How to break the kernel, part 2

Jason Duerstock (jduersto@kendall.mdcc.edu)
Thu, 22 Feb 1996 21:03:45 -0500


This was caused using the great dd stress test under 1.3.68. See my
other message for specifics.

general protection: 0000
CPU: 0
EIP: 0010:[<00126218>]
EFLAGS: 00010217
eax: 002e8700 ebx: 9f00b641 ecx: 0000002c edx: 001ec000
esi: 002e8700 edi: 002e8700 ebp: 00000001 esp: 01626cbc
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process dd (pid: 208, process nr: 4, stackpage=01626000)
Stack: 00000000 00000004 00000800 00001000 00000001 000002e0 0000478c 00000800
9f00b641 00126bc5 00000800 0000478c 00000400 0000000c 00000800 00000400
00000000 00000800 00129130 00000800 01626f74 00000400 018f73f0 00100000
Call Trace: [<00126bc5>] [<00129130>] [<001220c8>] [<00121fac>] [<0010a4b9>]
Code: 83 7b 0c 00 0f 84 1e 04 00 00 89 df 8b 44 24 2c 89 44 24 18
Using `../System.map' to map addresses to symbols.

>>EIP: 126218 <reassign_cluster+58/4b0>
Trace: 126bc5 <generate_cluster+145/160>
Trace: 129130 <block_read+3c0/680>
Trace: 1220c8 <sys_write+f8/110>
Trace: 121fac <sys_read+8c/b0>
Trace: 10a4b9 <system_call+59/a0>

Code: 126218 <reassign_cluster+58/4b0> cmpl $0x0,0xc(%ebx)
Code: 12621c <reassign_cluster+5c/4b0> je 126640 <reassign_cluster+480/4b0>
Code: 126222 <reassign_cluster+62/4b0> movl %ebx,%edi
Code: 126224 <reassign_cluster+64/4b0> movl 0x2c(%esp,1),%eax
Code: 126228 <reassign_cluster+68/4b0> movl %eax,0x18(%esp,1)