[ale] Em

jj at spiderentertainment.com jj at spiderentertainment.com
Fri Oct 8 17:24:39 EDT 1999


In these HEX numbers, is there an IP address I can extract ?


> Oct  8 15:42:54 spiderone kernel: *pde = 17bb8067
> Oct  8 15:42:54 spiderone kernel: *pte = 00000000
> Oct  8 15:42:54 spiderone kernel: Oops: 0000
> Oct  8 15:42:54 spiderone kernel: CPU:    0
> Oct  8 15:42:54 spiderone kernel: EIP:    0010:[random_read+84/344]
> Oct  8 15:42:54 spiderone kernel: EFLAGS: 00010283
> Oct  8 15:42:54 spiderone kernel: eax: 8255c29d   ebx: c06628d8   ecx:
> 0000002c   edx: 000005b4
> Oct  8 15:42:54 spiderone kernel: esi: 401f3fe5   edi: 1c058080   ebp:
> 06150e34   esp: 06150ddc
> Oct  8 15:42:54 spiderone kernel: ds: 0018   es: 0018   fs: 002b   gs:
> 002b   ss: 0018
> Oct  8 15:42:54 spiderone kernel: Process httpd (pid: 11806, process nr:
> 356, stackpage=06150000)
> Oct  8 15:42:54 spiderone kernel: Stack: 1c058668 000005b4 401f3fc5
> 0014bafa 401f3fc5 1c058060 000005b4 0000000
> 0
> Oct  8 15:42:54 spiderone kernel:        12fca414 ffffffea 00004475
> 00000400 1c05804c 00000000 0000008f 1c05866
> 8
> Oct  8 15:42:54 spiderone kernel:        000005b4 000005b4 401f3fc5
> 000016d5 00002da0 001b9e48 00000000 0014bbf
> 9
> Oct  8 15:42:54 spiderone kernel: Call Trace:
> [tcp_conn_request_fake+210/1284] [tcp_conn_request_fake+465/1284]
>  [ip_fw_chk+1585/1948] [block_read+574/1464] [block_read+1030/1464]
> [elf_core_dump+2196/2616] [load_aout_binary
> +263/1520]
> Oct  8 15:42:54 spiderone kernel:        [sys_swapoff+33/736]
> [block_read+1435/1464] [get_cpuinfo+173/752]
> Oct  8 15:42:54 spiderone kernel: Code: 64 8b 5e 18 11 d8 89 5f 18 64 8b
> 5e 1c 11 d8 89 5f 1c 8d 76
>
> here's a cut from dmesg
>
> 4070429 659a92d1 c51f9c3e 00000000 36393731 3536203a
>        32394139 303a3144 20303530 46313543 45334339 3234303a 37302041
> 30303020
> Call Trace: [<00130050>] [<0014722f>] [<001462e9>] [<00162611>]
> [<00112d65>] [<00129a10>] [<00110b05>]
>        [<0011002b>]
> Code: 8b 40 04 89 44 24 14 8b 54 24 14 52 31 c0 85 f6 74 06 8b 83
> Aiee, killing interrupt handler
> general protection: 0000
> CPU:    0
> EIP:    0010:[<0014616a>]
> EFLAGS: 00010202
> eax: 64736f2f   ebx: 0f670414   ecx: 00000000   edx: 00000000
> esi: 00000000   edi: 00000180   ebp: 00000000   esp: 0cef7e78
> ds: 0018   es: 0018   fs: 002b   gs: 002b   ss: 0018
> Process netstat (pid: 32276, process nr: 541, stackpage=0cef7000)
> Stack: 0be97000 0019de04 1d438374 00000400 ffffffff 00000000 0cef7eb0
> 00038580
>        00000709 00130050 1a9e0429 659a92d1 c51f9c3e 00000000 30303831
> 3536203a
>        32394139 303a3144 20303530 46313543 45334339 3234303a 37302041
> 30303020
> Call Trace: [<00130050>] [<0014722f>] [<001462e9>] [<00162611>]
> [<00129a10>] [<00110b05>] [<0011002b>]
> Code: 8b 40 04 89 44 24 14 8b 54 24 14 52 31 c0 85 f6 74 06 8b 83
> Aiee, killing interrupt handler






More information about the Ale mailing list