linux-image-2.6.35-15-generic panicing for first usage of ppp connection

Bug #618636 reported by Joel Soete
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Fix Released
Undecided
Unassigned

Bug Description

Binary package hint: linux-image-2.6.35-15-generic

Hello all,

I installed ubuntu 10.04 since few month and just play to upgrade to next release.
Nowadays that linux 2.6.35 is recently released, I try to install latest ubuntu package namely linux-image-2.6.35-15-generic.
All seems to work fine until I open gnome desktop and start firefox: the system panics.
I so manage to come back to my custom kernel to change /etc/default/grub to boot from serial console to grab more info in the attached file ubt1.txt (collected from dows hyperterminal).
Without launching firefox, I also try to send ubuntu-bug report but it fails: that's like this that I figure out that system panicing when it uses ppp connection.

I also try to download those kernel src tree and rebuild a custom kernel from my operational custom 2.6.34 .config but it doesn't help at all

Tags: kj-triage
Revision history for this message
Joel Soete (rubisher) wrote :
Revision history for this message
Joel Soete (rubisher) wrote :
Download full text (8.7 KiB)

As patch-2.6.35.2-3 was released, I apply it on my custom config but this time ppp simply failed to start:
Aug 21 17:41:04 sidh64 kernel: [ 20.176401] eth1: Link changed: 10Mbps, half duplex
Aug 21 17:41:04 sidh64 kernel: [ 20.389054] general protection fault: 0000 [#1] SMP
Aug 21 17:41:04 sidh64 kernel: [ 20.389213] last sysfs file: /sys/devices/virtual/net/lo/operstate
Aug 21 17:41:04 sidh64 kernel: [ 20.389285] CPU 4
Aug 21 17:41:04 sidh64 kernel: [ 20.389333] Modules linked in: nvidia(P) tpm_tis parport_pc tpm agpgart parport tpm_bios i7core_edac edac_core i2o_config i2o_block ide_pci_generic ide_core
Aug 21 17:41:04 sidh64 kernel: [ 20.390105]
Aug 21 17:41:04 sidh64 kernel: [ 20.390169] Pid: 1770, comm: pppd Tainted: P 2.6.35.3-amd64-t0 #2 EX58-UD3R/EX58-UD3R
Aug 21 17:41:04 sidh64 kernel: [ 20.390261] RIP: 0010:[<ffffffff810e4d9b>] [<ffffffff810e4d9b>] put_page+0x1b/0x180
Aug 21 17:41:04 sidh64 kernel: [ 20.390400] RSP: 0018:ffff880137b93bf8 EFLAGS: 00010292
Aug 21 17:41:04 sidh64 kernel: [ 20.390470] RAX: 0000000000000030 RBX: aed7aed77ea97ea9 RCX: 000000000000b941
Aug 21 17:41:04 sidh64 kernel: [ 20.390543] RDX: ffff880138d45640 RSI: ffff880137b3f700 RDI: aed7aed77ea97ea9
Aug 21 17:41:04 sidh64 kernel: [ 20.390617] RBP: ffff880137b3f700 R08: 0000000000000000 R09: 0000000000000000
Aug 21 17:41:04 sidh64 kernel: [ 20.390690] R10: 0000000000000000 R11: 0000000000000246 R12: ffff880137b93e58
Aug 21 17:41:04 sidh64 kernel: [ 20.390764] R13: ffff88013b285000 R14: 000000000000003c R15: 00000000000005f0
Aug 21 17:41:04 sidh64 kernel: [ 20.390838] FS: 00007f9f24fb5700(0000) GS:ffff880001f00000(0000) knlGS:0000000000000000
Aug 21 17:41:04 sidh64 kernel: [ 20.390928] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
Aug 21 17:41:04 sidh64 kernel: [ 20.390999] CR2: 00007f657f021cfc CR3: 000000013ca8d000 CR4: 00000000000006e0
Aug 21 17:41:04 sidh64 kernel: [ 20.391072] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
Aug 21 17:41:04 sidh64 kernel: [ 20.391146] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Aug 21 17:41:04 sidh64 kernel: [ 20.391220] Process pppd (pid: 1770, threadinfo ffff880137b92000, task ffff88013e192e60)
Aug 21 17:41:04 sidh64 kernel: [ 20.391309] Stack:
Aug 21 17:41:04 sidh64 kernel: [ 20.391372] ffff880137b3f500 0000000000000001 ffff880137b3f700 ffff880137b93e58
Aug 21 17:41:04 sidh64 kernel: [ 20.391576] <0> ffff88013b285000 ffffffff81465be7 ffff88013b285000 ffff880137b3f700
Aug 21 17:41:04 sidh64 kernel: [ 20.391883] <0> 0000000000000000 ffffffff814656f1 ffff88013b285000 ffffffff81469a8c
Aug 21 17:41:04 sidh64 kernel: [ 20.392250] Call Trace:
Aug 21 17:41:04 sidh64 kernel: [ 20.392318] [<ffffffff81465be7>] ? skb_release_data+0x77/0xd0
Aug 21 17:41:04 sidh64 kernel: [ 20.392390] [<ffffffff814656f1>] ? __kfree_skb+0x11/0x90
Aug 21 17:41:04 sidh64 kernel: [ 20.392462] [<ffffffff81469a8c>] ? skb_free_datagram+0xc/0x40
Aug 21 17:41:04 sidh64 kernel: [ 20.392535] [<ffffffff815304c9>] ? packet_recvmsg+0x1b9/0x4d0
Aug 21 17:41:04 sidh64 kernel: [ 20.392606] [<ffffffff8145d8bd>] ? sock_recvmsg+0xed/0x140
Aug 21 17:41:...

Read more...

tags: added: kj-triage
Revision history for this message
Joel Soete (rubisher) wrote :

Issue fixed by Jarek Poplawski patch <https://lkml.org/lkml/2010/12/25/17>.

Cheers,
    J.

Revision history for this message
Joel Soete (rubisher) wrote :

Fix submitted upstream here: <https://lkml.org/lkml/2010/12/25/28>

Successfully tested also on 2.6.36.2 vanilla src tree.

Changed in linux (Ubuntu):
status: New → Fix Released
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.