ksymoops 2.4.9 on i686 2.6.0-test11-evms.2.1.1-t8. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.6.0-test11-evms.2.1.1-t8/ (default) -m /boot/System.map-2.6.0-test11-evms.2.1.1-t8 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_ksyms stat /proc/ksyms failed No modules in ksyms, skipping objects No ksyms, skipping lsmod Unable to handle kernel NULL pointer dereference at virtual address 00000000 c8149f4d *pde = 00000000 Oops: 0002 [#1] CPU: 0 EIP: 0060:[__crc_journal_force_commit+920922/961439] Not tainted EFLAGS: 00010046 eax: c5e87000 ebx: c2eecc00 ecx: c5b28060 edx: 00000000 esi: c5e87000 edi: c5fb2000 ebp: 00000286 esp: c5fb3f10 ds: 007b es: 007b ss: 0068 Stack: c5fff610 00000020 c480a0c0 c03b1f70 c011a869 c5b28060 00000002 c5e87000 00000008 00000000 00000001 c814c2d5 c5e87000 c036ae40 00000092 c8152020 c2f72040 fffccf1d 00000000 c8152024 c8152020 c5fb2000 c8149b00 c5e87000 Call Trace: Warning (Oops_read): Code line not seen, dumping what data is available >>eax; c5e87000 <__crc_i2c_add_driver+15ae58/21534d> >>ebx; c2eecc00 <__crc_simple_fill_super+1ebd59/1fff5e> >>ecx; c5b28060 <__crc_ide_pci_register_host_proc+28d276/4913be> >>esi; c5e87000 <__crc_i2c_add_driver+15ae58/21534d> >>edi; c5fb2000 <__crc_load_nls+70b0b/318077> >>esp; c5fb3f10 <__crc_load_nls+72a1b/318077> Code: 89 02 8b 41 04 8b 53 04 8b 40 3c 89 42 3c 8b 41 04 8b 53 04 Using defaults from ksymoops -t elf32-i386 -a i386 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 89 02 mov %eax,(%edx) Code; 00000002 Before first symbol 2: 8b 41 04 mov 0x4(%ecx),%eax Code; 00000005 Before first symbol 5: 8b 53 04 mov 0x4(%ebx),%edx Code; 00000008 Before first symbol 8: 8b 40 3c mov 0x3c(%eax),%eax Code; 0000000b Before first symbol b: 89 42 3c mov %eax,0x3c(%edx) Code; 0000000e Before first symbol e: 8b 41 04 mov 0x4(%ecx),%eax Code; 00000011 Before first symbol 11: 8b 53 04 mov 0x4(%ebx),%edx 2 warnings and 1 error issued. Results may not be reliable. ksymoops 2.4.9 on i686 2.6.0-test11-evms.2.1.1-t8. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.6.0-test11-evms.2.1.1-t8/ (default) -m /boot/System.map-2.6.0-test11-evms.2.1.1-t8 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_ksyms stat /proc/ksyms failed No modules in ksyms, skipping objects No ksyms, skipping lsmod Unable to handle kernel NULL pointer dereference at virtual address 00000000 c8149f4d *pde = 00000000 Oops: 0002 [#1] CPU: 0 EIP: 0060:[__crc_journal_force_commit+920922/961439] Not tainted EFLAGS: 00010046 eax: c5e87000 ebx: c2f7dc00 ecx: c5b2a060 edx: 00000000 esi: c5e87000 edi: c5fb2000 ebp: 00000286 esp: c5fb3f10 ds: 007b es: 007b ss: 0068 Stack: c5fff610 00000020 c4a89080 c03b1f70 c011a869 c5b2a060 00000002 c5e87000 00000008 00000000 00000001 c814c2d5 c5e87000 c036ae40 00000092 c8152020 c2c1d900 fffd33f0 00000000 c8152024 c8152020 c5fb2000 c8149b00 c5e87000 Call Trace: Warning (Oops_read): Code line not seen, dumping what data is available >>eax; c5e87000 <__crc_i2c_add_driver+15ae58/21534d> >>ebx; c2f7dc00 <__crc_seq_release_private+7cdfb/550a6b> >>ecx; c5b2a060 <__crc_ide_pci_register_host_proc+28f276/4913be> >>esi; c5e87000 <__crc_i2c_add_driver+15ae58/21534d> >>edi; c5fb2000 <__crc_load_nls+70b0b/318077> >>esp; c5fb3f10 <__crc_load_nls+72a1b/318077> Code: 89 02 8b 41 04 8b 53 04 8b 40 3c 89 42 3c 8b 41 04 8b 53 04 Using defaults from ksymoops -t elf32-i386 -a i386 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 89 02 mov %eax,(%edx) Code; 00000002 Before first symbol 2: 8b 41 04 mov 0x4(%ecx),%eax Code; 00000005 Before first symbol 5: 8b 53 04 mov 0x4(%ebx),%edx Code; 00000008 Before first symbol 8: 8b 40 3c mov 0x3c(%eax),%eax Code; 0000000b Before first symbol b: 89 42 3c mov %eax,0x3c(%edx) Code; 0000000e Before first symbol e: 8b 41 04 mov 0x4(%ecx),%eax Code; 00000011 Before first symbol 11: 8b 53 04 mov 0x4(%ebx),%edx 2 warnings and 1 error issued. Results may not be reliable. ksymoops 2.4.9 on i686 2.6.0-test9-evms.2.6-t8. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.6.0-test9-evms.2.6-t8/ (default) -m /boot/System.map-2.6.0-test9-evms.2.6-t8 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_ksyms stat /proc/ksyms failed No modules in ksyms, skipping objects No ksyms, skipping lsmod Unable to handle kernel paging request at virtual address 2e1201bb c813ef4e *pde = 00000000 Oops: 0002 [#1] CPU: 0 EIP: 0060:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010046 eax: c5b29800 ebx: c2901200 ecx: c5b2a060 edx: 2e1201ab esi: c5b29800 edi: c5fb2000 ebp: 00000286 esp: c5fb3f10 ds: 007b es: 007b ss: 0068 Stack: c5fff610 00000020 c1152840 c5a5dd2c c011a939 c5b2a060 00000002 c5b29800 00000008 00000000 00000001 c81412e5 c5b29800 c5a5f940 00000092 c8147020 c5214660 23af27fa 00000000 c8147024 c8147020 c5fb2000 c813eb00 c5b29800 Call Trace: [] schedule+0x2f9/0x5b0 [] is_complete+0x2a5/0x2f0 [aha152x] [] run+0x40/0x50 [aha152x] [] worker_thread+0x1dd/0x2d0 [] run+0x0/0x50 [aha152x] [] default_wake_function+0x0/0x30 [] ret_from_fork+0x6/0x14 [] default_wake_function+0x0/0x30 [] worker_thread+0x0/0x2d0 [] kernel_thread_helper+0x5/0x10 Code: 89 42 10 8b 41 04 8b 53 04 8b 40 3c 89 42 3c 8b 41 04 8b 53 >>EIP; c813ef4e <__crc_journal_force_commit+d5d5b/eab9f> <===== >>eax; c5b29800 <__crc_parport_register_device+12b509/32deb1> >>ebx; c2901200 <__crc___copy_from_user_ll+f6cdb/4f6982> >>ecx; c5b2a060 <__crc_parport_register_device+12bd69/32deb1> >>edx; 2e1201ab <__crc_abi_fake_utsname+6b38a/10adc4> >>esi; c5b29800 <__crc_parport_register_device+12b509/32deb1> >>edi; c5fb2000 <__crc_load_nls+70b0b/318077> >>esp; c5fb3f10 <__crc_load_nls+72a1b/318077> Trace; c011a939 Trace; c81412e5 <__crc_journal_force_commit+d80f2/eab9f> Trace; c813eb00 <__crc_journal_force_commit+d590d/eab9f> Trace; c012d16d Trace; c813eac0 <__crc_journal_force_commit+d58cd/eab9f> Trace; c011ac40 Trace; c01091c2 Trace; c011ac40 Trace; c012cf90 Trace; c0107205 Code; c813ef4e <__crc_journal_force_commit+d5d5b/eab9f> 00000000 <_EIP>: Code; c813ef4e <__crc_journal_force_commit+d5d5b/eab9f> <===== 0: 89 42 10 mov %eax,0x10(%edx) <===== Code; c813ef51 <__crc_journal_force_commit+d5d5e/eab9f> 3: 8b 41 04 mov 0x4(%ecx),%eax Code; c813ef54 <__crc_journal_force_commit+d5d61/eab9f> 6: 8b 53 04 mov 0x4(%ebx),%edx Code; c813ef57 <__crc_journal_force_commit+d5d64/eab9f> 9: 8b 40 3c mov 0x3c(%eax),%eax Code; c813ef5a <__crc_journal_force_commit+d5d67/eab9f> c: 89 42 3c mov %eax,0x3c(%edx) Code; c813ef5d <__crc_journal_force_commit+d5d6a/eab9f> f: 8b 41 04 mov 0x4(%ecx),%eax Code; c813ef60 <__crc_journal_force_commit+d5d6d/eab9f> 12: 8b 53 00 mov 0x0(%ebx),%edx 1 warning and 1 error issued. Results may not be reliable.