[2.0.36] general protection

Matthew Wilcox (Matthew.Wilcox@genedata.com)
Sun, 9 May 1999 21:01:02 +0200


Just got this off our firewall. At the time, it was extracting the ssh
tarball. This is copied by hand, I didn't see anything of interest in
shift-scrolllock or ctrl-scrolllock.

general protection:0000
CPU: 0
EIP: 0010 [<00123bf8>]
EFLAGS:00010202
EAX: 00000170 ebx: 1a90300 ecx: f000e6f2 edx: 00000001
esi: 00000001 edi: 0000000 ebp: 001dc374 esp: 01464ee4
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process: tar pid 17121 process nr 64, stackpage=01464000
Stack: 00000000 001c5464 00123e51 020d1a00 00146574 00000009 0363a02f 0015d929
0015d95c 001dc374 00039842 00000001 020d1a00 01464f74 01464f74 00000009
020d1a00 00039842 0012ad7e 020d1a00 0363a02f 00000009 01464f74 00000000
Call Trace: [<00123e51>] [<0015d929>] [<0015d59c>] [<0012ad7e>] [<0012af92>]
+[<0012b04c>] [<001292c1>] [<0010a915>]
Code: 83 b9 80 00 00 00 00 75 22 ba e7 03 00 00 66 83 b9 88 00 00

Some relevant snippets from System.map:
0010a8c0 T system_call
0010a940 T ret_from_sys_call
...
00123bb4 T get_empty_inode
00123d10 T get_pipe_inode
00123df0 T __iget
00124010 t __wait_on_inode
...
00129298 T sys_newlstat
001292f0 T sys_fstat
...
0012aca0 T lookup
0012ad98 T follow_link
0012ae08 t dir_namei
0012af38 t _namei
0012b01c T lnamei
0012b064 T namei
...
0014618c t do_tcp_sendmsg
001467f0 t tcp_sendmsg
...
0015d8a8 T ext2_lookup
0015da18 t ext2_add_entry
...
001c4a4c b hash_table
001c5a4c b first_inode
...
001dc374 B super_blocks

-- 
Matthew Wilcox <willy@bofh.ai>
"Windows and MacOS are products, contrived by engineers in the service of
specific companies. Unix, by contrast, is not so much a product as it is a
painstakingly compiled oral history of the hacker subculture." - N Stephenson

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/