ksymoops 2.4.4 on i686 2.4.21-pre5-ac1. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.21-pre5-ac1/ (default) -m /boot/System.map-2.4.21-pre5-ac1 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Warning (expand_objects): object /lib/ext3.o for module ext3 has changed since load Warning (expand_objects): object /lib/jbd.o for module jbd has changed since load Unable to handle kernel paging request at virtual address ec11bee8 c012f1be *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010087 eax: cabc1a40 ebx: c12155d0 ecx: c12155d0 edx: 00000800 esi: 00000246 edi: cabc1a40 ebp: cabc1d00 esp: c07bfd50 ds: 0018 es: 0018 ss: 0018 Process gzip (pid: 3787, stackpage=c07bf000) Stack: 00000018 00000018 ffffff0b c0211a44 cafc3200 000001f0 00000568 c82c5b9c c01c482c 000006bc 000001f0 cbb614e0 00000000 c01e21b2 00000680 000001f0 00000000 00000058 00000016 00000046 00000001 c016fe76 c13ef2e0 00000000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 44 81 18 0f af fa 89 41 14 01 ef 40 75 23 8b 41 04 8b 11 >>EIP; c012f1be <===== Trace; c0211a44 Trace; c01c482c Trace; c01e21b2 Trace; c016fe76 Trace; c01a1f14 Trace; c01a7710 Trace; c01daab2 Trace; c0116b58 <__wake_up+38/60> Trace; c01dae65 Trace; c01a7bc7 Trace; c01fd1f5 Trace; c01c18af Trace; cc870344 <[3c59x]boomerang_rx+2a4/450> Trace; c016fda1 Trace; c01c1ac7 Trace; c0120d16 Trace; c0137306 Trace; c011d8cb Trace; c011d7d4 Trace; c011d5fb Trace; c0109dec Trace; c010883b Code; c012f1be 00000000 <_EIP>: Code; c012f1be <===== 0: 8b 44 81 18 mov 0x18(%ecx,%eax,4),%eax <===== Code; c012f1c2 4: 0f af fa imul %edx,%edi Code; c012f1c5 7: 89 41 14 mov %eax,0x14(%ecx) Code; c012f1c8 a: 01 ef add %ebp,%edi Code; c012f1ca c: 40 inc %eax Code; c012f1cb d: 75 23 jne 32 <_EIP+0x32> c012f1f0 Code; c012f1cd f: 8b 41 04 mov 0x4(%ecx),%eax Code; c012f1d0 12: 8b 11 mov (%ecx),%edx <1>Unable to handle kernel paging request at virtual address ec11bee8 c012f1be *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010087 eax: cabc1a40 ebx: c12155d0 ecx: c12155d0 edx: 00000800 esi: 00000246 edi: cabc1a40 ebp: cabc1d00 esp: c0717d50 ds: 0018 es: 0018 ss: 0018 Process sed (pid: 3792, stackpage=c0717000) Stack: c0663cc0 c82c51dc c82c51dc c01ec6d8 cbb613a0 000001f0 ffffffe0 c82c51dc c01c482c 000006bc 000001f0 c82c5118 c0717f30 c01e21b2 00000680 000001f0 00000082 c8f3d620 00000046 c016fda1 00000615 fc4c8917 0000000b 00000000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 44 81 18 0f af fa 89 41 14 01 ef 40 75 23 8b 41 04 8b 11 >>EIP; c012f1be <===== Trace; c01ec6d8 Trace; c01c482c Trace; c01e21b2 Trace; c016fda1 Trace; c0116b58 <__wake_up+38/60> Trace; c016fda1 Trace; c0116b58 <__wake_up+38/60> Trace; c016fda1 Trace; c016fe76 Trace; c01a2e2b Trace; c01a7781 Trace; c01fd1f5 Trace; c01c18af Trace; c010734b <__switch_to+2b/100> Trace; c0116af7 Trace; c01c1ac7 Trace; c0137306 Trace; c0109c3a Trace; c0109db8 Trace; c0109ddc Trace; c010883b Code; c012f1be 00000000 <_EIP>: Code; c012f1be <===== 0: 8b 44 81 18 mov 0x18(%ecx,%eax,4),%eax <===== Code; c012f1c2 4: 0f af fa imul %edx,%edi Code; c012f1c5 7: 89 41 14 mov %eax,0x14(%ecx) Code; c012f1c8 a: 01 ef add %ebp,%edi Code; c012f1ca c: 40 inc %eax Code; c012f1cb d: 75 23 jne 32 <_EIP+0x32> c012f1f0 Code; c012f1cd f: 8b 41 04 mov 0x4(%ecx),%eax Code; c012f1d0 12: 8b 11 mov (%ecx),%edx <1>Unable to handle kernel paging request at virtual address ec11bee8 c012f1be *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010083 eax: cabc1a40 ebx: c12155d0 ecx: c12155d0 edx: 00000800 esi: 00000246 edi: cabc1a40 ebp: cabc1d00 esp: c081dd50 ds: 0018 es: 0018 ss: 0018 Process sendbackup (pid: 3785, stackpage=c081d000) Stack: 00000000 00000000 c9f02ea0 c081ddb4 c0663860 000001f0 ffffffe0 c82c56bc c01c482c 000006bc 000001f0 c82c55f8 c081df30 c01e21b2 00000680 000001f0 0001803b c0138cd8 cbb2cb00 00000305 c0138ce9 c135e000 00000000 cbb2cb00 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 44 81 18 0f af fa 89 41 14 01 ef 40 75 23 8b 41 04 8b 11 >>EIP; c012f1be <===== Trace; c01c482c Trace; c01e21b2 Trace; c0138cd8 Trace; c0138ce9 Trace; cc80dc19 <[jbd]do_get_write_access+469/490> Trace; cc80dc78 <[jbd]journal_get_write_access+38/50> Trace; cc81fff1 <[ext3]ext3_reserve_inode_write+31/b0> Trace; cc820143 <[ext3]ext3_dirty_inode+93/d0> Trace; cc81ff84 <[ext3]ext3_mark_iloc_dirty+24/60> Trace; cc81ff95 <[ext3]ext3_mark_iloc_dirty+35/60> Trace; cc80e571 <[jbd]journal_stop+1b1/1c0> Trace; c01fd1f5 Trace; c01c18af Trace; c01c1ac7 Trace; c0137306 Trace; c0109c3a Trace; c011cf2b Trace; c010883b Code; c012f1be 00000000 <_EIP>: Code; c012f1be <===== 0: 8b 44 81 18 mov 0x18(%ecx,%eax,4),%eax <===== Code; c012f1c2 4: 0f af fa imul %edx,%edi Code; c012f1c5 7: 89 41 14 mov %eax,0x14(%ecx) Code; c012f1c8 a: 01 ef add %ebp,%edi Code; c012f1ca c: 40 inc %eax Code; c012f1cb d: 75 23 jne 32 <_EIP+0x32> c012f1f0 Code; c012f1cd f: 8b 41 04 mov 0x4(%ecx),%eax Code; c012f1d0 12: 8b 11 mov (%ecx),%edx <1>Unable to handle kernel paging request at virtual address ec11bee8 c012f1be *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010087 eax: cabc1a40 ebx: c12155d0 ecx: c12155d0 edx: 00000800 esi: 00000246 edi: cabc1a40 ebp: cabc1d00 esp: c028de84 ds: 0018 es: 0018 ss: 0018 Process swapper (pid: 0, stackpage=c028d000) Stack: c019a74b c01a820b 00000001 cbb61760 cba6b760 00000020 cbe7b400 00000109 c01c482c 0000065c 00000020 0000008c cbe7b400 cc8703d6 00000620 00000020 0000001f 00000000 00009400 0000001f cbe7b560 00000001 00000096 cb266000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 8b 44 81 18 0f af fa 89 41 14 01 ef 40 75 23 8b 41 04 8b 11 >>EIP; c012f1be <===== Trace; c019a74b Trace; c01a820b <__ide_dma_begin+2b/40> Trace; c01c482c Trace; cc8703d6 <[3c59x]boomerang_rx+336/450> Trace; c011644b Trace; c01ef5bb Trace; cc86fabf <[3c59x]boomerang_interrupt+12f/3a0> Trace; c012124d Trace; c0109c3a Trace; c0109db8 Trace; c0106de0 Trace; c0105000 <_stext+0/0> Trace; c010c1c8 Trace; c0106de0 Trace; c0106de0 Trace; c0105000 <_stext+0/0> Trace; c0106e03 Trace; c0106e54 Code; c012f1be 00000000 <_EIP>: Code; c012f1be <===== 0: 8b 44 81 18 mov 0x18(%ecx,%eax,4),%eax <===== Code; c012f1c2 4: 0f af fa imul %edx,%edi Code; c012f1c5 7: 89 41 14 mov %eax,0x14(%ecx) Code; c012f1c8 a: 01 ef add %ebp,%edi Code; c012f1ca c: 40 inc %eax Code; c012f1cb d: 75 23 jne 32 <_EIP+0x32> c012f1f0 Code; c012f1cd f: 8b 41 04 mov 0x4(%ecx),%eax Code; c012f1d0 12: 8b 11 mov (%ecx),%edx <0>Kernel panic: Aiee, killing interrupt handler! 3 warnings issued. Results may not be reliable.