OOPS on 2.0.33

Dave Airlie (airlied@skynet.csn.ul.ie)
Fri, 25 Sep 1998 21:46:54 +0100 (IST)


Got this in my system recently .. it's a 2.0.33 kernel and Redhat-4.2 ..

someone was also trying to run an imap exploit against me at the time if
that is any help :-)

Dave.

general protection: 0000
CPU: 0
EIP: 0010:[<0014c826>]
EFLAGS: 00010206
eax: 5243424f ebx: 06b1fc80 ecx: 06b1fbf8 edx: 00f27b90
esi: 034fc414 edi: 0100007f ebp: 034fc414 esp: 00c94f28
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process ping (pid: 19906, process nr: 54, stackpage=00c94000)
Stack: 00000000 06b1fc10 06b1fc80 0014130a 034fc414 06b1fc80 00191fa4 0100007f
0100007f 00000000 06b1fc80 0018d158 001a0008 067c8de0 02f344e8 00000000
00000000 00000001 ffffff01 00000101 0100007f 0805be60 00000246 0013a12c
Call Trace: [<0014130a>] [<0013a12c>] [<00117c5b>] [<0010a5af>]
Code: 66 8b 40 02 86 c4 25 ff ff 00 00 50 57 8b 42 24 0f b7 40 0c

Using `/boot/System.map' to map addresses to symbols.

>>EIP: 14c826 <raw_rcv+fa/120>
Trace: 14130a <ip_rcv+46a/578>
Trace: 13a12c <net_bh+fc/11c>
Trace: 117c5b <do_bottom_half+3b/60>
Trace: 10a5af <handle_bottom_half+b/18>

Code: 14c826 <raw_rcv+fa/120> movw 0x2(%eax),%ax
Code: 14c82a <raw_rcv+fe/120> xchgb %al,%ah
Code: 14c82c <raw_rcv+100/120> andl $0xffff,%eax
Code: 14c831 <raw_rcv+105/120> pushl %eax
Code: 14c832 <raw_rcv+106/120> pushl %edi
Code: 14c833 <raw_rcv+107/120> movl 0x24(%edx),%eax
Code: 14c836 <raw_rcv+10a/120> movzwl 0xc(%eax),%eax
Code: 14c83a <raw_rcv+10e/120>

------------ David Airlie, David.Airlie@ul.ie,airlied@skynet --------
Telecommunications Research Centre, ECE Dept, University of Limerick \
http://www.csn.ul.ie/~airlied -- Telecommunications Researcher \
--- TEL: +353-61-202695 -----------------------------------------------

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/