Diego Calleja To: Serge Belyshev Cc: linux-kernel@vger.kernel.org, vitalyb@telenet.dn.ua, netdev@vger.kernel.org Subject: Re: linux 2.6.15.1 ppp_async panic on x86-64. Message-Id: <20060116040302.9d3041d8.diegocg@gmail.com> In-Reply-To: <56slrpz0j7.fsf@depni.sinp.msu.ru> References: <20060115214838.2034a56c.vitalyb@telenet.dn.ua> <20060115210948.4e2990a7.diegocg@gmail.com> <56slrpz0j7.fsf@depni.sinp.msu.ru> X-Mailer: Sylpheed version 2.1.6 (GTK+ 2.8.9; i486-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-15 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 5640 Lines: 77 This should have been forwaded to netdev I think (forwading there) El Sun, 15 Jan 2006 23:41:48 +0300, Serge Belyshev escribi?: Diego Calleja writes: > > El Sun, 15 Jan 2006 21:48:38 +0200, > > "Vitaly V. Bursov" escribi?: > ... > >> PPP doesn't work for me on a x86-64 kernel. Kernel panics with a message > ... > >> Jan 15 20:24:12 vb skb_over_panic: text:ffffffff886700d9 len:1 put:1 > >> head:ffff81002b7ed000 data:ffff81012b7ed000 tail:ffff81012b7ed001 > >> end:ffff81002b7ed600 dev: > ... > > Just for the record, there're more people hitting this > > http://bugzilla.kernel.org/show_bug.cgi?id=5857 > > I can confirm this with a similar oops: > > [ 273.950666] skb_over_panic: text:ffffffff882d8c19 len:54 put:54 head:ffff81001cfecd60 data:ffff81011cfecd63 tail:ffff81011cfecd99 end:ffff81001cfed360 dev: > [ 273.950681] ----------- [cut here ] --------- [please bite here ] --------- > [ 273.950684] Kernel BUG at net/core/skbuff.c:94 > [ 273.950686] invalid operand: 0000 [1] PREEMPT > [ 273.950689] CPU 0 > [ 273.950691] Modules linked in: ppp_deflate bsd_comp ppp_async ppp_generic slhc pl2303 usbserial radeon drm af_packet ipv6 pcmcia firmware_class bridge deflate zlib_deflate zlib_inflate twofish serpent aes blowfish des sha256 sha1 af_key binfmt_misc dm_mod asus_acpi button thermal processor battery evdev eth1394 snd_intel8x0 snd_intel8x0m snd_ac97_codec snd_ac97_bus snd_pcm_oss snd_mixer_oss snd_pcm irtty_sir snd_timer ohci1394 snd sir_dev irda 8250_pci ide_cd yenta_socket rsrc_nonstatic pcmcia_core amd64_agp ehci_hcd psmouse pcspkr parport_pc parport 8250 serial_core ieee1394 cdrom ohci_hcd usbcore crc_ccitt i2c_nforce2 i2c_core soundcore snd_page_alloc rtc agpgart unix > [ 273.950728] Pid: 4, comm: events/0 Not tainted 2.6.15-ssb1dbg #3 > [ 273.950731] RIP: 0010:[skb_over_panic+96/112] {skb_over_panic+96} > [ 273.950739] RSP: 0018:ffff81001fe19d78 EFLAGS: 00010096 > [ 273.950742] RAX: 00000000000000ab RBX: 0000000000000036 RCX: ffffffff803b5d58 > [ 273.950745] RDX: ffff81001ff38080 RSI: 0000000000000082 RDI: 0000000000000001 > [ 273.950749] RBP: ffff81001fe19d98 R08: 0000000000000005 R09: 0000000000000000 > [ 273.950752] R10: 0000000000000000 R11: 0000000000000000 R12: ffff81000c4c18e8 > [ 273.950755] R13: 000000000000003f R14: ffff8100164a8801 R15: ffff81011cfecd63 > [ 273.950759] FS: 00002aaaab3a96d0(0000) GS:ffffffff80575800(0000) knlGS:0000000000000000 > [ 273.950763] CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b > [ 273.950766] CR2: 0000000000c55000 CR3: 0000000019e81000 CR4: 00000000000006e0 > [ 273.950770] Process events/0 (pid: 4, threadinfo ffff81001fe18000, task ffff81001ff38080) > [ 273.950772] Stack: ffff81011cfecd99 ffff81001cfed360 ffffffff80323edb ffff81000c4c18e8 > [ 273.950779] ffff81001fe19df8 ffffffff882d8c23 ffff81000c4c19a0 ffff81000c4c1918 > [ 273.950785] ffff8100164a8401 ffff8100164a8000 > [ 273.950789] Call Trace:{:ppp_async:ppp_asynctty_receive+579} > [ 273.950800] {flush_to_ldisc+291} {worker_thread+512} > [ 273.950816] {flush_to_ldisc+0} {default_wake_function+0} > [ 273.950827] {thread_return+191} {worker_thread+0} > [ 273.950839] {kthread+217} {_spin_unlock_irq+20} > [ 273.950848] {schedule_tail+73} {child_rip+8} > [ 273.950858] {kthread+0} {child_rip+0} > [ 273.950871] > [ 273.950874] > [ 273.950875] Code: 0f 0b 68 fe fe 32 80 c2 5e 00 c9 c3 66 66 66 90 55 49 89 d2 > [ 273.950885] RIP {skb_over_panic+96} RSP > [ 273.950891] <3>Debug: sleeping function called from invalid context at include/linux/rwsem.h:43 > [ 273.950895] in_atomic():1, irqs_disabled():1 > [ 273.950897] > [ 273.950898] Call Trace:{__might_sleep+187} {profile_task_exit+29} > [ 273.950907] {do_exit+37} {_spin_unlock_irqrestore+29} > [ 273.950917] {die+84} {do_trap+269} > [ 273.950929] {do_invalid_op+157} {skb_over_panic+96} > [ 273.950941] {error_exit+0} {skb_over_panic+96} > [ 273.950962] {skb_over_panic+96} {:ppp_async:ppp_asynctty_receive+579} > [ 273.950975] {flush_to_ldisc+291} {worker_thread+512} > [ 273.950990] {flush_to_ldisc+0} {default_wake_function+0} > [ 273.950999] {thread_return+191} {worker_thread+0} > [ 273.951011] {kthread+217} {_spin_unlock_irq+20} > [ 273.951020] {schedule_tail+73} {child_rip+8} > [ 273.951029] {kthread+0} {child_rip+0} > [ 273.951042] > [ 273.951046] note: events/0[4] exited with preempt_count 1 > > (this is 2.6.15-ck2 + few local hacks with debugging config) - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/