Oops under 2.1.105-ac2 while shutdowing

Malware (Michael.Mueller4@post.rwth-aachen.de)
Tue, 09 Jun 1998 22:50:39 +0200


This is a multi-part message in MIME format.
--------------324A48A1D5649C45FF1C406D
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Hi,

I got appended Oops while shuting down the system.

Malware
--------------324A48A1D5649C45FF1C406D
Content-Type: text/plain; charset=us-ascii; name="ooops_on_reboot_2.1.105-ac2.with-syms.txt"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="ooops_on_reboot_2.1.105-ac2.with-syms.txt"

Unable to handle kernel NULL pointer dereference at virtual address 00000030
current->tss.cr3 = 022c9000, ^_r3 = 022c9000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c014d765>]
EFLAGS: 00010216
eax: 00000017 ebx: 0000005c ecx: 00000017 edx: c134e05c
esi: 00000030 edi: c134e05c ebp: c134e058 esp: c23efed4
ds: 0018 es: 0018 ss: 0018
Process kerneld (pid: 72, process nr: 5, stackpage=c23ef000)
Stack: c2079c00 c30376d4 c01c798d c134e000 00000060 00000060 c014da3d c2079c00
00000007 0000005c 00000030 c2079c00 c30376d4 c0095920 bffffc44 c01c79bc
c01c7988 00000005 c134e000 000005dc c014dbe6 c2079c00 c30376d4 00000011
Call Trace: [<c30376d4>] [<c014da3d>] [<c30376d4>] [<c014dbe6>] [<c30376d4>] [<c014e0f4>] [<c30376d4>]
[<c014b1e4>] [<c30376d4>] [<c30376d4>] [<c0194584>] [<c30376d4>] [<c30376d4>] [<c3036f02>] [<c30376d4>]
[<c30376d4>] [<c3036000>] [<c3036000>] [<c0116024>] [<c3036000>] [<c3024000>] [<c01156f8>] [<c3036000>]
[<c01099d4>]
Code: f3 a5 f6 c3 02 74 02 66 a5 f6 c3 01 74 01 a4 5b 5e 5f 5d 83

Using `/boot/l21106.map' to map addresses to symbols.

>>EIP: c014d765 <__rta_fill+75/8c>
Trace: c30376d4
Trace: c014da3d <rtnetlink_fill_ifinfo+26d/2b0>
Trace: c30376d4
Trace: c014dbe6 <rtmsg_ifinfo+2a/68>
Trace: c30376d4
Trace: c014e0f4 <rtnetlink_event+1c/24>
Trace: c30376d4
Trace: c014b1e4 <unregister_netdevice+3c/c0>
Trace: c30376d4
Trace: c30376d4
Trace: c0194584 <unregister_netdev+10/20>
Trace: c30376d4
Trace: c30376d4
Trace: c3036f02
Trace: c30376d4
Trace: c30376d4
Trace: c3036000
Trace: c3036000
Trace: c0116024 <free_module+20/9c>
Trace: c3036000
Trace: c3024000
Trace: c01156f8 <sys_delete_module+198/1d8>
Trace: c3036000
Trace: c01099d4 <system_call+38/3c>
Code: c014d765 <__rta_fill+75/8c>
Code: c014d765 <__rta_fill+75/8c> f3 a5 repz movsl %ds:(%esi),%es:(%edi)
Code: c014d767 <__rta_fill+77/8c> f6 c3 02 testb $0x2,%bl
Code: c014d76a <__rta_fill+7a/8c> 74 02 je c014d76e <__rta_fill+7e/8c>
Code: c014d76c <__rta_fill+7c/8c> 66 a5 movsw %ds:(%esi),%es:(%edi)
Code: c014d76e <__rta_fill+7e/8c> f6 c3 01 testb $0x1,%bl
Code: c014d777 <__rta_fill+87/8c> 74 01 je c014d774 <__rta_fill+84/8c>
Code: c014d779 <__rta_fill+89/8c> a4 movsb %ds:(%esi),%es:(%edi)
Code: c014d77a <__rta_fill+8a/8c> 5b popl %ebx
Code: c014d77b <__rta_fill+8b/8c> 5e popl %esi
Code: c014d77c <rtnetlink_send> 5f popl %edi
Code: c014d77d <rtnetlink_send+1/54> 5d popl %ebp
Code: c014d77e <rtnetlink_send+2/54> 83 00 90 addl $0xffffff90,(%eax)
Code: c014d787 <rtnetlink_send+b/54> 90 nop
Code: c014d788 <rtnetlink_send+c/54> 90 nop

--------------324A48A1D5649C45FF1C406D--

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu