someone was also trying to run an imap exploit against me at the time if
that is any help :-)
Dave.
general protection: 0000
CPU: 0
EIP: 0010:[<0014c826>]
EFLAGS: 00010206
eax: 5243424f ebx: 06b1fc80 ecx: 06b1fbf8 edx: 00f27b90
esi: 034fc414 edi: 0100007f ebp: 034fc414 esp: 00c94f28
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process ping (pid: 19906, process nr: 54, stackpage=00c94000)
Stack: 00000000 06b1fc10 06b1fc80 0014130a 034fc414 06b1fc80 00191fa4 0100007f
0100007f 00000000 06b1fc80 0018d158 001a0008 067c8de0 02f344e8 00000000
00000000 00000001 ffffff01 00000101 0100007f 0805be60 00000246 0013a12c
Call Trace: [<0014130a>] [<0013a12c>] [<00117c5b>] [<0010a5af>]
Code: 66 8b 40 02 86 c4 25 ff ff 00 00 50 57 8b 42 24 0f b7 40 0c
Using `/boot/System.map' to map addresses to symbols.
>>EIP: 14c826 <raw_rcv+fa/120>
Trace: 14130a <ip_rcv+46a/578>
Trace: 13a12c <net_bh+fc/11c>
Trace: 117c5b <do_bottom_half+3b/60>
Trace: 10a5af <handle_bottom_half+b/18>
Code: 14c826 <raw_rcv+fa/120> movw 0x2(%eax),%ax
Code: 14c82a <raw_rcv+fe/120> xchgb %al,%ah
Code: 14c82c <raw_rcv+100/120> andl $0xffff,%eax
Code: 14c831 <raw_rcv+105/120> pushl %eax
Code: 14c832 <raw_rcv+106/120> pushl %edi
Code: 14c833 <raw_rcv+107/120> movl 0x24(%edx),%eax
Code: 14c836 <raw_rcv+10a/120> movzwl 0xc(%eax),%eax
Code: 14c83a <raw_rcv+10e/120>
------------ David Airlie, David.Airlie@ul.ie,airlied@skynet --------
Telecommunications Research Centre, ECE Dept, University of Limerick \
http://www.csn.ul.ie/~airlied -- Telecommunications Researcher \
--- TEL: +353-61-202695 -----------------------------------------------
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/