Here's one of the GP's, hopefully it is of use:
general protection: 0000
CPU: 0
EIP: 0010:[tcp_recvmsg+368/1036]
EFLAGS: 00010202
eax: f000e987 ebx: 00000000 ecx: 0278e438 edx: f000f84d
esi: 0278e4d4 edi: 000001a0 ebp: 0278e414 esp: 026e0ee8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process diablo (pid: 7596, process nr: 27, stackpage=026e0000)
Stack: 0278e414 026e0f7c 00000000 00000000 0aaf2b20 0278e438 00000000 000001a0
00d4d414 00ada924 fab021cd 0014de32 0278e414 026e0f78 00000e3c 00000000
00000000 026e0f7c 00000fdc 00ada8dc 080a6518 00ada968 001349ef 00ada968
Call Trace: [inet_recvmsg+114/136] [sock_read+171/192] [sys_read+192/232] [system_call+85/128]
Code: 8a 40 0d a8 02 74 04 ff 4c 24 10 8b 7c 24 10 39 7b 30 0f 87
Mike.
-- Miquel van | Cistron Internet Services -- Alphen aan den Rijn. Smoorenburg, | mailto:info@cistron.nl http://www.cistron.nl/ miquels@cistron.nl | PTT's Het Net: Surfen in de gootsteen!