ksymoops 2.4.9 on i686 2.6.0-test6-mm1. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.6.0-test6-mm1/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_ksyms stat /proc/ksyms failed No modules in ksyms, skipping objects No ksyms, skipping lsmod Machine check exception polling timer started. e100: selftest OK. e100: eth0: Intel(R) PRO/100 Network Connection cs: memory probe 0x0c0000-0x0fffff: excluding 0xc0000-0xcffff 0xe0000-0xfffff Unable to handle kernel paging request at virtual address e1962000 c0305009 *pde = 1fde9067 Oops: 0002 [#1] CPU: 0 EIP: 0060:[] Not tainted VLI Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010206 eax: 00000000 ebx: 00000002 ecx: 000013ee edx: 00005fb8 esi: 00002fdc edi: e1962000 ebp: de8e39e0 esp: da8b3f14 ds: 007b es: 007b ss: 0068 Stack: 00000002 0809723f 00002fdc dc3cb400 c178ec80 c02f21df 00000002 e1961000 00002fdc d61e6b00 de8e39e0 c1792600 d61e6b00 c02f3641 de8e39e0 d61e6b00 d61e6b00 00000000 dffc06c0 c1671c80 c015bba2 c1671c80 d61e6b00 c167c680 Call Trace: [] snd_pcm_oss_sync+0x69/0x15f [] snd_pcm_oss_release+0x22/0xc3 [] __fput+0x10c/0x11e [] filp_close+0x59/0x86 [] sys_dup2+0xe6/0x124 [] syscall_call+0x7/0xb Code: 24 e8 8d fe ff ff 89 f1 8b 7c 24 1c eb ea 89 1c 24 e8 7d fe ff ff 66 85 c0 89 c2 75 1f 8d 14 36 31 c0 8b 7c 24 1c 89 d1 c1 e9 02 ab f6 c2 02 74 02 66 ab f6 c2 01 74 01 aa eb be 89 f0 83 ee >>EIP; c0305009 <===== >>edx; 00005fb8 <__crc_ide_cmd_ioctl+47d2/34adda> >>esi; 00002fdc <__crc_ide_cmd_ioctl+17f6/34adda> >>edi; e1962000 <__crc_snd_component_add+2d018e/7434f6> >>ebp; de8e39e0 <__crc_mpage_readpages+afd2e/102408> >>esp; da8b3f14 <__crc_sock_setsockopt+10cd10/156291> Trace; c02f21df Trace; c02f3641 Trace; c015bba2 <__fput+10c/11e> Trace; c015a273 Trace; c016bcc4 Trace; c03a0b8f This architecture has variable length instructions, decoding before eip is unreliable, take these instructions with a pinch of salt. Code; c0304fde 00000000 <_EIP>: Code; c0304fde 0: 24 e8 and $0xe8,%al Code; c0304fe0 2: 8d lea (bad),%edi Code; c0304fe1 3: fe (bad) Code; c0304fe2 4: ff (bad) Code; c0304fe3 5: ff 89 f1 8b 7c 24 decl 0x247c8bf1(%ecx) Code; c0304fe9 b: 1c eb sbb $0xeb,%al Code; c0304feb d: ea 89 1c 24 e8 7d fe ljmp $0xfe7d,$0xe8241c89 Code; c0304ff2 14: ff (bad) Code; c0304ff3 15: ff 66 85 jmp *0xffffff85(%esi) Code; c0304ff6 18: c0 89 c2 75 1f 8d 14 rorb $0x14,0x8d1f75c2(%ecx) Code; c0304ffd 1f: 36 ss Code; c0304ffe 20: 31 c0 xor %eax,%eax Code; c0305000 22: 8b 7c 24 1c mov 0x1c(%esp,1),%edi Code; c0305004 26: 89 d1 mov %edx,%ecx Code; c0305006 28: c1 e9 02 shr $0x2,%ecx This decode from eip onwards should be reliable Code; c0305009 00000000 <_EIP>: Code; c0305009 <===== 0: f3 ab repz stos %eax,%es:(%edi) <===== Code; c030500b 2: f6 c2 02 test $0x2,%dl Code; c030500e 5: 74 02 je 9 <_EIP+0x9> Code; c0305010 7: 66 ab stos %ax,%es:(%edi) Code; c0305012 9: f6 c2 01 test $0x1,%dl Code; c0305015 c: 74 01 je f <_EIP+0xf> Code; c0305017 e: aa stos %al,%es:(%edi) Code; c0305018 f: eb be jmp ffffffcf <_EIP+0xffffffcf> Code; c030501a 11: 89 f0 mov %esi,%eax Code; c030501c 13: 83 .byte 0x83 Code; c030501d 14: ee out %al,(%dx) 1 warning and 1 error issued. Results may not be reliable.