ksymoops 2.3.4 on i686 2.4.0-test8. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.0-test8/ (default) -m /boot/System.map-2.4.0-test8 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Sep 8 08:50:36 Defiant kernel: Unable to handle kernel paging request at virtual address c482ace0 Sep 8 08:50:36 Defiant kernel: c481d461 Sep 8 08:50:36 Defiant kernel: *pde = 03faf063 Sep 8 08:50:36 Defiant kernel: Oops: 0000 Sep 8 08:50:36 Defiant kernel: CPU: 0 Sep 8 08:50:36 Defiant kernel: EIP: 0010:[fat:__insmod_fat_S.bss_L2240+26305/51066103] Sep 8 08:50:36 Defiant kernel: EFLAGS: 00010282 Sep 8 08:50:36 Defiant kernel: eax: c482ace0 ebx: c3b7f8a0 ecx: 00000003 edx: 00000003 Sep 8 08:50:36 Defiant kernel: esi: c2fca320 edi: 00000003 ebp: 00000003 esp: c2f6df00 Sep 8 08:50:36 Defiant kernel: ds: 0018 es: 0018 ss: 0018 Sep 8 08:50:36 Defiant kernel: Process au (pid: 195, stackpage=c2f6d000) Sep 8 08:50:36 Defiant kernel: Stack: 00000000 c2fca320 c2de5ce0 c3fb07a0 00000000 c2fca320 c2de5ce0 c3fb07a0 Sep 8 08:50:36 Defiant kernel: 72616863 6a616d2d 312d726f c11b0034 00000287 c012bbe2 c2de5ce0 c2fca320 Sep 8 08:50:36 Defiant kernel: c2fca320 c2de5ce0 00000000 c012aee5 c2de5ce0 c2fca320 00000000 c11bd000 Sep 8 08:50:36 Defiant kernel: Call Trace: [chrdev_open+62/76] [dentry_open+189/340] [filp_open+82/92] [sys_open+56/180] [system_call+51/56] Sep 8 08:50:36 Defiant kernel: Code: 8b 10 85 d2 74 19 52 e8 ab b3 8f fb 83 c4 04 85 c0 74 10 8b Using defaults from ksymoops -t elf32-i386 -a i386 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 8b 10 mov (%eax),%edx Code; 00000002 Before first symbol 2: 85 d2 test %edx,%edx Code; 00000004 Before first symbol 4: 74 19 je 1f <_EIP+0x1f> 0000001f Before first symbol Code; 00000006 Before first symbol 6: 52 push %edx Code; 00000007 Before first symbol 7: e8 ab b3 8f fb call fb8fb3b7 <_EIP+0xfb8fb3b7> fb8fb3b7 Code; 0000000c Before first symbol c: 83 c4 04 add $0x4,%esp Code; 0000000f Before first symbol f: 85 c0 test %eax,%eax Code; 00000011 Before first symbol 11: 74 10 je 23 <_EIP+0x23> 00000023 Before first symbol Code; 00000013 Before first symbol 13: 8b 00 mov (%eax),%eax Sep 8 08:50:38 Defiant kernel: Unable to handle kernel paging request at virtual address c482ace0 Sep 8 08:50:38 Defiant kernel: c481d461 Sep 8 08:50:38 Defiant kernel: *pde = 03faf063 Sep 8 08:50:38 Defiant kernel: Oops: 0000 Sep 8 08:50:38 Defiant kernel: CPU: 0 Sep 8 08:50:38 Defiant kernel: EIP: 0010:[fat:__insmod_fat_S.bss_L2240+26305/51066103] Sep 8 08:50:38 Defiant kernel: EFLAGS: 00010282 Sep 8 08:50:38 Defiant kernel: eax: c482ace0 ebx: c3b7f8a0 ecx: 00000003 edx: 00000003 Sep 8 08:50:38 Defiant kernel: esi: c2b7b480 edi: 00000003 ebp: 00000003 esp: c2b8ff00 Sep 8 08:50:38 Defiant kernel: ds: 0018 es: 0018 ss: 0018 Sep 8 08:50:38 Defiant kernel: Process rplayd (pid: 214, stackpage=c2b8f000) Sep 8 08:50:38 Defiant kernel: Stack: 00000000 c2b7b480 c2de5ce0 c3fb07a0 00000000 c2b7b480 c2de5ce0 c3fb07a0 Sep 8 08:50:38 Defiant kernel: c2b8e000 00000001 c013480d 0000001d 00000287 c012bbe2 c2de5ce0 c2b7b480 Sep 8 08:50:38 Defiant kernel: c2b7b480 c2de5ce0 00000000 c012aee5 c2de5ce0 c2b7b480 00000000 c38c6000 Sep 8 08:50:38 Defiant kernel: Call Trace: [permission+149/244] [chrdev_open+62/76] [dentry_open+189/340] [filp_open+82/92] [sys_open+56/180] [system_call+51/56] Sep 8 08:50:38 Defiant kernel: Code: 8b 10 85 d2 74 19 52 e8 ab b3 8f fb 83 c4 04 85 c0 74 10 8b Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 8b 10 mov (%eax),%edx Code; 00000002 Before first symbol 2: 85 d2 test %edx,%edx Code; 00000004 Before first symbol 4: 74 19 je 1f <_EIP+0x1f> 0000001f Before first symbol Code; 00000006 Before first symbol 6: 52 push %edx Code; 00000007 Before first symbol 7: e8 ab b3 8f fb call fb8fb3b7 <_EIP+0xfb8fb3b7> fb8fb3b7 Code; 0000000c Before first symbol c: 83 c4 04 add $0x4,%esp Code; 0000000f Before first symbol f: 85 c0 test %eax,%eax Code; 00000011 Before first symbol 11: 74 10 je 23 <_EIP+0x23> 00000023 Before first symbol Code; 00000013 Before first symbol 13: 8b 00 mov (%eax),%eax 1 warning issued. Results may not be reliable.